Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,613,213 Using telemetry to reduce malware definition package size
Clients send telemetry data to a cloud server, where the telemetry data includes security-related information such as file creations, timestamps and malware...
US-9,613,190 Systems and methods of secure data exchange
An example method for managing digital rights management (DRM) protected content sharing in a networked secure collaborative computer data exchange environment...
US-9,613,163 Efficient packet forwarding using cyber-security aware policies
For balancing load, a forwarder can selectively direct data from the forwarder to a processor according to a loading parameter. The selective direction includes...
US-9,612,904 Memory system and method for securing volatile memory during sleep mode using the same ECC module used to...
In one embodiment, a memory system is provided comprising a volatile memory, a non-volatile memory, and an error correction code (ECC) module. The ECC module is...
US-9,612,782 Scheduled and secured cloud print services
Techniques are provided for processing scheduled and secured print requests. In one embodiment, a printing device receives a notification form a network service...
US-9,612,617 Wearable computing device for managing and storing data
The disclosed embodiments present a wearable computing device for storing and managing data. The wearable computing device includes a wristband including a...
US-9,611,403 Fluorescent security enabled ink for digital offset printing applications
An ink composition useful for digital offset printing applications comprises a fluorescent colorant and a plurality of curable compounds. The compounds have...
US-9,610,619 Supercritical fluid cleaning of banknotes and secure documents
A method and system for cleaning a secure instrument, such as a banknote, including a substrate, visual data and a security feature, including exposing the...
US-9,610,086 Method of manufacturing an arthroplasty jig
A method and system for performing a total joint arthroplasty procedure on a patient's damaged bone region. A CT image or other suitable image is formed of the...
US-9,609,399 Automatic reporting of prognosis data from wireless mesh sensors to cloud
A apparatus is provided that includes a plurality of wireless sensors arranged into a mesh network, wherein each of the plurality of sensors detects threats...
US-9,609,129 System and method for secure transmission of data signals
The present invention provides systems and methods for controlling signaling data transmitted over a communication system between a first party and a second...
US-9,609,026 Segmented networks that implement scanning
Systems for providing scanning within distributed services are provided herein. In some embodiments, a system includes a plurality of segmented environments...
US-9,609,023 System and method for software defined deployment of security appliances using policy templates
A method includes retrieving, from a memory accessible by a computer, a document comprising a workload definition document that defines an intended virtual...
US-9,609,018 System and methods for reducing impact of malicious activity on operations of a wide area network
System architecture and methods for controlling improper network activity in a wide area network, where the system includes multiple service provider devices...
US-9,609,011 Interface having selectable, interactive views for evaluating potential network compromise
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-9,609,009 Network security threat detection by user/user-entity behavioral analysis
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-9,609,003 Generating risk profile using data of home monitoring and security system
Systems and methods are described comprising a touchscreen that includes a processor coupled to a security system at a premises. A plurality of user interfaces...
US-9,608,999 Smart beacon data security
A secure beacon-based system includes beacons that may generate dynamic beacon identifiers. A mobile device application may send a request to an application...
US-9,608,987 Systems and methods for the secure sharing of data
In various embodiments, a computer-implemented method for sharing tasks over one or more computer networks is disclosed. The method includes providing a task...
US-9,608,979 Systems, methods, and computer program products for securely managing data on a secure element
Systems, methods, and computer program products are provided for managing applets. A first request to personalize the first applet is received over a...
US-9,608,973 Security management system including multiple relay servers and security management method
The present invention relates to a security management system of a computer network, which includes a center server and two or more relay servers. The relay...
US-9,608,840 Virtualized on-demand service delivery between data networks via secure exchange network
In one embodiment, a method comprises determining, by a network edge device in a first autonomous network, whether a second network edge device in a second...
US-9,608,812 Common secret key generation device, encryption device, decryption device, common secret key generation method,...
Public data including a prime number p, a natural number d, a matrix Q, and a matrix S are acquired by a public data acquisition section, and secret key...
US-9,608,810 Systems and methods for encryption and provision of information security using platform services
Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in...
US-9,608,809 Systems and methods for encryption and provision of information security using platform services
Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in...
US-9,608,802 Decoy bits method for direct encryption and key generation
A new cryptographic technique is disclosed, called decoy bits method, which can be used to obtain near ideal information theoretic security in both quantum and...
US-9,607,518 Vehicle accident recorder and method for generating accident information thereof
Disclosed herein are vehicle accident recorders and methods for generating accident information thereof. A method may include receiving an accident message...
US-9,607,501 Systems and methods for providing emergency resources
A personal security system for use with a personal communication device is disclosed that is capable of sending position information regarding the location of...
US-9,607,462 System for anti-tamper parcel packaging, shipment, receipt, and storage
An apparatus and system for secure packaging, shipment, receipt and storage of mail, parcels and parcels is described. The apparatus includes an applique with a...
US-9,607,337 Data capture and real time risk controls for electronic markets
A distributed, transparent, in-line risk management and traffic capture system that solves securities trading compliance problems. A transparent cut-through...
US-9,607,300 Multi-layer transaction tracking
Embodiments for tracking multi-layer secured transactions include systems for providing a first transaction channel to a user and sending pre-authorization code...
US-9,607,298 System and method for providing secure data communication functionality to a variety of applications on a...
A system for providing an application associated with a portable communication device the ability to communicate via a secure element. The system has a digital...
US-9,607,177 Method for securing content in dynamically allocated memory using different domain-specific keys
A method operational within a memory controller is provided for securing content stored in memory. The memory controller may allocate logical memory regions...
US-9,607,176 Secure copy and paste of mobile app data
Secure transfer of mobile application content is disclosed. A state-related event associated with a managed application in a managed set of applications may be...
US-9,607,172 Electronic data security apparatus
An apparatus for providing security for an integrated circuit (IC) chip is disclosed. The apparatus may include the IC chip, attached to a surface of a printed...
US-9,607,170 Compromise free cloud data encryption and security
A cloud data encryption and security system includes a central computing authority and a network of computing devices. At least some of the computing devices...
US-9,607,168 Obfuscating a transaction in a dispersed storage system
A method begins by a processing module receiving a data segment for dispersed storage. The method continues with the processing module encoding the data segment...
US-9,607,155 Method and system for analyzing an environment
A system for analyzing an environment to identify a security risk in a process, comprising a model engine to generate a model of the environment using multiple...
US-9,607,151 Systems and methods involving features of hardware virtualization such as separation kernel hypervisors,...
Systems, methods, computer readable media and articles of manufacture consistent with innovations herein are directed to computer virtualization, computer...
US-9,607,099 Query conditions-based security
A method, system and article of manufacture for managing access to queries and, more particularly, for managing access by multiple users to persistently stored...
US-9,607,086 Providing prevalence information using query data
In one example, a data security system may determine prevalence of a file based query data for an object (e.g., a file or a hash or a file). An example...
US-9,606,939 Memory data security
A memory module secures data stored on the memory module. A request for the data from a computer system is received by the memory module. A verification key...
US-9,606,809 Computer with flexible operating system
Computer with flexible operating system, referred to the FOS Computer, it is an invention of the electronic information field, aimed at creating a unique...
US-9,606,065 Quantitative analysis method for measuring target element in specimen using laser-induced plasma spectrum
Disclosed herein is a quantitative analysis method for measuring a target element in a specimen using laser-induced plasma spectrum. More particularly, the...
US-9,604,695 Bicycle pedal with integrated security system
A locking bicycle pedal includes a ratcheting coiled cable with a male locking plug that mates with a female locking port. A lock, such as a resettable...
US-9,604,445 System and method for extracting triggered data from a variable data string and embedding the triggered data...
A system and method for securing a data stream containing data to be embedded in a bar code. The system comprising a printer, having a nontransitory storage...
US-9,604,102 Exercising apparatus
An apparatus is disclosed for enabling an operator to exercise comprising a frame having a body, a base and a top. A load is positioned on the frame for...
US-9,603,529 Optical speculum
A system for direct imaging and diagnosing of abnormal cells in a target tissue includes a disposable optical speculum and an image acquisition system having...
US-9,603,528 Optical speculum
A system for direct imaging and diagnosing of abnormal cells in a target tissue includes a disposable optical speculum and an image acquisition system having...
US-9,603,524 Portable biometric monitoring devices and methods of operating same
The present inventions, in one aspect, are directed to portable biometric monitoring device including a housing having a physical size and shape that is adapted...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.