Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,749,349 Computer security vulnerability assessment
Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification...
US-9,749,344 System and method of cyber threat intensity determination and application to cyber threat mitigation
A security system comprising a computer, a memory, a data store comprising a plurality of consensus evaluations and a plurality of cyber threat analyst ratings,...
US-9,749,343 System and method of cyber threat structure mapping and application to cyber threat mitigation
A security system comprising a computer, a memory, a data store comprising a cyber threat intent dictionary and a technology dictionary; and an application...
US-9,749,338 System security monitoring
A computing device may receive netflow data that includes information corresponding to network-side activity associated with a target device. The computing...
US-9,749,326 System and method for data center security enhancements leveraging server SOCs or server fabrics
A data center security system and method are provided that leverage server systems on a chip (SOCs) and/or server fabrics. In more detail, server interconnect...
US-9,749,302 Secure collection of sensitive data
In a method for securely collecting sensitive information, a first key entry made via a user interface is detected. Moreover, information is received via a...
US-9,749,299 Systems and methods for image-based encryption of cloud data
The disclosed computer-implemented method for image-based encryption of cloud data may include (1) identifying a user account for a cloud data store, wherein...
US-9,749,294 System and method of establishing trusted operability between networks in a network functions virtualization...
A system for establishing a trusted end-to-end communication link between different NFV networks is disclosed. The system comprises a server operating in a...
US-9,749,293 Systems for improved mobile internet performance and security
Systems and methods that efficiently combine multiple wireless networks or devices resulting in faster, more reliable, and more secure mobile Internet. A...
US-9,749,232 Intelligent medical network edge router
A medical network service can replace or supplement some or all of an expensive internally staffed clinical facility network with a cloud-based networking...
US-9,749,137 Method and system for securing the entry of data to a device
Crypto-glasses include systems that implement a method of authentication of users by blinking, the crypto-glasses including a frame configured so as to be worn...
US-9,749,132 System and method for secure deletion of data
Systems and methods for secure deletion of data items in a storage system may support the deletion of stored data item. In response to a storage request, a...
US-9,748,709 Grommet-mount electrical power unit assembly
An electrical receptacle assembly is mountable at an opening in a work surface to provide convenient access to electrical power and/or data. The assembly...
US-9,748,407 Semiconductor device and method of manufacturing same
An object is to provide a reliability-improved semiconductor device having a MONOS memory that rewrites data by injecting carriers into a charge storage...
US-9,747,769 Entry point opening sensor
A sensor package is disclosed that includes, a compass, an accelerometer, and an electromagnetic flux tag based open/close sensor. The compass may be activated...
US-9,747,735 Pattern analytics and physical access control system method of operation
A predictive physical access control and security intervention system includes a credential device, indicia sensors, portal actuators; and a data store of...
US-9,747,591 Online stock payment system
In general, this disclosure describes an electronic payment processing system that facilitates payment for goods or services using securities, such as stock. In...
US-9,747,570 Method and system for risk measurement and modeling
A method and system for risk measurement and modeling, which may be used to identify and mitigate information security risks for an information system, and...
US-9,747,470 Secure data processing method and use in biometry
The invention relates to a processing method, including the calculation of one function between a datum to be compared and a reference datum. The function can...
US-9,747,466 Hosted application gateway architecture with multi-level security policy and rule promulgations
A hosted application gateway server node may be communicatively coupled to backend systems, client devices, and database shards associated with database...
US-9,747,465 Systems and methods for secure data exchange and data tampering prevention
Systems and methods for secure data exchange and data tampering prevention. A secure data system receives electronic data files from data entities and stores...
US-9,747,460 Systems and methods for data sharing and transaction processing for high security documents
Systems and methods for data sharing and transaction processing for high security documents are disclosed. According to one embodiment, a method may include (1)...
US-9,747,456 Secure query processing over encrypted data
The subject disclosure is directed towards secure query processing over encrypted database records without disclosing information to an adversary except for...
US-9,747,444 System and method for providing network security to mobile devices
A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected...
US-9,747,439 Dynamic network tuner for the automated correlation of networking device functionality and network-related...
A dynamic network tuner establishes fluid, continuous, and automatic correlation between the extent and/or degree of a networking device's functionality, on the...
US-9,747,435 Authentication and control of encryption keys
An apparatus, a method, and a system are presented in which the apparatus may include a security circuit, a processor, and an interface controller. The security...
US-9,747,427 Storage device reader having security function and security method using thereof
Disclosed is a storage device reader for interfacing a storage device and a user terminal, which includes a storage unit and a control unit. The data storage...
US-9,747,220 Methods, apparatus, and systems for secure demand paging and other paging operations for processor devices
A secure demand paging system includes a secure internal memory having a table relating physical addresses to virtual addresses, a non-volatile memory, a...
US-9,747,218 CPU security mechanisms employing thread-specific protection domains
A computer processor includes an instruction processing pipeline that interfaces to a hierarchical memory system employing an address space. The instruction...
US-9,747,160 Securely storing data in a dispersed storage network
A method includes monitoring write processing performance while storing a plurality of sets of encoded data slices in storage units. The method includes...
US-9,746,913 Secured mobile maintenance and operator system including wearable augmented reality interface, voice command...
Secured remote maintenance, configuration management, and systems engineering apparatuses and methods including wearable augmented reality (AR) interface...
US-9,746,845 Support device, recording medium, and method for facilitating data exchange between different types of...
Provided is a support device that supports easier data exchange between PLCs without relying on a type of a PLC of the other communication party. The support...
US-9,746,519 Circuit for securing scan chain data
Methods, devices and circuits are provided for protecting secure data from being read during a scan chain output. A plurality of scan flip-flops is coupled in a...
US-9,746,429 Inspection and repair module
The invention relates to an inspection and repair module for an internal side wall of a vertically erected structure, with the module including a carrier for...
US-9,746,265 Secure smartphone-operated gun lock with means for overriding release of the lock
A gun locking and unlocking device, which may be configured to be disposed adjacent the trigger of a gun to alternatively prevent or enable firing, includes a...
US-9,745,782 Secure sealing device and method
The present invention concerns a secure sealing device 101 comprising at least a closure element 102 with an electrically conductive path 120, and a locking...
US-9,742,785 Power line communication (PLC) network nodes using cipher then segment security
Embodiments of the invention provide systems and methods for a cipher then segment approach in a Power Line Communication (PLC). A node or device generates...
US-9,742,752 Data backup and self-service data restoration
A user terminal stores security information for each of a plurality of files during a backup of the files. The user terminal also stores information regarding...
US-9,742,742 Secure data transfer system and method
Secure transfer of electronic files containing confidential information is achieved by selecting and copying files to be transferred to an intended recipient...
US-9,741,238 Security-focused network monitoring system
In some implementations, data from security monitoring devices of a facility is collected and analyzed within the facility and the results of the analysis is...
US-9,741,186 Providing wireless access to a secure lock based on various security data
A remote security access procedure for granting access to a wirelessly controlled lock may include one of receiving an address location at a server to setup a...
US-9,741,033 System and method for point of sale payment data credentials management using out-of-band authentication
The invention provides an easy to use credential management mechanism for multi-factor out-of-band multi-channel authentication process to protect payment...
US-9,741,032 Security broker
An attempted transaction is identified involving a customer device and the first customer device is redirected to a security broker. A security report for the...
US-9,741,024 Systems and methods of bank transfer
A financial institution and a payment initiator may exchange public keys to enable the secure exchange of data. A business wishing to collect payment can...
US-9,740,988 System and method for using unique device indentifiers to enhance security
A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can...
US-9,740,987 Generation of computer-based discovery avatars based on tokenization of prioritized source data
In embodiments of the present invention improved capabilities are described for developing, training, validating and deploying discovery avatars embodying...
US-9,740,886 Enhanced security for hardware decoder accelerator
A software security layer may be used to protect a system against exploitation of a hardware encoder accelerator by malicious data embedded in the one or more...
US-9,740,882 Sensor privacy mode
Technologies for sensor privacy on a computing device include receiving, by a sensor controller of the computing device, sensor data from a sensor of the...
US-9,740,879 Searchable encryption with secure and efficient updates
Methods, systems, and computer-readable storage media for selecting columns for using searchable encryption to query a database storing encrypted data....
US-9,740,876 Securely storing and provisioning security telemetry of multiple organizations for cloud based analytics
A cloud based system receives multiple types of security telemetry from multiple participating organizations. The received security telemetry can be...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.