Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,734,644 Wireless camera facilitated building security
A security system permits limited access into a building for authorized visitors. The security system includes an access interface pad installable at a building...
US-9,734,492 Secure universal two-step payment authorization system
A system and methods expedite and make secure payment data entry, and payment and authorization and authorization, for both in-store and online purchases. A...
US-9,734,487 Useful data and content feeds in the enterprise
In a new Notification Service, applications can publish data and allow users to subscribe to that data how they wish, with methods for secure redaction and...
US-9,734,480 Method and apparatus for secure asset tracking
An approach is provided for providing a secure and energy efficient method of asset tracking using BLE tags. The security module determines identification...
US-9,734,456 Systems and methods for determining likelihood of incident occurrence
Determination of a user-specific likelihood of incident occurrence at a geographic location may be performed. User information, historical incident information,...
US-9,734,442 LumID barcode format
A security feature and a method for creating a barcode are disclosed. Data is concatenating to be represented in the barcode. The concatenated data is...
US-9,734,359 Always-available embedded theft reaction subsystem
A system to provide an always-on embedded anti-theft protection for a platform is described. The system comprises in one embodiment, a storage including...
US-9,734,358 Self-locking USB protection pug device having LED to securely protect USB jack
Methods, devices and system for enhancing computer information security by physically blocking unused USB ports with self-locking devices, or by providing USB...
US-9,734,354 Notarizable electronic paper
A system and method helps to control "read" and/or "write" access to electronic paper (e-paper). Informational data may be on a restricted portion of e-paper...
US-9,734,346 Device and method for providing security in remote digital forensic environment
An apparatus and method for collecting digital evidence from a target system to be analyzed at a remote location and then providing security in a remote digital...
US-9,734,338 System on chip to perform a secure boot, an image forming apparatus using the same, and method thereof
A system on chip is provided. The system on chip includes a first memory to store a plurality of encryption keys, a second memory, a third memory to store an...
US-9,734,336 Process security validation
Techniques for process security validation are described herein. In one example, a method includes determining, via a processor, that a process is in a first...
US-9,734,327 Methods for restricting resources used by an application based on a base profile and an application specific...
In response to a request for launching an application within an operating system of a data processing system, one or more extended entitlements are extracted...
US-9,734,325 Hypervisor-based binding of data to cloud environment for improved security
A method includes receiving a request at a first hypervisor from an application within a virtual machine. The virtual machine is executed within a...
US-9,734,281 Plastic packaging materials testing system based on internet of things and cloud technology
The invention discloses a plastic packaging material testing system and method based on internet of things and cloud technology. It includes: cloud computing...
US-9,734,169 Digital information infrastructure and method for security designated data and with granular data stores
Distributed computer system processes data having select content (SC) represented by one or more predetermined words, characters, etc. The system has a...
US-9,734,095 Nonvolatile memory data security
Keys are generated at a memory device with a period of time elapsing between generation of each key. A request is received from a memory controller for the most...
US-9,734,094 Computer security system and method
A computer security system and method comprises a security device (1) which incorporates a connection arrangement (12i) which is configured to be connected to a...
US-9,734,092 Secure support for I/O in software cryptoprocessor
Methods and systems for securing sensitive data from security risks associated with direct memory access ("DMA") by input/output ("I/O") devices are provided....
US-9,734,016 Secure live virtual machine guest based snapshot recovery
A system, method, and apparatus for secure live virtual machine guest based snapshot recovery. A virtual machine sends a request to access a snapshot of a first...
US-9,733,975 System and method for implementing network experience shifting
Novel tools and techniques are provided for implementing network experience shifting, and, in particular embodiments, using either a roaming or portable...
US-9,733,849 Gateway for cloud-based secure storage
The systems and methods disclosed herein transparently provide an improved scalable cloud-based dynamically adjustable or configurable storage volume. In one...
US-9,733,639 Dynamic facility management system
Disclosed is a dynamic facility management system that is able to start quickly and monitor a state when various measuring instruments are attached to or...
US-9,730,033 Offline content distribution networks
Approaches, techniques, and mechanisms are disclosed for the secure distribution of media content to devices having minimal or no Internet connectivity....
US-9,730,001 Proximity based authentication using bluetooth
Techniques for securing communications between fixed devices and mobile devices. A mobile device management server mediates communications between the fixed...
US-9,729,864 Camera based safety mechanisms for users of head mounted displays
The disclosure provides methods and systems for warning a user of a head mounted display that the user approaches an edge of field of view of a camera or one or...
US-9,729,836 Information processing system and method, information processing apparatus, image-capturing device and method,...
A feature extracting unit obtains sensor data from a plurality of sensors to calculate each feature. When an event determining unit determines the occurrence of...
US-9,729,628 Systems and methods for enabling temporary, user-authorized cloning of mobile phone functionality on a secure...
Temporary, user-authorized cloning of physical mobile phone functionality via a secure server can enable physical mobile phone features to be accessed and...
US-9,729,554 Secure data transmission
A system may include a first network in which user device(s) and a HIP server are communicably coupled. The first network may include a secure data...
US-9,723,651 Enhanced connection management for multiple access networks
Semi-connected state operation for UEs in multiple-access networks is described. In the semi-connected state, UEs may monitor system information and paging, and...
US-9,723,436 Mobile device location
A mobile device is associated with a mobile communications network. The mobile device comprises: a transmitter for sending a request, to the mobile...
US-9,723,055 System and method for acceleration of a secure transmission over satellite
A broadband communication system with improved latency is disclosed. The system employs acceleration of secure web-based communications over a satellite...
US-9,723,019 Infected endpoint containment using aggregated security status information
In one example, a network device may store health status information specifying a current security status for each of a plurality of authenticated endpoint...
US-9,723,015 Detecting malware-related activity on a computer
Detecting malware-related activity on a computer by detecting activity associated with the creation of a data object, where the activity is performed by a...
US-9,723,014 Detecting malware-related activity on a computer
Detecting malware-related activity on a computer by detecting activity associated with the creation of a data object, where the activity is performed by a...
US-9,723,013 Secondary asynchronous background authorization (SABA)
A system for identify threats to the security of an owner's electronic information by performing a secondary background authorization (SABA) that is transparent...
US-9,723,009 System and method for providing for secure network communication in a multi-tenant environment
A security solution provides secure communication in a multi-tenant environment which includes a connection-based fabric, storage cells holding data associated...
US-9,723,008 System and method for providing an integrated firewall for secure network communication in a multi-tenant...
An integrated firewall provides security in a multi-tenant environment having a connection-based switched fabric directly connecting database servers which...
US-9,723,004 Method of controlling access to network drive, and network drive system
A network drive system for controlling access to a network drive based on location information on a communication device according to the present technology...
US-9,723,001 Method and system for state machine security device
A security device may be utilized to provide security measures to an electronic device that may incorporate the security device or be coupled to it. The...
US-9,722,994 User terminal for password-based authentication, and password-based trading terminal, system, and method
A user terminal, a password-based trading terminal, a system and a method for password-based authentication are provided. Wherein, the user terminal comprises a...
US-9,722,972 Methods and apparatuses for secure communication
A method of establishing a secure communications path between a first local server on a local network and a device on a wide area network comprising:...
US-9,722,919 Tying data plane paths to a secure control plane
In one embodiment, a router located at an exit edge of an autonomous system (AS) receives a data packet in a data plane, and determines a destination of the...
US-9,722,895 Vendor usage monitoring and vendor usage risk analysis system
A vendor usage assessment system analyzes network traffic from an enterprise data network and generates vendor usage analytics for the enterprise. In some...
US-9,721,111 Methods of dynamically securing electronic devices and other communications through environmental and system...
This invention is for a system capable of securing one or more fixed or mobile computing device and connected system. Each device is configured to change its...
US-9,716,690 Integrated security switch
An integrated security switch and related method for managing connectivity and security among networks. The integrated security switch includes a security...
US-9,715,601 Secure access in a microcontroller system
Systems, methods and computer-readable mediums are disclosed for providing secure access in a microcontroller system. In some implementations, a microcontroller...
US-9,713,574 Dose counting device for coupling with a medical container
The present invention relates to a dose counting device (10) for coupling with a medical container filled with a number N of doses of a product to be withdrawn...
US-9,712,564 System and method for providing network and computer firewall protection with dynamic address isolation to a device
A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to...
US-9,712,508 One-touch device personalization
Technologies for one-touch device personalization include at least two mobile computing devices configured to communicate with a personalization server. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.