Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,900,373 System for providing a service, such as a communication service
A system an method are provided for providing a service, such as telemonitoring, in particular via the Internet. The system includes a terminal device of a...
US-9,898,618 Securing a remote database
A database access system may protect a field by storing the field as one or more underlying fields within a database. The database engine may not have access to...
US-9,898,612 Multi-party encryption cube processing apparatuses, methods and systems
Computer-implemented systems and methods are disclosed herein for use within secure multi-party computation. A system and method are used for storing an...
US-9,895,725 Disk clamp and motor hub cleaning with stamping adhesive
An assembly configured to clean one or more selected structures of a device may comprise an end effector assembly, a material disposed on a surface of the end...
US-9,894,524 EHF secure communication device
A communication device employs a contactless secure communication interface to transmit and receive data with a computing device using close proximity extremely...
US-9,894,518 Server and method for remotely controlling working of communications terminal, and communications terminal
The present invention discloses a method for remotely controlling working of a communications terminal, and the method includes: receiving, in a push service...
US-9,894,517 Methods and apparatuses for handling data traffic in a radio node having a split protocol stack
In one aspect of the teachings herein, a radio node provides a local loopback mode of operation in at least some operational instances, in which it loops...
US-9,894,424 Method and system for converting between protocols
In an embodiment a protocol converter module for use with a gas transmitter assembly having a gas sensor, a controller, and a detector transceiver housed within...
US-9,894,141 Managed peer-to-peer applications, systems and methods for distributed data access and storage
Secure and remote operation of a remote computer from a local computer over a network includes authenticating a remote computer for connection to a computer...
US-9,894,093 Structuring data and pre-compiled exception list engines and internet protocol threat prevention
Blocking high-risk IP connections in real-time while allowing tailoring of an acceptable risk profile to match the security requirements of network resources....
US-9,894,087 System and method for uploading and verifying a document
A computer implemented method may allow for the upload and verification of a document. In one aspect, the method may receive a file at a data server associated...
US-9,894,085 Systems and methods for categorizing processes as malicious
The disclosed computer-implemented method for categorizing processes as malicious may include (1) storing, in a security application that tracks event data for...
US-9,894,083 System for providing a secure video display
A system for providing a secure video display using a one-way data link. An input interface for receives a video stream signal. The one-way data link has an...
US-9,894,080 Sequence hopping algorithm for securing goose messages
Embodiments of the present invention include methods and apparatuses for securing data transfer in power-system automation and smart grids. Embodiments of the...
US-9,894,077 Situational awareness system security features
Security features a situational awareness system using location tracking information including requiring a security identifier, such as a password or a bio...
US-9,894,063 Anonymizing biometric data for use in a security system
An anonymized biometric representation of a target individual is used in a computer based security system. A detailed input biometric signal associated with a...
US-9,894,061 Method for booting and dumping a confidential image on a trusted computer system
A method for booting and dumping a confidential image on a trusted computer system. Embodiments of the present invention disclose deploying a secure boot image...
US-9,894,058 System and method of secure personal identification
A system and method for securely and automatically identifying users to an inquirer for purposes of obtaining user identifying information is described. The...
US-9,894,040 Trust services for securing data in the cloud
Embodiments are directed to securing data in the cloud, securely encrypting data that is to be stored in the cloud and to securely decrypting data accessed from...
US-9,894,038 System security for network resource access using cross-firewall coded requests
A system includes a firewall, a first server located behind the firewall, and a second server located before the firewall. The second server is configured to...
US-9,893,995 Systems, methods, and apparatus for implementing agents in service appliances
The present disclosure describes several key features of an agent deployable on a service appliance: agent architecture/design, transport and channel...
US-9,893,881 Efficient sharing of hardware encryption pipeline for multiple security solutions
A processing or memory device may include a first encryption pipeline to encrypt and decrypt data with a first encryption mode and a second encryption pipeline...
US-9,893,880 Method for secure symbol comparison
A method for secure comparison of encrypted symbols. According to one embodiment, a user may encrypt two symbols, share the encrypted symbols with an untrusted...
US-9,892,422 Sales security integration
Disclosed are various embodiments of sales security integration. At least one embodiment of a method includes the steps of receiving contact data regarding a...
US-9,892,404 Secure identity authentication in an electronic transaction
An approach is provided for securely authenticating an identity of a user participating in an electronic transaction. A request for a biometric ...
US-9,892,403 Method, device and secure element for conducting a secured financial transaction on a device
A device and a secure element for conducting a secured financial transaction are disclosed. The device comprises a central processing unit; a communication...
US-9,892,276 Verifiable data destruction in a database
A computing device may determine that a policy event to initiate data destruction for a first set of data has been triggered. The first set of data may be...
US-9,892,271 Device lock control apparatus and method with device user identification using a thermal signature
A device includes a thermal infrared sensor and a processor, operatively coupled to the thermal IR sensor. The processor is configured to determine that the...
US-9,892,269 Techniques for data monitoring to mitigate transitive problem in object-oriented contexts
Techniques for mitigating the transitive data problem using a secure asset manager are provided. These techniques include generating a secure asset manager...
US-9,892,264 System and method for dynamic security provisioning of computing resources
The present invention facilitates the dynamic provisioning of computing and data assets in a commodity computing environment. The invention provides a system...
US-9,892,258 Automatic synthesis of unit tests for security testing
Performing security analysis on a computer program under test (CPUT). The CPUT can be analyzed to identify data pertinent to potential security vulnerabilities...
US-9,892,211 Searchable code processing system and method
In a searchable cipher system, the security of ciphertext, the optimization of the size of ciphertext and the optimization of the network traffic are not...
US-9,892,002 Incremental continuous data protection
Systems and techniques are provided for incremental Continuous Data Protection (iCDP) as a process to secure frequent, and space efficient, versions of...
US-9,891,945 Storage resource management in virtualized environments
Storage resource management in virtualized environments is provided. In this regard, when receiving a request for accessing a target general purpose partition...
US-9,891,675 Systems and methods for packaging high density SSDs
In various embodiments, a high-density solid-state storage unit includes a base section and a cassette section having plurality of flash cards. The cassette...
US-9,891,654 Secure clock switch circuit
An integrated circuit (IC) having a clock switch that switches the system clock between an internal clock and an external clock based on whether or not the IC...
US-9,888,384 Securing a wireless mesh network via a chain of trust
A master beacon device emits a data packet that is received and retransmitted by servant beacon devices in a wireless mesh network that enables the beacon...
US-9,888,382 Mobile data communication using biometric encryption
A mobile App using biometric encryption and decryption for privacy and security having both authentication and recognition functions. It utilizes the built-in...
US-9,888,371 Portable home and hotel security system
Systems and methods for monitoring a local environment for abnormal conditions (e.g., burglary, intrusion, fire, or flooding) are disclosed. Sensors of a...
US-9,888,290 Service denial notification in secure socket layer (SSL) processing
A data communication gateway. The gateway comprises a processor, a non-transitory memory, and an application stored in the non-transitory memory. When executed...
US-9,888,031 System and method thereof for identifying and responding to security incidents based on preemptive forensics
A system is connected to a plurality of user devices coupled to an enterprise's network. The system continuously collects, stores, and analyzes forensic data...
US-9,888,014 Enforcing security for sensitive data on database client hosts
A restriction agent resides on a database client host, the database client host receiving first data from a database secured by a database access control...
US-9,888,010 System and method for providing an integrated firewall for secure network communication in a multi-tenant...
An integrated firewall provides security in a multi-tenant environment having a connection-based switched fabric directly connecting database servers which...
US-9,887,998 Security model for data transfer using a shippable storage device
Data may be securely stored onto a shippable data storage device in order for the client data to be protected during shipment to the remote storage service...
US-9,887,994 Data processing based on two-dimensional code
The present disclosure provides example methods and apparatuses of data processing based on a two-dimensional code. The two-dimensional code is generated upon...
US-9,887,992 Sight codes for website authentication
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for site codes for website authentication are disclosed. In...
US-9,887,981 Single sign-on between multiple data centers
Systems and methods are disclosed for a single sign-on (SSO) enterprise system with multiple data centers that use a lightweight cookie on a user's client...
US-9,887,980 Global time based authentication of client devices
A system for authenticating client devices for communication with one or more wireless communications networks, includes a client device configured to receive a...
US-9,887,975 Systems and methods for delegated cryptography
In some embodiments, an authentication method comprises receiving a request for a digital signature of data from a delegate computer over a secure channel using...
US-9,887,971 Method and apparatus for secure energy delivery
A solar power conversion device embedded security module creates trusted metering data in relation to power generated and outputs it as metering data. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.