Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,794,789 Proximity-based system that secures linked wireless-enabled devices
The proliferation of networked, wireless-enabled devices is challenged by the reliance upon password management and user knowledge of privacy and security...
US-9,794,787 System and method for limiting mobile device functionality
The present invention relates to systems and methods that employ various mechanisms to selectively disable mobile device functionality. In general, mobile...
US-9,794,775 Methods and devices for performing a mobile network switch
A method of performing a switch from a first mobile network to a second mobile network by a mobile terminal comprising a secure element includes the steps of:...
US-9,794,646 Method and device to embed watermark in uncompressed video data
A system and method to watermark an uncompressed content received at a client device in a compressed form and encrypted by at least one content key, said...
US-9,794,378 Network traffic controller (NTC)
A Network Device (ND) may be configured to enable secure digital video streaming for HD (high definition) digital video systems over a standard network. The ND...
US-9,794,368 Apparatus and method for managing subscriber profile in wireless communication system
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-9,794,299 Passive based security escalation to shut off of application based on rules event triggering
Embodiments of the invention are directed to a system, method, or computer program product for a passive based security escalation to shut off of applications...
US-9,794,297 Security compliance framework usage
A method and system for improving usage of a security compliance framework is provided. The method includes authenticating a user for: access to the security...
US-9,794,293 System and method for monitoring computing servers for possible unauthorized access
A system is provided that includes one or more computing servers and a processing circuit for monitoring data transactions of the computing servers. Each of the...
US-9,794,290 Quantitative security improvement system based on crowdsourcing
The efficacy of security products and practices is quantified, based on monitored activities and conditions on multiple computers over time. A set of metrics is...
US-9,794,274 Information processing apparatus, information processing method, and computer readable medium
An attack detection apparatus (6) collects packets a transmission source or a transmission destination of which is a protection target apparatus (5), and...
US-9,794,270 Data security and integrity by remote attestation
The invention includes a system comprising a device, software installed on the device and coupled to the device's hardware and software stack to execute data...
US-9,794,256 System and method for advanced control tools for administrators in a cloud-based service
A cloud-based platform (e.g., cloud-based collaboration and/or storage platform/service) is described that provides advanced control tools for administrators of...
US-9,794,247 Method to prevent cloning of electronic components using public key infrastructure secure hardware device
An electronic component includes a processor and a memory. The electronic component has a secure platform capable of storing at least one dual key pair and a...
US-9,794,246 Increased communication security
An apparatus may include a communication interface and a security component. The communication interface may be configured to receive a Constrained Application...
US-9,794,228 Security challenge assisted password proxy
Systems, apparatus, and methods of authentication utilizing contextual data to authenticate individuals and prevent security breaches are described herein. An...
US-9,794,224 System and method for creating a trusted cloud security architecture
The present invention provides a method for providing a computer implemented method and system for creating a trusted cloud security architecture having the...
US-9,794,096 Direct synchronization of synthesized clock
The Direct Synchronization of Synthesized Clock (DSSC) contributes a method, system and apparatus for reliable and inexpensive synthesis of inherently stable...
US-9,794,071 Digital data content certification system, data certification device, user terminal, computer program and...
A file is created in which digital data and a certificate are integrated and content authentication for the digital data and the certificate are performed...
US-9,794,064 Client(s) to cloud or remote server secure data or file object encryption gateway
Systems and methods to send or write data or file objects to a remote cloud storage or data server using an encryption gateway. In one embodiment, a...
US-9,794,059 Lightweight cyber secure bi-directional aircraft communications addressing and reporting system (ACARS)...
The present invention generally relates to systems and methods for encrypting data. The disclosed techniques can include tracking a plurality of flight...
US-9,793,960 NFC apparatus capable to perform a contactless tag reading function
An NFC device may include a first and second controller interfaces, a first communication channel coupled to the first controller interface, and a second...
US-9,792,790 Collective objects management system with enhanced security
A collective objects management system with enhanced security for objects contained in object receptacles distributed throughout the system. Each object...
US-9,792,783 Secure point of sale terminal and associated methods
Methods and systems for processing secure information are disclosed. One method includes receiving secure data from a user via an input device. The method also...
US-9,792,611 Secure authentication system and method
Methods and systems pertaining secure transaction systems are disclosed. In one implementation, a verification token is associated with a computer and can send...
US-9,792,606 Method and secure device for performing a secure transaction with a terminal
A method for performing a secure transaction between a secure device (2) and a terminal (4), the method being carried out by the secure device (2) and...
US-9,792,598 System and method for initially establishing and periodically confirming trust in a software application
Systems and methods for providing trust provisioning are disclosed. A utilization request requesting to utilize data stored by a secure element associated with...
US-9,792,595 Secure data transfer from a vending device to portable data storage devices
Techniques for transferring secured data from a vending device to a portable data storage device are described herein. The vending device receives a request...
US-9,792,513 Method for evolutionary biometric recognition having speed and security features suitable for POS/ATM applications
A method quickly recognizes a person by identification codes derivable from biometric data and includes registering a user, and recognizing a registered user,...
US-9,792,461 Control apparatus
PROBLEM Unauthorized reproduction by a third party is to be prohibited by preventing waveform monitoring on a circuit board and by providing security from the...
US-9,792,460 Method and apparatus for processing biometric information in electronic device
A method and apparatus for processing biometric information in an electronic device including a processor that operates at a normal mode or at a secure mode,...
US-9,792,458 Platform to build secure mobile collaborative applications using dynamic presentation and data configurations
System and method to provide access to protected data for a communication terminal, the system including: a publisher database configured to store protected...
US-9,792,455 Sensor aware security policies with embedded controller hardened enforcement
An information handling system (IHS) performs security policy enforcement using security policy data maintained in an embedded controller, which operates within...
US-9,792,454 Record level data security
A database security system protects a data table at both the column level and the individual data record level. Access to data records within the data table is...
US-9,792,448 Cryptographic protection of information in a processing system
A processor employs a hardware encryption module in the processor's memory access path to cryptographically isolate secure information. In some embodiments, the...
US-9,792,444 Inoculator and antibody for computer security
In an embodiment of the invention, a method includes: determining, in a computer, an area where an undesired computer program will reside; and providing a data...
US-9,792,434 Systems and methods for security data analysis and display
Systems and methods are provided for improved security services. In one aspect, a method is provided for controlling an autonomous data machine situated near a...
US-9,792,427 Trusted execution within a distributed computing system
Methods for enforcing confidentiality and integrity of code and data while running the code over the data in a distributed computing system are described. In an...
US-9,792,143 Platform secure execution modes
The performing of virtual machine (VM)-based secure operations is enabled using a trusted co-processor that is able to operate in a secure mode to perform...
US-9,792,063 Deduplication-based data security
Providing data security includes: in response to a request to write data content to a storage, generating encrypted data content based on the data content;...
US-9,791,944 Secured KVM system having remote controller-indicator
A secure peripheral switching system comprises a secure peripheral switch remotely coupled to a secure remote controller-indicator, wherein the secure...
US-9,791,890 Secure housing for a portable computer
A secure housing for a portable computer, which has a screen, operating keys and at least one connector, can be transferred from an open state to a closed...
US-9,791,590 Portable security inspection system
The present specification discloses a radiographic inspection system for screening an area. The inspection system has a container that defines an enclosed...
US-9,789,236 Implantable heart pump controller
The present invention provides devices, systems, and methods for control of and communication with ventricular assist devices. In certain embodiments, the...
US-9,788,207 Method, system and apparatus for enhancing security of beacon device
A method, system and apparatus for enhancing the security of a beacon device are herein disclosed. A service device includes a service communication unit and a...
US-9,788,202 Method of accessing a WLAN access point
The invention is a method for authorizing a device to establish a communication session with an access point of a WLAN. A secure token comprises a data related...
US-9,788,199 System and method for providing a public/private telephone number system
This invention shows a method for operating a voice communications network that comprises dynamically associating a private number with at least one public...
US-9,788,165 Location intelligence management system for border security
Collection and analysis of network transaction information which includes the mobile device's usage, location, movements coupled with data from non-wireless...
US-9,788,039 Camera system API for third-party integrations
In embodiments of a camera system application program interface (API) for third-party integrations, a camera device captures images as a video stream and...
US-9,787,720 Lateral account mapping
Systems and methods of correlating accounts among a plurality of network assets using account lateral movement data is presented in the context of network...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.