Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,017,1537 Segregation of electronic personal health information
A dynamic secure mobile network is provided to enable the transfer and storage of private data. The dynamic secure mobile network can provide secured...
US-1,017,1532 Methods and systems for detection and classification of multimedia content in secured transactions
An apparatus is provided for detecting the presence of multimedia content in one or more transactions and for classifying the multimedia content in the one or...
US-1,017,1505 Preventative enterprise change management
Embodiments for implementing change control management in computing center environments by a processor. A physical activity of a user performing an action in...
US-1,017,1499 Zone-based security architecture for intra-vehicular wireless communication
Systems and methods provide secure and wireless intra-vehicular communication. An intra-vehicular communication system has a secured network segment including a...
US-1,017,1498 Secure crypto module including electrical shorting security layers
A security matrix layer between a first and second conductive shorting layers are located within a printed circuit board (PCB) that carries out cryptographic...
US-1,017,1497 Systems and methods for detecting online fraud
Described systems and methods enable a swift and efficient detection of fraudulent Internet domains, i.e., domains used to host or distribute fraudulent...
US-1,017,1494 Scarecrow for data security
A method, computer program product and/or system receives information pertaining to network data traffic from and/or to a network accessible resource, analyzes...
US-1,017,1487 Generating a virtual database to test data security of a real database
Determining a data security risk level of a virtual database is provided. An object catalog corresponding to a real database is imported into the virtual...
US-1,017,1486 Security and authentication daisy chain analysis and warning system
An approach is disclosed that provides a security and authentication daisy chain analysis and warning system to a user. The approach monitors sets of user...
US-1,017,1480 Cloud-based surveillance with intelligent tamper protection
In one embodiment, a security system includes a central communication unit and a first surveillance device. The central communication unit is communicatively...
US-1,017,1463 Secure transport layer authentication of network traffic
Technologies are disclosed herein for transport layer network data authentication. A token packet is attached to network data sent from a client software...
US-1,017,1461 System and method of secure encryption for electronic data transfer
A system for secure transfer of encrypted data involves a sender client, a recipient client, a main server, and a key server. The sender client receives...
US-1,017,1460 Proximity-based system for automatic application or data access and item tracking
A system and method provide automatic access to applications or data. A portable physical device, referred to herein as a Personal Digital Key or "PDK", stores...
US-1,017,1455 Protection of application passwords using a secure proxy
Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server....
US-1,017,1450 Global time based authentication of client devices
A system for authenticating client devices for communication with one or more wireless communications networks, includes a client device configured to receive a...
US-1,017,1444 Securitization of temporal digital communications via authentication and validation for wireless user and...
An access control system and associated devices are described that conceal and securitize data transmissions between one or more secure databases for various...
US-1,017,1436 Distributed learning and aging for management of Internet protocol (IP) addresses
A device includes a security process unit (SPU) associated with a logical ring of SPUs. The SPU receives a packet with an address associated with a malicious...
US-1,017,1432 Systems to implement security in computer systems
Systems, methods, and non-transitory computer-readable medium are provided to secure data centers and cloud computing. A method receives network identifiers for...
US-1,017,1431 Secure message handling of an application across deployment locations
A method and system for secure message handling of an application across deployment locations. The application is divided into multiple processing nodes which...
US-1,017,1429 Providing security to video frames
A method and system are provided for processing a media stream including at least a portion of a media program in a player executed by a computer. The player is...
US-1,017,1428 Confidential data management method and device, and security authentication method and system
The present invention relates to a method for safely managing confidential data and a security authentication method and system for performing a security...
US-1,017,1246 Multi-user strong authentication token
Apparatus, methods and systems to secure remotely accessible applications using authentication devices are disclosed. More in particular apparatus, methods and...
US-1,017,1244 Increased communication security
A method of increasing communication security may include receiving, at a first computer system, a first message including a first data portion and a second...
US-1,017,1238 Secure data transmission using quantum communication
Methods and systems for transmitting data are described. A random data stream is generated. A data stream is generated comprising the random data stream and...
US-1,017,1235 User-initiated migration of encryption keys
Embodiments utilizing secret keys for authentication and/or encrypted communication are described. In certain embodiments, authentication data is provided from...
US-1,017,0880 Mount having a mounting plate with mounting studs and electrical contacts
A modular equipment mount to enable quick relocation of the piece of equipment. The piece of equipment is secured to a mount. A track system is secured to...
US-1,017,0178 Secure off-chip MRAM
Techniques for improving the security of nonvolatile memory such as magnetic random access memory (MRAM) are provided. In one aspect, a method of operating a...
US-1,016,9974 Home security system
A home security system and method is provided. The method comprises detecting a motion in a monitored room, starting data collection through at least a first...
US-1,016,9671 Face detection with temperature and distance validation
An electronic device incorporates features that are dependent on finding a face by image processing of an image taken by an image capturing device. To avoid...
US-1,016,9623 Security apparatus for computing systems
A security apparatus that can detect unauthorized alterations of physical arrangement of a computing system or unauthorized movements of a computing system...
US-1,016,9608 Dynamic management of data with context-based processing
Techniques for using contextual information to manage data that is subject to one or more data-handling requirements are described herein. In many instances,...
US-1,016,9607 Individual centric personal data management process and method
An individual centric personal data management process consisting of utilizing at least one computing device for performing the function of facilitating...
US-1,016,9606 Verifiable data destruction in a database
A computing device may determine that a policy event to initiate data destruction for a first set of data has been triggered. The first set of data may be...
US-1,016,9604 Method and system to prevent ultrasound data leaks in mobile devices
A system, method and program product for implementing an ultrasound security system for a mobile device. A system is described that that integrates with an...
US-1,016,9594 Network security for data storage systems
In one embodiment of the present invention, a server is created, and a computer readable storage media is included in the server. An adapter is connected to the...
US-1,016,9589 Securely booting a computer from a user trusted device
A method for allowing a computer to boot from a user trusted device is provided. The computer includes a long-term data storage device storing operating system...
US-1,016,9587 Hosted device provisioning protocol with servers and a networked initiator
A network can operate a WiFi access point with credentials. An unconfigured device can (i) support a Device Provisioning Protocol (DPP), (ii) record responder...
US-1,016,9574 Using trusted execution environments for security of code and data
An embodiment includes a processor coupled to memory to perform operations comprising: creating a first trusted execution environment (TXE), in protected...
US-1,016,9573 Maintaining secure data isolated from non-secure access when switching between domains
A data processing apparatus including circuitry for performing data processing, a plurality of registers; and a data store including regions having different...
US-1,016,9563 Encryption authorization dongle having volatile memory
Embodiments of the present invention disclose a method, computer program product, and device for accessing encrypted data. A communication link may be...
US-1,016,9491 Query servicing with access path security in a relational database management system
A method and system for servicing a data query in a relational database management system (RDBMS). Access path security corresponding to a user originating the...
US-1,016,9300 Advanced zero-knowledge document processing and synchronization
Techniques disclosed herein decouple a document's structure from its general content wherein the structure is retained in plaintext (both at a client device and...
US-1,016,9162 Conveying value of implementing an integrated data management and protection system
A system and method are described for conveying to a user the value it would receive by implementing an integrated system to protect and manage its data. An...
US-1,016,9147 End-to-end secure data storage in a dispersed storage network
A method includes a first computing device generating a set of encryption keys and encrypting a data matrix based on the set of encryption keys to produce an...
US-1,016,8997 System and method for executing native client code in a storage device
A system and method for executing user-provided code securely on a solid state drive (SSD) to perform data processing on the SSD. In one embodiment, a user uses...
US-1,016,8974 Continuous glucose monitor communication with multiple display devices
A continuous glucose monitor for wirelessly transmitting data relating to glucose value to a plurality of displays is disclosed, as well as systems and methods...
US-1,016,8949 Envoy for multi-tenant compute infrastructure
A data management and storage (DMS) cluster of peer DMS nodes manages data of a tenant of a multi-tenant compute infrastructure. The compute infrastructure...
US-1,016,8934 Method and device for monitoring data integrity in shared memory environment
Provided is a method of memory access for a memory controller in an integrity monitoring system sharing memory with a host system. The memory access method may...
US-1,016,8775 Wearable motion sensing computing interface
An apparatus comprises a sensor configured to detect movement and generate movement data related to at least part of a detected movement; a messaging unit...
US-1,016,8180 Electronic flight data display instrument
An electronic display instrument configured to secure in a desired position over multiple pre-existing instrument holes in a dashboard of an aircraft in place...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.