Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,002,5944 Variable domain resource data security for data processing systems
The variable domain data access control system and method described herein use the same variable domain to describe a data security model and a variable domain...
US-1,002,5940 Method and system for secure use of services by untrusted storage providers
A method for encrypting data. The method comprises receiving, from a user, via a client terminal, digital content including at least one textual string for...
US-1,002,5935 Securely exchanging information during application startup
Provided is a method for securely exchanging information during application startup. A processor may send a request for a passphrase to one or more remote...
US-1,002,5923 Data processing apparatus and method for protecting secure data and program code from non-secure access when...
A data processing apparatus includes processing circuitry and a data store including a plurality of regions including a secure region and a less secure region....
US-1,002,5797 Method and system for separating storage and process of a computerized ledger for improved function
A non-conventional method and system used with computerized ledgers provides advantages of computing efficiencies, data security, and universal use. The system,...
US-1,002,5751 Dynamic clock lane assignment for increased performance and security
A lane within a processor bus that communicatively connects a transmitter and a receiver is dynamically assigned as a clock lane. The clock lane subsequently...
US-1,002,5703 Collectable display device
Provided is a collectable display device, including at least one display panel having at least one user accessible opening for housing and displaying at least...
US-1,002,5300 Systems and methods for virtually tagging and securing industrial equipment
In one embodiment, a non-transitory computer readable medium may include computer-executable instructions that, when executed by a processor, may receive a...
US-1,002,4659 System and method for intelligently coupling and connecting mobile terminals to a coordinate-measuring device
A coordinate-measuring system and related method for securely and intelligently coupling and connecting a mobile terminal device to a stationary...
US-1,002,3151 Autonomous vehicle security
Various implementations include unmanned autonomous vehicles (UAVs) and methods for providing security for a UAV. In various implementations, a processor of the...
US-RE46,959 Enabling/disabling display data channel access to enable/disable high-bandwidth digital content protection
A switcher device comprises a multiplexer coupled in-between at least one input and output cards. The multiplexer detects the presence of an event signal from...
US-RE46,956 Encryption-based security protection for processors
Methods, systems, and arrangements enable increased security for a processor, including by implementing block encryption. The block may include multiple...
US-1,002,1435 Method and system for datacasting and content management
A method and system of content management for datacasting. Such a system may have, as its core, a dashboard system for managing data feeds. A dashboard system...
US-1,002,1430 Method and system for distribution of media
A system for the distribution of media is disclosed. The system comprises a network center; a delivery system for receiving data from and transmitting data to...
US-1,002,1170 Managing a storage array using client-side services
Managing a storage array includes: receiving, by a client-side array services module from a cloud-based security module through data communications on a wide...
US-1,002,1143 Method and apparatus for multi-tenancy secrets management in multiple data security jurisdiction zones
A service provider computing environment includes a service provider computing device, which receives tenant secrets policies from tenants. The tenants are...
US-1,002,1140 Advanced asset tracking and correlation
A security management system may be remotely deployed (e.g., using a cloud-based architecture) to add security to an enterprise network. For example, the...
US-1,002,1125 Infrastructure monitoring tool for collecting industrial process control and automation system risk data
This disclosure provides an infrastructure monitoring tool, and related systems and methods, for collecting industrial process control and automation system...
US-1,002,1120 Delayed replication for protection of replicated databases
Apparatuses and methods are disclosed for protection of data servers configured for data replication of a database. As an example, one apparatus includes at...
US-1,002,1118 Predicting account takeover tsunami using dump quakes
Methods, systems, and computer program products for predicting an account takeover tsunami using dump quakes are disclosed. A computer-implemented method may...
US-1,002,1115 Integrated security system having rule optimization
Techniques are described for optimizing the placement of automatically generated rules within security policies. An administrator may, for example, interact...
US-1,002,1105 Mobile device enabled tiered data exchange via a vehicle
A mobile device enabled tiered data exchange via a vehicle is disclosed. A mobile device can access profile information related to a tiered-data sharing...
US-1,002,1088 Fast smart card logon
Methods and systems for faster and more efficient smart card logon and for giving a client device full domain access in a remote computing environment are...
US-1,002,1087 Method and system for providing a secure communication channel to portable privatized data
A system and method for communicating secure, privatized data stored on a first user device with a second user device requesting access thereto includes...
US-1,002,1078 System, apparatus and method for encryption and decryption of data transmitted over a network
A method and system for securing data transmitted between a client device and a server by obtaining input text at an intermediate module, processing the input...
US-1,002,1075 Multiple data center data security
Securely replicating backup data in a network having a production site and a plurality of remote sites by generating in the production site a data encryption...
US-1,002,1072 Security system and communication control method
A security system comprising: a first gateway device; a second gateway device; and a duplex communication line, wherein a first proxy part of the first gateway...
US-1,002,1050 Secure conversation and document binder
Disclosed are various embodiments for maintaining a collection of documents and user-defined messages made in conversations such that the collection may be...
US-1,002,1021 Broadband fallback for router
Systems for routing data over first and second broadband network. A router includes a first network interface that is configured to provide communication via a...
US-1,002,1016 VLAN to secure communication between virtual machines and in a multi-tenant public data center
A method for creating a set of virtual machines on a public datacenter. The method, from a first network controller of a private network, commands a second...
US-1,002,0987 Systems and methods for correlating sensory events and legacy system events utilizing a correlation engine for...
Monitoring systems and methods for use in security, safety, and business process applications utilizing a correlation engine are disclosed. Sensory data from...
US-1,002,0942 Token-based secure data management
In some implementations, tokens that are representative of sensitive data may be used in place of the sensitive data to maintain the security of the sensitive...
US-1,002,0936 Systems and methods for encryption and provision of information security using platform services
Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in...
US-1,002,0935 Systems and methods for encryption and provision of information security using platform services
Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in...
US-1,001,9703 Verifying a secure connection between a network beacon and a user computing device
A beacon device establishes a network connection with a user computing device. The beacon device determines the received signal strength indicator of the user...
US-1,001,9605 Systems, methods and apparatus for secure peripheral communication
An interface device includes a communication interface and a secure element. The communication interface receives input data and a selection of one of a...
US-1,001,9603 Secured memory system and method therefor
There is disclosed a cache memory controller for storing cache data within a cache, the cache data comprising an unsecured version data to corresponding secured...
US-1,001,9601 Method and apparatus for securely saving and restoring the state of a computing platform
An apparatus and method for securely suspending and resuming the state of a processor. For example, one embodiment of a method comprises: generating a data...
US-1,001,9590 Secure mobile phone document storage application
A method for a smart phone app is provided wherein entry to a secure data storage area is facilitated on a file or object level, and not on an app level,...
US-1,001,9588 Systems and/or methods for enabling cooperatively-completed rules-based data analytics of potentially sensitive...
Certain example embodiments relate to systems and/or methods for providing enhanced control over potentially sensitive data sharable among and/or between...
US-1,001,9581 Identifying stored security vulnerabilities in computer software applications
Identifying stored security vulnerabilities in computer software applications by providing via a first interface of a computer software application during...
US-1,001,9569 Dynamic patching for diversity-based software security
Methods, devices, and non-transitory storage media for dynamic patching of diversity-based software executing on a computing device. One of many variations of...
US-1,001,9555 Interactive respiratory device usage tracking system
A monitoring system for inhalers includes a tracker module configured to be secured to a variety of inhalers, including both controller and rescue inhalers. The...
US-1,001,9430 System and method for automatically filling out forms
The invention comprises a system and method for storing consumers' data and automatically filling out forms by sending this information to merchants, allowing...
US-1,001,9279 Transparent secure interception handling
A method and system for transparent secure interception handling is provided. The method and system include deploying a virtual machine (VM) in an environment...
US-1,001,9246 Device, method, and system for installing and managing applications in a handheld device
The object of the invention is to provide the user with improved operatability of an information-processing apparatus and usability of application programs as...
US-1,001,7156 Vehicle security system
A vehicle security system for monitoring a vehicle and notifying a user includes at least two image capture devices (ICD), sensors, a global positioning system...
US-1,001,7155 Cross correlation between connected vehicles and other online devices
Embodiments of the present invention disclose a method, computer system, and a computer program product for vehicle software security associated with a vehicle....
US-RE46,947 Data security method and device for computer modules
A security method for an attached computer module in a computer system. The security method reads a security identification number in an attached computer...
US-1,001,5766 Apparatus and method for securely tracking event attendees using IOT devices
Associating each of a plurality of an Internet of Things (IoT) devices with a different attendee at an event, the IoT devices configured to form local wireless...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.