Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,912,638 Systems and methods for integrating cloud services with information management systems
Systems and methods of integrating log data from a cloud system with an internal management system are described, wherein the cloud system is located externally...
US-9,912,549 Systems and methods for network analysis and reporting
Among other things, embodiments of the present disclosure can collect and analyze asset and network data from multiple sources, and use such data to present a...
US-9,912,483 Systems and methods to secure user identification
A computing apparatus configured to verify a digital signature applied on a set of data received from a user device, including an user ID assigned by a partner...
US-9,912,475 Vehicular entropy for random number generation
A method is provided for producing cryptographic keys, while a vehicle is in operation, for use in secure vehicle communications. The method may include...
US-9,912,472 Homomorphic database operations apparatuses, methods and systems
The HOMOMORPHIC DATABASE OPERATIONS APPARATUSES, METHODS AND SYSTEMS ("HEDO") transform transaction storage requests and homomorphic model queries using HEDO...
US-9,912,271 Linear actuator and method for controlling the same
The present invention provides a linear actuator including a motor; a linear driving unit coupled to the motor and including a magnet; a sensor unit configured...
US-9,911,297 Threat detection system having multi-hop, WiFi or cellular network arrangement of wireless detectors, sensors...
A data sensing and threat detection network comprising a plurality of wireless sensor devices and their related wireless sub-sensor devices, for communication...
US-9,911,294 Warning system and method using spatio-temporal situation data
The warning system using spatiotemporal situation data according to the present invention comprises: a situation detection unit including a sensor module for...
US-9,911,266 Multimode retail system
A multimode system for receiving data in a retail environment includes: a secure input module for receiving high security input and low security input from a...
US-9,911,256 Restricting access to a building
One embodiment provides a method, including: obtaining, using a sensor, biometric data of a user; determining, using a processor, that the biometric data of the...
US-9,911,146 Method and system for providing online authentication utilizing biometric data
A system and method for securely authenticating a user for the purpose of accessing information, such as private financial or personal information, in an online...
US-9,911,121 Method and system for authorizing a transaction using a dynamic authorization code
A method and apparatus for conducting a secure transaction involving generation of a dynamic authentication code on a mobile device, based on secret data which...
US-9,911,071 Method and system for controlling packaging of items on a production/distribution line
The disclosed method, and corresponding system, for controlling items on a production/distribution line relies on secure identification of items transported...
US-9,911,010 Secure field-programmable gate array (FPGA) architecture
A method and system for configuring a field-programmable gate array (FPGA) includes receiving an encrypted FPGA load-decryption key at an FPGA from a remote...
US-9,911,009 Device and method for providing safety of data by using multiple modes in device
A device and method for providing the security of data by using multiple modes in the device are provided. The device includes a storage unit that includes a...
US-9,911,006 Securing data gathering devices of a personal computing device while performing sensitive data gathering...
A functional library can secure data gathering devices of a personal computing device on behalf of a secure application program to provide a more secure...
US-9,910,996 Mass storage device memory encryption methods, systems, and apparatus
Mass storage devices and methods for securely storing data are disclosed. The mass storage device includes a communication interface for communicating with a...
US-9,910,995 System and method for secure file transmission
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for file transmission. In one aspect, a system includes at...
US-9,910,994 System for assuring security of sensitive data on a host
Described are techniques for determining and mitigating leakage of sensitive data into log data. An application programming interference (API) is instrumented...
US-9,910,980 Cyber security
Systems and methods that use probabilistic grammatical inference and statistical data analysis techniques to characterize the behavior of systems in terms of a...
US-9,910,969 System, method, and device for delivering communications and storing and delivering data
A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is...
US-9,910,655 Secure content platform software developer kit
A system and method may be used to manipulate secure content on a first computing device through the use of a software developer's kit. The method may include...
US-9,910,610 Protected mode for global platform complaint smart cards
A multiple application smart card uses hardware firewalls and an internal communications scheme to isolate applications from different service providers. A...
US-9,910,436 Autonomous data machines and systems
Autonomous data machines and systems may be provided, which may be deployed in an environment. The machines may roam within the environment and collect data...
US-9,906,958 Web server bypass of backend process on near field communications and secure element chips
A mobile access terminal providing access to data in a secure element of the mobile access terminal is provided. The mobile access terminal comprises the secure...
US-9,906,930 System and method for mobile personal emergency response
A mobile personal emergency response system includes a security fob configured to be manually activated, and wirelessly transmit an emergency alert signal when...
US-9,906,511 Secure impersonation detection
Techniques of performing impersonation detection involve using encrypted access request data. Along these lines, an impersonation detection server stores...
US-9,905,110 Valve service detection through data analysis
Securing communications from a process plant to a remote system includes a data diode disposed there between that allows data to egress from the plant but...
US-9,904,902 Methods and apparatus for pseudo master node mode operations within a hierarchical wireless network
Methods of operation and systems are described for node communication within a hierarchical wireless node network having a plurality of ID nodes on a first...
US-9,904,632 Technique for supporting multiple secure enclaves
A technique to enable secure application and data integrity within a computer system. In one embodiment, one or more secure enclaves are established in which an...
US-9,902,368 Apparatus, system and method for vehicle access and function control utilizing a portable device
A system for providing dynamic access to a vehicle via a plurality of devices. A device and/or a server of an authentication network stored fob data relating to...
US-9,901,405 MEMS-based method and system for tracking a femoral frame of reference
A system for tracking a femoral frame of reference in computer-assisted surgery comprises a sensor unit. The sensor unit is adapted to be secured to the femur....
US-9,900,373 System for providing a service, such as a communication service
A system an method are provided for providing a service, such as telemonitoring, in particular via the Internet. The system includes a terminal device of a...
US-9,898,618 Securing a remote database
A database access system may protect a field by storing the field as one or more underlying fields within a database. The database engine may not have access to...
US-9,898,612 Multi-party encryption cube processing apparatuses, methods and systems
Computer-implemented systems and methods are disclosed herein for use within secure multi-party computation. A system and method are used for storing an...
US-9,895,725 Disk clamp and motor hub cleaning with stamping adhesive
An assembly configured to clean one or more selected structures of a device may comprise an end effector assembly, a material disposed on a surface of the end...
US-9,894,524 EHF secure communication device
A communication device employs a contactless secure communication interface to transmit and receive data with a computing device using close proximity extremely...
US-9,894,518 Server and method for remotely controlling working of communications terminal, and communications terminal
The present invention discloses a method for remotely controlling working of a communications terminal, and the method includes: receiving, in a push service...
US-9,894,517 Methods and apparatuses for handling data traffic in a radio node having a split protocol stack
In one aspect of the teachings herein, a radio node provides a local loopback mode of operation in at least some operational instances, in which it loops...
US-9,894,424 Method and system for converting between protocols
In an embodiment a protocol converter module for use with a gas transmitter assembly having a gas sensor, a controller, and a detector transceiver housed within...
US-9,894,141 Managed peer-to-peer applications, systems and methods for distributed data access and storage
Secure and remote operation of a remote computer from a local computer over a network includes authenticating a remote computer for connection to a computer...
US-9,894,093 Structuring data and pre-compiled exception list engines and internet protocol threat prevention
Blocking high-risk IP connections in real-time while allowing tailoring of an acceptable risk profile to match the security requirements of network resources....
US-9,894,087 System and method for uploading and verifying a document
A computer implemented method may allow for the upload and verification of a document. In one aspect, the method may receive a file at a data server associated...
US-9,894,085 Systems and methods for categorizing processes as malicious
The disclosed computer-implemented method for categorizing processes as malicious may include (1) storing, in a security application that tracks event data for...
US-9,894,083 System for providing a secure video display
A system for providing a secure video display using a one-way data link. An input interface for receives a video stream signal. The one-way data link has an...
US-9,894,080 Sequence hopping algorithm for securing goose messages
Embodiments of the present invention include methods and apparatuses for securing data transfer in power-system automation and smart grids. Embodiments of the...
US-9,894,077 Situational awareness system security features
Security features a situational awareness system using location tracking information including requiring a security identifier, such as a password or a bio...
US-9,894,063 Anonymizing biometric data for use in a security system
An anonymized biometric representation of a target individual is used in a computer based security system. A detailed input biometric signal associated with a...
US-9,894,061 Method for booting and dumping a confidential image on a trusted computer system
A method for booting and dumping a confidential image on a trusted computer system. Embodiments of the present invention disclose deploying a secure boot image...
US-9,894,058 System and method of secure personal identification
A system and method for securely and automatically identifying users to an inquirer for purposes of obtaining user identifying information is described. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.