Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,006,2141 Server-based fast remote display on client devices
A system and method for controlling a display on a client device such as a wireless communication device, e.g., a smartphone or similar device is presented....
US-1,006,1938 Moving a portion of a streaming application to a public cloud based on sensitive data
A streams manager determines which portions of a streaming application process sensitive data, and when performance of the streaming application needs to be...
US-1,006,1932 Securing portable data elements between containers in insecure shared memory space
Systems and methods for encrypting an unencrypted data set within a file are provided. The disclosed systems and methods can be configured to create a...
US-1,006,1929 Secure content sharing
Convenient sharing of information among authorized network users may be facilitated by allowing a user to send information originating from multiple...
US-1,006,1928 Security-enhanced computer systems and methods
In general, the invention provides a computer architecture designed for enhanced data security. In embodiments, the architecture comprises two sub-systems, each...
US-1,006,1923 Safe and secure internet or network connected computing machine providing means for processing, manipulating,...
A computing machine that minimizes problems from external files, such as software virus and malware is disclosed. The computing machine has local operations...
US-1,006,1910 Secure biometric data capture, processing and management for selectively prohibiting access to a data storage...
A system includes one or more biometric sensors, a sensor hub and a trusted application execution environment. The sensor hub has exclusive access to the...
US-1,006,1903 Data processing method and electronic device thereof
A method of operating an electronic device is provided. The method includes creating a security key based on data shared with a specific electronic device,...
US-1,006,1847 Information targeting systems and methods
The present disclosure relates generally to systems and methods for the secure management of electronic information relating to a user. In certain embodiments,...
US-1,006,1738 Ephemeral peripheral device
An ephemeral system includes an ephemeral communications device and associated ephemeral memory system (onboard or peripheral) for securing user data. Different...
US-1,006,1606 Systems and methods of secure domain isolation involving separation kernel features
Systems and methods are disclosed for providing secure information processing. In one exemplary implementation, there is provided a method of secure domain...
US-1,005,9358 Method and system for preventing shopping cart theft
The present invention provides a system and method for preventing theft of mobile objects which are used by for temporary time period by anonymous users. The...
US-1,005,8765 Self-balancing board with primary wheel and distal auxiliary wheel
A self-balancing board is provided, comprising a primary wheel assembly, a platform, at least one sensor, a controller, a first auxiliary wheel assembly, and a...
US-1,005,8005 Computer hardware unit with collapsible mounting brackets
A computer hardware unit, a data center cabinet having the same, and a method of removing the computer hardware unit from the data center cabinet. The computer...
US-1,005,7929 Enhanced hotspot 2.0 management object for trusted non-3GPP access discovery
User equipment (UE) includes a transceiver configured to transmit and receive information to/from a Wireless Fidelity (WiFi) access point. The UE includes...
US-1,005,7773 Systems, methods, and computer program products for interfacing multiple service provider trusted service...
System, methods, and computer program products are provided for interfacing between one of a plurality of service provider (SP) trusted service managers (TSM)...
US-1,005,7364 Method and apparatus for remotely running application program
A method for remotely running an application program. A client acquires an application program from a server, runs the application program on the client, and...
US-1,005,7295 System and method for providing network and computer firewall protection with dynamic address isolation to a device
A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to...
US-1,005,7292 Method for operating a security gateway of a communication system for vehicles
A method for operating a security gateway between data buses of a vehicle, in which a correlation between an identification information item (ID) of the message...
US-1,005,7287 Secure data redaction and masking in intercepted data interactions
A method for modifying intercepted data interactions is provided in the illustrative embodiments. At a security application executing in a security data...
US-1,005,7286 Automotive ECU controller and data network having security features for protection from malware transmission
In one implementation, a method for providing security on controllers includes detecting, by a given controller, an attempted security attack on the given...
US-1,005,7282 Detecting and reacting to malicious activity in decrypted application data
Described herein are systems and methods for detecting potentially malicious activity in a network session. Embodiments may involve identifying a requested...
US-1,005,7276 Global attestation procedure
A method, computer program product, and system for authenticating a computing device by geographic attestation includes a processor utilizing executing an...
US-1,005,7272 Universal subscriber identity recognition and data classification
An aspect includes storing data elements in a storage space of a memory device. The storage space is allocated for an account of a subscriber of a universal...
US-1,005,7253 Cloaked data system
Systems and methods of securely storing and retrieving data are disclosed. A database may include a table of data with rows and columns and encrypted at rest....
US-1,005,7252 System for secure communications
A system and method provides security features for inter-computer communications. After a user has proved an association with one of several firms, a user...
US-1,005,7243 System and method for securing data transport between a non-IP endpoint device that is connected to a gateway...
A method of securing data transport between an endpoint device, without an IP address and connected to a gateway device, and a connected service using a...
US-1,005,7234 Systems and methods for providing network security monitoring
Systems and methods are disclosed for providing network security monitoring in a computer network. In an embodiment, network configuration data may be gathered...
US-1,005,7224 System and method for initializing a shared secret system
Embodiments as described herein provide systems and methods for sharing secrets between a device and another entity. The shared secret may be generated on the...
US-1,005,7223 Data protection keys
One embodiment provides a client device. The client device includes a Trusted Platform Module (TPM). The TPM includes a secure controller to extend a secure...
US-1,005,7222 Decentralized and distributed secure home subscriber server device
A decentralized and distributed secure home subscriber server is provided. First data can be sent representing a first nonce string to a mobile device; and in...
US-1,005,7218 Network address-based encryption
A system for encrypting data and transferring or storing data securely may include a computing device including an encryptor configured to generate an...
US-1,005,7217 System and method to secure sensitive content in a URI
A system and method for transmitting data using a data transfer protocol, including receiving, at the first device, a request from the second device, the...
US-1,005,7214 DNSSEC lightweight database access protocol gateway
A system that converts standardized lightweight database access protocol (LDAP) requests into a series of domain name system (DNS) requests to look up requested...
US-1,005,7070 Secure access control to an embedded device through a networked computer
A method for secure access control to a power tool enables secure access to an embedded computing device in the power tool from a web application in another...
US-1,005,7066 Devices, systems and methods for authenticated intravascular device use and reuse
Devices, systems, and methods for reconditioning an intravascular device for reuse are provided. The method includes reading first security data from a memory...
US-1,005,7065 System and method for securely storing and utilizing password validation data
A system and method for storing and accessing password verification data on multi-user computer systems that prevents remote attacks. Along with ...
US-1,005,7059 Systems and methods for "machine-to-machine" (M2M) communications between modules, servers, and an application...
Methods and systems are provided for supporting efficient and secure "Machine-to-Machine" (M2M) communications using a module, a server, and an application. A...
US-1,005,7054 Method and system for remotely keyed encrypting/decrypting data with prior checking a token
A method for encrypting a message by a host device includes requesting, by the host device, a message key from a secure device and generating, by the secure...
US-1,005,6985 Broadband communication network architecture with train control network and train serving network combined, and...
A broadband communication network architecture with a train control network and a train serving network combined, is characterized by, comprising a trusted...
US-1,005,6933 Electronic device and method for controlling display on basis of information of accessory device and accessory...
An accessory device of a portable electronic device is provided. The accessory device includes a first cover that is detachably attached to at least a portion...
US-1,005,5984 Unmanned aerial vehicle system and method of use
An unmanned aerial vehicle (UAV) system includes a command center having a computing device an unmanned aerial vehicle (UAV) with a body, the UAV to communicate...
US-1,005,5901 Method and apparatus for remotely communicating vehicle information to the cloud
The present invention relates generally to the communication of vehicle data, diagnostics and related information with a network remote from the vehicle, and...
US-1,005,5801 Systems and methods for generating structured data based on scanned documents
A system and method for efficiently and securely converting physical documents, including handwritten reports, into structured data stored in databases is...
US-1,005,5728 Form factor with an alias code and a secure chip ID
Systems and methods may comprise RFID data acquisition technology which may be embedded in a fob or tag for use in completing financial transactions. This fob...
US-1,005,5607 Security layer and methods for protecting tenant data in a cloud-mediated computing network
A system for protecting data managed in a cloud-computing network from malicious data operations includes an Internet-connected server and software executing on...
US-1,005,5602 Securely processing range predicates on cloud databases
Methods, systems, and computer program products for securely processing range predicates on cloud databases are provided herein. A computer-implemented method...
US-1,005,5601 Method and system for securing data
A first access key, which is provided by a key server for decrypting a file and the encrypted file is published on a public network by a first user. Every time...
US-1,005,5599 Processing method for making electronic documents secure
Disclosed are systems and processing methods that may be performed by first, second, and third processor units to give access to an item of sensitive text data...
US-1,005,5596 Data protection system
A storage device of a data center may protect data stored on a storage medium of the storage device using a data security mechanism. The data security mechanism...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.