At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-9,354,927 |
Securing virtual machine data One embodiment of the present invention is a method including: (a) representing virtual primary disk data and state data of a virtual machine in a unit of... |
US-9,354,674 |
Transportation, storage and stabilization device for electronic equipment An equipment saddle is provided. The equipment saddle may include a plurality of cases attached to a drapable skirt. Each case forms a compartment for retaining... |
US-9,351,167 |
SMS botnet detection on mobile devices Technologies for mobile device security are disclosed. A described technique includes launching a monitoring application that has a priority receiver attribute... |
US-9,351,163 |
Automatic sanitization of data on a mobile device in a network environment A method is provided in one example embodiment and includes establishing a network connection to a central security system in a central network, receiving a... |
US-9,351,141 |
Headset computer with handsfree emergency response Operating conditions for a headset computer are used to detect a situation where an emergency response mode should be activated. In emergency response mode, the... |
US-9,351,077 |
Systems and methods for independent and control-isolated audio processing
(ICIAP) Systems and methods are provided that may implement independent and control-isolated audio processing (ICIAP) to separate and/or control audio streams at... |
US-9,350,782 |
Method and system for delivering media data For use in media communications, e.g. in the delivery of video and audio or in teleconferencing, a media file or title is partitioned for secured, efficient... |
US-9,350,761 |
System for the distribution and deployment of applications, with
provisions for security and policy conformance A system and method are disclosed for deploying applications to end point devices. The applications are obtained from a marketplace that checks the applications... |
US-9,350,759 |
Network security appliance to imitate a wireless access point of a local
area network through coordination of... Disclosed are methods and systems of a network security appliance to imitate a wireless access point of a local area network through coordination of multiple... |
US-9,350,750 |
Distribution of security rules among sensor computers Systems and methods for generating rules in a networking environment having one or more sensor computers logically connected to compromised computers are... |
US-9,350,749 |
Application attack monitoring Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for providing application attack monitoring. Actions... |
US-9,350,738 |
Template representation of security resources Systems and methods are described for enabling users to model security resources and user access keys as resources in a template language. The template can be... |
US-9,350,736 |
System and method for isolating mobile data Disclosed is a system for mobile data isolation, comprising of a tag control management module and a mobile data management module. The tag control management... |
US-9,350,731 |
Secure method of processing data The invention relates to a secure method of processing data in which method is implemented the evaluation of a function that may be written as a linear... |
US-9,350,715 |
Methods and apparatus for network communications via a transparent
security proxy A data security device for providing a network transport connection via a transparent network proxy that employs different encryption security mediums along a... |
US-9,350,708 |
System and method for providing secured access to services A system and method for providing authenticated access to an initiating terminal in relation to the services provided by a terminating terminal via a... |
US-9,350,550 |
Power management and security for wireless modules in "machine-to-machine"
communications Methods and systems are provided for power management and security for wireless modules in "Machine-to-Machine" communications. A wireless module operating in a... |
US-9,350,540 |
System and method of secure encryption for electronic data transfer A system for secure transfer of encrypted data involves a sender client, a recipient client, a main server, and a key server. The sender client receives... |
US-9,350,532 |
System and method for conducting searches at target devices A method, apparatus and system for secure forensic investigation of a target machine by a client machine over a communications network. In one aspect the method... |
US-9,349,287 |
System for obtaining vehicular traffic flow data from a tire pressure
monitoring system An embedded Tire Pressure Monitoring sensor is incorporated into vehicular wheels and a secured central server is used to track the unique identification code... |
US-9,349,027 |
Smart hybrid card system providing authenticity, privacy, and security
(APS) An RFID/MFID system includes a tag and a reader. The tag is adapted to provide an RF identification signature when interrogated with an electric travelling wave... |
US-9,349,023 |
Database encryption system, method, and program A user apparatus connected to database apparatus via network comprises: unit that manages key information in order to encrypt and decrypt; storage unit that... |
US-9,349,018 |
Preventing content data leak on mobile devices Preventing enterprise or other protected content data from "leaking" from being under secure management on a device, for example by virtue of being viewed using... |
US-9,349,015 |
Programmatically detecting collusion-based security policy violations Sets of multiple software programs selected from a set of candidate software programs are evaluated to determine if the applications can collude to violate a... |
US-9,348,991 |
User management of authentication tokens A computer implemented method, a computer program product, and a data processing system manage a set of federated log-in authentications at secure web sites. A... |
US-9,348,980 |
Methods, systems and application programmable interface for verifying the
security level of universal resource... The present disclosure discloses a method of allowing WebView to verify the security level of a web content and inform the user with regards to the security and... |
US-9,348,879 |
Data lineage transformation analysis Resources for data lineage discovery, data lineage analysis, role-based security, notification. The resources may include or involve machine readable memory... |
US-9,348,864 |
Managed peer-to-peer applications, systems and methods for distributed
data access and storage Secure and remote operation of a remote computer from a local computer over a network includes authenticating at least one remote computer for connection to at... |
US-9,348,856 |
Data movement from a database to a distributed file system Provided are techniques for data movement. An activity is created that overrides existing security, that is associated with a user, that defines one or more... |
US-9,348,789 |
Computer system and network interface supporting class of service queues A data processing system adapted for high-speed network communications, a method for managing a network interface and a network interface for such system, are... |
US-9,348,768 |
Method for implementing encryption in storage card, and decryption method
and device A method for implemented encryption in a memory card, and a decryption method and device, and the method includes: receiving an input encryption key; requesting... |
US-9,348,626 |
Mobile device maintaining adequate security and data partitioning between
user mode and business mode One or more embodiments of the invention facilitate switching between a host environment of a mobile device and a guest environment of the mobile device. One... |
US-9,348,575 |
Update of a data-carrier application In a method for updating or installing a data storage medium application which can be executed on a secure data storage medium, the data storage medium is used... |
US-9,348,553 |
Electronic display tiling apparatus and method thereof Disclosed is a method and apparatus for substantially eliminating the appearance of seams between tiled panels of a display. Non-imaging magnification may be... |
US-9,347,782 |
System and method for sharing a travel itinerary with a protective detail A system for sharing a travel itinerary with a plurality of members of a protective detail tasked with protecting the security of an individual, includes one or... |
US-9,345,053 |
Synoptic emergency cellular device and system A wearable emergency cellular device for use in a medical emergency alert situation includes an application containing synoptic medical information and other... |
US-9,345,040 |
Securing transmit openings A technique for securing transmit opening helps enhance the operation of a station that employs the technique. The technique may facilitate low latency response... |
US-9,344,895 |
Method and system for securely accessing portable hotspot for intelligent
mobile phones A method and a system for securely accessing a portable hotspot for intelligent mobile phones, comprises an intelligent mobile phone used as an AP and another... |
US-9,344,892 |
Mobile device authentication and call routing using dual-tone
multi-frequency signaling Methods and apparatuses are described for mobile device authentication and call routing using dual-tone multi-frequency signaling. A server computing device... |
US-9,344,832 |
Methods and apparatus for delivering electronic identification components
over a wireless network Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or... |
US-9,344,616 |
Correlation engine for security, safety, and business productivity The present invention is a correlation engine for use in security, safety, and business monitoring applications. Sensory data from one or more sensors are... |
US-9,344,559 |
Method and device for the legally secure archiving of telephone contents The present invention relates to a method and a device for the legally secure archiving of telephone contents. In particular, it should be possible to provide a... |
US-9,344,484 |
Determining consistencies in staged replication data to improve data
migration efficiency in cloud based networks Embodiments relate to systems and methods for data migration among a plurality of cloud-based storage networks. In aspects, an administrator of a data payload... |
US-9,344,457 |
Automated feedback for proposed security rules A computer determines a number of matches returned by a proposed security rule that result from application of the proposed security-rule to historical logged... |
US-9,344,456 |
Distributed multi-processing security gateway A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the... |
US-9,344,421 |
User access authentication based on network access point Systems and methods of authenticating user access based on an access point to a secure data network include a secure data network having a plurality of a... |
US-9,344,410 |
Telecommunication method for securely exchanging data The invention provides for a telecommunication method of securely exchanging unencrypted data between a telecommunications device and a first server computer... |
US-9,344,378 |
Shared community storage network A hardware and/or software facility for durably and securely storing data within a shared community storage network. A user may have a storage device that they... |
US-9,344,278 |
Secure data transfer using random ordering and random block sizing Encrypted information is conventionally broken into blocks which are transmitted sequentially. Because the order and the size of such blocks can be easily... |
US-9,344,275 |
System, device, and method of secure entry and handling of passwords Devices, system, and methods of secure entry and handling of passwords and Personal Identification Numbers (PINs), as well as for secure local storage, secure... |