Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,253,204 Generating accurate preemptive security device policy tuning recommendations
An approach is provided for determining a likelihood of an attack on a first computer system of a first business. Characteristics of the first business and a...
US-9,253,198 Systems and methods for geolocation-based authentication and authorization
Systems and methods are provided for controlling the authentication or authorization of a mobile device user for enabling access to the resources or...
US-9,253,187 Computer system and method
A method for use in a simplified login system, involving operating a computer to identify user name, password and submit fields on a remote website. The method...
US-9,253,176 Computerized method and system for managing secure content sharing in a networked secure collaborative exchange...
In embodiments of the present invention improved capabilities are described for securely sharing computer data content that allows for the secure un-sharing of...
US-9,253,171 Distributed network encryption key generation
Embodiments of methods and network devices for securing data within a network are generally described herein. One such method includes a key aggregation server...
US-9,253,170 Method and apparatus for securing mobile applications
In some embodiments, a method includes obtaining an object code of an application executed on a mobile device. The application is created by an author different...
US-9,253,167 Device and system for facilitating communication and networking within a secure mobile environment
The present invention relates generally to facilitating secure voice and data communication by way of a commercially available communication device (i.e.,...
US-9,253,162 Intelligent card secure communication method
The present invention relates to the field of information security. Disclosed is an intelligent card secure communication method, capable of preventing the...
US-9,253,160 Methods, systems, and media for secure connection management and automatic compression over metered data...
Methods, systems and media for facilitating compression over a metered data connection are provided. In some embodiments, the methods comprise: detecting a new...
US-9,253,152 Applying a packet routing policy to an application session
A security gateway includes packet routing policies, each including a host network address, an application network address, and a forwarding interface. In...
US-9,252,977 Method and system for an uncompromising connection from a computing device having information storage like...
A system for sending data from at least one computing device, which may be an email server, located at a user location, to a plurality of handsets. The system...
US-9,252,963 Performing multicast communication in computer networks by using overlay routing
An overlay protocol and system for allowing multicast routing in the Internet to be performed at the application level. The overlay protocol uses "native"...
US-9,252,956 Method and system for transmitting control data in a manner that is secured against manipulation
A method and system for detecting manipulation when control data are transmitted from a first control unit to a second control unit via a network, which...
US-9,252,955 Apparatus and methods for the secure transfer of electronic data
An embodiment of the invention provides a method for processing a secure electronic transaction over a network from a sender to a receiver, which includes the...
US-9,252,952 Gesture-based encryption methods and systems
Methods and systems for transmitting and receiving are disclosed. For example, a method for establishing secure communications can include measuring one or more...
US-9,252,949 Broadcast encryption based media key block security class-based signing
Provided are techniques for verifying, by a first device, that a management key block of a second device is valid. A management key block that includes a...
US-9,252,948 Broadcast encryption based media key block security class-based signing
Provided are techniques for verifying, by a first device, that a management key block of a second device is valid. A management key block that includes a...
US-9,252,946 Method and system to securely migrate and provision virtual machine images and content
A method, device, and system for securely migrating and provisioning a virtual machine image to a host device of a cloud service provider environment (CSPE) is...
US-9,252,945 Method for recognizing a manipulation of a sensor and/or sensor data of the sensor
A method for data transmission between a sensor and an electronic control and/or regulating unit (ECU), the transmitted sensor data (x.sub.1, . . . , x.sub.t)...
US-9,252,943 Parallelizable cipher construction
A method of providing security in a computer system includes producing an output block of data from an input block of data, which may be performed by one or...
US-9,252,845 Near-field communications and routing
Near-field communications (NFC) with NFC reader devices are facilitated. In accordance with one or more embodiments, an apparatus includes a NFC circuit that...
US-9,252,843 Method and apparatus for data transmission
A method and an apparatus for data transmission between a contactless front element and a security element are provided. The method includes: the contactless...
US-9,251,583 Analysis, secure access to, and transmission of array images
Systems and methods are provided the autocentering, autofocusing, acquiring, decoding, aligning, analyzing and exchanging among various parties, images, where...
US-9,251,385 Computer system for accessing confidential data by means of at least one remote unit and remote unit
A computer system for accessing confidential data via at least one remote unit (4), the data being stored in a secured centralized computer system (3) including...
US-9,251,381 Solid-state storage subsystem security solution
A solid-state storage subsystem, such as a non-volatile memory card or drive, includes a main memory area that is accessible via standard memory access commands...
US-9,251,378 Security protection of software libraries in a data processing apparatus
A processing apparatus 2 has a secure domain 90 and a less secure domain 80. Security protection hardware 40 performs security checking operations when the...
US-9,251,377 Instructions processors, methods, and systems to process secure hash algorithms
A method of an aspect includes receiving an instruction. The instruction indicates a first source of a first packed data including state data elements a.sub.i,...
US-9,251,371 Method and system for applying data retention policies in a computing platform
Systems and methods for a multitenant computing platform. Original data is generated through operation of a computing platform system on behalf of an account of...
US-9,251,368 Provisioning transient-controlled secure environments for viewing sensitive data
A new approach to customer support that protects working artifacts through their entire lifecycle by provisioning, on-demand, a transient-controlled debugging...
US-9,251,365 Trusted storage systems and methods
Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of...
US-9,251,360 Computerized method and system for managing secure mobile device content viewing in a networked secure...
In embodiments of the present invention improved capabilities are described for securely viewing computer data content, such as documents, presentations,...
US-9,251,358 System and method for providing secure access to system memory
There is provided a method of providing secure access to data stored in a system memory of a computer system, the computer system comprising a memory controller...
US-9,251,357 Scalable precomputation system for host-opaque processing of encrypted databases
A method, system, and computer program product to generate results for a query to an encrypted database stored on a host are described. The system includes a...
US-9,251,354 Secure access supersession on shared workstations
Transitions between users at shared workstations that permit access to private health information or other secure data may be handled, without incurring...
US-9,251,331 Simplified user registration
Methods, systems, and computer-readable media are provided. Some embodiments include receiving, at a computing device, a security token identifier and a request...
US-9,251,330 Secure management of a smart card
A smart card comprises: a processing circuit; a memory that contains a protected object; an activity detector that receives a signal that describes a planned...
US-9,251,326 Personal digital key initialization and registration for secure transactions
A system and method provide efficient, secure, and highly reliable authentication for transaction processing and/or access control applications. A personal...
US-9,251,311 System and method for real-time transactional data obfuscation
A system and method for providing transactional data privacy while maintaining data usability, including the use of different obfuscation functions for...
US-9,251,233 Merging an out of synchronization indicator and a change recording indicator in response to a failure in...
A first data structure stores indications of storage locations that need to be copied for forming a consistency group. A second data structure stores...
US-9,251,231 Merging an out of synchronization indicator and a change recording indicator in response to a failure in...
A first data structure stores indications of storage locations that need to be copied for forming a consistency group. A second data structure stores...
US-9,251,193 Extending user relationships
A system and method for linking information of one user to other users via a data aggregation server is provided. Various security settings govern the linking...
US-9,251,162 Secure storage management system and method
The present invention provides a storage management system and method for managing access between a plurality of processes and a common store. According to the...
US-9,250,840 Image forming apparatus capable of executing applications, image forming method, and recording medium
Provided is an image forming apparatus that allows information to be shared between applications, while lowering the security risk. With this image forming...
US-9,250,834 Method and apparatus for reading and replacing control and/or identification data in a print image to support...
According to aspects of the embodiments, there is provided methods of decomposing and modifying a bitmap image before it is rendered by an output device....
US-9,250,709 Secure point of sale terminal
A data entry device including a housing formed of at least two portions, data entry circuitry located within the housing, at least one case-open switch assembly...
US-9,249,601 Conversion system for mechanical keys
A system is disclosed and includes an adapter, an activation apparatus and a sensor apparatus. The adapter is for use with a mechanical key. The adapter...
US-9,248,680 Method and device for used ribbon destruction
Methods and devices are described for securely destroying used ribbon from a document personalization machine in order to render any information retained on the...
US-9,247,445 Wireless sensor module, method for processing measurement data thereby, and recording medium
A wireless sensor module has a sensor that measures a measuring object to generate measured data, a wireless communication section that wirelessly transmits the...
US-9,247,212 Intelligent motion capture element
Intelligent motion capture element that includes sensor personalities that optimize the sensor for specific movements and/or pieces of equipment and/or clothing...
US-9,247,108 Use of active shutter device to securely display content
An active shutter device for use in securely displaying content from a display to a user. The secure content is encoded as a sequence of video frames...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.