Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,001,3560 Securely exchanging information during application startup
Provided is a method for securely exchanging information during application startup. A processor may send a request for a passphrase to one or more remote...
US-1,001,3527 Automatically assessing an anatomical surface feature and securely managing information related to the same
A facility for procuring and analyzing information about an anatomical surface feature from a caregiver that is usable to generate an assessment of the surface...
US-1,001,3390 Secure handle for intra-and inter-processor communications
A protocol element referred to as a secure handle is described which provides an efficient and reliable method for application-to-application signaling in...
US-1,001,3385 Programmable validation of transaction requests
A data processor includes an input/output bridge that provides enforcement of a security status on transactions between devices across the bridge. The bridge...
US-1,001,3364 Securing data using per tenant encryption keys
One embodiment is directed to a technique which secures data on a set of storage drives of a data storage system. The technique involves encrypting data from a...
US-1,001,3138 Method and apparatus for secure data entry using a virtual interface
Method and apparatus for secure data entry. In the method a virtual data entry interface is generated, and is outputted so as to be readable only by the user....
US-1,001,2993 Method and system for risk modeling in autonomous vehicles
A method for adaptive risk modeling for an autonomous vehicle, the method comprising: retrieving parameters of an identified driving mission of the autonomous...
US-1,001,2406 Method and apparatus for controlling temperature
The present disclosure relates to a sensor network, Machine Type Communication (MTC), Machine-to-Machine (M2M) communication, and technology for Internet of...
US-1,001,2009 Electric lock device for furniture and storage
An electric lock device for furniture or storage has an RFID transmitter/receiver for communication with portable data carriers. A controller detects a data...
US-1,001,1248 Cross correlation between connected vehicles and other online devices
Embodiments of the present invention disclose a method, computer system, and a computer program product for vehicle software security associated with a vehicle....
US-1,001,0777 Bat swing training system and method of use
A system for swing training with a bat, the system includes a training device, having a bat spacer attached to a sweet spot position on the bat about a barrel...
US-1,001,0010 Mobile video, audio, and sensory apparatus
A self-contained mobile surveillance apparatus has applicability in a variety of short or long term settings where security and documentation of activities are...
US-1,000,9826 Wide area network (WAN) backhaul for wireless relays in a data communication network
A wireless relay serves a first User Equipment (UE). An eNodeB wirelessly exchanges UE signaling data and UE user data with the first UE. The eNodeB processes...
US-1,000,9773 Secured data access from a mobile device executing a native mobile application and a headless browser
Systems, methods, and computer-readable storage devices to enable secured data access from a mobile device executing a native mobile application and a headless...
US-1,000,9762 Method and system to enable secure communication for inter-eNB transmission
The embodiments herein provide a method and system for creating a secure connection for a User Equipment (UE) in a wireless network including a UE, carrier...
US-1,000,9354 Trust relationships in a computerized system
Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in...
US-1,000,9344 Systems and methods for endpoint management classification
A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to...
US-1,000,9322 Secure virtualized mobile cellular device
Secure virtualizing of a mobile cellular device uses a cellular communication network having base transceiver station edge node servers. A virtualized-instance...
US-1,000,9180 System and method for generating auditable secure seeds from real-world data
An interface receives a first digital signature of real-world data. A memory stores the first digital signature as seed data. The interface receives a second...
US-1,000,9175 Secure communication
A method for allowing a first party and a second party to obtain shared secret information is provided. The method comprises the steps of: obtaining, by the...
US-1,000,9173 System, device, and method of secure entry and handling of passwords
Devices, system, and methods of secure entry and handling of passwords and Personal Identification Numbers (PINs), as well as for secure local storage, secure...
US-1,000,9172 Instructions processors, methods, and systems to process secure hash algorithms
A method of an aspect includes receiving an instruction. The instruction indicates a first source of a first packed data including state data elements a.sub.i,...
US-1,000,9171 Construction and uses of variable-input-length tweakable ciphers
Innovations in the construction and use of variable-input-length tweakable ciphers ("VILTCs"). In some cases, a VILTC uses an initialization vector that is...
US-1,000,9168 System and method for secure communications and data storage using multidimensional encryption
An encryption system and method has processors and a memory system, the memory system configured to hold at least one macroblock, an encryption key, and machine...
US-1,000,9139 Peer-to-peer proximity pairing of electronic devices with cameras and see-through heads-up displays
The disclosed embodiments relate to electronic devices with optical head-mounted displays (OHMDs). Each electronic device includes an OHMD that provides a...
US-1,000,8124 Method and system for providing secure remote testing
A method and system provides security for remotely administered tests to examinees at respective remote locations by providing, with a head mounted image...
US-1,000,8061 Secure access to physical resources using asymmetric cryptography
Digital certificates are signed by a server's private key and installed at lock controllers that restrict access to physical resources. The server's public key...
US-1,000,8055 Reverse trace-preventing wireless recognition secure entry method and secure entry system using same
The present invention relates to a secure entry method of a radio-frequency identification (RFID) secure entry system including a tag, a reader, a detector, a...
US-1,000,7912 Client-side security for tokenized transactions
A method for processing transactions within a token transfer device, such as a smartphone or other portable electronic device. The method includes storing a...
US-1,000,7910 System and method for variable length encryption
Systems and methods for performing a secure transaction provided. In one embodiment, the method includes: reading data on a command token, reading data on a...
US-1,000,7909 Method and system for secure transmission of remote notification service messages to mobile devices without...
A method for receiving and processing a data message includes: storing at least an encryption key; receiving a data message, the data message including at an...
US-1,000,7850 System and method for event monitoring and detection
A system for event detection and reporting has primary sensors for producing raw data from observing the proximate area, one or more processors for the primary...
US-1,000,7809 Fine-grained self-shredding data in a secure communication ecosystem
One embodiment provides a document management system comprising a storage system to store one or more encrypted documents, at least a first portion of a first...
US-1,000,7807 Simultaneous state-based cryptographic splitting in a secure storage appliance
Methods and systems for managing I/O requests in a secure storage appliance are disclosed. One method includes receiving a plurality of I/O requests at the...
US-1,000,7804 Secure cloud storage distribution and aggregation
Methods and systems for vendor independent and secure cloud storage distribution and aggregation are provided. According to one embodiment, an application...
US-1,000,7794 Methods and systems for ensuring printer looses ability to print security patterns if disconnected from...
The present invention relates to a method and system used to ensure that a printer which is capable of printing security patterns loses its ability to print...
US-1,000,7793 Secure object having protected region, integrity tree, and unprotected region
A method and structure for a secure object, as tangibly embodied in a computer-readable storage medium. The secure object includes a cryptographically protected...
US-1,000,7792 Modeling a network security environment as a game
Disclosed are various embodiments that model a network security environment as a game. A data model corresponding to a network security environment is received....
US-1,000,7785 Method and apparatus for implementing virtual machine introspection
The present disclosure relates to the field of information technologies and discloses a method and an apparatus for implementing virtual machine introspection....
US-1,000,7772 Method and apparatus for authenticating access to a multi-level secure environment of an electronic device
An electronic system utilizes a method (500) for authenticating access to a multi-level secure environment. According embodiments, the system stores (501)...
US-1,000,7767 System and method for securing tenant data on a local appliance prior to delivery to a SaaS data center hosted...
An extensible servicing hosting platform is provided that supports the design, build and concurrent deployment of multiple web accessible services on a services...
US-1,000,7503 Method and apparatus for upgrading operating system of electronic device
An embodiment discloses an electronic device capable of performing an upgrade to an Operating System (OS) having enhanced security without deleting any user...
US-1,000,7502 Method for upgrading communication device
A method is disclosed for updating communication equipment through a server in a communication system, wherein the server stores the updated files used for...
US-1,000,7473 Continuous glucose monitor communication with multiple display devices
A continuous glucose monitor for wirelessly transmitting data relating to glucose value to a plurality of displays is disclosed, as well as systems and methods...
US-1,000,4096 Apparatus, system, and method of wirelessly transmitting and receiving data
A wireless media player and a related system and methodology are disclosed. One aspect of the wireless media player system pertains to a virtual connector...
US-1,000,4055 Method for a secure detach procedure in a radio telecommunication network
A method for performing a detach of a terminal registered to a telecommunication network is disclosed. The detach is performed by associating an identification...
US-1,000,3975 Authorized areas of authentication
An electronic device including a memory storing at least one of biometric or passcode data of a user, and a processor (i) requesting access of data over the...
US-1,000,3967 Bearer release
A user equipment method, user equipment, a base station method, a base station and computer program products. The user equipment method, comprises: on reception...
US-1,000,3627 Method, device and system for managing audio, video and data communications
Described herein are methods, systems and programs for managing the sharing of video, audio and data communications between users over the internet in the most...
US-1,000,3612 Protection for computing systems from revoked system updates
A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.