Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,872,167 Method of managing several profiles in a secure element
The invention is a method for managing communication between a secure element and a device. The secure element comprises a physical communication interface and...
US-9,871,920 Securely and efficiently transferring sensitive information via a telephone
An apparatus includes a communications module that establishes a verbal communication between an automated attendant of a company and a customer through an...
US-9,871,852 Monitoring system with message forwarding, a method, and a computer program
Monitoring installations for buildings, building complexes, open spaces or other monitoring areas can comprise a plurality of system components. These system...
US-9,871,851 Migrating private infrastructure services to a cloud
Implementations are provided herein for the migration of known infrastructure services, such as those existing on a private cloud infrastructure, to a public...
US-9,871,819 Zone-based security architecture for intra-vehicular wireless communication
Systems and methods provide secure and wireless intra-vehicular communication. An intra-vehicular communication system has a secured network segment including a...
US-9,871,816 Systems and methods for security management of multi-client based distributed storage
There is provided a method of maintaining a security risk level of data objects stored in a distributed system, comprising: estimating a current security risk...
US-9,871,814 System and method for improving security intelligence through inventory discovery
A system for monitoring devices in a network comprising a coordinator operating on a first processor and configured to detect a plurality of active devices and...
US-9,871,805 User authentication
A method, system, server processing system and computer readable medium for authenticating a user attempting to access a secure environment is disclosed. In one...
US-9,871,797 Information security apparatus and methods for credential dump authenticity verification
In some embodiments, an apparatus includes a memory, storing processor-executable instructions, blacklist terms, and credential dump records, and a processor....
US-9,871,790 Identification method of an entity
The present invention relates to identification method of an entity executed by an identification system from indexed distance data (d.sub.1, . . . , d.sub.n)...
US-9,871,774 Secured file transfer management on augmented reality (AR) and virtual reality (VR) devices
In one embodiment, a system includes a processing circuit and logic integrated with the processing circuit, executable by the processing circuit, or integrated...
US-9,871,771 Cryptographic security profiles
Two endpoint devices communicate with one another in a secure session by negotiating encrypted communications at initial establishment of the session. Each...
US-9,871,770 Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-9,871,768 IPv6 to IPv4 data packet migration in a trusted security zone
Systems and methods discussed herein relate to enabling communications between IPv4 and IPv6 hosts using a communication channel in a trusted security zone...
US-9,871,766 Secure path determination between devices
Methods, network controllers, and machine-readable and executable instructions are provided to determine a secure path between a source device and a destination...
US-9,871,660 Method for certifying and authentifying security documents based on a measure of the relative variations of the...
Methods for certifying a security document comprising the steps of: a) selecting a set of unique characteristics, obtained as the result of the variations in...
US-9,871,659 Data transmission unit for a vehicle
A method for transmitting data between a vehicle and a terminal, in which data to be transmitted are transmitted on the basis of at least one digital signature...
US-9,870,694 Networked security cameras and automation
Apparatuses, techniques, and methods for a security and/or automation system are described. In some cases, methods may include obtaining data from a first...
US-9,870,665 Apparatus, system and method for vehicle access and function control utilizing a portable device
A system for providing dynamic access to a vehicle via a plurality of devices. A device and/or a server of an authentication network stored fob data relating to...
US-9,870,659 Cryptographic key management via a computer server
Some embodiments include a computer server. The computer server can be configured to: add a security system associated with a user account; provision one or...
US-9,870,508 Securely authenticating a recording file from initial collection through post-production and distribution
The technology disclosed relates to data captured in streams from sensors. Streams often are edited, especially video and audio data streams. In particular, the...
US-9,870,490 Apparatus and method for an antitheft secure operating system module
An apparatus and method for a secure operating system module are provided. The method includes receiving an activation signal to enable a secure OS module, in...
US-9,870,488 Method and apparatus for securing programming data of a programmable device
Circuitry and methods prevent unauthorized programming, or reprogramming, of a programmable device, by requiring a signature in the configuration data to match...
US-9,870,478 Data protection for storage device
A method for protecting data on a first storage device from unauthorized access is provided. The method includes copying a data map, such as a file allocation...
US-9,870,477 Security engine for a secure operating environment
The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a...
US-9,870,471 Computer-implemented method for distilling a malware program in a system
A computer-implemented method for distilling a malware program in a system is disclosed. The computer-implemented method includes steps of receiving a known...
US-9,870,459 Physical token-less security screening using biometrics
In physical token-less security screening using biometrics, a person provides biometric data to a security computing device as part of a security screening. The...
US-9,870,414 Secure deletion operations in a wide area network
Methods, systems, and computer program products are provided for performing a secure delete operation in a wide area network (WAN) including a cache site and a...
US-9,870,407 Automated and delegated model-based row level security
Business groups are created to secure business entities of a BI data model. In one aspect, a user to be secured is selected and a business group of the BI model...
US-9,870,324 Isolating guest code and data using multiple nested page tables
A hypervisor provides a guest operating system with a plurality of protection domains, including a root protection domain and one or more secure protection...
US-9,870,166 Securely sharing cached data
Various embodiments of a system and method for securely caching and sharing image data. A process can generate image data and store the image data into the...
US-9,869,848 Single element radiometric lens
The disclosure describes systems and apparatuses that include a focusable lens, as well as methods for focusing the optical lens. The focusable lens system...
US-9,869,176 Downhole to surface data lift apparatus
Data may be collected from a wellbore by retrievably deploying a data receiver tool to a location proximate a gauge located in the wellbore, where the gauge...
US-9,867,721 Method and apparatus for post-operative tuning of a spinal implant
A tunable implant, system, and method enables a tunable implant to be adjusted within a patient. The tunable implant includes a securing mechanism to secure the...
US-9,867,539 Sweat sensing device communication security and compliance
The invention addresses confounding difficulties involving continuous sweat analyte measurement. Specifically, the present invention provides: at least one...
US-9,867,045 Method of managing communication between a secure element and a host device
The invention is a method of managing communication between a host device and a secure element comprising two virtual profiles. The method comprises the steps...
US-9,866,991 System and method for secure pairing of bluetooth devices
A mobile device includes a Bluetooth transceiver, the Bluetooth transceiver being in an idle power state when not securely paired to a second Bluetooth...
US-9,866,925 Relevancy improvement through targeting of information based on data gathered from a networked device...
In one embodiment, a method of a relevancy-matching server includes generating a fingerprint data using a television, matching primary data generated from the...
US-9,866,827 Intelligent motion capture element
Intelligent motion capture element that includes sensor personalities that optimize the sensor for specific movements and/or pieces of equipment and/or clothing...
US-9,866,686 Method and apparatus for performing network registration through a selected component for data service
An electronic device is provided, which includes a removable SIM, a secure memory configured to store at least one profile, a processor configured to select at...
US-9,866,568 Systems and methods for detecting and reacting to malicious activity in computer networks
Described herein are systems and methods for performing detection operations on secure ticket data to detect potentially malicious activity. Embodiments may...
US-9,866,564 System, method and computer program product for gathering and delivering personalized user information
A system, method and computer program product for providing a secure data channel between a user and associates. The method may receive pushed information from...
US-9,866,561 Enhanced user interface and data handling in business intelligence software
A business intelligence and reporting solution can include a databook interface that acts as both as a reporting mechanism and an interface for providing data...
US-9,866,560 Secure data access
Technologies are generally disclosed for methods and systems for providing secure document storage and retrieval services. In an example embodiment, a method...
US-9,866,559 Method for opening a session of a machine belonging to a machine set
A method for opening a session of a first machine using a session checking service for the first machine and a second machine, including a security service,...
US-9,866,553 Method for securing access to a computer device
The invention relates to a method for securing access to a computer device, that includes the step of establishing a secured connection and authentication of...
US-9,866,533 Secured cloud data storage, distribution and restoration among multiple devices of a user
A method is provided to share a content stored on a secured server. The content is associated to a first electronic device and encrypted using a public key of...
US-9,866,426 Methods and apparatus for analyzing system events
Apparatus and methods facilitate analysis of events associated with network and computer systems. Event data, such as security threats, are comparison matched...
US-9,866,394 Device for archiving handwritten information
An electronic pen device configured for use with a remote secure server for registering handwritten signatures, the secure server comprising an authentication...
US-9,866,382 Secure app-to-app communication
Secure application-to-application communication is disclosed. A shared encryption key may be used to encrypt data to be transferred from a first mobile...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.