Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,769,949 Mobile video, audio, and sensory apparatus
A self-contained mobile surveillance apparatus has applicability in a variety of short or long term settings where security and documentation of activities are...
US-9,769,664 Nonce silent and replay resistant encryption and authentication wireless sensor network
An access point and a sensor node are disclosed for use within a wireless sensor network. The wireless sensor network includes at least one access point adapted...
US-9,769,658 Certificating vehicle public key with vehicle attributes
A method for providing secure connection between vehicles. A unique pair of digitally signed public key and private key is provided to each vehicle, along with...
US-9,769,639 Secure emergency response technology
Technology for securely processing emergency response. An emergency response server receives intermittent location data from a client device during...
US-9,769,276 Real-time network monitoring and security
A hardware device for monitoring and intercepting data packetized data traffic at full line rate, is proved. In high bandwidth embodiments, full line rate...
US-9,769,213 Method and system for secure digital object management
A system and method for secure data object management system comprising a cloud-based host environment and a local secure container. The cloud-based host...
US-9,769,170 Synchronizing credential hashes between directory services
The subject disclosure is directed towards securely synchronizing passwords that are changed at a source location (e.g., an on-premises directory service) to a...
US-9,769,169 Secure sensor data transport and processing
The present disclosure is directed to secure sensor data transport and processing. End-to-end security may prevent attackers from altering data during the...
US-9,769,149 Proxy-less secure sockets layer (SSL) data inspection
Some embodiments of proxy-less Secure Sockets Layer (SSL) data inspection have been presented. In one embodiment, a secured connection according to a secured...
US-9,769,148 Secure application access system
A proxy server receives a synchronization request from an application program resident on a user device. The proxy server determines that the user device...
US-9,769,144 Method for logging of a remote control session
A method for logging of a remote control session, for use in a remote control system comprising a session initiator operable to initiate a remote control...
US-9,769,137 Extensible mechanism for securing objects using claims
An extensible mechanism for providing access control for logical objects in a network environment. A security broker is able to dynamically register one or more...
US-9,769,131 Fast reconfiguring environment for mobile computing devices
An example method includes receiving an indication of a selection of a first application environment that includes a first virtual environment associated with a...
US-9,769,130 Systems and methods of transmitting data
Systems and methods of transmitting data from one location to another location that can be used in a number of applications including, but not limited to,...
US-9,769,046 Sensor-based detection and remediation system
The invention comprises a method and system of deploying and managing sensor agents to provide services to networks and devices within a network. The invention...
US-9,768,965 Methods and apparatus for validating a digital signature
Various embodiments include one or more of systems, methods, software, and data structures for validating a digital signature, wherein common information in a...
US-9,768,958 Visible-light communication-based encryption, decryption and encryption/decryption method and system
Embodiments of the present invention provide a method and system of encryption, decryption, and encryption and decryption based on visible light communication....
US-9,768,955 System and method for exchanging encryption keys between a mobile device and a peripheral device
Systems and methods for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless...
US-9,768,823 Convertible data carrier cradle for electronic mobile device
A data carrier is convertible into a cradle for a mobile communications device. The data carrier includes a first manipulation line downstream of a cutout in...
US-9,767,680 Abberation detection technology
In some implementations, techniques are described for detecting abnormal installations in a property monitored by a monitoring (e.g., security) system. For...
US-9,767,676 Security system storage of persistent data
A security system including devices generating persistent data, a local control system (LCS) including a microprocessor and non-volatile memory and receiving...
US-9,767,631 Garage door status and control via a security system
Methods, systems, and devices are described that are directed to status and control of a garage door system via an alarm system controller. A garage door system...
US-9,767,527 Diamond-based tradeable instrument security system
A tradeable commodity or instrument, a trading system for a plurality of such commodities, a method of trading using such a system and security systems related...
US-9,767,482 Intelligent interactive voice response system for processing customer communications
Extracting and sharing user preference information includes receiving a call from a user device, retrieving user information from a user account stored in a...
US-9,767,323 Spatial security for stored data
Systems and methods of providing spatial security of data stored on a hard disk drive. A method includes associating a user with at least one track and/or...
US-9,767,321 Setting security features of programmable logic devices
Systems and methods are disclosed for allowing security features to be selectively enabled during device configuration. For example, a programmable integrated...
US-9,767,318 Secure controller systems and associated methods thereof
Systems and methods for encrypted processing are provided. For example, an apparatus for encrypted processing includes: an input interface adapted to receive...
US-9,767,317 System to provide cryptographic functions to a markup language application
A browser includes modules to provide markup language applications with access to cryptographic functions executing in a secure zone. Non-secure operations...
US-9,767,315 Systems and methods for initiating immediate data erasure on a device
A system and method of erasing data on a data handling device may include providing a device with a data storage element and a biometric characteristic scanning...
US-9,767,310 Systems and methods for secure data exchange and data tampering prevention
Systems and methods for secure data exchange and data tampering prevention. A secure data system receives electronic data files from data entities and stores...
US-9,767,306 Secured data storage on a hard drive
Secured electronic data storage on a hard drive is described. A computer system that incorporates the hard drive includes a shrink, shred, and data...
US-9,767,299 Secure cloud data sharing
A system and method for sharing an encrypted file stored on a cloud server is disclosed. In certain embodiments, the method includes generating a file key...
US-9,767,295 Content based hardware security module assignment to virtual machines
At least one hardware security module out of a plurality of hardware security modules is assigned to a guest system. The at least one hardware security module...
US-9,767,294 Intermediate server, database query processing method and program
To make it possible to prevent leakage of sensitive information from a database without using a server having both secure operation management and a high...
US-9,767,293 Content based hardware security module assignment to virtual machines
At least one hardware security module out of a plurality of hardware security modules is assigned to a guest system. The at least one hardware security module...
US-9,767,287 Systems, methods, and computer program products for managing data re-installation
Systems, methods, and computer program products are provided for managing data re-installation including service re-installation. A re-installation procedure...
US-9,767,268 Optimizing a compiled access control table in a content management system
A method, computer program product, and system for improving the operation and management of a content management system, by managing data security and...
US-9,767,267 Method and apparatus for making a decision on a card
Method and devices for making access decisions in a secure access network are provided. The access decisions are made by a portable credential using data and...
US-9,767,262 Managing security credentials
Disclosed are various embodiments for managing security credentials. In one embodiment, a request for a security credential is obtained from a client and is...
US-9,767,249 Energy consumption via VPN configuration management
An automation system including a plurality of peripheral devices, each configured to perform at least one function relating to energy consumption in a facility...
US-9,767,109 Secure data migration in a dispersed storage network
A method begins by a dispersed storage (DS) processing module identifying a candidate dispersed storage (DS) unit of a dispersed storage network (DSN). In...
US-9,767,013 Detecting code alteration based on memory allocation
Techniques are described for identifying anomalous execution instance of the process as a security risk by analyzing the memory allocation for the process....
US-9,766,957 Method and processes for securely autofilling data fields in a software application
The present invention gives the methods and processes for automatically servicing user driven requests to find placeholder fields, fill them in with relevant...
US-9,766,615 Motor drive system data interface system and method
A motor drive system includes a motor drive processor, a motor drive memory component, a server, and a display that displays a machine readable code, wherein...
US-9,766,263 Apparatus and method for detecting disease in dairy animals
Disclosed is apparatus and a method for detecting udder disease in dairy animals. An accelerometer is attached to each of a plurality of dairy animals. A...
US-9,764,893 Thief hatch monitoring system
The present invention is directed to a device and system for monitoring the closure state of a hatch. A pressure sensor is positioned between the upper sealing...
US-9,763,164 System and method for enabling VPN-less session setup for connecting mobile data devices to an enterprise data...
A mobile application gateway configured to interconnect mobile communication devices on a cellular network with an enterprise network is provided. The mobile...
US-9,763,096 Mobile application identification and control through WiFi access points
A network access point secures a WiFi network, and acts as a picocell, by identifying applications running on computer-based devices, such as mobile phones,...
US-9,763,089 Protecting sensitive data in a security area
Managing data security on a mobile device. Data associated with a mobile device is received; the data includes an identification (ID) of the mobile device and a...
US-9,763,063 Secure broadcast beacon communications
Using various embodiments, methods and systems for secure Bluetooth Low Energy communications, in an unconnected state, are described herein. In one embodiment,...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.