Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,693,235 Methods and devices for securing radio resources for an LTE-U data transmission
A method for securing radio resources for a Long Term Evolution-unlicensed, LTE-U, data transmission is disclosed. The method includes transmitting a plurality...
US-9,692,848 Preemptive loading of protected data for streaming mobile devices
According to some embodiments, a proxy server populates a proxy server cache with first user content and sends the first user content to a secure client...
US-9,692,593 Distributed storage network and method for communicating data across a plurality of parallel wireless data streams
A distributed storage network receives data that is to be transmitted. The data is processed via one or more error-coding dispersed storage functions and sliced...
US-9,691,264 Security system health monitoring
An apparatus and method for determining at least one operational condition of a premises based system including at least one premises device. The apparatus...
US-9,691,012 Dynamic authentication system and methods for use with legacy terminals
In one embodiment, the present invention provides a method and communication device with an emulated mag stripe capability. Information is transmitted in the...
US-9,690,946 Security analysis using relational abstraction of data structures
Analyzing program code can include detecting an instance of a container within the program code using a processor, selecting a model container correlated with...
US-9,690,945 Security analysis using relational abstraction of data structures
Analyzing program code can include detecting an instance of a container within the program code using a processor, selecting a model container correlated with...
US-9,690,943 BIOS secure data management system
A Basic Input/Output System (BIOS) secure data management system includes a BIOS that is configured to perform a boot process. At least one memory system is...
US-9,690,912 System for interactive matrix manipulation control of streamed data
An interactive streaming media and application service provider system can securely stream high resolution, multiple formats of video and data. Different data...
US-9,690,721 System and method of sharing memory by arbitrating through an internal data bus
One or more methods and systems of sharing an external memory between functional modules of an integrated circuit chip are presented. The invention provides a...
US-9,690,717 Secure object having protected region, integrity tree, and unprotected region
A method and structure for a secure object, as tangibly embodied in a computer-readable storage medium. The secure object includes a cryptographically protected...
US-9,688,248 Vehicle security arrangement
A security arrangement for a motor vehicle having a vehicle management system and an on board diagnostics port to permit the external interrogation of the...
US-9,686,787 Pooled transport and control functions in a 3GPP LTE network
Presented are methods and apparatus for decoupling transport and control (T&C) functions from a plurality of eNBs and collecting the T&C functions in a...
US-9,686,685 Method of reinforcing security of beacon device, and system and apparatus thereof
Provided are a method of reinforcing the security of a beacon device and a system and apparatus thereof. In particular, the stability of security is increased...
US-9,686,301 Method and system for virtual asset assisted extrusion and intrusion detection and threat scoring in a cloud...
An analysis trigger monitoring system is provided in one or more virtual assets. One or more analysis trigger parameters, including security threat patterns,...
US-9,686,290 Procedure for the preparation and performing of a post issuance process on a secure element
The invention relates to a method for enabling post issuance operation on a secure element connectable to a communication device. The method allows an SE...
US-9,686,241 System and method for using unique device identifiers to enhance security
A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can...
US-9,686,240 IPv6 to IPv4 data packet migration in a trusted security zone
Systems and methods discussed herein relate to enabling communications between IPv4 and IPv6 hosts using a communication channel in a trusted security zone...
US-9,686,079 Electronic document notarization
A server receives a package of data including: a document designated for notarization, identification information including a photograph, photograph of a user,...
US-9,680,849 Rootkit detection by using hardware resources to detect inconsistencies in network traffic
A technique allows detection of covert malware that attempts to hide network traffic. By monitoring network traffic both in a secure trusted environment and in...
US-9,680,804 Distributed learning and aging for management of internet protocol (IP) addresses
A device includes a security process unit (SPU) associated with a logical ring of SPUs. The SPU receives a packet with an address associated with a malicious...
US-9,680,794 Secure one-way interface for archestra data transfer
A system for transmitting ArchestrA information from a first network in a first security domain to a second network in a second security domain. A first...
US-9,679,455 Security monitoring with programmable mapping
An integrated security arrangement is implemented in a variety of embodiments. In one such embodiment an integrated security arrangement includes a plurality of...
US-9,679,193 Methods and systems for capturing biometric data
A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an...
US-9,679,176 Indicia decoding device with security lock
A securable indicia encoding system with a lock receiving portion is disclosed herein. In one illustrative embodiment, a securable indicia decoding device may...
US-9,679,147 System and method for automated security testing
According to some embodiments, a list of files comprising each file in a data repository that is associated with the website is determined. A list of user roles...
US-9,679,126 Decryption device, method for decrypting and method and system for secure data transmission
A decryption device for decrypting a document encrypted using biometric information of an intended receiver of the document is provided. The decryption device...
US-9,679,118 Method and system for secure distribution of selected content to be protected
The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related...
US-9,678,681 Secured multi-tenancy data in cloud-based storage environments
A mechanism is provided for multi-tenancy data security. A storage device receives a request for storage from a client device. Responsive to the request for...
US-9,674,699 System and methods for secure communication in mobile devices
A system and a method for secure communication in a mobile computing device involve obtaining, by a first program installed on the mobile computing device, an...
US-9,674,201 Unobtrusive protection for large-scale data breaches utilizing user-specific data object access budgets
Techniques for unobtrusively protecting against large-scale data breaches over time are described. A security gateway coupled between clients and servers...
US-9,674,146 Network security module for Ethernet-receiving industrial control devices
A high-speed security device for network connected industrial controls provides hybrid processing in tandem hardware and software security components. The...
US-9,674,142 Monitoring network traffic
The disclosure is related to monitoring data traffic of user equipment through a monitoring node. A monitoring node may receive a data packet from user...
US-9,672,384 Secure processor and a program for a secure processor
The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated...
US-9,672,347 Integrity for security audit logs
Methods, systems, and computer-readable storage media for storing event data in an audit log file. Implementations include actions of receiving event data,...
US-9,672,345 Method and apparatus for making a decision on a card
Method and devices for making access decisions in a secure access network are provided. The access decisions are made by a portable credential using data and...
US-9,672,189 Methods for effective network-security inspection in virtualized environments
The present invention discloses methods for effective network-security inspection in virtualized environments, the methods including the steps of: providing a...
US-9,672,052 Secure inter-process communication
Among other disclosed subject matter, a system includes a secure execution domain configured to execute trusted processes. The system also includes a hardware...
US-9,671,953 Systems and methods using drawings which incorporate biometric data as security information
Systems and methods using drawings as security information are disclosed. According to an aspect, a computing device may include a touchscreen display...
US-9,669,508 Grinding wheel with identification tag
A grinding wheel assembly for use in a sharpening system includes a grinding wheel configured to be mounted in the sharpening system to carry out sharpening...
US-9,669,330 WWTP sensor cartridge
Embodiments describe apparatuses, systems and methods for utilizing a configurable WWTP container having a removable sensor/controller cartridge. Said removable...
US-9,667,723 High performance IP processor using RDMA
An architecture provides capabilities to transport and process Internet Protocol (IP) packets from Layer 2 through transport protocol layer and may also provide...
US-9,667,698 Secure port forwarding to access data between public processing locations and on-premise components
A method for transmitting data from an on-premise component to an off-premise computer image includes: sending a message from the off-premise computer image to...
US-9,667,659 Determining security factors associated with an operating environment
Embodiments of the present invention disclose a method, computer program product, and system for determining security factors associated with an operating...
US-9,667,654 Policy directed security-centric model driven architecture to secure client and cloud hosted web service...
A policy directed, security-centric model driven architecture is described to secure internal web services, such as those implementing service-oriented...
US-9,667,639 Systems and methods for detecting fraudulent electronic communication
Systems and methods are presented for receiving a plurality of request messages to analyze electronic communications. For each request message of the plurality...
US-9,667,627 Airport security check system and method therefor
A decryption system for decrypting user identification information encrypted on a storage device associated with a user identity document is disclosed. The...
US-9,667,621 Providing data security with a token device
A computer-implemented method for providing security to access and store data may include transferring first information for display from a token device having...
US-9,667,421 Federated key management
A system uses information submitted in connection with a request to determine if and how to process the request. The information may be electronically signed by...
US-9,667,338 Multiband wireless data transmission between aircraft and ground systems
Provided are methods and systems for multiband wireless data transmission between aircraft and ground systems. The transmission uses different wavelength...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.