Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,886,595 Priority-based application execution method and apparatus of data processing device
A method and an apparatus for executing applications in a highest-priority-first order in the processor divided into a secure mode area and a non-secure mode...
US-9,886,592 Medical alert computer interface tamper-proof secure device
A medical information system includes a portable device and remote authentication computing device. The portable device stores a person's personal medical...
US-9,886,589 Leveraging digital security using intelligent proxies
A method for protecting data is disclosed that protects not only who may access data but also how it is used. This invention uses an intelligent proxy which...
US-9,886,585 Multi-layer data security
Data may be encrypted using a public key. From a plurality of functions executable on the data, one or more functions may be selected. The selected one or more...
US-9,886,581 Automated intelligence graph construction and countermeasure deployment
Techniques for providing information security threat assessment and amelioration are disclosed. The techniques may include obtaining fundamental data, obtaining...
US-9,886,580 Method for optimizing boot time of an information handling system
A method and information handling system (IHS) that optimizes boot time. The method includes a basic input output system (BIOS) performing an authentication...
US-9,886,576 Security box
Provided is a security box including: an input means for input of external data; an execution means for executing, in a predetermined area, external data input...
US-9,886,564 Server system, communication system, communication terminal device, program, recording medium, and...
Provided is a network system which improves a security and prevents illegal use when providing services such as Internet banking services. A random graphic...
US-9,886,255 Healthcare as a service--downloadable enterprise application
An application as a service provided in a secure environment. A sandbox in a user's computing environment may be created. An application may be downloaded to...
US-9,885,541 Riflescope aiming system
A riflescope aiming system that includes a telescopic sight, a multiple-zero-point elevation turret and a ballistics reference system. The multiple-zero-point...
US-9,884,224 Exercising apparatus
An apparatus is disclosed for enabling an operator to exercise comprising a frame having a body, a base and a top. A load is positioned on the frame for...
US-D809,493 Hub for routing security sensor data
US-9,883,395 Securely accessing secure elements
Direct management of secure element data life cycles by backend servers without requiring direct communications between a trusted service manager (TSM) and a...
US-9,883,388 Ephemeral identity for device and service discovery
Embodiments of a system and method for secure discovery and identification of devices via a wireless network are generally described herein. In some embodiments...
US-9,883,387 Authentication using application authentication element
Embodiments of the present invention can be directed to systems, apparatuses, and methods for performing transactions through mobile communication devices using...
US-9,883,385 Apparatus and method for mobility procedure involving mobility management entity relocation
A device that identifies entry into a new service area, transmits a service area update request to a network device associated with a network, receives a...
US-9,883,383 Secure near field communications
The security of Near Field Communications (NFC) against eavesdroppers is improved by encoding a hidden key, private to an initiating device, onto the carrier...
US-9,883,362 Method and apparatus for transmitting and receiving voice call in communication system
The present disclosure relates to a communication method and a system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data...
US-9,881,506 Unmanned aerial vehicle beacon pod
Beacon pods that provide location information to unmanned aerial vehicles (UAVs). The beacon pods may emit location information, which may replicate global...
US-9,881,434 Intelligent portable object comprising graphical personalization data
The invention relates to an intelligent portable personal security object including graphical personalization data visible from a face of the object, wherein...
US-9,881,433 Systems and methods for electronic ticket validation using proximity detection
Systems and methods for monitoring permission to be in a location comprising: a secured area having at least one entry point with a mechanical gate having an...
US-9,881,297 Methods and systems for secure mobile device initiated payments using generated image data
Systems, methods, processes, computer program code and means for conducting a payment transaction are provided which include activating a payment application of...
US-9,881,294 RF payment via a mobile device
A nontraditional transaction device, for example a mobile device, may be employed to complete a transaction. The mobile device may utilize radio frequency (RF)...
US-9,881,216 Object tracking and alerts
An integrated surveillance system combining video surveillance and data from other sensor-based security networks is used to identify activities that may...
US-9,881,184 Authenticity-assured data gathering apparatus and method
Data is captured by a data capture apparatus in a manner to ensure authenticity of the data to the data capture apparatus. Transducer signaling is generated in...
US-9,881,183 System and method for recovering from an interrupted encryption and decryption operation performed on a volume
Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An...
US-9,881,177 Systems and methods for a cryptographic file system layer
The systems and methods disclosed herein transparently provide data security using a cryptographic file system layer that selectively intercepts and modifies...
US-9,881,176 Fragmenting data for the purposes of persistent storage across multiple immutable data structures
Provided is a process including: receiving one or more write requests; selecting a first subset of the values as corresponding to higher-security fields;...
US-9,881,164 Securing data
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for securing data. One of the methods includes receiving, by the...
US-9,881,161 System on chip to perform a secure boot, an image forming apparatus using the same, and method thereof
A system on chip is provided. The system on chip includes a first memory to store a plurality of encryption keys, a second memory, a third memory to store an...
US-9,881,159 Workload execution systems and methods
In one embodiment, a method is executed by a computer system. The method includes receiving information related to a platform-portable workload, the information...
US-9,881,033 Intelligent electrical distribution grid control system data
Aspects of a multi-level electrical distribution control system associated with an electrical distribution grid are disclosed. Data access and processing across...
US-9,881,030 Distributed archive system, data archive device, and data restoring device with improved restoration and security
A system for a distributed archive and data restoration which achieves both high-speed processing and security is provided. A random number is generated by a...
US-9,879,469 Centrally controlled safe management system
A cash management system utilizes a cloud computing model wherein a cloud of one or more servers may be locally networked or may be geographically dispersed and...
US-9,875,626 Methods and systems for determining a location of a container by tracking a SIM card associated with the container
Systems and methods of securing chattels are provided. Motion of a first container can be measured by a sensor over an interval of time and compared to motion...
US-9,875,607 Methods and apparatus for providing secure logon to a gaming machine using a mobile device
A gaming system compatible with patron-controlled portable electronic devices, such as smart phones or tablet computers, is described. When a transaction is...
US-9,875,474 Method for securing a transaction performed by bank card
A method is provided for securing a transaction made by bank card, the transaction involving a remote provision, by a user, of data existing in a bank card in...
US-9,875,376 Sensitive data aliasing
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed...
US-9,875,374 System and method for collecting, storing, and securing data
A computer system for collecting, securing, storing, retrieving, and disposing data includes an input that receives data from one or more data capture devices,...
US-9,875,370 Database server and client for query processing on encrypted data
Methods, systems, apparatuses, and computer program products are provided for secure handling of queries by a data server (DS) and a database application (DA)....
US-9,875,354 Apparatus and method for enhancing security of data on a host computing device and a peripheral device
A method of enhancing security of at least one of a host computing device and a peripheral device coupled to the host computing device through a communication...
US-9,875,348 E-learning utilizing remote proctoring and analytical metrics captured during training and testing
A device configured to utilize training techniques and to gather information while training and administering certification examinations. Certification...
US-9,875,194 Security system for external data storage apparatus and control method thereof
A security system for an external data storage apparatus and control method thereof are disclosed. The system utilizes a preset identification (ID) and input ID...
US-9,872,167 Method of managing several profiles in a secure element
The invention is a method for managing communication between a secure element and a device. The secure element comprises a physical communication interface and...
US-9,871,920 Securely and efficiently transferring sensitive information via a telephone
An apparatus includes a communications module that establishes a verbal communication between an automated attendant of a company and a customer through an...
US-9,871,852 Monitoring system with message forwarding, a method, and a computer program
Monitoring installations for buildings, building complexes, open spaces or other monitoring areas can comprise a plurality of system components. These system...
US-9,871,851 Migrating private infrastructure services to a cloud
Implementations are provided herein for the migration of known infrastructure services, such as those existing on a private cloud infrastructure, to a public...
US-9,871,819 Zone-based security architecture for intra-vehicular wireless communication
Systems and methods provide secure and wireless intra-vehicular communication. An intra-vehicular communication system has a secured network segment including a...
US-9,871,816 Systems and methods for security management of multi-client based distributed storage
There is provided a method of maintaining a security risk level of data objects stored in a distributed system, comprising: estimating a current security risk...
US-9,871,814 System and method for improving security intelligence through inventory discovery
A system for monitoring devices in a network comprising a coordinator operating on a first processor and configured to detect a plurality of active devices and...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.