Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,955,912 Magnet-based monitoring system
A magnetometer-based monitoring system comprising a magnet integrated with an object whose disposition is to be monitored, a first magnetometer secured in...
US-9,955,885 System and method for physiological data processing and delivery
A system and method for secure physiological data processing and delivery are provided. A log of identifiers of physiological monitoring patches and of...
US-9,955,354 Apparatus and method for controlling security mode in wireless communication system
Disclosed is a method for controlling a security mode by a user equipment (UE) in a wireless communication system, including performing a camp-on process and a...
US-9,955,351 RFID phone-unlocking system
The RFID phone-unlocking system is adapted for use with a personal data device. The personal data device further comprises an interrogator, a security code, and...
US-9,955,239 Configurable secure mobile tool for AMI and AMR metering systems
Disclosed herein are apparatuses, methods and systems for a configurable and secure mobile tool for Advanced Metering Infrastructure (AMI) and Automatic Meter...
US-9,954,920 Distributed secure decoding and processing of big data streams
Embodiments are directed to a secure MapReduce model for distributed processing and decoding of big data streams. An encoding engine may be employed to divide a...
US-9,954,903 Industrial network security translator
Embodiments of the present technology relate to a system for providing intrusion detection for industrial control systems, comprising serial data links to...
US-9,954,902 Secure proxy
Methods and systems are provided herein to enable secure proxying of network traffic between trusted and untrusted environments. In particular, a secure proxy...
US-9,954,899 Applying a network traffic policy to an application session
Embodiments of the present technology relate to a method for applying a security policy to an application session, comprising: determining, by a security...
US-9,954,856 Token based one-time password security
A one-time password (OTP) based security scheme is described, where a provider pre-generates a number of verification codes (e.g., OTP codes) which will be...
US-9,954,849 Systems and methods for managing secure sharing of online advertising data
Systems and methods are disclosed for managing online advertising data secure sharing. One method includes receiving, at a server, a request for proprietary...
US-9,954,838 Browser plug-in for secure credential submission
Described is a technology by which a plug-in (e.g., an ActiveX.RTM. control) instantiated by a web browser calls functions of a credential service to use a set...
US-9,954,833 Management of access sessions
Disclosed are examples of managing access sessions for a computing device. In some examples, a computing device obtains a key and timeout data from secured...
US-9,954,832 System and method for enhanced data protection
In one embodiment, a method of secure network transmission is performed by a computer system. The method includes encrypting a payload via a first symmetric key...
US-9,954,826 Scalable and secure key management for cryptographic data processing
A method and system for secure and scalable key management for cryptographic processing of data is described herein. A method of secure key handling and...
US-9,954,740 Performance and security management of applications deployed in hosted computing environments
Systems and methods for performance and security management of the computing infrastructure that supports an application deployed in a hosted computing...
US-9,954,684 Secure sharing
Among other things, at a central server, management of a document sharing process includes uploading from client devices through a communication network,...
US-9,954,678 Content-based transport security
A computer system can send a secure request over a named-data network to a remote device by generating an Interest with encrypted name components. During...
US-9,954,579 Smart connectors and associated communications links
"Smart" connectors with embedded processors, measurement circuits and control circuits are disclosed for establishing a "contactless" radio frequency (RF)...
US-9,954,156 Body heat powered wireless transmitter
A Body Heat Powered Portable Wireless Transmitter contains a Thermo Electric Generator, an energy Harvesting System, a Control System and a Wireless...
US-9,953,720 Implementing hidden security key in eFuses
A method and circuit for implementing a hidden security key in Electronic Fuses (eFuses), and a design structure on which the subject circuit resides are...
US-9,953,543 Secured computer based assessment
Systems and methods for secured computer based assessment are described. In one embodiment, the method comprises capturing of proctoring data at a candidate...
US-9,953,530 Systems, methods, and devices for securing cargo
Enhanced methods and systems for securing and monitoring cargo are described. Some examples provide a cargo monitoring system ("CMS") that is configured to...
US-9,953,515 Inductive security sensor not susceptible to magnetic tampering
An inductive security sensor system is not susceptible to magnetic tampering (such as by using an external magnet or false target). A sensor assembly includes...
US-9,953,500 Methods, systems, and products for security services
A sensor associated with a security system determines an electrically open circuit. An identifier identifies the open circuit, which may then be used to...
US-9,953,497 Merchandise security system with data collection features and relevant technical field
A merchandise security system with data collection features and a relevant method are disclosed. The system has: a data management unit, at least one alarm unit...
US-9,953,479 Controlling access to physical compartment using mobile device and transaction authentication system
Techniques are disclosed relating to securing physical compartments and allowing users access via a mobile device configured to use a mobile authentication...
US-9,953,467 Secure vehicular data management with enhanced privacy
The present disclosure is directed to secure vehicular data management with enhanced privacy. A vehicle may comprise at least a vehicular control architecture...
US-9,953,368 Embedded hardware based system which provides real-time pre-trade risk assessments for multiple parties and...
A risk assessment system and method are provided that may be implemented as an embedded hardware based system and method that provide real-time pre-trade risk...
US-9,953,333 Systems and methods for use of transaction data for customers
The invention provides a system and method for using transaction data to provide information to a customer, the information being provided in response to a...
US-9,953,317 Method and system for secure key rotation
This invention discloses a novel system for securing and using payment token data in a system for processing electronic payment transactions that does not...
US-9,953,310 Systems and method for providing multiple virtual secure elements in a single physical secure element of a...
Methods and systems are disclosed for providing a plurality of virtual secure elements (virtual SEs) to mobile devices with secure elements (SEs). A method...
US-9,953,309 Third party integrated security system
A third party payment system is provided which allows a user to conduct transactions through payment accounts stored on the third party payment system. The user...
US-9,953,184 Customized trusted computer for secure data processing and storage
The techniques discussed herein facilitate the transmission, storage, and manipulation of data in an encrypted database management system (EDBMS). An untrusted...
US-9,953,172 Secure database backup and recovery
As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system...
US-9,953,170 Semiconductor memory device, semiconductor system and reading method
The invention provides a flash memory which may effectively protect information with a high security level. A flash memory includes a setting part. When the...
US-9,953,168 Secure boot of virtualized computing instances
In an approach, a secure boot process includes two phases. In the first phase an on premises device generates a data encryption key (DEK) with which to encrypt...
US-9,953,166 Method for securely booting target processor in target system using a secure root of trust to verify a returned...
A method for securely booting a target processor in a target system from a secure root of trust includes computing a message authentication code from boot code...
US-9,953,165 Mobile platform software update with secure authentication
Generally, this disclosure describes devices, methods and systems and for securely updating software on a mobile platform using trusted hardware based...
US-9,953,160 Applying multi-level clustering at scale to unlabeled data for anomaly detection and security
Methods, systems, and computer program products for applying multi-level clustering at scale to unlabeled data for anomaly detection and security are disclosed....
US-9,953,146 Mobile communications device providing heuristic security authentication features and related methods
A mobile communications device includes a plurality of first input devices capable of passively collecting input data, a second input device(s) capable of...
US-9,952,790 Application security policy actions based on security profile exchange
In one embodiment, a method includes receiving, at a first host, a security profile related to a first data socket descriptor indicating risk to data security...
US-9,950,261 Secure data encoding for low-resource remote systems
A method includes identifying a string and parameters. The parameters include a coding frame, elements, and a travel path. The method includes traversing the...
US-9,949,249 Method and apparatus for spatial multiplexing in wireless communication system
The present disclosure relates to a communication method and system for converging a 5th-Generation communication system to support higher data rates beyond a...
US-9,949,132 Near field communication (NFC) device and method for selectively securing records in a near field communication...
A method and device for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message in a Near Field Communication (NFC)...
US-9,949,130 Data security for internet of things (IOT) devices
System for monitoring of IoT data traffic between an IoT device connected via a cellular network and a server using Internet Protocol (IP), where the IP...
US-9,949,128 Method of personalizing a security element cooperating with an apparatus
The invention relates to a method of personalizing a security element cooperating with an apparatus. This personalization includes downloading data, which is...
US-9,949,113 Updating profiles for secondary wireless devices
Techniques to manage updates for eSIMs of a secondary wireless device are disclosed. Responsive to a user input, expiration of a timer, receipt of a message...
US-9,949,111 Apparatuses, methods and systems for interfacing with a trusted subscription management platform
Apparatuses, methods, and systems are provided for implementing a trusted subscription management platform. The platform allows the remote creation,...
US-9,948,682 Data resource control through a control policy defining an authorized context for utilization of a protected...
Disclosed is a method, a device, and/or a system of a data resource control data structure. In one embodiment, a computer-implemented method includes receiving...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.