Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,000,9173 System, device, and method of secure entry and handling of passwords
Devices, system, and methods of secure entry and handling of passwords and Personal Identification Numbers (PINs), as well as for secure local storage, secure...
US-1,000,9172 Instructions processors, methods, and systems to process secure hash algorithms
A method of an aspect includes receiving an instruction. The instruction indicates a first source of a first packed data including state data elements a.sub.i,...
US-1,000,9171 Construction and uses of variable-input-length tweakable ciphers
Innovations in the construction and use of variable-input-length tweakable ciphers ("VILTCs"). In some cases, a VILTC uses an initialization vector that is...
US-1,000,9168 System and method for secure communications and data storage using multidimensional encryption
An encryption system and method has processors and a memory system, the memory system configured to hold at least one macroblock, an encryption key, and machine...
US-1,000,9139 Peer-to-peer proximity pairing of electronic devices with cameras and see-through heads-up displays
The disclosed embodiments relate to electronic devices with optical head-mounted displays (OHMDs). Each electronic device includes an OHMD that provides a...
US-1,000,8124 Method and system for providing secure remote testing
A method and system provides security for remotely administered tests to examinees at respective remote locations by providing, with a head mounted image...
US-1,000,8061 Secure access to physical resources using asymmetric cryptography
Digital certificates are signed by a server's private key and installed at lock controllers that restrict access to physical resources. The server's public key...
US-1,000,8055 Reverse trace-preventing wireless recognition secure entry method and secure entry system using same
The present invention relates to a secure entry method of a radio-frequency identification (RFID) secure entry system including a tag, a reader, a detector, a...
US-1,000,7912 Client-side security for tokenized transactions
A method for processing transactions within a token transfer device, such as a smartphone or other portable electronic device. The method includes storing a...
US-1,000,7910 System and method for variable length encryption
Systems and methods for performing a secure transaction provided. In one embodiment, the method includes: reading data on a command token, reading data on a...
US-1,000,7909 Method and system for secure transmission of remote notification service messages to mobile devices without...
A method for receiving and processing a data message includes: storing at least an encryption key; receiving a data message, the data message including at an...
US-1,000,7850 System and method for event monitoring and detection
A system for event detection and reporting has primary sensors for producing raw data from observing the proximate area, one or more processors for the primary...
US-1,000,7809 Fine-grained self-shredding data in a secure communication ecosystem
One embodiment provides a document management system comprising a storage system to store one or more encrypted documents, at least a first portion of a first...
US-1,000,7807 Simultaneous state-based cryptographic splitting in a secure storage appliance
Methods and systems for managing I/O requests in a secure storage appliance are disclosed. One method includes receiving a plurality of I/O requests at the...
US-1,000,7804 Secure cloud storage distribution and aggregation
Methods and systems for vendor independent and secure cloud storage distribution and aggregation are provided. According to one embodiment, an application...
US-1,000,7794 Methods and systems for ensuring printer looses ability to print security patterns if disconnected from...
The present invention relates to a method and system used to ensure that a printer which is capable of printing security patterns loses its ability to print...
US-1,000,7793 Secure object having protected region, integrity tree, and unprotected region
A method and structure for a secure object, as tangibly embodied in a computer-readable storage medium. The secure object includes a cryptographically protected...
US-1,000,7792 Modeling a network security environment as a game
Disclosed are various embodiments that model a network security environment as a game. A data model corresponding to a network security environment is received....
US-1,000,7785 Method and apparatus for implementing virtual machine introspection
The present disclosure relates to the field of information technologies and discloses a method and an apparatus for implementing virtual machine introspection....
US-1,000,7772 Method and apparatus for authenticating access to a multi-level secure environment of an electronic device
An electronic system utilizes a method (500) for authenticating access to a multi-level secure environment. According embodiments, the system stores (501)...
US-1,000,7767 System and method for securing tenant data on a local appliance prior to delivery to a SaaS data center hosted...
An extensible servicing hosting platform is provided that supports the design, build and concurrent deployment of multiple web accessible services on a services...
US-1,000,7503 Method and apparatus for upgrading operating system of electronic device
An embodiment discloses an electronic device capable of performing an upgrade to an Operating System (OS) having enhanced security without deleting any user...
US-1,000,7502 Method for upgrading communication device
A method is disclosed for updating communication equipment through a server in a communication system, wherein the server stores the updated files used for...
US-1,000,7473 Continuous glucose monitor communication with multiple display devices
A continuous glucose monitor for wirelessly transmitting data relating to glucose value to a plurality of displays is disclosed, as well as systems and methods...
US-1,000,4096 Apparatus, system, and method of wirelessly transmitting and receiving data
A wireless media player and a related system and methodology are disclosed. One aspect of the wireless media player system pertains to a virtual connector...
US-1,000,4055 Method for a secure detach procedure in a radio telecommunication network
A method for performing a detach of a terminal registered to a telecommunication network is disclosed. The detach is performed by associating an identification...
US-1,000,3975 Authorized areas of authentication
An electronic device including a memory storing at least one of biometric or passcode data of a user, and a processor (i) requesting access of data over the...
US-1,000,3967 Bearer release
A user equipment method, user equipment, a base station method, a base station and computer program products. The user equipment method, comprises: on reception...
US-1,000,3627 Method, device and system for managing audio, video and data communications
Described herein are methods, systems and programs for managing the sharing of video, audio and data communications between users over the internet in the most...
US-1,000,3612 Protection for computing systems from revoked system updates
A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security...
US-1,000,3610 System for tracking data security threats and method for same
An incident response system and method for tracking data security incidents in enterprise networks is disclosed. An Incident Manager application (IM) stores...
US-1,000,3605 Detection of clustering in graphs in network security analysis
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,000,3603 Computer security based on hierarchical cache latency signature authentication
A processor is coupled to a hierarchical memory structure which includes a plurality of levels of cache memories that hierarchically cache data that is read by...
US-1,000,3591 Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts
A permissions management system is disclosed for enabling a user to securely authorize a third-party system to access user account data and initiate...
US-1,000,3577 Secure transmission of local private encoding data
A method of secure transfer of local private encoding data between a first communication device and a second communication device, the first communication...
US-1,000,3549 System for allocating sensor network resources
The technology relates to allocating the resource costs of a sensor network. In particular, an auction model is used to control the demand-side of sensor...
US-1,000,3461 Power management and security for wireless modules in "machine-to-machine" communications
Methods and systems are provided for power management and security for wireless modules in "Machine-to-Machine" communications. A wireless module operating in a...
US-1,000,3124 Data communications case having an internal antenna array
A data communications apparatus including a case having a base and a lid connectable to the base, the lid movable with respect to the base between an open...
US-1,000,2635 Systems and methods for information capture
Disclosed herein are information capture systems and related methods. An information capture system includes a sensor secured to an object configured to be...
US-1,000,2474 Access control based on rhythmic pattern repetition
Techniques are described for controlling access based on pattern repetition. A rhythmic pattern may be communicated to a portable computing device of an...
US-1,000,2362 Composite security marking
The present invention relates to the field of anti-counterfeit protection of products. Specifically, the invention is directed to a composite security marking...
US-1,000,2277 Reader device for reading a marking comprising a physical unclonable function
The present invention relates to the field of anti-counterfeit protection of products. Specifically, the invention is directed to a method of reading with a...
US-1,000,2259 Information security/privacy in an always listening assistant device
An always-listening-capable computing device includes a receiver for input from a user, a module for communication with a remote server, and a gate-keeping...
US-1,000,2255 Method and device for controlling security screen in electronic device
A device and a method for controlling a security screen in an electronic device are provided. The electronic device includes a display module, a first memory...
US-1,000,2250 Security agent
A security agent is described herein. The security agent is configured to observe events, filter the observed events using configurable filters, route the...
US-1,000,2248 Mobile device data security system
Systems, computer program products, and methods are described herein for a mobile device data security system. The present invention is configured to establish...
US-9,998,926 Security enabled predictive mobile data caching
An approach to preemptive mobile data caching is provided, the approach involves retrieving personal user data associated with a user of a mobile computing...
US-9,998,629 Rights management in a distributed image capture system
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on...
US-9,998,520 Information processing terminal and method
An information processing terminal displays a confirmation screen for confirming whether to delete data relating to a web site, in a case where a movement from...
US-9,998,496 Logging and monitoring usage of cloud-based hosted storage services
A computer-implemented method for accessing a hosted service on client devices is described. The client devices include client software that uses a remotely...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.