Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,806,780 Method and apparatus for generating and transmitting channel feedback in mobile communication system employing...
The present disclosure relates to a communication method and system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data...
US-9,806,072 Super CMOS devices on a microelectronics system
This application is directed to a low cost IC solution that provides Super CMOS microelectronics macros. Hereinafter, SCMOS refers to Super CMOS and Schottky...
US-9,805,582 Integrative security system and method
A method for monitoring and securing a facility without employing a manned control center, according to which a server acquires surveillance data from each of a...
US-9,805,534 Increased security electronic lock
Disclosed are an apparatus and a method for managing access to a shared resource based on identity that is established by use of personal data, such as...
US-9,805,430 Crisis-related information exchange hub
A crisis-related information hub manages the exchange of crisis-related information among multiple individual users and organizations. A safety communications...
US-9,805,421 Integrated investment management system with network datafeed and incremental database refresh
An investment management computer system is configured to communicate with data vendors or electronic accounting systems. The system may include an electronic...
US-9,805,368 End-to end secure payment processes
Systems and method for performing secure electronic payment transactions to allow merchants to perform payment processing such that the merchant payment system...
US-9,805,367 System and method to record encrypted content with access conditions
A secure detachable utility monitoring device is disclosed, to be appended to a utility metering apparatus for controlling at least one utility usage...
US-9,805,337 System and method for developing and administering web applications and services from a workflow, enterprise,...
A workflow, enterprise, and mail-enabled application server and platform supports distributed computing and remote execution of web applications. Lotus Domino...
US-9,805,206 Systems and methods for containerized data security
Provided herein are systems and methods useful in facilitating containerized data security. The system may include a data store, a computer processing unit, a...
US-9,805,204 Systems and methods for determining that files found on client devices comprise sensitive information
The disclosed computer-implemented method for determining that files found on client devices comprise sensitive information may include (1) maintaining, on a...
US-9,805,203 Cooperative static and dynamic analysis of web application code for finding security vulnerabilities
Implementations of the present disclosure include methods, systems, and computer-readable storage media for receiving, by a SSCA module of a server, source code...
US-9,805,199 Securely booting a computer from a user trusted device
A method for allowing a computer to boot from a user trusted device is provided. The computer includes a long-term data storage device storing operating system...
US-9,805,195 System and method for transferring files between computer systems using information invariant data transformation
Systems and methods using Information-invariant Data Transformation (IIDT) in the transfer of files from an un-trusted to a trusted computer system are...
US-9,801,059 Security for wireless broadcasts
Methods and systems are provided for concealing identifying data that may be used to identify a beacon or device in broadcasts unless an observer device is able...
US-9,801,056 Wireless communication system to secure data communications between application programming interfaces
A wireless communication system to secure data communications between APIs. The wireless communication system includes a first API for a first sensor in a first...
US-9,801,052 Method and system for securing control packets and data packets in a mobile broadband network environment
The present invention provides a method and an apparatus for securing data packets and control messages in a mobile broadband network environment. In one...
US-9,801,004 Device, method, and system for securely pairing mobile communication devices using movement
A device, method, and system for securely pairing mobile communication devices using device movement includes capturing a begin movement, capturing arbitrary...
US-9,800,879 Methods and systems for reversible multi-layer data hiding
Methods and systems for providing multi-layer reversible data hiding are disclosed. According to the methods and systems, multi-layer reversible data hiding...
US-9,800,672 Computer work distribution system and method
A system and method are presented that improve work cooperation among computers. Communication between programs is combined with restart data to travel via a...
US-9,800,616 Integrating policies from a plurality of disparate management agents
Described herein are embodiments for managing policies of a mobile device. In embodiments, a mobile device receives policy containers from a plurality of...
US-9,800,608 Processing data flows with a data flow processor
An apparatus and method to distribute applications and services in and throughout a network and to secure the network includes the functionality of a switch...
US-9,800,606 Systems and methods for evaluating network security
A computer-implemented method for evaluating network security may include (1) receiving, by a security server, a request to report a network risk score for an...
US-9,800,596 Automated detection of time-based access anomalies in a computer network through processing of login data
A processing device comprises a processor coupled to a memory and is configured to obtain data characterizing login events for multiple user identifiers. The...
US-9,800,582 Method and apparatus generating and applying security labels to sensitive data
The disclosure comprises a method, an apparatus, and instructions for controlling a computer to implement a security labeling service (SLS) to tag an electronic...
US-9,800,568 Methods for client certificate delegation and devices thereof
Methods, non-transitory computer readable media, and network traffic management apparatuses that receive a request from a client device to access an...
US-9,800,563 Method and device for processing data security channel
Embodiments of the present invention provide a method and a device for processing a data security channel of a tunnel, where the method includes: receiving an...
US-9,800,556 Systems and methods for providing data security services
Embodiments described herein provide enhanced computer- and network-based systems and methods for providing data security with respect to computing services,...
US-9,800,549 Hierarchical clustering in a geographically dispersed network environment
An example method for facilitating hierarchical clustering in a geographically dispersed network environment is provided and includes receiving a packet at one...
US-9,800,412 System and method for securing sensitive data
An approach is provided for securing data in a technical environment. In one embodiment, a processor obtains a first file, which when executed installs a first...
US-9,800,406 Technologies for modifying a first cryptographic cipher with operations of a second cryptographic cipher
Generally, the present disclosure provides technology modifying a first cryptographic cipher with one or more operations of a second cryptographic cipher. In...
US-9,800,405 Blackbox security provider programming system permitting multiple customer use and in field conditional access...
A method, apparatus, article of manufacture, and a memory structure for securely providing data for use by a hardware device of a receiver. The method utilizes...
US-9,799,154 Electronic key, electronic closure system and a method for allowing an access authorization
The invention relates to an electronic key (32) having at least two contacts (324, 325, 326) for the transmission of data and/or energy to an electronic lock...
US-9,799,032 Client-side security for tokenized transactions
A program product and device for processing transactions within a token transfer device, such as a smartphone or other portable electronic device. The method...
US-9,799,029 Securely receiving data input at a computing device without storing the data locally
The present invention is generally directed to securely receiving data input at a computing device without storing the data locally. The invention allows an...
US-9,798,965 On card display of data from secured chip
A retrofitted credit card including a certified smart card chip, a display and retrofitted emulation circuitry operative to enable the certified smart card chip...
US-9,798,942 Biometric recognition method with speed and security feature suitable for POS/ATM applications
A method quickly recognizes a person by identification codes derivable from biometric data includes registering and recognizing at least one user from multiple...
US-9,798,901 Device having a security module
A device securely accesses data in a memory via an addressing unit which provides a memory interface for interfacing to a memory, a core interface for...
US-9,798,895 Platform identity architecture with a temporary pseudonymous identity
In an example, a client-server platform identity architecture is disclosed. The platform identity architecture may be used to enable a venue operator to provide...
US-9,798,893 Secure format-preserving encryption of data fields
In one embodiment, a computer-implemented method includes extracting first key derivation data from a first row of data to be stored in a database, where the...
US-9,798,886 Bio-medical sensing platform
Methods, devices, systems, and computer program products for implementing a bio-medical sensing platform are provided herein. A method includes receiving one or...
US-9,798,882 Real-time model of states of monitored devices
A model representing system components and events of a plurality of monitored devices as data objects is described herein. The model resides on a security...
US-9,798,881 Dynamic feature enhancement in client server applications and high volume server deployment with dynamic app...
Generally, this disclosure provides methods and systems for dynamic feature enhancement in client server applications and for high volume server deployment with...
US-9,797,744 Electronic flight data display instrument
An electronic display instrument configured to secure in a desired position over multiple pre-existing instrument holes in a dashboard of an aircraft in place...
US-9,794,789 Proximity-based system that secures linked wireless-enabled devices
The proliferation of networked, wireless-enabled devices is challenged by the reliance upon password management and user knowledge of privacy and security...
US-9,794,787 System and method for limiting mobile device functionality
The present invention relates to systems and methods that employ various mechanisms to selectively disable mobile device functionality. In general, mobile...
US-9,794,775 Methods and devices for performing a mobile network switch
A method of performing a switch from a first mobile network to a second mobile network by a mobile terminal comprising a secure element includes the steps of:...
US-9,794,646 Method and device to embed watermark in uncompressed video data
A system and method to watermark an uncompressed content received at a client device in a compressed form and encrypted by at least one content key, said...
US-9,794,378 Network traffic controller (NTC)
A Network Device (ND) may be configured to enable secure digital video streaming for HD (high definition) digital video systems over a standard network. The ND...
US-9,794,368 Apparatus and method for managing subscriber profile in wireless communication system
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.