Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,016,9604 Method and system to prevent ultrasound data leaks in mobile devices
A system, method and program product for implementing an ultrasound security system for a mobile device. A system is described that that integrates with an...
US-1,016,9594 Network security for data storage systems
In one embodiment of the present invention, a server is created, and a computer readable storage media is included in the server. An adapter is connected to the...
US-1,016,9589 Securely booting a computer from a user trusted device
A method for allowing a computer to boot from a user trusted device is provided. The computer includes a long-term data storage device storing operating system...
US-1,016,9587 Hosted device provisioning protocol with servers and a networked initiator
A network can operate a WiFi access point with credentials. An unconfigured device can (i) support a Device Provisioning Protocol (DPP), (ii) record responder...
US-1,016,9574 Using trusted execution environments for security of code and data
An embodiment includes a processor coupled to memory to perform operations comprising: creating a first trusted execution environment (TXE), in protected...
US-1,016,9573 Maintaining secure data isolated from non-secure access when switching between domains
A data processing apparatus including circuitry for performing data processing, a plurality of registers; and a data store including regions having different...
US-1,016,9563 Encryption authorization dongle having volatile memory
Embodiments of the present invention disclose a method, computer program product, and device for accessing encrypted data. A communication link may be...
US-1,016,9491 Query servicing with access path security in a relational database management system
A method and system for servicing a data query in a relational database management system (RDBMS). Access path security corresponding to a user originating the...
US-1,016,9300 Advanced zero-knowledge document processing and synchronization
Techniques disclosed herein decouple a document's structure from its general content wherein the structure is retained in plaintext (both at a client device and...
US-1,016,9162 Conveying value of implementing an integrated data management and protection system
A system and method are described for conveying to a user the value it would receive by implementing an integrated system to protect and manage its data. An...
US-1,016,9147 End-to-end secure data storage in a dispersed storage network
A method includes a first computing device generating a set of encryption keys and encrypting a data matrix based on the set of encryption keys to produce an...
US-1,016,8997 System and method for executing native client code in a storage device
A system and method for executing user-provided code securely on a solid state drive (SSD) to perform data processing on the SSD. In one embodiment, a user uses...
US-1,016,8974 Continuous glucose monitor communication with multiple display devices
A continuous glucose monitor for wirelessly transmitting data relating to glucose value to a plurality of displays is disclosed, as well as systems and methods...
US-1,016,8949 Envoy for multi-tenant compute infrastructure
A data management and storage (DMS) cluster of peer DMS nodes manages data of a tenant of a multi-tenant compute infrastructure. The compute infrastructure...
US-1,016,8934 Method and device for monitoring data integrity in shared memory environment
Provided is a method of memory access for a memory controller in an integrity monitoring system sharing memory with a host system. The memory access method may...
US-1,016,8775 Wearable motion sensing computing interface
An apparatus comprises a sensor configured to detect movement and generate movement data related to at least part of a detected movement; a messaging unit...
US-1,016,8180 Electronic flight data display instrument
An electronic display instrument configured to secure in a desired position over multiple pre-existing instrument holes in a dashboard of an aircraft in place...
US-1,016,7850 Systems, methods and apparatus for improved energy management systems with security constrained dynamic...
Embodiments provide systems, methods and apparatus for controlling an energy delivery system including providing an energy management system (EMS) including a...
US-1,016,6949 Vehicle safety and security system
The vehicle safety and security system comprises one or more vehicle cameras which feed imaging data to a control box located within the vehicle and which may...
US-1,016,6476 Secure data encoding for low-resource remote systems
A method includes receiving an input artefact and a set of shared parameters comprising a coding frame, one or more positioned elements, a travel path, and an...
US-1,016,6475 Secure data encoding for low-resource remote systems
A method includes receiving an input artefact and a set of shared parameters comprising a coding frame, one or more positioned elements, a travel path, and an...
US-1,016,5622 Method and system for synchronizing communication between nodes in a Bluetooth network
The present disclosure relates to a sensor network, Machine Type Communication (MTC), Machine-to-Machine (M2M) communication, and technology for Internet of...
US-1,016,5445 AT command for secure ESM information
Systems and methods for transmitting AT commands indicating whether Evolved Packet System (EPS) Session Management (ESM) information should be transmitted...
US-1,016,5089 System and method for automatic data security, back-up and control for mobile devices
Systems and methods for providing security, monitoring, and control of mobile communications device activity including at least one mobile communication device...
US-1,016,5051 High performance IP processor using RDMA
An architecture provides capabilities to transport and process Internet Protocol (IP) packets from Layer 2 through transport protocol layer and may also provide...
US-1,016,5010 Security compliance framework usage
A method and system for improving usage of a security compliance framework is provided. The method includes authenticating a user for: access to the security...
US-1,016,5007 Securing data usage in computing devices
Policies are applied to specific data rather than to an entire computing device that contains the specific data. Access to the specific data is controlled by...
US-1,016,4980 Method and apparatus for sharing data from a secured environment
A method for sharing data from within a secure network perimeter includes providing a sharing folder associated with a first user for transferring data...
US-1,016,4970 Secure cross-domain page generation
Systems and methods are directed to enabling a client device to insert customized content from a first server into a container page received from a second...
US-1,016,4969 Computer security system and method
A computer security system comprises a security module adapted to control access to a secure computer resource by a user via a client based on verification of a...
US-1,016,4786 Industry internet field broadband bus architecture system
The invention relates to an industry internet field broadband bus architecture system based on the two-wire data transmission network widely used in the...
US-1,016,4777 Privacy control using unique identifiers associated with sensitive data elements of a group
A method, system and computer program product for privacy control. A unique identifier for each data element of a group of data elements (e.g., driver's license...
US-1,016,4710 Optical transceiver for secure data transmission
We disclose a multichannel optical transceiver having a first optical channel used for client-data transmission over an optical fiber and a second optical...
US-1,016,4661 Data processing device and data processing method
The present technology relates to a data processing device and a data processing method, which are capable of securing excellent communication quality in data...
US-1,016,3372 Self-destructive documents for information security and privacy protection
The inventor here discloses destructive (self-destructing) documents useful for the protection of confidential information. The invention comprises a document...
US-1,016,3084 Banking systems controlled by data bearing records
Aspects of the disclosure relate to deploying, configuring, and utilizing cash handling devices to provide dynamic and adaptable operating functions. A cash...
US-1,016,2983 Selectively wiping a remote device
A system and method for selectively securing data from unauthorized access on a client device storing a plurality of data types with reference to an...
US-1,016,2978 Secure computer cluster with encryption
Systems and methods are provided for implementing a secure computing system with encryption, including a file system with a set of encryption zones. Each...
US-1,016,2977 System for securing the critical data of an on-board airplane system of an aircraft
A data security system for securing the critical data of an on-board airplane avionics system comprising access control means for controlling access to the said...
US-1,016,2970 Automated intelligence graph construction and countermeasure deployment
Techniques for providing information security threat assessment and amelioration are disclosed. The techniques may include obtaining fundamental data, obtaining...
US-1,016,2949 Dynamic token having log function and working method therefor
A dynamic token having a log function and a working method therefor. After the dynamic token determines that a key interrupt flag is set, a keyboard is scanned...
US-1,016,2947 Methods and systems for generating history data of system use and replay mode for identifying security events...
Devices and methods are presented for managing data security. One example method includes receiving user identification information from a screen of a device...
US-1,016,2943 Streamlined digital rights management
A streamlined workflow for digital rights management (DRM) licensing for content such as media assets is achieved via an authentication server establishing an...
US-1,016,2827 Method and system for distributed control system (DCS) process data cloning and migration through secured file...
A method includes generating a migration image file for a software migration based on configuration parameters associated with a first node of an industrial...
US-1,016,1141 Load distribution structures for raised floor data center
Load distribution structures are provided for a raised floor tile(s) of a raised floor data center. The load distribution structure, which resides adjacent to...
US-1,016,0457 Vehicle occupant monitoring using infrared imaging
Methods and systems for monitoring vehicle occupants using infrared and other sensors are disclosed. The systems may use infrared sensor data to identify each...
US-1,015,8997 Wireless system with secure range determination
A wireless network may include devices that wirelessly transmit and receive packets. Each packet may include a preamble, a start-of-frame delimiter, a physical...
US-1,015,8991 Method and system for managing security keys for user and M2M devices in a wireless communication network...
Pre Shared Keys ("PSK") for application and data session security are generated using application authentication secret values stored in a SIM device/card. The...
US-1,015,8742 Multi-stage acceleration system and method
A Multi-Stage Acceleration System improves performance, security, and reduces data transferred for mobile devices using wireless networks by transforming...
US-1,015,8718 Sensor nodes with multicast transmissions in lighting sensory network
In one example, a method is provided for a lighting node within a lighting infrastructure to communicate data to other nodes within a lighting sensory network....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.