Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,001,3850 Methods and apparatus for providing secure logon to a gaming machine using a mobile device
A gaming system compatible with patron-controlled portable electronic devices, such as smart phones or tablet computers, is described. When a transaction is...
US-1,001,3833 Transponder key replication
A method and apparatus for replicating a transponder key is disclosed. The transponder replication device includes an antenna that reads a transponder code from...
US-1,001,3750 Object detection methods, display methods and apparatuses
Disclosed are object detection method, display methods and apparatuses. The method includes obtaining slice data of inspected luggage in the CT system;...
US-1,001,3582 Secure data entry device
A secure data entry device including a housing having at least one housing element, at least one additional element located within the housing, at least one...
US-1,001,3580 Security device with programmable systolic-matrix cryptographic module and programmable input/output interface
A system includes programmable systolic cryptographic modules for security processing of packets from a data source. A first programmable input/output interface...
US-1,001,3579 Secure routing of trusted software transactions in unsecure fabric
Various configurations and methods for securing and validating trusted input output (IO) data communications within fabric interconnects of processing circuitry...
US-1,001,3578 Apparatus for processing with a secure system manager
Method and apparatus for secure processing. The method includes detecting communication among secure and non-secure data entities, prohibiting execution of...
US-1,001,3574 Method and apparatus for secure storage and retrieval of encrypted files in public cloud-computing platforms
In one aspect, a computerized Encrypted Drive System (EDS) server useful for keyword extraction and indexing server of includes a computer store containing...
US-1,001,3567 Private and public sharing of electronic assets
The embodiments set forth techniques for implementing a cloud service that enables cloud data to be shared between different users in a secure manner. One...
US-1,001,3566 System and method for managing collaboration in a networked secure exchange environment
In embodiments of the present invention improved capabilities are described for securely viewing computer data content, such as documents, presentations,...
US-1,001,3565 System and method for secure transport of data from an operating system to a pre-operating system environment
An information handling system includes a trusted platform module (TPM) and a storage device, the TPM provides boot authentication for the information handling...
US-1,001,3560 Securely exchanging information during application startup
Provided is a method for securely exchanging information during application startup. A processor may send a request for a passphrase to one or more remote...
US-1,001,3527 Automatically assessing an anatomical surface feature and securely managing information related to the same
A facility for procuring and analyzing information about an anatomical surface feature from a caregiver that is usable to generate an assessment of the surface...
US-1,001,3390 Secure handle for intra-and inter-processor communications
A protocol element referred to as a secure handle is described which provides an efficient and reliable method for application-to-application signaling in...
US-1,001,3385 Programmable validation of transaction requests
A data processor includes an input/output bridge that provides enforcement of a security status on transactions between devices across the bridge. The bridge...
US-1,001,3364 Securing data using per tenant encryption keys
One embodiment is directed to a technique which secures data on a set of storage drives of a data storage system. The technique involves encrypting data from a...
US-1,001,3138 Method and apparatus for secure data entry using a virtual interface
Method and apparatus for secure data entry. In the method a virtual data entry interface is generated, and is outputted so as to be readable only by the user....
US-1,001,2993 Method and system for risk modeling in autonomous vehicles
A method for adaptive risk modeling for an autonomous vehicle, the method comprising: retrieving parameters of an identified driving mission of the autonomous...
US-1,001,2406 Method and apparatus for controlling temperature
The present disclosure relates to a sensor network, Machine Type Communication (MTC), Machine-to-Machine (M2M) communication, and technology for Internet of...
US-1,001,2009 Electric lock device for furniture and storage
An electric lock device for furniture or storage has an RFID transmitter/receiver for communication with portable data carriers. A controller detects a data...
US-1,001,1248 Cross correlation between connected vehicles and other online devices
Embodiments of the present invention disclose a method, computer system, and a computer program product for vehicle software security associated with a vehicle....
US-1,001,0777 Bat swing training system and method of use
A system for swing training with a bat, the system includes a training device, having a bat spacer attached to a sweet spot position on the bat about a barrel...
US-1,001,0010 Mobile video, audio, and sensory apparatus
A self-contained mobile surveillance apparatus has applicability in a variety of short or long term settings where security and documentation of activities are...
US-1,000,9826 Wide area network (WAN) backhaul for wireless relays in a data communication network
A wireless relay serves a first User Equipment (UE). An eNodeB wirelessly exchanges UE signaling data and UE user data with the first UE. The eNodeB processes...
US-1,000,9773 Secured data access from a mobile device executing a native mobile application and a headless browser
Systems, methods, and computer-readable storage devices to enable secured data access from a mobile device executing a native mobile application and a headless...
US-1,000,9762 Method and system to enable secure communication for inter-eNB transmission
The embodiments herein provide a method and system for creating a secure connection for a User Equipment (UE) in a wireless network including a UE, carrier...
US-1,000,9354 Trust relationships in a computerized system
Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in...
US-1,000,9344 Systems and methods for endpoint management classification
A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to...
US-1,000,9322 Secure virtualized mobile cellular device
Secure virtualizing of a mobile cellular device uses a cellular communication network having base transceiver station edge node servers. A virtualized-instance...
US-1,000,9180 System and method for generating auditable secure seeds from real-world data
An interface receives a first digital signature of real-world data. A memory stores the first digital signature as seed data. The interface receives a second...
US-1,000,9175 Secure communication
A method for allowing a first party and a second party to obtain shared secret information is provided. The method comprises the steps of: obtaining, by the...
US-1,000,9173 System, device, and method of secure entry and handling of passwords
Devices, system, and methods of secure entry and handling of passwords and Personal Identification Numbers (PINs), as well as for secure local storage, secure...
US-1,000,9172 Instructions processors, methods, and systems to process secure hash algorithms
A method of an aspect includes receiving an instruction. The instruction indicates a first source of a first packed data including state data elements a.sub.i,...
US-1,000,9171 Construction and uses of variable-input-length tweakable ciphers
Innovations in the construction and use of variable-input-length tweakable ciphers ("VILTCs"). In some cases, a VILTC uses an initialization vector that is...
US-1,000,9168 System and method for secure communications and data storage using multidimensional encryption
An encryption system and method has processors and a memory system, the memory system configured to hold at least one macroblock, an encryption key, and machine...
US-1,000,9139 Peer-to-peer proximity pairing of electronic devices with cameras and see-through heads-up displays
The disclosed embodiments relate to electronic devices with optical head-mounted displays (OHMDs). Each electronic device includes an OHMD that provides a...
US-1,000,8124 Method and system for providing secure remote testing
A method and system provides security for remotely administered tests to examinees at respective remote locations by providing, with a head mounted image...
US-1,000,8061 Secure access to physical resources using asymmetric cryptography
Digital certificates are signed by a server's private key and installed at lock controllers that restrict access to physical resources. The server's public key...
US-1,000,8055 Reverse trace-preventing wireless recognition secure entry method and secure entry system using same
The present invention relates to a secure entry method of a radio-frequency identification (RFID) secure entry system including a tag, a reader, a detector, a...
US-1,000,7912 Client-side security for tokenized transactions
A method for processing transactions within a token transfer device, such as a smartphone or other portable electronic device. The method includes storing a...
US-1,000,7910 System and method for variable length encryption
Systems and methods for performing a secure transaction provided. In one embodiment, the method includes: reading data on a command token, reading data on a...
US-1,000,7909 Method and system for secure transmission of remote notification service messages to mobile devices without...
A method for receiving and processing a data message includes: storing at least an encryption key; receiving a data message, the data message including at an...
US-1,000,7850 System and method for event monitoring and detection
A system for event detection and reporting has primary sensors for producing raw data from observing the proximate area, one or more processors for the primary...
US-1,000,7809 Fine-grained self-shredding data in a secure communication ecosystem
One embodiment provides a document management system comprising a storage system to store one or more encrypted documents, at least a first portion of a first...
US-1,000,7807 Simultaneous state-based cryptographic splitting in a secure storage appliance
Methods and systems for managing I/O requests in a secure storage appliance are disclosed. One method includes receiving a plurality of I/O requests at the...
US-1,000,7804 Secure cloud storage distribution and aggregation
Methods and systems for vendor independent and secure cloud storage distribution and aggregation are provided. According to one embodiment, an application...
US-1,000,7794 Methods and systems for ensuring printer looses ability to print security patterns if disconnected from...
The present invention relates to a method and system used to ensure that a printer which is capable of printing security patterns loses its ability to print...
US-1,000,7793 Secure object having protected region, integrity tree, and unprotected region
A method and structure for a secure object, as tangibly embodied in a computer-readable storage medium. The secure object includes a cryptographically protected...
US-1,000,7792 Modeling a network security environment as a game
Disclosed are various embodiments that model a network security environment as a game. A data model corresponding to a network security environment is received....
US-1,000,7785 Method and apparatus for implementing virtual machine introspection
The present disclosure relates to the field of information technologies and discloses a method and an apparatus for implementing virtual machine introspection....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.