Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,884,224 Exercising apparatus
An apparatus is disclosed for enabling an operator to exercise comprising a frame having a body, a base and a top. A load is positioned on the frame for...
US-D809,493 Hub for routing security sensor data
US-9,883,395 Securely accessing secure elements
Direct management of secure element data life cycles by backend servers without requiring direct communications between a trusted service manager (TSM) and a...
US-9,883,388 Ephemeral identity for device and service discovery
Embodiments of a system and method for secure discovery and identification of devices via a wireless network are generally described herein. In some embodiments...
US-9,883,387 Authentication using application authentication element
Embodiments of the present invention can be directed to systems, apparatuses, and methods for performing transactions through mobile communication devices using...
US-9,883,385 Apparatus and method for mobility procedure involving mobility management entity relocation
A device that identifies entry into a new service area, transmits a service area update request to a network device associated with a network, receives a...
US-9,883,383 Secure near field communications
The security of Near Field Communications (NFC) against eavesdroppers is improved by encoding a hidden key, private to an initiating device, onto the carrier...
US-9,883,362 Method and apparatus for transmitting and receiving voice call in communication system
The present disclosure relates to a communication method and a system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data...
US-9,881,506 Unmanned aerial vehicle beacon pod
Beacon pods that provide location information to unmanned aerial vehicles (UAVs). The beacon pods may emit location information, which may replicate global...
US-9,881,434 Intelligent portable object comprising graphical personalization data
The invention relates to an intelligent portable personal security object including graphical personalization data visible from a face of the object, wherein...
US-9,881,433 Systems and methods for electronic ticket validation using proximity detection
Systems and methods for monitoring permission to be in a location comprising: a secured area having at least one entry point with a mechanical gate having an...
US-9,881,297 Methods and systems for secure mobile device initiated payments using generated image data
Systems, methods, processes, computer program code and means for conducting a payment transaction are provided which include activating a payment application of...
US-9,881,294 RF payment via a mobile device
A nontraditional transaction device, for example a mobile device, may be employed to complete a transaction. The mobile device may utilize radio frequency (RF)...
US-9,881,216 Object tracking and alerts
An integrated surveillance system combining video surveillance and data from other sensor-based security networks is used to identify activities that may...
US-9,881,184 Authenticity-assured data gathering apparatus and method
Data is captured by a data capture apparatus in a manner to ensure authenticity of the data to the data capture apparatus. Transducer signaling is generated in...
US-9,881,183 System and method for recovering from an interrupted encryption and decryption operation performed on a volume
Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An...
US-9,881,177 Systems and methods for a cryptographic file system layer
The systems and methods disclosed herein transparently provide data security using a cryptographic file system layer that selectively intercepts and modifies...
US-9,881,176 Fragmenting data for the purposes of persistent storage across multiple immutable data structures
Provided is a process including: receiving one or more write requests; selecting a first subset of the values as corresponding to higher-security fields;...
US-9,881,164 Securing data
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for securing data. One of the methods includes receiving, by the...
US-9,881,161 System on chip to perform a secure boot, an image forming apparatus using the same, and method thereof
A system on chip is provided. The system on chip includes a first memory to store a plurality of encryption keys, a second memory, a third memory to store an...
US-9,881,159 Workload execution systems and methods
In one embodiment, a method is executed by a computer system. The method includes receiving information related to a platform-portable workload, the information...
US-9,881,033 Intelligent electrical distribution grid control system data
Aspects of a multi-level electrical distribution control system associated with an electrical distribution grid are disclosed. Data access and processing across...
US-9,881,030 Distributed archive system, data archive device, and data restoring device with improved restoration and security
A system for a distributed archive and data restoration which achieves both high-speed processing and security is provided. A random number is generated by a...
US-9,879,469 Centrally controlled safe management system
A cash management system utilizes a cloud computing model wherein a cloud of one or more servers may be locally networked or may be geographically dispersed and...
US-9,875,626 Methods and systems for determining a location of a container by tracking a SIM card associated with the container
Systems and methods of securing chattels are provided. Motion of a first container can be measured by a sensor over an interval of time and compared to motion...
US-9,875,607 Methods and apparatus for providing secure logon to a gaming machine using a mobile device
A gaming system compatible with patron-controlled portable electronic devices, such as smart phones or tablet computers, is described. When a transaction is...
US-9,875,474 Method for securing a transaction performed by bank card
A method is provided for securing a transaction made by bank card, the transaction involving a remote provision, by a user, of data existing in a bank card in...
US-9,875,376 Sensitive data aliasing
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed...
US-9,875,374 System and method for collecting, storing, and securing data
A computer system for collecting, securing, storing, retrieving, and disposing data includes an input that receives data from one or more data capture devices,...
US-9,875,370 Database server and client for query processing on encrypted data
Methods, systems, apparatuses, and computer program products are provided for secure handling of queries by a data server (DS) and a database application (DA)....
US-9,875,354 Apparatus and method for enhancing security of data on a host computing device and a peripheral device
A method of enhancing security of at least one of a host computing device and a peripheral device coupled to the host computing device through a communication...
US-9,875,348 E-learning utilizing remote proctoring and analytical metrics captured during training and testing
A device configured to utilize training techniques and to gather information while training and administering certification examinations. Certification...
US-9,875,194 Security system for external data storage apparatus and control method thereof
A security system for an external data storage apparatus and control method thereof are disclosed. The system utilizes a preset identification (ID) and input ID...
US-9,872,167 Method of managing several profiles in a secure element
The invention is a method for managing communication between a secure element and a device. The secure element comprises a physical communication interface and...
US-9,871,920 Securely and efficiently transferring sensitive information via a telephone
An apparatus includes a communications module that establishes a verbal communication between an automated attendant of a company and a customer through an...
US-9,871,852 Monitoring system with message forwarding, a method, and a computer program
Monitoring installations for buildings, building complexes, open spaces or other monitoring areas can comprise a plurality of system components. These system...
US-9,871,851 Migrating private infrastructure services to a cloud
Implementations are provided herein for the migration of known infrastructure services, such as those existing on a private cloud infrastructure, to a public...
US-9,871,819 Zone-based security architecture for intra-vehicular wireless communication
Systems and methods provide secure and wireless intra-vehicular communication. An intra-vehicular communication system has a secured network segment including a...
US-9,871,816 Systems and methods for security management of multi-client based distributed storage
There is provided a method of maintaining a security risk level of data objects stored in a distributed system, comprising: estimating a current security risk...
US-9,871,814 System and method for improving security intelligence through inventory discovery
A system for monitoring devices in a network comprising a coordinator operating on a first processor and configured to detect a plurality of active devices and...
US-9,871,805 User authentication
A method, system, server processing system and computer readable medium for authenticating a user attempting to access a secure environment is disclosed. In one...
US-9,871,797 Information security apparatus and methods for credential dump authenticity verification
In some embodiments, an apparatus includes a memory, storing processor-executable instructions, blacklist terms, and credential dump records, and a processor....
US-9,871,790 Identification method of an entity
The present invention relates to identification method of an entity executed by an identification system from indexed distance data (d.sub.1, . . . , d.sub.n)...
US-9,871,774 Secured file transfer management on augmented reality (AR) and virtual reality (VR) devices
In one embodiment, a system includes a processing circuit and logic integrated with the processing circuit, executable by the processing circuit, or integrated...
US-9,871,771 Cryptographic security profiles
Two endpoint devices communicate with one another in a secure session by negotiating encrypted communications at initial establishment of the session. Each...
US-9,871,770 Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-9,871,768 IPv6 to IPv4 data packet migration in a trusted security zone
Systems and methods discussed herein relate to enabling communications between IPv4 and IPv6 hosts using a communication channel in a trusted security zone...
US-9,871,766 Secure path determination between devices
Methods, network controllers, and machine-readable and executable instructions are provided to determine a secure path between a source device and a destination...
US-9,871,660 Method for certifying and authentifying security documents based on a measure of the relative variations of the...
Methods for certifying a security document comprising the steps of: a) selecting a set of unique characteristics, obtained as the result of the variations in...
US-9,871,659 Data transmission unit for a vehicle
A method for transmitting data between a vehicle and a terminal, in which data to be transmitted are transmitted on the basis of at least one digital signature...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.