Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,870,694 Networked security cameras and automation
Apparatuses, techniques, and methods for a security and/or automation system are described. In some cases, methods may include obtaining data from a first...
US-9,870,665 Apparatus, system and method for vehicle access and function control utilizing a portable device
A system for providing dynamic access to a vehicle via a plurality of devices. A device and/or a server of an authentication network stored fob data relating to...
US-9,870,659 Cryptographic key management via a computer server
Some embodiments include a computer server. The computer server can be configured to: add a security system associated with a user account; provision one or...
US-9,870,508 Securely authenticating a recording file from initial collection through post-production and distribution
The technology disclosed relates to data captured in streams from sensors. Streams often are edited, especially video and audio data streams. In particular, the...
US-9,870,490 Apparatus and method for an antitheft secure operating system module
An apparatus and method for a secure operating system module are provided. The method includes receiving an activation signal to enable a secure OS module, in...
US-9,870,488 Method and apparatus for securing programming data of a programmable device
Circuitry and methods prevent unauthorized programming, or reprogramming, of a programmable device, by requiring a signature in the configuration data to match...
US-9,870,478 Data protection for storage device
A method for protecting data on a first storage device from unauthorized access is provided. The method includes copying a data map, such as a file allocation...
US-9,870,477 Security engine for a secure operating environment
The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a...
US-9,870,471 Computer-implemented method for distilling a malware program in a system
A computer-implemented method for distilling a malware program in a system is disclosed. The computer-implemented method includes steps of receiving a known...
US-9,870,459 Physical token-less security screening using biometrics
In physical token-less security screening using biometrics, a person provides biometric data to a security computing device as part of a security screening. The...
US-9,870,414 Secure deletion operations in a wide area network
Methods, systems, and computer program products are provided for performing a secure delete operation in a wide area network (WAN) including a cache site and a...
US-9,870,407 Automated and delegated model-based row level security
Business groups are created to secure business entities of a BI data model. In one aspect, a user to be secured is selected and a business group of the BI model...
US-9,870,324 Isolating guest code and data using multiple nested page tables
A hypervisor provides a guest operating system with a plurality of protection domains, including a root protection domain and one or more secure protection...
US-9,870,166 Securely sharing cached data
Various embodiments of a system and method for securely caching and sharing image data. A process can generate image data and store the image data into the...
US-9,869,848 Single element radiometric lens
The disclosure describes systems and apparatuses that include a focusable lens, as well as methods for focusing the optical lens. The focusable lens system...
US-9,869,176 Downhole to surface data lift apparatus
Data may be collected from a wellbore by retrievably deploying a data receiver tool to a location proximate a gauge located in the wellbore, where the gauge...
US-9,867,721 Method and apparatus for post-operative tuning of a spinal implant
A tunable implant, system, and method enables a tunable implant to be adjusted within a patient. The tunable implant includes a securing mechanism to secure the...
US-9,867,539 Sweat sensing device communication security and compliance
The invention addresses confounding difficulties involving continuous sweat analyte measurement. Specifically, the present invention provides: at least one...
US-9,867,045 Method of managing communication between a secure element and a host device
The invention is a method of managing communication between a host device and a secure element comprising two virtual profiles. The method comprises the steps...
US-9,866,991 System and method for secure pairing of bluetooth devices
A mobile device includes a Bluetooth transceiver, the Bluetooth transceiver being in an idle power state when not securely paired to a second Bluetooth...
US-9,866,925 Relevancy improvement through targeting of information based on data gathered from a networked device...
In one embodiment, a method of a relevancy-matching server includes generating a fingerprint data using a television, matching primary data generated from the...
US-9,866,827 Intelligent motion capture element
Intelligent motion capture element that includes sensor personalities that optimize the sensor for specific movements and/or pieces of equipment and/or clothing...
US-9,866,686 Method and apparatus for performing network registration through a selected component for data service
An electronic device is provided, which includes a removable SIM, a secure memory configured to store at least one profile, a processor configured to select at...
US-9,866,568 Systems and methods for detecting and reacting to malicious activity in computer networks
Described herein are systems and methods for performing detection operations on secure ticket data to detect potentially malicious activity. Embodiments may...
US-9,866,564 System, method and computer program product for gathering and delivering personalized user information
A system, method and computer program product for providing a secure data channel between a user and associates. The method may receive pushed information from...
US-9,866,561 Enhanced user interface and data handling in business intelligence software
A business intelligence and reporting solution can include a databook interface that acts as both as a reporting mechanism and an interface for providing data...
US-9,866,560 Secure data access
Technologies are generally disclosed for methods and systems for providing secure document storage and retrieval services. In an example embodiment, a method...
US-9,866,559 Method for opening a session of a machine belonging to a machine set
A method for opening a session of a first machine using a session checking service for the first machine and a second machine, including a security service,...
US-9,866,553 Method for securing access to a computer device
The invention relates to a method for securing access to a computer device, that includes the step of establishing a secured connection and authentication of...
US-9,866,533 Secured cloud data storage, distribution and restoration among multiple devices of a user
A method is provided to share a content stored on a secured server. The content is associated to a first electronic device and encrypted using a public key of...
US-9,866,426 Methods and apparatus for analyzing system events
Apparatus and methods facilitate analysis of events associated with network and computer systems. Event data, such as security threats, are comparison matched...
US-9,866,394 Device for archiving handwritten information
An electronic pen device configured for use with a remote secure server for registering handwritten signatures, the secure server comprising an authentication...
US-9,866,382 Secure app-to-app communication
Secure application-to-application communication is disclosed. A shared encryption key may be used to encrypt data to be transferred from a first mobile...
US-9,866,349 Network coding over GF(2)
Disclosed herein is a method of generating an encoded data packet over GF(2). The method comprises determining 303 a plurality of data packets in dependence on...
US-9,866,023 Security concept for integrating a battery into an inverter
An inverter apparatus includes an input stage receiving DC electric power from a DC power generator for loading a DC voltage link, a DC/AC converter connected...
US-9,865,154 Adaptive exit arm times based on real time events and historical data in a home security system
A security system includes a plurality of sensors installed at a premises to capture data from an environment in or around the premises, a memory configured to...
US-9,865,113 Apparatus, system and method for dynamic identification and key management for vehicle access
A system for providing dynamic access to a vehicle via a plurality of devices. A device and/or a server of an authentication network stored fob data relating to...
US-9,865,112 Apparatus, system and method for dynamic identification for vehicle access
A system for providing dynamic access to a vehicle via a plurality of devices. A device and/or a server of an authentication network stored fob data relating to...
US-9,864,994 Terminal for magnetic secure transmission
Devices, systems, and methods for securely converting a user's existing static payment card data into dynamic card data that can be authenticated by card...
US-9,864,978 Method and apparatus for enabling content to be shared among multiple devices in a secure environment
A Master device (e.g., a SIM card) is configured with information regarding one or more Slave devices (e.g., SIM cards) that are associated with the Master...
US-9,864,971 Secure self-checkout station
A self-checkout system includes a cabinet having a doorway and a vending space. The system includes a secure door enclosing the vending space. The system...
US-9,864,879 Secure subsystem
An apparatus for performing secure operations with a dedicated secure processor is described in one embodiment. The apparatus includes security firmware...
US-9,864,866 Dynamically configurable online data update system
A data object update system provides a flexible framework that can be used to upgrade, renew, replace or supplement data objects that are provisioned in a large...
US-9,864,703 Cache memory having enhanced performance and security features
A cache memory having enhanced performance and security feature is provided. The cache memory includes a data array storing a plurality of data elements, a tag...
US-9,864,687 Cache coherent system including master-side filter and data processing system including same
An application processor is provided. The application processor includes a cache coherent interconnect, a first master device connected to the cache coherent...
US-9,864,655 Methods and apparatus for mobile computing device security in testing facilities
Methods and apparatus are provided for providing testing as a service. A loading computing device can receive a request to restore a testing computing device to...
US-9,864,629 Real-time code and data protection via CPU transactional memory suppport
A technique allows for memory bounds checking for dynamically generated code by using transactional memory support in a processor. The memory bounds checking...
US-9,864,599 Firmware update method in two-chip solution for secure terminal
A firmware update method in a two-chip solution for a secure terminal. The method comprises secure firmware update and application firmware update. The secure...
US-9,864,372 Automated drone systems
An automated drone security system for surveilling a location includes one or more drones with onboard sensors and an imaging device for measuring surveillance...
US-9,862,488 Location verification and secure no-fly logic for unmanned aerial vehicles
Certain embodiments herein relate to location verification for autonomous unmanned aerial vehicles (also referred to as "drones"). In some embodiments, an...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.