Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,954,826 Scalable and secure key management for cryptographic data processing
A method and system for secure and scalable key management for cryptographic processing of data is described herein. A method of secure key handling and...
US-9,954,740 Performance and security management of applications deployed in hosted computing environments
Systems and methods for performance and security management of the computing infrastructure that supports an application deployed in a hosted computing...
US-9,954,684 Secure sharing
Among other things, at a central server, management of a document sharing process includes uploading from client devices through a communication network,...
US-9,954,678 Content-based transport security
A computer system can send a secure request over a named-data network to a remote device by generating an Interest with encrypted name components. During...
US-9,954,579 Smart connectors and associated communications links
"Smart" connectors with embedded processors, measurement circuits and control circuits are disclosed for establishing a "contactless" radio frequency (RF)...
US-9,954,156 Body heat powered wireless transmitter
A Body Heat Powered Portable Wireless Transmitter contains a Thermo Electric Generator, an energy Harvesting System, a Control System and a Wireless...
US-9,953,720 Implementing hidden security key in eFuses
A method and circuit for implementing a hidden security key in Electronic Fuses (eFuses), and a design structure on which the subject circuit resides are...
US-9,953,543 Secured computer based assessment
Systems and methods for secured computer based assessment are described. In one embodiment, the method comprises capturing of proctoring data at a candidate...
US-9,953,530 Systems, methods, and devices for securing cargo
Enhanced methods and systems for securing and monitoring cargo are described. Some examples provide a cargo monitoring system ("CMS") that is configured to...
US-9,953,515 Inductive security sensor not susceptible to magnetic tampering
An inductive security sensor system is not susceptible to magnetic tampering (such as by using an external magnet or false target). A sensor assembly includes...
US-9,953,500 Methods, systems, and products for security services
A sensor associated with a security system determines an electrically open circuit. An identifier identifies the open circuit, which may then be used to...
US-9,953,497 Merchandise security system with data collection features and relevant technical field
A merchandise security system with data collection features and a relevant method are disclosed. The system has: a data management unit, at least one alarm unit...
US-9,953,479 Controlling access to physical compartment using mobile device and transaction authentication system
Techniques are disclosed relating to securing physical compartments and allowing users access via a mobile device configured to use a mobile authentication...
US-9,953,467 Secure vehicular data management with enhanced privacy
The present disclosure is directed to secure vehicular data management with enhanced privacy. A vehicle may comprise at least a vehicular control architecture...
US-9,953,368 Embedded hardware based system which provides real-time pre-trade risk assessments for multiple parties and...
A risk assessment system and method are provided that may be implemented as an embedded hardware based system and method that provide real-time pre-trade risk...
US-9,953,333 Systems and methods for use of transaction data for customers
The invention provides a system and method for using transaction data to provide information to a customer, the information being provided in response to a...
US-9,953,317 Method and system for secure key rotation
This invention discloses a novel system for securing and using payment token data in a system for processing electronic payment transactions that does not...
US-9,953,310 Systems and method for providing multiple virtual secure elements in a single physical secure element of a...
Methods and systems are disclosed for providing a plurality of virtual secure elements (virtual SEs) to mobile devices with secure elements (SEs). A method...
US-9,953,309 Third party integrated security system
A third party payment system is provided which allows a user to conduct transactions through payment accounts stored on the third party payment system. The user...
US-9,953,184 Customized trusted computer for secure data processing and storage
The techniques discussed herein facilitate the transmission, storage, and manipulation of data in an encrypted database management system (EDBMS). An untrusted...
US-9,953,172 Secure database backup and recovery
As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system...
US-9,953,170 Semiconductor memory device, semiconductor system and reading method
The invention provides a flash memory which may effectively protect information with a high security level. A flash memory includes a setting part. When the...
US-9,953,168 Secure boot of virtualized computing instances
In an approach, a secure boot process includes two phases. In the first phase an on premises device generates a data encryption key (DEK) with which to encrypt...
US-9,953,166 Method for securely booting target processor in target system using a secure root of trust to verify a returned...
A method for securely booting a target processor in a target system from a secure root of trust includes computing a message authentication code from boot code...
US-9,953,165 Mobile platform software update with secure authentication
Generally, this disclosure describes devices, methods and systems and for securely updating software on a mobile platform using trusted hardware based...
US-9,953,160 Applying multi-level clustering at scale to unlabeled data for anomaly detection and security
Methods, systems, and computer program products for applying multi-level clustering at scale to unlabeled data for anomaly detection and security are disclosed....
US-9,953,146 Mobile communications device providing heuristic security authentication features and related methods
A mobile communications device includes a plurality of first input devices capable of passively collecting input data, a second input device(s) capable of...
US-9,952,790 Application security policy actions based on security profile exchange
In one embodiment, a method includes receiving, at a first host, a security profile related to a first data socket descriptor indicating risk to data security...
US-9,950,261 Secure data encoding for low-resource remote systems
A method includes identifying a string and parameters. The parameters include a coding frame, elements, and a travel path. The method includes traversing the...
US-9,949,249 Method and apparatus for spatial multiplexing in wireless communication system
The present disclosure relates to a communication method and system for converging a 5th-Generation communication system to support higher data rates beyond a...
US-9,949,132 Near field communication (NFC) device and method for selectively securing records in a near field communication...
A method and device for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message in a Near Field Communication (NFC)...
US-9,949,130 Data security for internet of things (IOT) devices
System for monitoring of IoT data traffic between an IoT device connected via a cellular network and a server using Internet Protocol (IP), where the IP...
US-9,949,128 Method of personalizing a security element cooperating with an apparatus
The invention relates to a method of personalizing a security element cooperating with an apparatus. This personalization includes downloading data, which is...
US-9,949,113 Updating profiles for secondary wireless devices
Techniques to manage updates for eSIMs of a secondary wireless device are disclosed. Responsive to a user input, expiration of a timer, receipt of a message...
US-9,949,111 Apparatuses, methods and systems for interfacing with a trusted subscription management platform
Apparatuses, methods, and systems are provided for implementing a trusted subscription management platform. The platform allows the remote creation,...
US-9,948,682 Data resource control through a control policy defining an authorized context for utilization of a protected...
Disclosed is a method, a device, and/or a system of a data resource control data structure. In one embodiment, a computer-implemented method includes receiving...
US-9,948,680 Security configuration file conversion with security policy optimization
Systems and methods for converting a configuration file from a first language into a second language with policy optimization and auditing are provided....
US-9,948,678 Method and system for gathering and contextualizing multiple events to identify potential security incidents
A method and system for aggregating and correlating disparate and unrelated events to enable faster security event detection. A plurality of event logs...
US-9,948,677 System and method for secure synchronization of data across multiple computing devices
A computer implemented method and apparatus comprises detecting a file content update on a first client computer system, the file to be synchronized on a...
US-9,948,663 Systems and methods for predicting security threat attacks
A computer-implemented method for predicting security threat attacks may include (1) identifying candidate security threat targets with latent attributes that...
US-9,948,660 Computer security based on hierarchical cache latency signature authentication
A processor is coupled to a hierarchical memory structure which includes a plurality of levels of cache memories that hierarchically cache data that is read by...
US-9,948,659 Context based management for secure augmented reality applications
An example system that allows a camera enabled application, such as an augmented reality application, to run in a protected area may include a first device...
US-9,948,654 Method for accessing a plurality of services by a mobile terminal user, and related secure device
The invention relates to a method for enabling the user of at least one mobile terminal to access a plurality of services, said method consisting of: creating...
US-9,948,638 System and method of secure personal identification
A system and method for securely and automatically identifying users to an inquirer for purposes of obtaining user identifying information is described. The...
US-9,948,637 System and method for data security on big data sets
Systems and methods of securely storing and retrieving data are disclosed. A database may include a table of data with rows and columns and encrypted at rest....
US-9,948,631 Implementing single sign-on in a transaction processing system
A single sign-on is implemented in an online transaction processing system. A security token extracted from a transaction request is received. The security...
US-9,948,628 Method for enabling lawful interception by providing security information
A method and apparatus are provided. Information associated with a lawful interception of communication data of a user equipment is received. Security...
US-9,948,621 Policy based cryptographic key distribution for network group encryption
Various embodiments include a method for managing a group of devices in communication with each other and sharing a set of keys. The method may include opening...
US-9,948,619 System and method for encryption key management in a mixed infrastructure stream processing framework
A system and method for protecting streams in a mixed infrastructure includes determining processing elements that are to access a data stream in a stream...
US-9,948,617 Secure software updates
Improved techniques to update software in electronic devices that are already in use are disclosed. In one embodiment, software can be updated in a secure and...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.