Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,911,009 Device and method for providing safety of data by using multiple modes in device
A device and method for providing the security of data by using multiple modes in the device are provided. The device includes a storage unit that includes a...
US-9,911,006 Securing data gathering devices of a personal computing device while performing sensitive data gathering...
A functional library can secure data gathering devices of a personal computing device on behalf of a secure application program to provide a more secure...
US-9,910,996 Mass storage device memory encryption methods, systems, and apparatus
Mass storage devices and methods for securely storing data are disclosed. The mass storage device includes a communication interface for communicating with a...
US-9,910,995 System and method for secure file transmission
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for file transmission. In one aspect, a system includes at...
US-9,910,994 System for assuring security of sensitive data on a host
Described are techniques for determining and mitigating leakage of sensitive data into log data. An application programming interference (API) is instrumented...
US-9,910,980 Cyber security
Systems and methods that use probabilistic grammatical inference and statistical data analysis techniques to characterize the behavior of systems in terms of a...
US-9,910,969 System, method, and device for delivering communications and storing and delivering data
A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is...
US-9,910,655 Secure content platform software developer kit
A system and method may be used to manipulate secure content on a first computing device through the use of a software developer's kit. The method may include...
US-9,910,610 Protected mode for global platform complaint smart cards
A multiple application smart card uses hardware firewalls and an internal communications scheme to isolate applications from different service providers. A...
US-9,910,436 Autonomous data machines and systems
Autonomous data machines and systems may be provided, which may be deployed in an environment. The machines may roam within the environment and collect data...
US-9,906,958 Web server bypass of backend process on near field communications and secure element chips
A mobile access terminal providing access to data in a secure element of the mobile access terminal is provided. The mobile access terminal comprises the secure...
US-9,906,930 System and method for mobile personal emergency response
A mobile personal emergency response system includes a security fob configured to be manually activated, and wirelessly transmit an emergency alert signal when...
US-9,906,511 Secure impersonation detection
Techniques of performing impersonation detection involve using encrypted access request data. Along these lines, an impersonation detection server stores...
US-9,905,110 Valve service detection through data analysis
Securing communications from a process plant to a remote system includes a data diode disposed there between that allows data to egress from the plant but...
US-9,904,902 Methods and apparatus for pseudo master node mode operations within a hierarchical wireless network
Methods of operation and systems are described for node communication within a hierarchical wireless node network having a plurality of ID nodes on a first...
US-9,904,632 Technique for supporting multiple secure enclaves
A technique to enable secure application and data integrity within a computer system. In one embodiment, one or more secure enclaves are established in which an...
US-9,902,368 Apparatus, system and method for vehicle access and function control utilizing a portable device
A system for providing dynamic access to a vehicle via a plurality of devices. A device and/or a server of an authentication network stored fob data relating to...
US-9,901,405 MEMS-based method and system for tracking a femoral frame of reference
A system for tracking a femoral frame of reference in computer-assisted surgery comprises a sensor unit. The sensor unit is adapted to be secured to the femur....
US-9,900,373 System for providing a service, such as a communication service
A system an method are provided for providing a service, such as telemonitoring, in particular via the Internet. The system includes a terminal device of a...
US-9,898,618 Securing a remote database
A database access system may protect a field by storing the field as one or more underlying fields within a database. The database engine may not have access to...
US-9,898,612 Multi-party encryption cube processing apparatuses, methods and systems
Computer-implemented systems and methods are disclosed herein for use within secure multi-party computation. A system and method are used for storing an...
US-9,895,725 Disk clamp and motor hub cleaning with stamping adhesive
An assembly configured to clean one or more selected structures of a device may comprise an end effector assembly, a material disposed on a surface of the end...
US-9,894,524 EHF secure communication device
A communication device employs a contactless secure communication interface to transmit and receive data with a computing device using close proximity extremely...
US-9,894,518 Server and method for remotely controlling working of communications terminal, and communications terminal
The present invention discloses a method for remotely controlling working of a communications terminal, and the method includes: receiving, in a push service...
US-9,894,517 Methods and apparatuses for handling data traffic in a radio node having a split protocol stack
In one aspect of the teachings herein, a radio node provides a local loopback mode of operation in at least some operational instances, in which it loops...
US-9,894,424 Method and system for converting between protocols
In an embodiment a protocol converter module for use with a gas transmitter assembly having a gas sensor, a controller, and a detector transceiver housed within...
US-9,894,141 Managed peer-to-peer applications, systems and methods for distributed data access and storage
Secure and remote operation of a remote computer from a local computer over a network includes authenticating a remote computer for connection to a computer...
US-9,894,093 Structuring data and pre-compiled exception list engines and internet protocol threat prevention
Blocking high-risk IP connections in real-time while allowing tailoring of an acceptable risk profile to match the security requirements of network resources....
US-9,894,087 System and method for uploading and verifying a document
A computer implemented method may allow for the upload and verification of a document. In one aspect, the method may receive a file at a data server associated...
US-9,894,085 Systems and methods for categorizing processes as malicious
The disclosed computer-implemented method for categorizing processes as malicious may include (1) storing, in a security application that tracks event data for...
US-9,894,083 System for providing a secure video display
A system for providing a secure video display using a one-way data link. An input interface for receives a video stream signal. The one-way data link has an...
US-9,894,080 Sequence hopping algorithm for securing goose messages
Embodiments of the present invention include methods and apparatuses for securing data transfer in power-system automation and smart grids. Embodiments of the...
US-9,894,077 Situational awareness system security features
Security features a situational awareness system using location tracking information including requiring a security identifier, such as a password or a bio...
US-9,894,063 Anonymizing biometric data for use in a security system
An anonymized biometric representation of a target individual is used in a computer based security system. A detailed input biometric signal associated with a...
US-9,894,061 Method for booting and dumping a confidential image on a trusted computer system
A method for booting and dumping a confidential image on a trusted computer system. Embodiments of the present invention disclose deploying a secure boot image...
US-9,894,058 System and method of secure personal identification
A system and method for securely and automatically identifying users to an inquirer for purposes of obtaining user identifying information is described. The...
US-9,894,040 Trust services for securing data in the cloud
Embodiments are directed to securing data in the cloud, securely encrypting data that is to be stored in the cloud and to securely decrypting data accessed from...
US-9,894,038 System security for network resource access using cross-firewall coded requests
A system includes a firewall, a first server located behind the firewall, and a second server located before the firewall. The second server is configured to...
US-9,893,995 Systems, methods, and apparatus for implementing agents in service appliances
The present disclosure describes several key features of an agent deployable on a service appliance: agent architecture/design, transport and channel...
US-9,893,881 Efficient sharing of hardware encryption pipeline for multiple security solutions
A processing or memory device may include a first encryption pipeline to encrypt and decrypt data with a first encryption mode and a second encryption pipeline...
US-9,893,880 Method for secure symbol comparison
A method for secure comparison of encrypted symbols. According to one embodiment, a user may encrypt two symbols, share the encrypted symbols with an untrusted...
US-9,892,422 Sales security integration
Disclosed are various embodiments of sales security integration. At least one embodiment of a method includes the steps of receiving contact data regarding a...
US-9,892,404 Secure identity authentication in an electronic transaction
An approach is provided for securely authenticating an identity of a user participating in an electronic transaction. A request for a biometric ...
US-9,892,403 Method, device and secure element for conducting a secured financial transaction on a device
A device and a secure element for conducting a secured financial transaction are disclosed. The device comprises a central processing unit; a communication...
US-9,892,276 Verifiable data destruction in a database
A computing device may determine that a policy event to initiate data destruction for a first set of data has been triggered. The first set of data may be...
US-9,892,271 Device lock control apparatus and method with device user identification using a thermal signature
A device includes a thermal infrared sensor and a processor, operatively coupled to the thermal IR sensor. The processor is configured to determine that the...
US-9,892,269 Techniques for data monitoring to mitigate transitive problem in object-oriented contexts
Techniques for mitigating the transitive data problem using a secure asset manager are provided. These techniques include generating a secure asset manager...
US-9,892,264 System and method for dynamic security provisioning of computing resources
The present invention facilitates the dynamic provisioning of computing and data assets in a commodity computing environment. The invention provides a system...
US-9,892,258 Automatic synthesis of unit tests for security testing
Performing security analysis on a computer program under test (CPUT). The CPUT can be analyzed to identify data pertinent to potential security vulnerabilities...
US-9,892,211 Searchable code processing system and method
In a searchable cipher system, the security of ciphertext, the optimization of the size of ciphertext and the optimization of the network traffic are not...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.