Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,888,382 Mobile data communication using biometric encryption
A mobile App using biometric encryption and decryption for privacy and security having both authentication and recognition functions. It utilizes the built-in...
US-9,888,371 Portable home and hotel security system
Systems and methods for monitoring a local environment for abnormal conditions (e.g., burglary, intrusion, fire, or flooding) are disclosed. Sensors of a...
US-9,888,290 Service denial notification in secure socket layer (SSL) processing
A data communication gateway. The gateway comprises a processor, a non-transitory memory, and an application stored in the non-transitory memory. When executed...
US-9,888,031 System and method thereof for identifying and responding to security incidents based on preemptive forensics
A system is connected to a plurality of user devices coupled to an enterprise's network. The system continuously collects, stores, and analyzes forensic data...
US-9,888,014 Enforcing security for sensitive data on database client hosts
A restriction agent resides on a database client host, the database client host receiving first data from a database secured by a database access control...
US-9,888,010 System and method for providing an integrated firewall for secure network communication in a multi-tenant...
An integrated firewall provides security in a multi-tenant environment having a connection-based switched fabric directly connecting database servers which...
US-9,887,998 Security model for data transfer using a shippable storage device
Data may be securely stored onto a shippable data storage device in order for the client data to be protected during shipment to the remote storage service...
US-9,887,994 Data processing based on two-dimensional code
The present disclosure provides example methods and apparatuses of data processing based on a two-dimensional code. The two-dimensional code is generated upon...
US-9,887,992 Sight codes for website authentication
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for site codes for website authentication are disclosed. In...
US-9,887,981 Single sign-on between multiple data centers
Systems and methods are disclosed for a single sign-on (SSO) enterprise system with multiple data centers that use a lightweight cookie on a user's client...
US-9,887,980 Global time based authentication of client devices
A system for authenticating client devices for communication with one or more wireless communications networks, includes a client device configured to receive a...
US-9,887,975 Systems and methods for delegated cryptography
In some embodiments, an authentication method comprises receiving a request for a digital signature of data from a delegate computer over a secure channel using...
US-9,887,971 Method and apparatus for secure energy delivery
A solar power conversion device embedded security module creates trusted metering data in relation to power generated and outputs it as metering data. The...
US-9,887,967 Portable security device, method for securing a data exchange and computer program product
There is disclosed a portable security device for securing a data exchange between a host device and a remote device, said portable security device comprising a...
US-9,887,911 Systems, methods, and devices for adaptive communication in a data communication network
Disclosed herein are devices, systems, methods, and computer-program products for multiplexing data from multiple transport protocols in computing. Dynamic,...
US-9,887,879 Monitoring apparatus and method
A management server receives selection of a setting item to be a monitoring target from setting information that can be set for a device, extracts, as...
US-9,887,854 Method and apparatus for dynamically changing group control mode by using user intervention information
The present disclosure relates to a sensor network, Machine Type Communication (MTC), Machine-to-Machine (M2M) communication, and technology for Internet of...
US-9,887,839 Securely sharing information via a public key-value data store
In some embodiments, each client device in the network has a private key and a public key. For two client devices to securely exchange information, each...
US-9,887,838 Method and device for secure communications over a network using a hardware security engine
A method, device, and system for establishing a secure communication session with a server includes initiating a request for a secure communication session,...
US-9,886,983 Storage drive with collapsible support
A storage device includes a data drive and an enclosure. Shock absorber mounting holes on the enclosure can receive shock absorbers to connect to the data...
US-9,886,688 System and method for secure transaction process via mobile device
A secure element with a user security domain thereon, the user security domain constituted of: a security domain control circuitry; an encoder/decoder...
US-9,886,595 Priority-based application execution method and apparatus of data processing device
A method and an apparatus for executing applications in a highest-priority-first order in the processor divided into a secure mode area and a non-secure mode...
US-9,886,592 Medical alert computer interface tamper-proof secure device
A medical information system includes a portable device and remote authentication computing device. The portable device stores a person's personal medical...
US-9,886,589 Leveraging digital security using intelligent proxies
A method for protecting data is disclosed that protects not only who may access data but also how it is used. This invention uses an intelligent proxy which...
US-9,886,585 Multi-layer data security
Data may be encrypted using a public key. From a plurality of functions executable on the data, one or more functions may be selected. The selected one or more...
US-9,886,581 Automated intelligence graph construction and countermeasure deployment
Techniques for providing information security threat assessment and amelioration are disclosed. The techniques may include obtaining fundamental data, obtaining...
US-9,886,580 Method for optimizing boot time of an information handling system
A method and information handling system (IHS) that optimizes boot time. The method includes a basic input output system (BIOS) performing an authentication...
US-9,886,576 Security box
Provided is a security box including: an input means for input of external data; an execution means for executing, in a predetermined area, external data input...
US-9,886,564 Server system, communication system, communication terminal device, program, recording medium, and...
Provided is a network system which improves a security and prevents illegal use when providing services such as Internet banking services. A random graphic...
US-9,886,255 Healthcare as a service--downloadable enterprise application
An application as a service provided in a secure environment. A sandbox in a user's computing environment may be created. An application may be downloaded to...
US-9,885,541 Riflescope aiming system
A riflescope aiming system that includes a telescopic sight, a multiple-zero-point elevation turret and a ballistics reference system. The multiple-zero-point...
US-9,884,224 Exercising apparatus
An apparatus is disclosed for enabling an operator to exercise comprising a frame having a body, a base and a top. A load is positioned on the frame for...
US-D809,493 Hub for routing security sensor data
US-9,883,395 Securely accessing secure elements
Direct management of secure element data life cycles by backend servers without requiring direct communications between a trusted service manager (TSM) and a...
US-9,883,388 Ephemeral identity for device and service discovery
Embodiments of a system and method for secure discovery and identification of devices via a wireless network are generally described herein. In some embodiments...
US-9,883,387 Authentication using application authentication element
Embodiments of the present invention can be directed to systems, apparatuses, and methods for performing transactions through mobile communication devices using...
US-9,883,385 Apparatus and method for mobility procedure involving mobility management entity relocation
A device that identifies entry into a new service area, transmits a service area update request to a network device associated with a network, receives a...
US-9,883,383 Secure near field communications
The security of Near Field Communications (NFC) against eavesdroppers is improved by encoding a hidden key, private to an initiating device, onto the carrier...
US-9,883,362 Method and apparatus for transmitting and receiving voice call in communication system
The present disclosure relates to a communication method and a system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data...
US-9,881,506 Unmanned aerial vehicle beacon pod
Beacon pods that provide location information to unmanned aerial vehicles (UAVs). The beacon pods may emit location information, which may replicate global...
US-9,881,434 Intelligent portable object comprising graphical personalization data
The invention relates to an intelligent portable personal security object including graphical personalization data visible from a face of the object, wherein...
US-9,881,433 Systems and methods for electronic ticket validation using proximity detection
Systems and methods for monitoring permission to be in a location comprising: a secured area having at least one entry point with a mechanical gate having an...
US-9,881,297 Methods and systems for secure mobile device initiated payments using generated image data
Systems, methods, processes, computer program code and means for conducting a payment transaction are provided which include activating a payment application of...
US-9,881,294 RF payment via a mobile device
A nontraditional transaction device, for example a mobile device, may be employed to complete a transaction. The mobile device may utilize radio frequency (RF)...
US-9,881,216 Object tracking and alerts
An integrated surveillance system combining video surveillance and data from other sensor-based security networks is used to identify activities that may...
US-9,881,184 Authenticity-assured data gathering apparatus and method
Data is captured by a data capture apparatus in a manner to ensure authenticity of the data to the data capture apparatus. Transducer signaling is generated in...
US-9,881,183 System and method for recovering from an interrupted encryption and decryption operation performed on a volume
Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An...
US-9,881,177 Systems and methods for a cryptographic file system layer
The systems and methods disclosed herein transparently provide data security using a cryptographic file system layer that selectively intercepts and modifies...
US-9,881,176 Fragmenting data for the purposes of persistent storage across multiple immutable data structures
Provided is a process including: receiving one or more write requests; selecting a first subset of the values as corresponding to higher-security fields;...
US-9,881,164 Securing data
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for securing data. One of the methods includes receiving, by the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.