Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,745,782 Secure sealing device and method
The present invention concerns a secure sealing device 101 comprising at least a closure element 102 with an electrically conductive path 120, and a locking...
US-9,742,785 Power line communication (PLC) network nodes using cipher then segment security
Embodiments of the invention provide systems and methods for a cipher then segment approach in a Power Line Communication (PLC). A node or device generates...
US-9,742,752 Data backup and self-service data restoration
A user terminal stores security information for each of a plurality of files during a backup of the files. The user terminal also stores information regarding...
US-9,742,742 Secure data transfer system and method
Secure transfer of electronic files containing confidential information is achieved by selecting and copying files to be transferred to an intended recipient...
US-9,741,238 Security-focused network monitoring system
In some implementations, data from security monitoring devices of a facility is collected and analyzed within the facility and the results of the analysis is...
US-9,741,186 Providing wireless access to a secure lock based on various security data
A remote security access procedure for granting access to a wirelessly controlled lock may include one of receiving an address location at a server to setup a...
US-9,741,033 System and method for point of sale payment data credentials management using out-of-band authentication
The invention provides an easy to use credential management mechanism for multi-factor out-of-band multi-channel authentication process to protect payment...
US-9,741,032 Security broker
An attempted transaction is identified involving a customer device and the first customer device is redirected to a security broker. A security report for the...
US-9,741,024 Systems and methods of bank transfer
A financial institution and a payment initiator may exchange public keys to enable the secure exchange of data. A business wishing to collect payment can...
US-9,740,988 System and method for using unique device indentifiers to enhance security
A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can...
US-9,740,987 Generation of computer-based discovery avatars based on tokenization of prioritized source data
In embodiments of the present invention improved capabilities are described for developing, training, validating and deploying discovery avatars embodying...
US-9,740,886 Enhanced security for hardware decoder accelerator
A software security layer may be used to protect a system against exploitation of a hardware encoder accelerator by malicious data embedded in the one or more...
US-9,740,882 Sensor privacy mode
Technologies for sensor privacy on a computing device include receiving, by a sensor controller of the computing device, sensor data from a sensor of the...
US-9,740,879 Searchable encryption with secure and efficient updates
Methods, systems, and computer-readable storage media for selecting columns for using searchable encryption to query a database storing encrypted data....
US-9,740,876 Securely storing and provisioning security telemetry of multiple organizations for cloud based analytics
A cloud based system receives multiple types of security telemetry from multiple participating organizations. The received security telemetry can be...
US-9,740,872 Data access control systems and methods
Various hardware and software configurations are described herein which provide improved security and control over protected data. In some embodiments, a...
US-9,740,868 Customizing a security report using static analysis
Respective edge weights are assigned to edges of a plurality of paths in a control flow graph representing a model of data flow of a computer program. Edge...
US-9,740,867 Securely passing user authentication data between a pre-boot authentication environment and an operating system
Systems and methods for securely passing user authentication data between a Pre-Boot Authentication (PBA) environment and an Operating System (OS) are...
US-9,740,847 Method and system for authenticating a user by means of an application
Methods and systems are provided for authentication in electronic devices using multi-level security schemes. In an electronic device, at each particular level...
US-9,740,834 Usage rights information for protected content having two parts
The invention relates to a device for accessing protected content, the device comprising a secure module for accessing the protected content and a control unit...
US-9,740,764 Systems and methods for probabilistic data classification
A system for performing data classification operations. In one embodiment, the system comprises a file system configured to store a plurality of computer files...
US-9,740,720 Secure and lossless data compression
A method for compressing a string of characters, initially defined by an original ordered sequence of characters each represented by an absolute number uniquely...
US-9,740,652 Apparatus and method for controlling transparent tunnel mode operation in communication system supporting...
A method for controlling a transparent tunnel mode operation in a Wireless Dockee (WD) in a communication system supporting a wireless docking protocol is...
US-9,740,567 System and method for secured backup of data
A system and method of selectively providing encrypted data is provided. Embodiments of the invention may store data in encrypted form on a storage device....
US-9,740,227 System, method, and data packets for messaging for electric power grid elements over a secure internet protocol...
Systems, methods, and messages of the present invention provides IP-based messages associated with the grid elements, wherein each IP-based message includes an...
US-9,737,745 Dynamic pendula stool
Disclosed herein is a dynamic pendula stool possessing a foot, a leg secured to the foot, and a seat secured to the top end of the leg. The leg has a telescopic...
US-9,736,176 System and method for detecting security exposures of VOIP devices
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for detecting security exposures of Voice over Internet...
US-9,736,167 Enhanced security and safety in telerobotic systems
Methods and systems for securing remotely-operable devices are provided. A security device can receive a plurality of commands to control a remotely-operable...
US-9,736,028 System and method for providing network support services and premises gateway support infrastructure
A service management system communicates via wide area network with gateway devices located at respective user premises. The service management system remotely...
US-9,735,966 Secure transmission
A method for providing evidential data is disclosed. The method includes establishing one or more first secret tokens with a server; obtaining one or more data...
US-9,735,962 Three layer key wrapping for securing encryption keys in a data storage system
Securing encryption keys in a data storage system using three layer key wrapping that encrypts a data encryption key using a key encryption key, encrypts the...
US-9,735,959 Method and system for enforcing access control policies on data
A method for enforcing access control policies on data owned by a plurality of users includes evaluating the access control policies of users, applying a...
US-9,735,925 Secure communication method and system based on bit error probability
Provided is a method for performing Hybrid Automatic Repeat Request (HARQ) by a data transmitting terminal in a wireless communication system. The terminal...
US-9,735,840 Beacon comprising multiple communication interfaces with secure deactivation/reactivation
A communication beacon including a calculation unit associated with a memory module for data storage and with a communication circuit, the beacon being powered...
US-9,735,825 Electronic device and method for controlling display on basis of information of accessory device and accessory...
Various embodiments of the present disclosure provide an accessory device of a portable electronic device. The accessory device includes a first cover that is...
US-9,734,644 Wireless camera facilitated building security
A security system permits limited access into a building for authorized visitors. The security system includes an access interface pad installable at a building...
US-9,734,492 Secure universal two-step payment authorization system
A system and methods expedite and make secure payment data entry, and payment and authorization and authorization, for both in-store and online purchases. A...
US-9,734,487 Useful data and content feeds in the enterprise
In a new Notification Service, applications can publish data and allow users to subscribe to that data how they wish, with methods for secure redaction and...
US-9,734,480 Method and apparatus for secure asset tracking
An approach is provided for providing a secure and energy efficient method of asset tracking using BLE tags. The security module determines identification...
US-9,734,456 Systems and methods for determining likelihood of incident occurrence
Determination of a user-specific likelihood of incident occurrence at a geographic location may be performed. User information, historical incident information,...
US-9,734,442 LumID barcode format
A security feature and a method for creating a barcode are disclosed. Data is concatenating to be represented in the barcode. The concatenated data is...
US-9,734,359 Always-available embedded theft reaction subsystem
A system to provide an always-on embedded anti-theft protection for a platform is described. The system comprises in one embodiment, a storage including...
US-9,734,358 Self-locking USB protection pug device having LED to securely protect USB jack
Methods, devices and system for enhancing computer information security by physically blocking unused USB ports with self-locking devices, or by providing USB...
US-9,734,354 Notarizable electronic paper
A system and method helps to control "read" and/or "write" access to electronic paper (e-paper). Informational data may be on a restricted portion of e-paper...
US-9,734,346 Device and method for providing security in remote digital forensic environment
An apparatus and method for collecting digital evidence from a target system to be analyzed at a remote location and then providing security in a remote digital...
US-9,734,338 System on chip to perform a secure boot, an image forming apparatus using the same, and method thereof
A system on chip is provided. The system on chip includes a first memory to store a plurality of encryption keys, a second memory, a third memory to store an...
US-9,734,336 Process security validation
Techniques for process security validation are described herein. In one example, a method includes determining, via a processor, that a process is in a first...
US-9,734,327 Methods for restricting resources used by an application based on a base profile and an application specific...
In response to a request for launching an application within an operating system of a data processing system, one or more extended entitlements are extracted...
US-9,734,325 Hypervisor-based binding of data to cloud environment for improved security
A method includes receiving a request at a first hypervisor from an application within a virtual machine. The virtual machine is executed within a...
US-9,734,281 Plastic packaging materials testing system based on internet of things and cloud technology
The invention discloses a plastic packaging material testing system and method based on internet of things and cloud technology. It includes: cloud computing...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.