Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,854,122 Image forming apparatus, data management method, and storage medium
An image forming apparatus includes a state management unit that shifts an authentication state from a non-login state to a login state, a storage unit that...
US-9,854,057 Network data collection and response system
Embodiments include a network data collection and response system for enhancing security in an enterprise network providing a user-supplied computing device...
US-9,853,992 Cloud service usage risk analysis based on user location
A system and method for filtering detected anomalies in cloud service usage activities associated with an enterprise uses a trusted location analysis to filter...
US-9,853,987 Method, apparatus and system for realizing security detection in heterogeneous network
Provided are a method, apparatus and system for realizing security detection in a heterogeneous network. UE establishes cross-Evolved NodeB (eNB)...
US-9,853,985 Device time accumulation
A method, system and computer-usable medium are disclosed for performing a device time accumulation operation. With a device time accumulation operation systems...
US-9,853,977 System, method, and program product for processing secure transactions within a cloud computing system
Particular systems, methods, and program products for web-based security systems for user authentication and processing in a distributed computing environment...
US-9,853,976 Data encryption/decryption using neurological fingerprints
In accordance with one embodiment, a method for securing data is disclosed. The method includes sensing multi-dimensional motion of a body part of a user to...
US-9,853,971 Proximity based authentication using bluetooth
Techniques for securing communications between fixed devices and mobile devices. A mobile device management server mediates communications between the fixed...
US-9,853,970 Method, system and apparatus for secured wireless docking connection
Examples are disclosed for techniques for wireless docking. According to some embodiments, a mobile device may scan for an available docking device, for example...
US-9,853,968 Systems and methods for authenticating users accessing a secure network with one-session-only, on-demand login...
Systems and methods are disclosed for providing an unregistered user with access to a network in a secure and efficient manner. A random, on-demand password is...
US-9,853,952 Apparatus and method for encryption
An encryption apparatus comprises a memory configured to store a predetermined program on a general domain and a security domain; and a processor configured to...
US-9,853,946 Security compliance for cloud-based machine data acquisition and search system
Disclosed herein are a method, apparatus and system that authenticate a first data forwarder, of a distributed machine data acquisition and search system...
US-9,853,944 Cloud based logging service
Methods and systems are provided for facilitating access to a cloud-based logging service. According to one embodiment, access to a cloud-based logging service...
US-9,853,812 Secure key management for roaming protected content
Content on a device is encrypted and protected based on a data protection key corresponding to a particular identity of the user of the device. The protected...
US-9,853,741 Fiber optic encryption
A fiber optic encryption method is provided. The method includes transmitting an initial security key to a laser receiver apparatus over an out of band (OOB)...
US-9,853,669 Modular radio frequency hub and interchangeable modules
The present invention provides for a modular radio frequency communications assembly including a radio frequency hub and one or more radio frequency modules....
US-9,853,569 Method for actuating inverters connected in parallel
The invention relates to a method for actuating inverter stages (2) switched in parallel, wherein each inverter stage (2) comprises several switching elements...
US-9,852,605 Systems and methods of dynamically varying a pre-alarm time of a security system
Systems and methods of adjusting a pre-alarm time are provided, including detecting, by a sensor, an entry into a building by a person and generating detection...
US-9,852,604 Building security system
A security system that can be used in a home, office, or other building in order to generate alarms or take other actions depending on conditions within the...
US-9,852,578 Methods and apparatus for providing secure logon to a gaming machine using a mobile device
A gaming system compatible with patron-controlled portable electronic devices, such as smart phones or tablet computers, is described. When a transaction is...
US-9,852,572 Cryptographic token with leak-resistant key derivation
Methods and apparatuses for increasing the leak-resistance of cryptographic systems are disclosed. A cryptographic token maintains secret key data based on a...
US-9,852,515 Mobile terminal security systems
Systems that can track an object as it moves across the field of view of the security device, integrate transaction data with the object information, and can...
US-9,852,418 Trusted service manager (TSM) architectures and methods
A client device comprises a first secure element and a second secure element. The first secure element comprises a first computer-readable medium having a...
US-9,852,409 Consumer device based point-of-sale
Systems and related methods facilitating interactions between a merchant device, a central system and a consumer device are discussed herein. Wallet identifying...
US-9,852,312 Generic encryption system for nonsecure datapaths
A secure generic encryption system for nonsecure datapaths comprises a format-specific adaptation layer/data path for receiving and processing nonsecure content...
US-9,852,309 System and method for securing personal data elements
A system and method may obtain a connection profile, the connection profile including at least one rule related to at least one PII data element; associate the...
US-9,852,305 Method for provably secure erasure of data
A method for provably secure erasure of data, performed in a memory available to one or more computing devices, includes generating prover state information...
US-9,852,303 Protecting sensitive data in software products and in generating core dumps
Sensitive data is protected in a software product. A source file of the software product is compiled to generate an object file, in which the source file...
US-9,852,300 Secure audit logging
The invention includes systems and methods to asymmetrically encrypt audit logs, store a limited period of the encrypted audit logs, periodically send the...
US-9,852,294 Systems and methods for detecting suspicious applications based on how entry-point functions are triggered
The disclosed computer-implemented method for detecting suspicious applications based on how entry-point functions are triggered may include (1) identifying an...
US-9,852,288 Securing data on a computing system
The present subject matter relates to securing data on a computing system. In an example, a request to execute an application instance of the application is...
US-9,852,284 Storage isolation using I/O authentication
Techniques are described for logically isolating data I/O requests from different operating systems (OSes) for a same multi-tenant storage system (MTSS)....
US-9,852,206 Computer relational database method and system having role based access control
In a method of controlling access to secured data, a repository operatively coupled to one or more databases storing secure data is employed to intercept a user...
US-9,852,102 System for exchanging information between wireless peripherals and back-end systems via a peripheral hub
Wireless peripherals may be used by workers to facilitate communication, data entry, data visualization, safety, and security. Typically, these peripherals must...
US-9,851,924 Using hard drive on panels for data storage
Methods and systems are described for controlling an automation and security system. According to at least one embodiment, an apparatus for data storage in an...
US-9,851,914 Random number generation in ferroelectric random access memory (FRAM)
Disclosed embodiments relate to generating random numbers using two transistor, two capacitor (2T-2C) ferroelectric memory cells. In accordance with one...
US-9,847,878 System and method for interleaving information into slices of a data packet, differentially encrypting the...
Approaches for combining different information to be transmitted into different slices of a data packet and/or encrypting the slices using different...
US-9,846,980 Lock releasing method of electronic device, and apparatus thereof
The present disclosure relates to a lock releasing method of an electronic device, an apparatus thereof, and a medium storing a program source for the method....
US-9,846,861 Upstream and downstream data conversion
One embodiment of the invention is directed to implementing a broker system to accept confidential information from upstream trading partners, retrieve tokens...
US-9,846,791 Data storage device for protected data exchange between different security zones
The embodiments relate to a data storage device for protected data exchange between different security zones including at least a storage unit, a data...
US-9,846,780 Automated vulnerability intelligence generation and application
Techniques for providing computer security vulnerability intelligence are disclosed. The techniques include obtaining distributable vulnerability data that...
US-9,844,061 LPI/LPD communication systems
In a wireless communication system, a secure communication link is provided by selecting a decoy data signal for transmission, generating a precoding matrix...
US-9,843,929 Apparatus and method for sharing WiFi security data in an internet of things (IoT) system
A method and system for connecting an Internet of Things (IoT) hub to a wireless network. One embodiment of the method includes establishing a secure...
US-9,843,926 System and method for preventing an attack on a networked vehicle
A system for preventing an attack on a networked vehicle via a wireless communication device including a wireless data traffic network, a security status...
US-9,843,925 Operation of control protocol data units in packet data convergence protocol
A method and apparatus reports packet data control protocol (PDCP) status and PDCP resets in a wireless communication, using control PDUs that may have security...
US-9,843,773 Signal security in a satellite signal distribution environment
Certain embodiments provide a set top box, comprising: a processing entity configured to obtain data for a channel stacking switch, to obtain a security data...
US-9,843,605 Security compliance framework deployment
A method and system for improving deployment of a security compliance framework is provided. The method includes deploying a data store that includes an...
US-9,843,599 Context aware threat protection
Methods and systems for dynamic threat protection are disclosed. An example method for dynamic threat protection may commence with receiving real-time...
US-9,843,598 Capture triggers for capturing network data
The disclosed embodiments provide a system that facilitates the processing of network data. During operation, the system provides a risk-identification...
US-9,843,595 Systems and methods for providing security services during power management mode
Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.