Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,005,0780 Securely storing data in a data storage system
A data file is encrypted with a file-specific encryption key and sent to a remote data storage system. The file-specific encryption key is encrypted with a...
US-1,005,0456 Mobile handset recharge
Methods and devices for connecting a mobile device with different data storage devices located either locally or remotely are provided. The device may apply one...
US-1,004,9766 Method and apparatus for secure setup of clinical trial client device
A method, device and system for transceiving clinical trial related information includes a client device and a server that communicate. An application of the...
US-1,004,9544 Virtual enhancement of security monitoring
Methods, systems, and apparatus, including computer programs encoded on storage devices, for monitoring, security, and surveillance of a property. In one...
US-1,004,9533 Physical security system for computer terminals
A computer terminal located in an environment may include an actuator, retractable privacy barrier attached to the computer terminal by the actuator, a display,...
US-1,004,9523 Method and device for detecting overlapped bank notes
A method for detecting overlapped bank notes is provided. The method includes: step 10, collecting original image data of bank notes; step 20, performing...
US-1,004,9405 System and method for specified pool trading
A computer system and related methods configured to store and deliver, upon request, information related to asset-backed security pools, and execute...
US-1,004,9394 Apparatus and method for performing secure transactions with a digital device
Method to perform secure transactions with a digital device starts with microphone receiving signal generated by the digital device. Signal includes product...
US-1,004,9357 System and method of processing PIN-based payment transactions via mobile devices
A system and method for using a Personal Identification Number ("PIN") to authenticate payment transactions via a mobile device coupled to a reader device is...
US-1,004,9225 Data access control systems and methods
Various hardware and software configurations are described herein which provide improved security and control over protected data. In some embodiments, a...
US-1,004,9221 Management of application access
Concepts and technologies are disclosed herein for management of application access. A security management application can be configured to set access controls...
US-1,004,9214 Systems and methods for detecting malicious processes on computing devices
The disclosed computer-implemented method for detecting malicious processes on computing devices may include (i) identifying a portion of data on a computing...
US-1,004,9201 Physical token-less security screening using biometrics
In physical token-less security screening using biometrics, a person provides biometric data to a security computing device as part of a security screening. The...
US-1,004,9137 Methods and systems for optimizing text searches over structured data in a multi-tenant environment
Search systems and methods for searching structured data and enhancing the relevancy of search results provided to a requesting user or application. Enhanced...
US-1,004,6585 Micro-optic viewing arrangement
A micro-optical inspection arrangement comprises micro-focusing elements which are composite bodies consisting of a main part and an additional part and which...
US-1,004,5737 Clip-on device with inward-facing cameras
In order to enable collection of data from a head-mounted inward-facing camera, a clip-on device is attached to eyeglasses. The clip-on device optionally weighs...
US-1,004,5455 Land based unit for seismic data acquisition
A self-contained, wireless seismic data acquisition unit having a cylindrically shaped case with smooth side walls along the length of the case. A retaining...
US-1,004,5215 Method and system for remote data access using a mobile device
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and...
US-1,004,5208 Method and apparatus for secured social networking
Various methods are described for using a local trust level and/or a general trust level to control access of data in PSN. Any PSN user can select other users...
US-1,004,5207 Apparatus for secure hearing device communication and related method
The disclosure provides a client device for hearing device communication and related method. The client device comprises a processing unit, a memory unit, and...
US-1,004,5201 Inter-network operator roaming policy configuration in mobile wireless data networks operated by cooperating...
A method carried out by communications between a home roaming configuration server and a visited roaming configuration server is described that facilitates...
US-1,004,5156 Physical security system and method
Systems (100) and methods (110) for operating a physical security surveillance system. The methods involve: detecting the constant unencrypted radio...
US-1,004,5095 Communication processing device, communication method, and communication system
Provided are a communication processing device and a communication system, capable of securely updating a communication protocol process with a simple...
US-1,004,5062 Networked personal video storage and delivery
A portable video delivery device includes data storage, a secure processor, and a wireless network interface that acts as an access point for a secure personal...
US-1,004,4780 Dynamic segregated secure data connection
A system can perform operations including receiving a first data stream from a first device, wherein the first data stream is associated with an active session...
US-1,004,4759 Conflict detection and resolution methods and apparatuses
Conflict detection and resolution methods and apparatuses relate to the field of communications technologies. The conflict detection method includes: acquiring,...
US-1,004,4757 Secure execution of enterprise applications on mobile devices
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application...
US-1,004,4756 Enabling an on-premises resource to be exposed to a public cloud application securely and seamlessly
An application deployed in a public cloud is enabled to access an on-premises resource securely and without requiring additional ports on a firewall. A pair of...
US-1,004,4745 Systems for computer network security risk assessment including user compromise analysis associated with a...
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for computer network security risk assessment. One of the...
US-1,004,4730 Methods, systems, and articles of manufacture for implementing adaptive levels of assurance in a financial...
Disclosed are methods, systems, and articles of manufacture for implementing adaptive levels of authentication assurance according to sensitivity or criticality...
US-1,004,4705 Session management for internet of things devices
The disclosure is directed to security management in communications involving computing devices, e.g. Internet of Things (IoT) devices. An IoT device can...
US-1,004,4701 Technologies for token-based authentication and authorization of distributed computing resources
Technologies for token-based access authorization to an application program interface (API) include an access management server to receive a service request...
US-1,004,4693 Security for confidential data
In an example embodiment, a submission of confidential data is received from a user. Then, the confidential data is encrypted using a first public key generated...
US-1,004,4690 Secure media capture, transfer, and storage
A secure media capture device may comprise a secure memory, a first sensor, a second sensor, a processor, and a communication module. The first sensor may be...
US-1,004,4685 Securing enterprise data on mobile devices
Embodiments include method, systems and computer program products for securing enterprise data in a mobile computing environment. Aspects include receiving, by...
US-1,004,4647 Systems and methods for controlling enrollment and secure persistent SMS texting account servicing with an...
The disclosed technology includes systems and methods for controlling enrollment and secure persistent SMS texting account servicing communications. A method is...
US-1,004,4551 Secure cloud management agent
Embodiments relate to providing a secure management agent for high-availability continuity for cloud systems. An aspect includes receiving operating parameters...
US-1,004,4550 Secure cloud management agent
Embodiments relate to providing a secure management agent for high-availability continuity for cloud systems. An aspect includes receiving operating parameters...
US-1,004,4510 Storing and using data with secure circuitry
An electronic device is provided. The electronic device includes a processor, a memory configured to connect to the processor, and an embedded secure element...
US-1,004,4509 Method for encrypting and storing data
Systems and methods for securely uploading a data file are presented. A client generates a symmetric encryption key and an initialization vector; encrypts the...
US-1,004,4501 Selective content security using visual hashing
In an approach to securing data using visual hashing, one or more computer processors receive a user access request for hashed image. The one or more computer...
US-1,004,4468 Optical transceiver and data mapping method using thereof
Disclosed is an optical transceiver. The optical transceiver includes a decoder for decoding an 8B10B line-coded signal, a data mapper for separating the...
US-1,004,4412 System and method for providing contactless payment with a near field communications attachment
A system and method in accordance with exemplary embodiments may include an attachment with a near field communication antenna, a secure element, a plug capable...
US-1,004,3590 Method, apparatus and system for securely transferring biological information
A system for providing product recommendations for two or more members of a group, including a wearable device comprising a reader for reading product...
US-1,004,3213 Systems and methods for improving computation efficiency in the detection of fraud indicators for loans with...
Certain embodiments of the disclosed technology include systems and methods for increasing efficiency in the detection of identity-based fraud indicators...
US-1,004,3186 Secure authentication system and method
Methods and systems pertaining secure transaction systems are disclosed. In one implementation, a computer with a verification token associated with a computer...
US-1,004,3180 System and method for secure transactions at a mobile device
A system and method for conducting money transfer transactions using mobile devices includes a money transfer host computer that facilitates the collection of...
US-1,004,3128 Data carrier
The present invention relates to a data carrier, especially a security document, such as an identification card, e.g. a passport or a driving license, a credit...
US-1,004,3105 Method and system to characterize video background changes as abandoned or removed objects
A method and system for analyzing video data in a security system. An analysis compares a current frame to a background model. The analysis system compares the...
US-1,004,3041 Multi-function, modular system for network security, secure communication, and malware protection
Representative embodiments are disclosed for providing network and system security. A representative apparatus includes an input-output connector coupleable to...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.