Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,356,781 Methods and apparatus for authenticating data as originating from a storage and processing device and for...
Techniques are described for using unique features of a storage medium for authentication of data as originating from the storage medium, and also for...
US-9,356,552 Motor drive system data interface system and method
A motor drive system includes a motor drive processor, a motor drive memory component, a server, and a display that displays a machine readable code, wherein...
US-9,355,545 Secure optionally passive RFID tag or sensor with external power source and data logging
A secure optionally passive RFID tag or sensor system comprises a passive RFID tag having means for receiving radio signals from at least one base station and...
US-9,355,426 Hardware-enforced, always-on insertion of a watermark in a video processing path
A method, apparatus, article of manufacture, and a memory structure for inserting a watermark in a media program is described. In an exemplary embodiment, the...
US-9,355,399 System and method for providing contactless payment with a near field communications attachment
A system and method in accordance with exemplary embodiments may include an attachment with a near field communication antenna, a secure element, a plug capable...
US-9,355,282 Using multiple display servers to protect data
A first display server and a second display server execute on a processing device. The first display server provides a secure environment for data presented in...
US-9,355,280 Apparatus and method for providing hardware security
A technique to provide a hardware security module that provides a secure boundary for retention of a secure key within the secure boundary and prevention of...
US-9,355,279 Multi-tenancy architecture
A system includes a security device, configured for cryptographic processing, coupled to receive incoming data from a plurality of data sources (e.g., data from...
US-9,355,270 Security configuration systems and methods for portal users in a multi-tenant database environment
A computer-implemented system and method includes method includes receiving a data request for data in a database from a user; determining if the user is an...
US-9,355,261 Secure data management
The disclosed subject matter includes a method. The method includes determining, by a module running on a computer platform in communication with non-transitory...
US-9,355,260 Method and system for securing access to configuration information stored in universal plug and play data models
A method and system for securing access to configuration information stored in universal plug and play data models are provided. The method includes receiving a...
US-9,355,254 Apparatus, system and method for preventing data loss
A device and method are provided for a device that communicates security information to a user entering content into the device. In an aspect, the device may...
US-9,355,250 Method and system for rapidly scanning files
The present embodiments provide a method and system for rapidly scanning a file, wherein the method includes obtaining a data packet, the data packet comprising...
US-9,355,224 System and method for dynamic adjustment of expiration date for authorization key for antivirus products
A system for a dynamic adjustment of expiration date of an authorization key, the system comprising: a security product that will be installed on a...
US-9,355,157 Information targeting systems and methods
The present disclosure relates generally to systems and methods for the secure management of electronic information relating to a user. In certain embodiments,...
US-9,355,135 Data movement from a database to a distributed file system
Provided are techniques for data movement. An activity is created that overrides existing security, that is associated with a user, that defines one or more...
US-9,355,048 Method for implementing secure data channel between processor and devices
Apparatuses, systems, and methods are directed to securely store, transfer, and/or process data especially sensitive data sent from input devices to processors....
US-9,354,985 Data processing device and data processing method
Embodiments of the present invention provide a data processing device and a data processing method. In the data processing device and the data processing method...
US-9,354,927 Securing virtual machine data
One embodiment of the present invention is a method including: (a) representing virtual primary disk data and state data of a virtual machine in a unit of...
US-9,354,674 Transportation, storage and stabilization device for electronic equipment
An equipment saddle is provided. The equipment saddle may include a plurality of cases attached to a drapable skirt. Each case forms a compartment for retaining...
US-9,351,167 SMS botnet detection on mobile devices
Technologies for mobile device security are disclosed. A described technique includes launching a monitoring application that has a priority receiver attribute...
US-9,351,163 Automatic sanitization of data on a mobile device in a network environment
A method is provided in one example embodiment and includes establishing a network connection to a central security system in a central network, receiving a...
US-9,351,141 Headset computer with handsfree emergency response
Operating conditions for a headset computer are used to detect a situation where an emergency response mode should be activated. In emergency response mode, the...
US-9,351,077 Systems and methods for independent and control-isolated audio processing (ICIAP)
Systems and methods are provided that may implement independent and control-isolated audio processing (ICIAP) to separate and/or control audio streams at...
US-9,350,782 Method and system for delivering media data
For use in media communications, e.g. in the delivery of video and audio or in teleconferencing, a media file or title is partitioned for secured, efficient...
US-9,350,761 System for the distribution and deployment of applications, with provisions for security and policy conformance
A system and method are disclosed for deploying applications to end point devices. The applications are obtained from a marketplace that checks the applications...
US-9,350,759 Network security appliance to imitate a wireless access point of a local area network through coordination of...
Disclosed are methods and systems of a network security appliance to imitate a wireless access point of a local area network through coordination of multiple...
US-9,350,750 Distribution of security rules among sensor computers
Systems and methods for generating rules in a networking environment having one or more sensor computers logically connected to compromised computers are...
US-9,350,749 Application attack monitoring
Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for providing application attack monitoring. Actions...
US-9,350,738 Template representation of security resources
Systems and methods are described for enabling users to model security resources and user access keys as resources in a template language. The template can be...
US-9,350,736 System and method for isolating mobile data
Disclosed is a system for mobile data isolation, comprising of a tag control management module and a mobile data management module. The tag control management...
US-9,350,731 Secure method of processing data
The invention relates to a secure method of processing data in which method is implemented the evaluation of a function that may be written as a linear...
US-9,350,715 Methods and apparatus for network communications via a transparent security proxy
A data security device for providing a network transport connection via a transparent network proxy that employs different encryption security mediums along a...
US-9,350,708 System and method for providing secured access to services
A system and method for providing authenticated access to an initiating terminal in relation to the services provided by a terminating terminal via a...
US-9,350,550 Power management and security for wireless modules in "machine-to-machine" communications
Methods and systems are provided for power management and security for wireless modules in "Machine-to-Machine" communications. A wireless module operating in a...
US-9,350,540 System and method of secure encryption for electronic data transfer
A system for secure transfer of encrypted data involves a sender client, a recipient client, a main server, and a key server. The sender client receives...
US-9,350,532 System and method for conducting searches at target devices
A method, apparatus and system for secure forensic investigation of a target machine by a client machine over a communications network. In one aspect the method...
US-9,349,287 System for obtaining vehicular traffic flow data from a tire pressure monitoring system
An embedded Tire Pressure Monitoring sensor is incorporated into vehicular wheels and a secured central server is used to track the unique identification code...
US-9,349,027 Smart hybrid card system providing authenticity, privacy, and security (APS)
An RFID/MFID system includes a tag and a reader. The tag is adapted to provide an RF identification signature when interrogated with an electric travelling wave...
US-9,349,023 Database encryption system, method, and program
A user apparatus connected to database apparatus via network comprises: unit that manages key information in order to encrypt and decrypt; storage unit that...
US-9,349,018 Preventing content data leak on mobile devices
Preventing enterprise or other protected content data from "leaking" from being under secure management on a device, for example by virtue of being viewed using...
US-9,349,015 Programmatically detecting collusion-based security policy violations
Sets of multiple software programs selected from a set of candidate software programs are evaluated to determine if the applications can collude to violate a...
US-9,348,991 User management of authentication tokens
A computer implemented method, a computer program product, and a data processing system manage a set of federated log-in authentications at secure web sites. A...
US-9,348,980 Methods, systems and application programmable interface for verifying the security level of universal resource...
The present disclosure discloses a method of allowing WebView to verify the security level of a web content and inform the user with regards to the security and...
US-9,348,879 Data lineage transformation analysis
Resources for data lineage discovery, data lineage analysis, role-based security, notification. The resources may include or involve machine readable memory...
US-9,348,864 Managed peer-to-peer applications, systems and methods for distributed data access and storage
Secure and remote operation of a remote computer from a local computer over a network includes authenticating at least one remote computer for connection to at...
US-9,348,856 Data movement from a database to a distributed file system
Provided are techniques for data movement. An activity is created that overrides existing security, that is associated with a user, that defines one or more...
US-9,348,789 Computer system and network interface supporting class of service queues
A data processing system adapted for high-speed network communications, a method for managing a network interface and a network interface for such system, are...
US-9,348,768 Method for implementing encryption in storage card, and decryption method and device
A method for implemented encryption in a memory card, and a decryption method and device, and the method includes: receiving an input encryption key; requesting...
US-9,348,626 Mobile device maintaining adequate security and data partitioning between user mode and business mode
One or more embodiments of the invention facilitate switching between a host environment of a mobile device and a guest environment of the mobile device. One...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.