Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,894,141 Managed peer-to-peer applications, systems and methods for distributed data access and storage
Secure and remote operation of a remote computer from a local computer over a network includes authenticating a remote computer for connection to a computer...
US-9,894,093 Structuring data and pre-compiled exception list engines and internet protocol threat prevention
Blocking high-risk IP connections in real-time while allowing tailoring of an acceptable risk profile to match the security requirements of network resources....
US-9,894,087 System and method for uploading and verifying a document
A computer implemented method may allow for the upload and verification of a document. In one aspect, the method may receive a file at a data server associated...
US-9,894,085 Systems and methods for categorizing processes as malicious
The disclosed computer-implemented method for categorizing processes as malicious may include (1) storing, in a security application that tracks event data for...
US-9,894,083 System for providing a secure video display
A system for providing a secure video display using a one-way data link. An input interface for receives a video stream signal. The one-way data link has an...
US-9,894,080 Sequence hopping algorithm for securing goose messages
Embodiments of the present invention include methods and apparatuses for securing data transfer in power-system automation and smart grids. Embodiments of the...
US-9,894,077 Situational awareness system security features
Security features a situational awareness system using location tracking information including requiring a security identifier, such as a password or a bio...
US-9,894,063 Anonymizing biometric data for use in a security system
An anonymized biometric representation of a target individual is used in a computer based security system. A detailed input biometric signal associated with a...
US-9,894,061 Method for booting and dumping a confidential image on a trusted computer system
A method for booting and dumping a confidential image on a trusted computer system. Embodiments of the present invention disclose deploying a secure boot image...
US-9,894,058 System and method of secure personal identification
A system and method for securely and automatically identifying users to an inquirer for purposes of obtaining user identifying information is described. The...
US-9,894,040 Trust services for securing data in the cloud
Embodiments are directed to securing data in the cloud, securely encrypting data that is to be stored in the cloud and to securely decrypting data accessed from...
US-9,894,038 System security for network resource access using cross-firewall coded requests
A system includes a firewall, a first server located behind the firewall, and a second server located before the firewall. The second server is configured to...
US-9,893,995 Systems, methods, and apparatus for implementing agents in service appliances
The present disclosure describes several key features of an agent deployable on a service appliance: agent architecture/design, transport and channel...
US-9,893,881 Efficient sharing of hardware encryption pipeline for multiple security solutions
A processing or memory device may include a first encryption pipeline to encrypt and decrypt data with a first encryption mode and a second encryption pipeline...
US-9,893,880 Method for secure symbol comparison
A method for secure comparison of encrypted symbols. According to one embodiment, a user may encrypt two symbols, share the encrypted symbols with an untrusted...
US-9,892,422 Sales security integration
Disclosed are various embodiments of sales security integration. At least one embodiment of a method includes the steps of receiving contact data regarding a...
US-9,892,404 Secure identity authentication in an electronic transaction
An approach is provided for securely authenticating an identity of a user participating in an electronic transaction. A request for a biometric ...
US-9,892,403 Method, device and secure element for conducting a secured financial transaction on a device
A device and a secure element for conducting a secured financial transaction are disclosed. The device comprises a central processing unit; a communication...
US-9,892,276 Verifiable data destruction in a database
A computing device may determine that a policy event to initiate data destruction for a first set of data has been triggered. The first set of data may be...
US-9,892,271 Device lock control apparatus and method with device user identification using a thermal signature
A device includes a thermal infrared sensor and a processor, operatively coupled to the thermal IR sensor. The processor is configured to determine that the...
US-9,892,269 Techniques for data monitoring to mitigate transitive problem in object-oriented contexts
Techniques for mitigating the transitive data problem using a secure asset manager are provided. These techniques include generating a secure asset manager...
US-9,892,264 System and method for dynamic security provisioning of computing resources
The present invention facilitates the dynamic provisioning of computing and data assets in a commodity computing environment. The invention provides a system...
US-9,892,258 Automatic synthesis of unit tests for security testing
Performing security analysis on a computer program under test (CPUT). The CPUT can be analyzed to identify data pertinent to potential security vulnerabilities...
US-9,892,211 Searchable code processing system and method
In a searchable cipher system, the security of ciphertext, the optimization of the size of ciphertext and the optimization of the network traffic are not...
US-9,892,002 Incremental continuous data protection
Systems and techniques are provided for incremental Continuous Data Protection (iCDP) as a process to secure frequent, and space efficient, versions of...
US-9,891,945 Storage resource management in virtualized environments
Storage resource management in virtualized environments is provided. In this regard, when receiving a request for accessing a target general purpose partition...
US-9,891,675 Systems and methods for packaging high density SSDs
In various embodiments, a high-density solid-state storage unit includes a base section and a cassette section having plurality of flash cards. The cassette...
US-9,891,654 Secure clock switch circuit
An integrated circuit (IC) having a clock switch that switches the system clock between an internal clock and an external clock based on whether or not the IC...
US-9,888,384 Securing a wireless mesh network via a chain of trust
A master beacon device emits a data packet that is received and retransmitted by servant beacon devices in a wireless mesh network that enables the beacon...
US-9,888,382 Mobile data communication using biometric encryption
A mobile App using biometric encryption and decryption for privacy and security having both authentication and recognition functions. It utilizes the built-in...
US-9,888,371 Portable home and hotel security system
Systems and methods for monitoring a local environment for abnormal conditions (e.g., burglary, intrusion, fire, or flooding) are disclosed. Sensors of a...
US-9,888,290 Service denial notification in secure socket layer (SSL) processing
A data communication gateway. The gateway comprises a processor, a non-transitory memory, and an application stored in the non-transitory memory. When executed...
US-9,888,031 System and method thereof for identifying and responding to security incidents based on preemptive forensics
A system is connected to a plurality of user devices coupled to an enterprise's network. The system continuously collects, stores, and analyzes forensic data...
US-9,888,014 Enforcing security for sensitive data on database client hosts
A restriction agent resides on a database client host, the database client host receiving first data from a database secured by a database access control...
US-9,888,010 System and method for providing an integrated firewall for secure network communication in a multi-tenant...
An integrated firewall provides security in a multi-tenant environment having a connection-based switched fabric directly connecting database servers which...
US-9,887,998 Security model for data transfer using a shippable storage device
Data may be securely stored onto a shippable data storage device in order for the client data to be protected during shipment to the remote storage service...
US-9,887,994 Data processing based on two-dimensional code
The present disclosure provides example methods and apparatuses of data processing based on a two-dimensional code. The two-dimensional code is generated upon...
US-9,887,992 Sight codes for website authentication
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for site codes for website authentication are disclosed. In...
US-9,887,981 Single sign-on between multiple data centers
Systems and methods are disclosed for a single sign-on (SSO) enterprise system with multiple data centers that use a lightweight cookie on a user's client...
US-9,887,980 Global time based authentication of client devices
A system for authenticating client devices for communication with one or more wireless communications networks, includes a client device configured to receive a...
US-9,887,975 Systems and methods for delegated cryptography
In some embodiments, an authentication method comprises receiving a request for a digital signature of data from a delegate computer over a secure channel using...
US-9,887,971 Method and apparatus for secure energy delivery
A solar power conversion device embedded security module creates trusted metering data in relation to power generated and outputs it as metering data. The...
US-9,887,967 Portable security device, method for securing a data exchange and computer program product
There is disclosed a portable security device for securing a data exchange between a host device and a remote device, said portable security device comprising a...
US-9,887,911 Systems, methods, and devices for adaptive communication in a data communication network
Disclosed herein are devices, systems, methods, and computer-program products for multiplexing data from multiple transport protocols in computing. Dynamic,...
US-9,887,879 Monitoring apparatus and method
A management server receives selection of a setting item to be a monitoring target from setting information that can be set for a device, extracts, as...
US-9,887,854 Method and apparatus for dynamically changing group control mode by using user intervention information
The present disclosure relates to a sensor network, Machine Type Communication (MTC), Machine-to-Machine (M2M) communication, and technology for Internet of...
US-9,887,839 Securely sharing information via a public key-value data store
In some embodiments, each client device in the network has a private key and a public key. For two client devices to securely exchange information, each...
US-9,887,838 Method and device for secure communications over a network using a hardware security engine
A method, device, and system for establishing a secure communication session with a server includes initiating a request for a secure communication session,...
US-9,886,983 Storage drive with collapsible support
A storage device includes a data drive and an enclosure. Shock absorber mounting holes on the enclosure can receive shock absorbers to connect to the data...
US-9,886,688 System and method for secure transaction process via mobile device
A secure element with a user security domain thereon, the user security domain constituted of: a security domain control circuitry; an encoder/decoder...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.