Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,001,2009 Electric lock device for furniture and storage
An electric lock device for furniture or storage has an RFID transmitter/receiver for communication with portable data carriers. A controller detects a data...
US-1,001,1248 Cross correlation between connected vehicles and other online devices
Embodiments of the present invention disclose a method, computer system, and a computer program product for vehicle software security associated with a vehicle....
US-1,001,0777 Bat swing training system and method of use
A system for swing training with a bat, the system includes a training device, having a bat spacer attached to a sweet spot position on the bat about a barrel...
US-1,001,0010 Mobile video, audio, and sensory apparatus
A self-contained mobile surveillance apparatus has applicability in a variety of short or long term settings where security and documentation of activities are...
US-1,000,9180 System and method for generating auditable secure seeds from real-world data
An interface receives a first digital signature of real-world data. A memory stores the first digital signature as seed data. The interface receives a second...
US-1,000,9172 Instructions processors, methods, and systems to process secure hash algorithms
A method of an aspect includes receiving an instruction. The instruction indicates a first source of a first packed data including state data elements a.sub.i,...
US-1,000,7910 System and method for variable length encryption
Systems and methods for performing a secure transaction provided. In one embodiment, the method includes: reading data on a command token, reading data on a...
US-1,000,7809 Fine-grained self-shredding data in a secure communication ecosystem
One embodiment provides a document management system comprising a storage system to store one or more encrypted documents, at least a first portion of a first...
US-1,000,7502 Method for upgrading communication device
A method is disclosed for updating communication equipment through a server in a communication system, wherein the server stores the updated files used for...
US-1,000,7473 Continuous glucose monitor communication with multiple display devices
A continuous glucose monitor for wirelessly transmitting data relating to glucose value to a plurality of displays is disclosed, as well as systems and methods...
US-9,998,926 Security enabled predictive mobile data caching
An approach to preemptive mobile data caching is provided, the approach involves retrieving personal user data associated with a user of a mobile computing...
US-9,998,629 Rights management in a distributed image capture system
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on...
US-9,998,520 Information processing terminal and method
An information processing terminal displays a confirmation screen for confirming whether to delete data relating to a web site, in a case where a movement from...
US-9,998,496 Logging and monitoring usage of cloud-based hosted storage services
A computer-implemented method for accessing a hosted service on client devices is described. The client devices include client software that uses a remotely...
US-9,998,494 Methods and apparatus for secure communication in a vehicle-based data communication system
A method provides secure communication between a first module and a second module within a vehicle communication network. A first anti-replay counter is...
US-9,998,493 Systems and methods for key logger prevention security techniques
An applet may be downloaded or provided to a web browser when a user visits a site in order to protect data input by the user from being captured by malicious...
US-9,998,478 Enterprise-wide security for computer devices
A system and method for securing data in mobile devices (104) includes a computing mode (102) and a plurality of mobile devices (104). A node security program...
US-9,998,466 System and method for secure control of resources of wireless mobile communication devices
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
US-9,998,455 Protection of application passwords using a secure proxy
Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server....
US-9,998,450 Automatically generating certification documents
A certification application automatically generates a certification document associated with a service. A transformation module retrieves a component...
US-9,998,447 System and method for secure access of a remote system
A system and method for providing a user with secure access to devices operatively connected to a network comprising at least one processing device that has...
US-9,998,434 Secure dynamic communication network and protocol
In a secure cloud for transmitting packets of digital data, the packets may be repeatedly scrambled (i.e., their data segments reordered) and then unscrambled,...
US-9,998,426 Bi-directional data security for control systems
A cyber-security device includes a processor operable to process messages with a data validation rule-set; an external communication interface configured for...
US-9,998,288 Management of secret data items used for server authentication
A security device (6) is provided for facilitating management of secret data items such as cryptographic keys which are used by a remote server (2) to...
US-9,998,281 Set of servers for "machine-to-machine" communications using public key infrastructure
A set of servers can support secure and efficient "Machine to Machine" communications using an application interface and a module controller. The set of servers...
US-9,998,255 Fiber optic light intensity encryption
A fiber optic light intensity encryption method is provided. The method includes determining light intensities associated with multi-frequency light pulses...
US-9,996,837 Integration of secure protocols into a fraud detection system
Embodiments of the present invention are directed to methods and systems for performing a secure authentication process by leveraging the historical transaction...
US-9,996,792 Data carrier
The present invention relates to a data carrier, especially a security document, such as an identification card, comprising authentication data comprising...
US-9,996,711 Asset protection of integrated circuits during transport
An integrated circuit (IC) provisioned for asset protection has a primary circuit portion, such as a microprocessor or system-on-chip, that can be selectively...
US-9,996,709 Secure computer architecture
A secure computer architecture is provided. With this architecture, data is received, in a component of an integrated circuit chip implementing the secure...
US-9,996,705 Determining potential sharing of private data associated with a private network domain to improve data security
Techniques for determining potential sharing of private data are described herein. The techniques may include identifying content having computer readable...
US-9,996,698 Automated management of confidential data in cloud environments
A shared networked storage may be separated from a key vault system. A storage request with data to be stored and the storage request with a confidentiality...
US-9,996,692 Method and system for using principal components analysis (PCA) to display trends in aircraft cyber events in...
A system, method, and computer readable media for using principal components analysis (PCA) to graphically display cyber event information about an aircraft or...
US-9,996,688 Systems and methods for controlling access to computer applications or data
Solutions for controlling access to computer applications or data are disclosed. For instance, certain systems advantageously secure access to applications and...
US-9,996,679 Methods and apparatus for device authentication and secure data exchange between a server application and a device
In some embodiments, a method includes sending an authentication request to a client device to obtain a utilization code in response to a request from the...
US-9,996,377 Virtual machine migration via a mobile device
Embodiments relate to virtual machine (VM) migration via a mobile device. A method includes requesting, by a mobile device, a source computer to capture a state...
US-9,996,376 Virtual machine monitoring method and system thereof
A virtual machine monitoring method and a system thereof are provided. The virtual machine monitoring method includes: detecting at least one hardware resource...
US-9,996,309 Method and apparatus for providing search information
The present disclosure relates to technologies for sensor networks, machine-to-machine (M2M), machine-type communication (MTC), and Internet of things (IoT)....
US-9,994,380 Ruggedized enclosure for data storage device
The embodiments provide a rugged enclosure for an external drive. The enclosure is configured to provide shock protection and protect the external drive from...
US-9,993,737 Constructing social networks using monitored game play
Features are described to use data from game play to construct social networks of users. For example determining that a user played a game with a certain...
US-9,993,080 Beam mounted chair assembly
Beam mounted chair assemblies may include at least two standards supported on a floor, a beam secured to, and supported by, the standards, and a plurality of...
US-9,992,814 Secure toll-free application data access
Secure toll-free application data network access is disclosed. Respective limits for registered traffic (e.g., application provider addresses; content type;...
US-9,992,683 Secure communications with wearable devices
Various embodiments described herein include systems and methods directed towards allowing a wearable device with one or more sensors to communicate with a...
US-9,992,670 Machine-to-machine cellular communication security
Facilitating authentication on communication between a mobile terminal and a server is achieved. The communication is made through a Serving GPRS Support Node...
US-9,992,378 Image forming system with external apparatus, image forming apparatus and projector
Provided is an image forming system that simply and securely protects printed matter that is not so important, but that the user does not wish others to view....
US-9,992,234 System for providing DNS-based control of individual devices
A device control system is associated with individual devices connected through a network control point to a gateway and thereby to the Internet. The gateway...
US-9,992,233 Enhanced firewall and method for securing internet communications
A system and method are described for securing a network-connected device from a hacker having access to a network to which the network-connected device is...
US-9,992,231 Method and apparatus for data protection in cloud-based matching system
Enhanced security is provided for cloud based matching systems by using the principle of Independence of Irrelevant Alternatives (IIA). The client uses IIA to...
US-9,992,227 Secure remote maintenance and support system, method, network entity and computer program product
A remote, secure maintenance and support system, method, network entity and computer program product are provided. The system can include site terminal(s)...
US-9,992,220 Graphical display of events indicating security threats in an information technology system
A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.