Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,015,4444 Method and apparatus for improving handover success rate
The present disclosure relates to a communication technique for combining a 5G communication system for supporting a higher data transmission rate after a 4G...
US-1,015,4408 System and method for providing a public number-private number telephony system
This invention shows a method for operating a voice communications network that comprises dynamically associating a private number with at least one public...
US-1,015,4398 Methods and systems for node selection in multihop wireless sensor networks
A method and system for node selection in a multihop wireless sensor network is disclosed. The method includes: determining, at a source node, a leftover energy...
US-1,015,4084 Hybrid applications utilizing distributed models and views apparatuses, methods and systems
The HYBRID APPLICATIONS UTILIZING DISTRIBUTED MODELS AND VIEWS APPARATUSES, METHODS AND SYSTEMS ("HAP") transform hybrid application user inputs using HAP...
US-1,015,4066 Context-aware compromise assessment
Assessing compromises of data security is achieved by establishing access control policies for data files in storage devices across an enterprise. A list is...
US-1,015,4062 Rule lookup using predictive tuples based rule lookup cache in the data plane
This disclosure describes an approach to handle packets that arrive at a network security device, such as a router. At a data plane of the security device,...
US-1,015,4047 Method and system for generating a kill chain for monitoring computer network security
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,015,4044 Method, system, and computer program product for providing security and responsiveness in cloud based data...
A storage controller that is coupled to a plurality of storage clouds is maintained. The storage controller determines security requirements for performing a...
US-1,015,4037 Techniques for implementing a data storage device as a security device for managing access to resources
Techniques are disclosed for implementation of a data storage device as a security device for managing access to resources. These techniques can be implemented...
US-1,015,4031 User-wearable secured devices provided assuring authentication and validation of data storage and transmission
Described are user-wearable devices utilizing encryption authentication techniques to ensure security of any data transmission to and from these devices. In...
US-1,015,4028 Systems and methods for authenticating users accessing a secure network
Systems and methods are disclosed for providing an unregistered user with access to a network in a secure and efficient manner. A random, on-demand password is...
US-1,015,4021 Securitization of temporal digital communications with authentication and validation of user and access devices
One more devices and/or access control systems are described that securitize data and data transmissions using three sets of computing operations including...
US-1,015,4016 Devices for transmitting and communicating randomized data utilizing sub-channels
The disclosure provides for two or more transceiver devices and a system that utilizes one or more encrypters and one or more decrypters comprising one or more...
US-1,015,4014 Method and system for efficient encryption, transmission, and decryption of video data
One embodiment provides a system for efficiently and securely encrypting, transmitting, and decrypting video data, including selective encryption of image...
US-1,015,4011 Secure data sharing with publicly accessible computing nodes
An embodiment of the invention includes determining a first security status for first information and a second security status for second information, the...
US-1,015,3983 Optimum resource routing using contextual data analysis
Systems, apparatus are defined that provide for determining optimal resource channels for delivering resources using contextual and prior usage data analysis....
US-1,015,3906 Systems and methods for implementing computer security
A security server transmits a specification of a first set of files and directories to a computing device for monitoring according to a security policy. Each of...
US-1,015,3902 Secure data transmission using natural language
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for secure data transmission using natural language. One of the...
US-1,015,3898 Wireless mesh network with secure automatic key loads to wireless devices
A wireless mesh network provides secure communication by encrypting data using one or more encryption keys. A configuration device in communication with a...
US-1,015,3895 Homomorphic database operations apparatuses, methods and systems
The HOMOMORPHIC DATABASE OPERATIONS APPARATUSES, METHODS AND SYSTEMS ("HEDO") transform transaction storage requests and homomorphic model queries using HEDO...
US-1,015,2868 Smart bedtime
A method for security and/or automation systems is described. In one embodiment, the method may include receiving occupancy data, identifying characteristics of...
US-1,015,2861 Wireless security camera system
A security camera system, comprising wireless communication components for communicating over first and second wireless communications, and a digital camera...
US-1,015,2860 Monitoring smart devices on a wireless mesh communication network
A surveillance system and method with at least one wireless input capture device ICD(s) and a corresponding digital input recorder (DIR) and/or another ICD,...
US-1,015,2749 Systems and methods for trading a trade list in financial markets
Systems and methods are provided for maintaining neutrality while trading a list of securities using an algorithmic trading facility coupled with at least one...
US-1,015,2746 Flexible security system for cash-in-transit
There is provided an adaptive access-control and monitor system that comprises at least one portable communication device, further comprising, a transceiver...
US-1,015,2706 Secure NFC data authentication
A mobile device includes a wireless transceiver, a host processor, a secure element (SE), and a near field communication (NFC) system having an NFC transceiver...
US-1,015,2618 Reader, writer and method for programmable tags
A tag writer, reader and method are disclosed. The tag writer is operable to generate a security identifier during writing of data to the tag, the security...
US-1,015,2607 Secure access to hierarchical documents in a sorted, distributed key/value data store
Policy-based, cell-level access control is provided in association with a sorted, distributed key-value data store. As data representing a hierarchical document...
US-1,015,2605 Systems and methods for front-end and back-end data security protocols
A security framework and methodology is provided which provides front-end security through authentication and authorization, and back-end security through a...
US-1,015,2581 Methods and systems for data entry
User identities, password, etc. represent the barrier between a user's confidential data and any other third party seeking to access this data. As multiple...
US-1,015,2524 Wavefront muxing and demuxing for cloud data storage and transport
Security on data storage and transport are important concerns on cloud computing. Wavefront multiplexing/demultiplexing process (WF muxing/demuxing) embodying...
US-1,015,2465 Security-focused web application crawling
Various embodiment methods for performing security-focused web crawling by a server may include identifying sensitive data on a first web page, and generating a...
US-1,015,2268 System and methods for replication resource management in asymmetric secure multi-tenancy deployments in...
A method for replicating data from a plurality of storage systems to a target storage system. The method implemented at the target storage system receives a...
US-1,015,2257 Random number generation in ferroelectric random access memory (FRAM)
Disclosed embodiments relate to generating random numbers using two transistor, two capacitor (2T-2C) ferroelectric memory cells. In accordance with one...
US-1,014,9653 Secure patient data recorder for recording monitored vital sign data
A monitor and recorder system having a monitor unit for gathering vital sign data from a patient and a memory module for automatically recording the data. Means...
US-1,014,9398 Method for improving fire prevention performance of vehicle-carried data recording device and protection device...
A method for improving fire prevention performance of a vehicle-carried data recording device and a protection device thereof are provided, where the method...
US-1,014,9344 Device and method of handling a radio resource control state change
A communication device for handling a radio resource control (RRC) state change comprises a storage unit for storing instructions and a processing circuit,...
US-1,014,9333 Communication data processing method, apparatus, and system
Embodiments of the present invention provide a communication data processing method, an apparatus, and a system. A communication data processing method...
US-1,014,9197 Methods and apparatus for secure connectionless uplink small data transmission
Certain aspects of the present disclosure generally relate to techniques for secure connectionless uplink transmissions by a wireless device. Such techniques...
US-1,014,9154 Apparatus and method for sharing WiFi security data in an internet of things (IoT) system
An apparatus for connecting an Internet of Things (IoT) hub to a wireless network, the apparatus including: 1) a security module to generate a first secret and...
US-1,014,9153 Wireless communication system
A wireless communication system comprises two communication units (101, 03) which exchange public key identification data using both Near Field Communication...
US-1,014,9150 Updating profiles for secondary wireless devices
Techniques to manage updates for eSIMs of a secondary wireless device are disclosed. Responsive to a user input, expiration of a timer, receipt of a message...
US-1,014,9144 Simulacrum of physical security device and methods
Described herein is a simulacrum security device and methods. In one embodiment, a simulacrum or likeness of a physical security device is provided for use in...
US-1,014,8915 Lighting system with monitoring and alarm function
The invention relates to the field of security, more particularly, to a lighting system with monitoring and alarm function. The illuminating module can supply...
US-1,014,8761 System-on-chip data security appliance and methods of operating the same
System-on-chip data security appliance ("SoC-DSA") and methods of operating the same. In one embodiment, the SoC-DSA includes data security mechanisms enclosed...
US-1,014,8752 Enterprise level security orchestration
Enterprise level security orchestration coordinates the safeguarding functions of safeguard software packages with respect to an installation. Multiple...
US-1,014,8736 Executing parallel jobs with message passing on compute clusters
A client may submit a job to a service provider that processes a large data set and that employs a message passing interface (MPI) to coordinate the collective...
US-1,014,8732 Secure remote computer network
A method of distributing data over multiple Internet connections is provided. The method includes the steps of: (a) providing a client computer with access to a...
US-1,014,8697 Unified host based security exchange between heterogeneous end point security agents
In one embodiment, a system includes a processing circuit and logic integrated with and/or executable by the processing circuit. The logic is configured to...
US-1,014,8686 Telemetry analysis system for physical process anomaly detection
Systems, methods, and apparatus, including computer programs encoded on computer storage media, for analyzing telemetry data from physical process sensors to...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.