Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,044,0565 System and method of counter management and security key update for device-to-device group communication
A system and a method of counter management and security key update for device-to-device (D2D) communication are provided. The method includes creating by a...
US-1,044,0123 Method and system for secure bidirection communication for industrial devices
A method and system for establishing bidirectional remote communication between a Remote Service Portal and a plurality of drives is described. The method and...
US-1,044,0056 Method for deploying an application in a secure element
Method for deploying an authentication application in a secure element of a communication terminal comprising a non-secure processing unit executing a program...
US-1,044,0047 Systems and methods for mapping internet protocol addresses for an organization
The disclosed computer-implemented method for mapping Internet Protocol addresses for an organization may include (1) receiving information for an organization...
US-1,044,0042 Domain feature classification and autonomous system vulnerability scanning
In an embodiment, a data processing method providing an improvement in computer security, comprises selecting, from a domain name queue comprising a plurality...
US-1,044,0039 Delayed replication for protection of replicated databases
Apparatuses and methods are disclosed for protection of data servers configured for data replication of a database. As an example, one apparatus includes at...
US-1,044,0017 Secure health data storage and transaction system
Embodiments of the invention are directed to a system, method, or computer program product for a transaction apparatus for secure data storage and consolidation...
US-1,044,0014 Portable secure access module
Examining virtualized credentials of a holder includes verifying authenticity of a device of a relying party using a verifying device secret that is provided in...
US-1,044,0000 Secure data provisioning
A first instruction to store an entity identification (ID) in a memory of a device may be received. The entity ID may be stored in the memory in response to...
US-1,043,9999 Point-to-point secure data store and communication system and method
A method for encryption of a private media package by a first processing device which includes at least three key components of a regret management flag, a...
US-1,043,9991 Communicating with a machine to machine device
The present disclosure provides a bootstrapping server, a network application function (NAF), a system and methods for establishing secure communication between...
US-1,043,9956 Network path selection for routing data
Apparatus and methods concerning routing of data in a network disclosed. In an example embodiment, an apparatus includes a network interface circuit connected...
US-1,043,9822 Multi-user strong authentication token
Apparatus, methods and systems to secure remotely accessible applications using authentication devices are disclosed. More in particular apparatus, methods and...
US-1,043,9815 User data validation for digital identifications
In general, one innovative aspect of the subject matter described in this specification may be embodied in methods that may include validating user data pages...
US-1,043,9806 Method and system for secure data transmission
One embodiment described herein provides a system and method for establishing a secure communication channel between a client and a server. During operation,...
US-1,043,9799 System and method for automating indirect fire protocol using fully homomorphic encryption
Indirect fire protocol according to several embodiments of the present invention can include the initial step establishing a grid and locating a forward...
US-1,043,9755 Systems and methods for securing wireless communications
Systems and methods of friendly jamming for securing wireless communications at the physical layer are presented. Under the assumption of exact knowledge of the...
US-1,043,9654 Systems, methods and computer program products including features of transforming data involving a secure...
Systems and methods are disclosed for processing data. In one exemplary implementation, there is provided a method of generating H output data from W data input...
US-1,043,8464 Systems and methods for determining and verifying a presence of an object or an intruder in a secured area
Systems and methods for determining and verifying a presence of an object or an intruder within a secured area are provided. Such systems and methods tan...
US-1,043,8209 System for secure routing of data to various networks from a process data network
Embodiments enable a block chain distributed network arrangement system for facilitating a tiered dedicated block chain configuration to provide differing...
US-1,043,8190 Devices with on-board physically unclonable functions
An electronic device may include a printed circuit board having a physically unclonable function (PUF) source. The electronic device may also include an...
US-1,043,8104 System and apparatus for encrypted data collection using RFID cards
A secure smart card is described. The smart card can include a processor, a memory and a transceiver. The smart card can communicate with various terminals and...
US-1,043,8032 Data-securing chip card construction
A card may store data on an integrated circuit housed within the card. The card includes at least two antennas that are configured to transmit the data....
US-1,043,8029 Mobile device and reader for facilitating a transaction
According to a first aspect of the present disclosure, a mobile device for facilitating a transaction is provided, comprising: a secure element configured to...
US-1,043,8023 Pipeline processor data and attribute register, secure emulation logic, gating
The present disclosure describes systems and methods for controlling access to secure debugging and profiling features of a computer system. Some illustrative...
US-1,043,8012 Interface to generate data compatible with an external system in an oil and gas asset supply chain
The present disclosure generally relates to an interface system and method of interfacing to generate data compatible with an external system in an oil and gas...
US-1,043,8008 Row level security
A system and method of enabling row level security through security policies is disclosed herein. In this system and method, a computing device may be...
US-1,043,8006 Secure information storage
Embodiments of the disclosure include systems and methods for secure storage and/or retrieval of customer secrets by, e.g., a cloud services provider. According...
US-1,043,8005 Device, system, and method for protecting cryptographic keying material
A device, system, and method protects cryptographic keying material. The method is performed at an electronic device including a plurality of components housed...
US-1,043,8003 Secure document repository
Embodiments for secure data storage that include systems and methods that receive, from a second system maintained by a second entity, a data payload to be...
US-1,043,8002 Field-bus data transmission
A communication subscriber for a field-bus system for transmitting data, comprises a safety layer with an error-safety layer protecting the data against random...
US-1,043,8001 Identification, prediction, and assessment of cyber security risk
A technique for assessing and quantifying a cyber security risk is provided that includes a cyber resilience platform for obtaining reliable data from a vast...
US-1,043,7985 Using a second device to enroll a secure application enclave
A method, apparatus, and computer-readable medium are provided to determine whether to enroll a computing device as a provider of a secure application enclave...
US-1,043,7980 Method and apparatus for making a decision on a card
Method and devices for making access decisions in a secure access network are provided. The access decisions are made by a portable credential using data and...
US-1,043,7741 Loading control method and system storage device
A loading control method and system for a storage device are disclosed. The method includes: judging whether a storage controller is valid through a first bus,...
US-1,043,7723 Method of flushing the contents of a dynamic redundancy register to a secure storage area during a power down...
A method of writing data into a memory device is disclosed. The method comprises utilizing a pipeline to process write operations of a first plurality of data...
US-1,043,3743 Method for secure physiological data acquisition and storage
A method for secure physiological data acquisition and storage is provided. An identifier of a physiological monitoring device that is configured to store the...
US-1,043,3324 Method and apparatus for allocating resource in wireless communication system
A communication method and a system for converging a 5th-generation (5G) communication system for supporting higher data rates beyond a 4th-generation (4G)...
US-1,043,3165 Method for configuring and transmitting key
The present application discloses a method for configuring and transmitting a key, which includes that: a) a serving cell (PCell) of UE determines a key (KeNB)...
US-1,043,3100 Systems and methods for correction of geographic inconsistency in item properties
Methods, systems, and non-transitory computer readable media are correction of geographic inconsistency in item properties. A system identifies locations of...
US-1,043,2803 Image formation system including encoded image generation device and image formation device
An image formation system includes: an encoded image generation device including a first processor that generates print data from manuscript data, sets security...
US-1,043,2697 Method and system for re-deploying metadata and associated data from a source organization to a destination...
Methods and systems are provided for re-deploying metadata and it's associated data from a source organization to a destination organization of a cloud-based...
US-1,043,2674 Scalable network security with fast response protocol
This disclosure provides a network security architecture that permits installation of different software security products as virtual machines (VMs). By relying...
US-1,043,2673 In-channel event processing for network agnostic mobile applications in cloud based security systems
Systems and methods in a mobile device communicatively coupled to a cloud based security system, the method for detecting and processing in-channel events...
US-1,043,2672 Detection of offline attempts to circumvent security policies
Disclosed are approaches for detecting attempts to circumvent security policies on a client device. A deletion of a user account on a computing device is...
US-1,043,2669 Security appliance to monitor networked computing environment
A system and method to evaluate a software defined infrastructure is disclosed. A security appliance is used to evaluate the software defined infrastructure....
US-1,043,2668 Selectable encryption methods
A secure mobile financial transaction is provided by receiving, over a communication network, a list of protection mechanisms available for implementation by an...
US-1,043,2663 Electronic security keys for data security based on quantum particle states that indicates type of access
Systems and method for determining for determining the type of unauthorized access that occurs when a quantum-level encrypted message is tampered with or...
US-1,043,2660 Advanced cybersecurity threat mitigation for inter-bank financial transactions
A system for mitigation of cyberattacks employing an advanced cyber decision platform comprising a time series data store, a directed computational graph...
US-1,043,2656 Method and system for assessing data security
A method and system for conducting simulated phishing attacks. This may include identifying a target device from a list, such as a corporate directory, and...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.