Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,034,8682 Transparent traffic control device and method
A firewall security platform is provided for enhancing security of a network. The firewall security platform includes at least one interface to communicate the...
US-1,034,4996 Method and apparatus for controlling energy in HVAC system
The present disclosure relates to a sensor network, Machine Type Communication (MTC), Machine-to-Machine (M2M) communication, and technology for Internet of...
US-1,034,3697 Driver assistance system and method for automatically logging log data
A driver assistance system and a method for automatically logging a transition of the responsibility during a status change between fully automatic operation...
US-1,034,1327 Enabling secure connections by managing signer certificates
Embodiments provide a system for managing security certificates, thereby enabling secure connections between systems. Embodiments collect data; authenticate to...
US-1,034,1315 Management of access sessions
Disclosed are examples of managing access sessions for a computing device. In some examples, a key is generated using a code obtained through a user interface....
US-1,034,1309 Cryptographically protecting data transferred between spatially distributed computing devices using an...
Aspects of the disclosure relate to a system and method for cryptographically protecting data transferred between spatially distributed computing devices. An...
US-1,034,1305 Encrypted communications method and communications terminal, and computer storage medium
Disclosed are an encrypted communications method and communications terminal. The method comprises: reading from a first NFC security label the encryption...
US-1,034,1118 SSL gateway with integrated hardware security module
A security network system may include a security gateway operable to establish a client session between the security gateway and a client device. The security...
US-1,034,1108 Secure permanent integrated circuit personalization
Methods, systems and devices for using charged particle beams (CPBs) to write different die-specific, non-volatile, electronically readable data to different...
US-1,034,1015 Secure fiber optic seals enabled by quantum optical communication concepts
Described herein are various technologies pertaining to detecting tampering of a seal based upon quantum optical communication via a communications channel...
US-1,033,9506 Method and system for a secure registration
Methods and apparatus for secure registration to enable transactions between a first user and a vendor that is facilitated by a payment server are disclosed....
US-1,033,9339 Securely storing and distributing sensitive data in a cloud-based application
Techniques to securely store and retrieve data are disclosed. In various embodiments, a process of retrieving secure data includes receiving a request, where...
US-1,033,4439 Method and apparatus for authenticating users in internet of things environment
The present disclosure relates to a sensor network, machine type communication (MTC), machine-to-machine (M2M) communication, and technology for Internet of...
US-1,033,4019 Method and associated server for ensuring data security under high access efficiency
A server includes a HTTP module and a CGI module, where the HTTP module includes a configuration file, and the configuration file describes an application that...
US-1,033,1891 Branch target computation in secure start-up using an integrity datum and an adjustment datum
Embodiments related to conducting and constructing a secure start-up process are disclosed. One embodiment provides, on a computing device, a method of...
US-1,033,1881 User-mode component injection techniques
Techniques are described herein for loading a user-mode component of a security agent based on an asynchronous procedure call (APC) built by a kernel-mode...
US-1,033,1609 System for exchanging information between wireless peripherals and back-end systems via a peripheral hub
Wireless peripherals may be used by workers to facilitate communication, data entry, data visualization, safety, and security. Typically, these peripherals must...
US-1,033,1478 Secure data onboarding agent network
A data onboarding network includes a data onboarding configurator to generate a number of data onboarding objects, each of these data onboarding objects...
US-1,032,7706 Near field telemetry link for passing a shared secret to establish a secure radio frequency communication link...
Pairing is provided between first and second wireless devices in a physiological condition management system. The first and second wireless devices are placed...
US-1,032,7526 Carrying devices with built-in security system
A carrying device with a built-in security system including a security unit (10) having components housed in an integral unit, where the components include a...
US-1,032,7479 System and method for an improved personal vapourization device
A vape device system including a payload reservoir that is identified by a payload identifier and that is configured to hold a substance for atomization. A...
US-1,032,6841 Remote data securement on mobile devices
A server determines a status of a client device, wherein if the client device violates the compliance rule, the server accesses a device record established by...
US-1,032,6786 Methods for using organizational behavior for risk ratings
Among other things, traces are received of activities of an online user who is associated with an entity. By analysis of the traces a security state of the...
US-1,032,4862 Supporting oversubscription of guest enclave memory pages
Implementations of the disclosure provide for supporting oversubscription of guest enclave memory pages. In one implementation, a processing device comprising a...
US-1,032,1824 Patient monitor screen aggregation
A remote interface system according to some embodiments includes one or more patient monitoring devices having one or more sensors for patient monitoring, one...
US-1,032,1503 Method and apparatus for attaching a remote unit to a mobile core network via a standalone untrusted non-3GPP...
A method and apparatus attach a remote unit to a mobile core network via a standalone untrusted non-3GPP access network. A remote unit can be communicated with...
US-1,032,1309 Apparatuses and methods for wireless communication
One feature pertains to a method operational at a device. The method includes performing key agreement with a core network device, and generating an...
US-1,032,0789 Fast and secure way to fetch or post data and display it temporarily to a user
A method for interacting with one or more data resources is disclosed which decreases necessary user actions and improves security. In one embodiment, the...
US-1,032,0787 System and method of facilitating the identification of a computer on a network
A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may...
US-1,032,0784 Methods for utilizing fingerprinting to manage network security and devices thereof
Methods, non-transitory computer readable media, and security management computing devices are disclosed herein. With this technology, an executable code is...
US-1,032,0776 Protection of application passwords using a secure proxy
Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server....
US-1,032,0775 Eliminating abuse caused by password reuse in different systems
Methods, systems, and computer program products for eliminating abuse caused by password reuse in different computer systems are disclosed. For example, a...
US-1,031,8741 Data security and risk ranking tool
A risk ranking tool includes a retrieval engine, a data risk engine, an operational risk engine, and a data security engine. The data risk engine calculates,...
US-1,031,4216 Method of fabricating electronic cards including at least one printed pattern
The invention relates to a method for fabricating electronic cards by A) forming a plurality of card bodies in the form of a thick sheet with a plurality of...
US-1,031,3890 Method and device for receiving service through different wireless communication systems
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-1,031,3385 Systems and methods for data driven game theoretic cyber threat mitigation
System and methods for a data-driven security game framework that models an attacker based on exploit market data actively mined from the darknet to develop...
US-1,031,2957 Communication method and apparatus for wearable device in wireless communication system
The present invention relates to a technology for a sensor network, machine to machine (M2M) communication, machine type communication (MTC), and the Internet...
US-1,031,2940 Data processing apparatus and data processing method
The present technology relates to a data processing apparatus and a data processing method that are able to secure good communication quality in data...
US-1,030,6596 Method and system for connectionless transmission during uplink and downlink of data packets
A method and system for uplink-downlink transmission of data packets in a wireless cellular network, during idle state of User Equipment (UE) using ...
US-1,030,6526 Method and apparatus for controlling handover in a wireless communication system
A method and apparatus is provided that controls the handover between distributed units (DUs) (inter-DU handover) in an eNB including a central unit (CU) and a...
US-1,030,6520 Handover method between heterogeneous wireless communication techniques and device for same
The present invention relates to a handover method between heterogeneous wireless communication techniques and a device for same. A wireless access device is...
US-1,030,6500 Method and device for controlling data traffic during access to wireless LAN and cellular network
A communication method for incorporating an IoT technique with a 5G communication system for supporting a higher data transmission rate in comparison with a 4G...
US-1,030,6470 System and method for validating authenticity of base station and/or information received from base station
A communication method and a system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data rates beyond a 4.sup.th-Generation...
US-1,030,6465 Protecting sensitive data in a security area
Managing data security on a mobile device. Data associated with a mobile device is received; the data includes an identification (ID) of the mobile device and a...
US-1,030,6463 Secure data link for subscriber identification module (SIM)-based processor
The subject matter described herein includes methods, systems, and computer program products for providing a bi-directional data path to a SIM containing an...
US-1,030,6187 Adjustable movement detection doorbell
Systems, apparatuses, and methods relating to security system and automation monitoring are described. In one embodiment a method may include receiving motion...
US-1,030,6023 Pre-formed instructions for a mobile cloud service
Methods, systems, and computer readable mediums are disclosed for introducing pre-formed instruction sets to a mobile cloud service. In some examples, an...
US-1,030,6012 Secure network access to infusion pump
A system for secure network access to an infusion pump has an infusion pump and a server computer. The infusion pump includes a network interface circuit...
US-1,030,5995 Techniques for device independent session migration
Techniques for device independent session migration are presented. A secure mechanism is presented for a target device to receive a current authenticated...
US-1,030,5937 Dividing a data processing device into separate security domains
This invention provides secure, policy-based separation of data and applications on computer, especially personal computers that operate in different...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.