Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,005,1716 Lighting control apparatus and method
A lighting control apparatus (106) may include an accelerometer (118), a wireless communication interface (112), and a secure connection (125) for securing the...
US-1,005,1661 Method and apparatus for communicating using unlicensed bands in mobile communication system
The present disclosure relates to a communication method and system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data...
US-1,005,1465 Method and system for securely transferring a message
In a method and system for securely transferring a message (N) from a transmitter unit (SE) to a receiver unit (EE), a message sent by a transmitter unit (SE)...
US-1,005,1464 Apparatus and methods for electronic subscriber identity module (ESIM) installation and interoperability
Methods and apparatus for managing processing of electronic Subscriber Identity Modules (eSIM) data at a mobile device are disclosed. An eSIM management entity...
US-1,005,1231 Arrangement for, and method of, securing a data capture session of a portable data capture device
A sensor senses when a portable, handheld data capture device has been dropped from a user's hand and is in free fall in a venue. A control system automatically...
US-1,005,1146 Verifiable check and security document system
A secured document with a security architecture having a plurality of security elements for authentication, wherein at least one security element is printed...
US-1,005,1112 Non-intrusive user authentication system
A system for secure user authentication of a mobile electronic device includes a touch-based user interface of the mobile electronic device, a processor, and a...
US-1,005,1111 Separating sensitive data from mobile devices for theft prevention
Concepts and technologies are disclosed herein for separating sensitive data from mobile devices for theft prevention. According to one aspect, a system...
US-1,005,1035 Method and apparatus for providing secure file transmission
An approach is provided for enabling the transmission of files independent of a file transfer application or the throughput capabilities of the sending or...
US-1,005,1007 Network traffic control device, and security policy configuration method and apparatus thereof
A network traffic control device, and a security policy configuration method. The network traffic control device identifies a source, a destination, and an...
US-1,005,1001 Efficient and secure user credential store for credentials enforcement using a firewall
Techniques for an efficient and secure store for credentials enforcement using a firewall are disclosed. In some embodiments, a system, process, and/or computer...
US-1,005,0981 Attack detection through signal delay monitoring
The present disclosure is directed to attack detection through signal delay monitoring. An example system may comprise at least one device including a physical...
US-1,005,0978 Systems and methods for securing command and data interfaces to sensors and devices through the use of a...
Various embodiments of the invention increase security of a network of interoperable devices. In certain embodiments, this is accomplished by a security module...
US-1,005,0970 System and method for data center security enhancements leveraging server SOCs or server fabrics
A data center security system and method are provided that leverage server systems on a chip (SOCs) and/or server fabrics. In more detail, server interconnect...
US-1,005,0964 Method and system for securing data communicated in a network
According to a first aspect of the present disclosure, a method is conceived for securing data communicated in a network, the method comprising: receiving, by a...
US-1,005,0959 Synthetic genomic variant-based secure transaction devices, systems and methods
Various devices, systems, structures and methods are disclosed related to securely authorizing a transaction by synchronizing digital genomic data with...
US-1,005,0956 System architecture and method for guaranteeing network information security
Disclosed is a system architecture and method for guaranteeing network information security, the system architecture including the Internet, a program...
US-1,005,0955 Efficient start-up for secured connections and related services
One embodiment of the present invention includes an approach for efficient start-up for secured connections and related services. A client machine receives, via...
US-1,005,0946 Secured data transmission using identity-based cryptography
A system is provided for secure data transmission. The system stores a public master key, private decryption key and secure messaging module for securely...
US-1,005,0938 Highly secure firewall system
A firewall system with closed ports configured to reject the data packets and create a readable log of rejected data packets. A port listening processor...
US-1,005,0936 Security device implementing network flow prediction
A security device for processing network flows is described, including: one or more packet processors configured to receive incoming data packets associated...
US-1,005,0933 Structural data ferry system
A system allowing computers to be un-connected to the internet or networks generally while still allowing computers to share data on networks. By creating a...
US-1,005,0899 Data processing method, apparatus, client, server and system
The present invention discloses a data processing method, apparatus, client, server and system, which belong to the field of computer technologies. The method...
US-1,005,0881 Method and apparatus for transmitting and receiving data in communication system
Disclosed is a technology for a sensor network, Machine to Machine (M2M), Machine Type Communication (MTC), and Internet of Things (IoT). The present disclosure...
US-1,005,0791 Method for verifying the identity of a user of a communicating terminal and associated system
A method for verifying identity of a user of a communicating terminal, including: a preliminary operation including: communicating a first piece of identity...
US-1,005,0785 Secure threshold decryption protocol computation
The present invention relates to a method of converting an encrypted data set into an encryption of individual bits representing the data set. Further, the...
US-1,005,0784 System and method for generating a cryptographic key
A system and method for generating a cryptographic key using a sequence of data segments selected by a user from one or more data resources. Raw data from the...
US-1,005,0780 Securely storing data in a data storage system
A data file is encrypted with a file-specific encryption key and sent to a remote data storage system. The file-specific encryption key is encrypted with a...
US-1,005,0456 Mobile handset recharge
Methods and devices for connecting a mobile device with different data storage devices located either locally or remotely are provided. The device may apply one...
US-1,004,9766 Method and apparatus for secure setup of clinical trial client device
A method, device and system for transceiving clinical trial related information includes a client device and a server that communicate. An application of the...
US-1,004,9533 Physical security system for computer terminals
A computer terminal located in an environment may include an actuator, retractable privacy barrier attached to the computer terminal by the actuator, a display,...
US-1,004,9523 Method and device for detecting overlapped bank notes
A method for detecting overlapped bank notes is provided. The method includes: step 10, collecting original image data of bank notes; step 20, performing...
US-1,004,9405 System and method for specified pool trading
A computer system and related methods configured to store and deliver, upon request, information related to asset-backed security pools, and execute...
US-1,004,9394 Apparatus and method for performing secure transactions with a digital device
Method to perform secure transactions with a digital device starts with microphone receiving signal generated by the digital device. Signal includes product...
US-1,004,9357 System and method of processing PIN-based payment transactions via mobile devices
A system and method for using a Personal Identification Number ("PIN") to authenticate payment transactions via a mobile device coupled to a reader device is...
US-1,004,9225 Data access control systems and methods
Various hardware and software configurations are described herein which provide improved security and control over protected data. In some embodiments, a...
US-1,004,9221 Management of application access
Concepts and technologies are disclosed herein for management of application access. A security management application can be configured to set access controls...
US-1,004,9214 Systems and methods for detecting malicious processes on computing devices
The disclosed computer-implemented method for detecting malicious processes on computing devices may include (i) identifying a portion of data on a computing...
US-1,004,9201 Physical token-less security screening using biometrics
In physical token-less security screening using biometrics, a person provides biometric data to a security computing device as part of a security screening. The...
US-1,004,9137 Methods and systems for optimizing text searches over structured data in a multi-tenant environment
Search systems and methods for searching structured data and enhancing the relevancy of search results provided to a requesting user or application. Enhanced...
US-1,004,5737 Clip-on device with inward-facing cameras
In order to enable collection of data from a head-mounted inward-facing camera, a clip-on device is attached to eyeglasses. The clip-on device optionally weighs...
US-1,004,5208 Method and apparatus for secured social networking
Various methods are described for using a local trust level and/or a general trust level to control access of data in PSN. Any PSN user can select other users...
US-1,004,5207 Apparatus for secure hearing device communication and related method
The disclosure provides a client device for hearing device communication and related method. The client device comprises a processing unit, a memory unit, and...
US-1,004,5201 Inter-network operator roaming policy configuration in mobile wireless data networks operated by cooperating...
A method carried out by communications between a home roaming configuration server and a visited roaming configuration server is described that facilitates...
US-1,004,5156 Physical security system and method
Systems (100) and methods (110) for operating a physical security surveillance system. The methods involve: detecting the constant unencrypted radio...
US-1,004,5095 Communication processing device, communication method, and communication system
Provided are a communication processing device and a communication system, capable of securely updating a communication protocol process with a simple...
US-1,004,4780 Dynamic segregated secure data connection
A system can perform operations including receiving a first data stream from a first device, wherein the first data stream is associated with an active session...
US-1,004,4745 Systems for computer network security risk assessment including user compromise analysis associated with a...
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for computer network security risk assessment. One of the...
US-1,004,4551 Secure cloud management agent
Embodiments relate to providing a secure management agent for high-availability continuity for cloud systems. An aspect includes receiving operating parameters...
US-1,004,4550 Secure cloud management agent
Embodiments relate to providing a secure management agent for high-availability continuity for cloud systems. An aspect includes receiving operating parameters...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.