Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,017,6418 System and apparatus for encrypted data collection using RFID cards
A secure smart card is described. The smart card can include a processor, a memory and a transceiver. The smart card can communicate with various terminals and...
US-1,017,6334 Data security using alternative encoding
A system and method for protecting text from unauthorized access. An original data set including a plurality of character code values is received, where each...
US-1,017,6329 Systems and methods for detecting unknown vulnerabilities in computing processes
The disclosed computer-implemented method for detecting unknown vulnerabilities in computing processes may include (1) monitoring a computing environment that...
US-1,017,6319 Maintaining secure clustered software with a container-based architecture
The subject matter of this specification can be implemented in, among other things, a method that includes receiving, by a processing device in a...
US-1,017,6317 Method and apparatus for managing super user password on smart mobile terminal
The present invention discloses a method and an apparatus for managing a super user password on a smart mobile terminal, wherein the method for managing the...
US-1,017,6310 System and method for privacy-enhanced data synchronization
A system, apparatus, method, and machine readable medium are described for establishing a trust circle between multiple devices. For example, one embodiment of...
US-1,017,6305 Method and system for secure distribution of selected content to be protected
The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related...
US-1,017,6122 Direct memory access authorization in a processing system
A processor employs a hardware encryption module in the memory access path between an input/out device and memory to cryptographically isolate secure...
US-1,017,5911 Image file distribution apparatus, image file recovery apparatus, image file distribution method, image file...
Provided are an image file distribution apparatus, an image file recovery apparatus, an image file distribution method, an image file recovery method, an image...
US-1,017,5771 Secured compact keyboard
A keyboard of a data entry device includes a printed circuit board, a spacer having a plurality of key-positioning locations, a plurality of keys, each key...
US-1,017,5215 Method and device for quantification of plant chlorophyll content
A system for measuring chlorophyll concentration in a leaf sample includes a leaf-holding illuminator device with a main body containing a power source, a...
US-1,017,3773 Systems and methods for operating drones in response to an incident
A response system may be provided. The response system may include a security system and an autonomous drone. The security system includes a security sensor and...
US-1,017,3130 Information processing system, extended input device, and information processing method
In a state where an extended input device is secured to a data transmission device, an image capturing unit of the data transmission device captures an image of...
US-1,017,2153 Method and apparatus for scheduling uplink data in mobile communication system
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-1,017,2003 Communication security processing method, and apparatus
The present invention provides a communication security processing method and an apparatus. The communication security processing method includes: determining,...
US-1,017,2000 Method and system for managing security keys for user and M2M devices in a wireless communication network...
Pre Shared Keys ("PSK") for application and data session security are generated using application authentication secret values stored in a SIM device/card. The...
US-1,017,1540 Method and apparatus for streaming video security
A streaming video security device is provided that comprises an input LAN interface, at least one streaming video decoder, an output LAN interface, at least one...
US-1,017,1537 Segregation of electronic personal health information
A dynamic secure mobile network is provided to enable the transfer and storage of private data. The dynamic secure mobile network can provide secured...
US-1,017,1532 Methods and systems for detection and classification of multimedia content in secured transactions
An apparatus is provided for detecting the presence of multimedia content in one or more transactions and for classifying the multimedia content in the one or...
US-1,017,1505 Preventative enterprise change management
Embodiments for implementing change control management in computing center environments by a processor. A physical activity of a user performing an action in...
US-1,017,1499 Zone-based security architecture for intra-vehicular wireless communication
Systems and methods provide secure and wireless intra-vehicular communication. An intra-vehicular communication system has a secured network segment including a...
US-1,017,1498 Secure crypto module including electrical shorting security layers
A security matrix layer between a first and second conductive shorting layers are located within a printed circuit board (PCB) that carries out cryptographic...
US-1,017,1497 Systems and methods for detecting online fraud
Described systems and methods enable a swift and efficient detection of fraudulent Internet domains, i.e., domains used to host or distribute fraudulent...
US-1,017,1494 Scarecrow for data security
A method, computer program product and/or system receives information pertaining to network data traffic from and/or to a network accessible resource, analyzes...
US-1,017,1487 Generating a virtual database to test data security of a real database
Determining a data security risk level of a virtual database is provided. An object catalog corresponding to a real database is imported into the virtual...
US-1,017,1486 Security and authentication daisy chain analysis and warning system
An approach is disclosed that provides a security and authentication daisy chain analysis and warning system to a user. The approach monitors sets of user...
US-1,017,1480 Cloud-based surveillance with intelligent tamper protection
In one embodiment, a security system includes a central communication unit and a first surveillance device. The central communication unit is communicatively...
US-1,017,1463 Secure transport layer authentication of network traffic
Technologies are disclosed herein for transport layer network data authentication. A token packet is attached to network data sent from a client software...
US-1,017,1461 System and method of secure encryption for electronic data transfer
A system for secure transfer of encrypted data involves a sender client, a recipient client, a main server, and a key server. The sender client receives...
US-1,017,1460 Proximity-based system for automatic application or data access and item tracking
A system and method provide automatic access to applications or data. A portable physical device, referred to herein as a Personal Digital Key or "PDK", stores...
US-1,017,1455 Protection of application passwords using a secure proxy
Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server....
US-1,017,1450 Global time based authentication of client devices
A system for authenticating client devices for communication with one or more wireless communications networks, includes a client device configured to receive a...
US-1,017,1444 Securitization of temporal digital communications via authentication and validation for wireless user and...
An access control system and associated devices are described that conceal and securitize data transmissions between one or more secure databases for various...
US-1,017,1436 Distributed learning and aging for management of Internet protocol (IP) addresses
A device includes a security process unit (SPU) associated with a logical ring of SPUs. The SPU receives a packet with an address associated with a malicious...
US-1,017,1432 Systems to implement security in computer systems
Systems, methods, and non-transitory computer-readable medium are provided to secure data centers and cloud computing. A method receives network identifiers for...
US-1,017,1431 Secure message handling of an application across deployment locations
A method and system for secure message handling of an application across deployment locations. The application is divided into multiple processing nodes which...
US-1,017,1429 Providing security to video frames
A method and system are provided for processing a media stream including at least a portion of a media program in a player executed by a computer. The player is...
US-1,017,1428 Confidential data management method and device, and security authentication method and system
The present invention relates to a method for safely managing confidential data and a security authentication method and system for performing a security...
US-1,017,1246 Multi-user strong authentication token
Apparatus, methods and systems to secure remotely accessible applications using authentication devices are disclosed. More in particular apparatus, methods and...
US-1,017,1244 Increased communication security
A method of increasing communication security may include receiving, at a first computer system, a first message including a first data portion and a second...
US-1,017,1238 Secure data transmission using quantum communication
Methods and systems for transmitting data are described. A random data stream is generated. A data stream is generated comprising the random data stream and...
US-1,017,1235 User-initiated migration of encryption keys
Embodiments utilizing secret keys for authentication and/or encrypted communication are described. In certain embodiments, authentication data is provided from...
US-1,017,0880 Mount having a mounting plate with mounting studs and electrical contacts
A modular equipment mount to enable quick relocation of the piece of equipment. The piece of equipment is secured to a mount. A track system is secured to...
US-1,017,0178 Secure off-chip MRAM
Techniques for improving the security of nonvolatile memory such as magnetic random access memory (MRAM) are provided. In one aspect, a method of operating a...
US-1,016,9974 Home security system
A home security system and method is provided. The method comprises detecting a motion in a monitored room, starting data collection through at least a first...
US-1,016,9671 Face detection with temperature and distance validation
An electronic device incorporates features that are dependent on finding a face by image processing of an image taken by an image capturing device. To avoid...
US-1,016,9623 Security apparatus for computing systems
A security apparatus that can detect unauthorized alterations of physical arrangement of a computing system or unauthorized movements of a computing system...
US-1,016,9608 Dynamic management of data with context-based processing
Techniques for using contextual information to manage data that is subject to one or more data-handling requirements are described herein. In many instances,...
US-1,016,9607 Individual centric personal data management process and method
An individual centric personal data management process consisting of utilizing at least one computing device for performing the function of facilitating...
US-1,016,9606 Verifiable data destruction in a database
A computing device may determine that a policy event to initiate data destruction for a first set of data has been triggered. The first set of data may be...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.