Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,012,9736 Method and device for updating profile management server
A method to converge a 5.sup.th-Generation (5G) communication system to support higher data rates beyond a 4.sup.th-Generation (4G) system with a technology for...
US-1,012,9715 Reporting terminal capabilities for supporting short message service
A method and apparatus for receiving at least one IP-based registration message from a first UE is disclosed. The at least one IP-based registration message may...
US-1,012,9687 Compressed sensing with machine-to-machine communication
Some examples include a plurality of secure low-power compressive sensing sensor blocks able to communicate with each other and with a computing device to...
US-1,012,9370 Mapping between user interface fields and protocol information
A gateway device for implementing data security is described herein. The gateway device is coupled between a client device and a server device, and generates a...
US-1,012,9290 Dynamic adaptive defense for cyber-security threats
Disclosed is a cyber-security system that is configured to aggregate and unify data from multiple components and platforms on a network. The system allows...
US-1,012,9280 Modular event pipeline
A modular pipeline for event management in a computer environment is provided to enable the high volume of events that may be relevant to the security and...
US-1,012,9276 Methods and apparatus for identifying suspicious domains using common user clustering
Methods and apparatus are provided for identifying suspicious domains using common user clustering. An exemplary method comprises obtaining network event data...
US-1,012,9273 System and methods for computer network security involving user confirmation of network connections
Systems and methods for detecting anomalies in network traffic and providing notification to the users of the computers that generated the network traffic for...
US-1,012,9254 Automated provisioning of a network appliance
Certain embodiments disclose a method of provisioning security services for a domain or set of domains. The method comprises sending an electronic message to...
US-1,012,9244 Securing computing resources
Various examples are directed to systems and methods for providing access to computing resources. A resource system may receive an access request from a first...
US-1,012,9238 System for control of secure access and communication with different process data networks with separate...
A distributed block chain network having at least a private block chain portion, and in some cases a public block chain portion, allows users to take actions...
US-1,012,9237 System and method invoking security and profile utilities for global account registration
Systems and methods are disclosed herein for managing electronic access from remote devices to a plurality of back-end computer platforms. The system includes a...
US-1,012,9233 Method, device and system for network-based remote control over contactless secure storages
A typical system environment comprises a terminal device, a secure storage subsystem, and an interconnectivity component. The terminal device has a network...
US-1,012,9229 Peer validation
The present disclosure describes systems and methods for authenticating a called party during the initialization stage of establishing a secure ...
US-1,012,9228 Authenticated communication between devices
Various examples are directed to systems and methods for establishing a secure, authenticated connection between devices utilizing a password authenticated key...
US-1,012,9222 Trusted storage systems and methods
Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of...
US-1,012,9219 Methods and systems for securing data stored at a storage area network
Methods and systems for securing data are provided. For example, one method includes providing context information for an input/output (I/O) operation to a...
US-1,012,9214 System and method for secure communication between domains
A system and method of executing secure communications between first and second domains includes a first logical unit and a second logical unit. The first...
US-1,012,9212 Computation of historical data
Secure computation of enterprise data in a cloud is provided, by a third party, such that values and data manipulation processes are encrypted through use...
US-1,012,9211 Methods and/or systems for an online and/or mobile privacy and/or security encryption technologies used in...
A method, apparatus, computer readable medium, computer system, wireless or wired network, or system to provide an online and/or mobile security of a user's...
US-1,012,9197 Computerized system and method for modifying a message to apply security features to the message's content
Disclosed are systems and methods for improving interactions with and between computers in content providing, generating and/or hosting systems supported by or...
US-1,012,9117 Conditional policies
Conditional policies can be defined that change based on security measurements of network endpoints. In an example embodiment, a network traffic monitoring...
US-1,012,9023 Enhancing security for multiple storage configurations
A method begins by a processing module identifying, for a DSN (Dispersed Storage Network) memory using multiple IDA (Information Dispersal Algorithms)...
US-1,012,7989 Semiconductor device
An object of the present disclosure is to provide a semiconductor having high security. A semiconductor device includes: a memory region having a plurality of...
US-1,012,7926 Securely executing voice actions with speaker identification and authentication input types
In some implementations, (i) audio data representing a voice command spoken by a speaker and (ii) a speaker identification result indicating that the voice...
US-1,012,7785 Entry point opening sensor
A sensor package is disclosed that includes a compass and/or an accelerometer. The compass may be activated by a microcontroller in response to an indication of...
US-1,012,7748 System having a mobile key unit
A system having a mobile key unit (2) for reading and writing data from at least one external device (3) of a facility (4), wherein the data at least comprise...
US-1,012,7740 Inspection apparatus, inspection system, and inspection method
There are provided an inspection apparatus, an inspection system, and an inspection method capable of inspecting operation of a control device, accurately,...
US-1,012,7611 Method and system for requesting a reservation for a set of contract rights to be offered
A method and system for the determination of optimal pricing and allocation of securities in an open, competitive environment. The method and system may also be...
US-1,012,7562 Method and apparatus for maintaining high data integrity and for providing a secure audit for fraud prevention...
Any of various comparisons of computer folders from different points in time is performed. Such comparisons provide the ability to discover missing documents or...
US-1,012,7397 Method for strongly encrypting .zip files
The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data...
US-1,012,7392 Secure rendering system that generates ray tracing samples with obfuscated position data
Secure rendering system that creates ray tracing samples with obfuscated positions, so that images can only be viewed by an authorized consumer able to recover...
US-1,012,7389 Performing operations on intelligent storage with hardened interfaces
A storage device can include processing and cryptographic capability enabling the device to function as a hardware security module (HSM). This includes the...
US-1,012,7385 Automated security vulnerability exploit tracking on social media
Embodiments automate tracking of exploit information related to initially-identified security vulnerabilities, through the data mining of social networks....
US-1,012,7383 Resource usage optimized auditing of database shared memory
A system, and computer program product for security auditing of database transactions are provided in the illustrative embodiments. For a specified period, an...
US-1,012,7172 Single SDIO interface with multiple SDIO units
A system and method communicates with one of two or more secure digital input output (SDIO) units that only one SDIO unit responds when it is being addressed....
US-1,012,7022 Tools and methods for real-time dataflow programming language
A dataflow programming language can be used to express reactive dataflow programs that can be used in pattern-driven real-time data analysis. One or more tools...
US-1,012,6961 Securely recovering stored data in a dispersed storage network
A method for execution by a dispersed storage and task (DST) execution unit that includes a processor includes receiving a slice pre-image request from a...
US-1,012,6832 Split rotating keyboard system
A split rotating keyboard system for use in easing muscle strain and mitigating the effects of carpal tunnel syndrome associated with the usage of conventional...
US-1,012,3703 Health monitoring apparatus with wireless capabilities for initiating a patient treatment with the aid of a...
Individuals who suffer from certain kinds of medical conditions, particularly conditions that only sporadically exhibit measurable symptoms, can feel helpless...
US-1,012,3360 System and method for secure wireless communication
A system and method for secure wireless communication for transferring or sharing data between at least two devices over a wireless network. A set of pictures...
US-1,012,3213 Methods and devices for securing radio resources for an LTE-U data transmission
A method for securing radio resources for a Long Term Evolution-unlicensed, LTE-U, data transmission is disclosed. The method includes transmitting a plurality...
US-1,012,2985 Camera based safety mechanisms for users of head mounted displays
The disclosure provides methods and systems for warning a user of a head mounted display that the user approaches an edge of field of view of a camera or one or...
US-1,012,2900 Camera mounting device
A web cam device includes a camera housing, a camera disposed in the camera housing, a data cable coupled to the camera that extends from the camera housing,...
US-1,012,2888 Information processing system, terminal device and method of controlling display of secure data using augmented...
An information processing system includes a server, and a terminal device communicable with the server via a network. The terminal device includes a display, an...
US-1,012,2766 Policy-based secure containers for multiple enterprise applications
Technologies for providing policy-based secure containers for multiple enterprise applications include a client computing device and an enterprise policy...
US-1,012,2764 Multi-factor and context sensitive biometric authentication system
This disclosure describes techniques that facilitate granting an access privilege to a client device based on selectively authenticating biometric data....
US-1,012,2746 Correlation and consolidation of analytic data for holistic view of malware attack
In communication with security appliances, an electronic device for providing a holistic view of a malware attack is described. The electronic device features...
US-1,012,2745 Heuristics-based identification of IoT (internet of things) attacks in Wi-fi
Attacks from IoT (Internet of Things) devices (or other statins) on a Wi-Fi network are identified using heuristics. Frames are detected from an IoT device (or...
US-1,012,2740 Methods for establishing anomaly detection configurations and identifying anomalous network traffic and devices...
A method, non-transitory computer readable medium, and network security apparatus that monitors received network traffic to obtain signal data for signals...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.