Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,030,4150 Apparatus and method for protecting real-time safety and security relevant video data
A system for generating and detecting watermarks within a video frame (e.g., video content) is described to determine whether a data interruption has occurred....
US-1,030,4046 Device and method in wireless communication system and wireless communication system
There is disclosed a device and method in a wireless communication system and a wireless communication system, the device including: a secure channel...
US-1,030,4044 Multi-factor mobile user authentication
A system and method are disclosed herein leveraging financial networks standards with mobile device data and secure processing and storage environment knowledge...
US-1,030,3953 Person tracking and privacy and acceleration of data using autonomous machines
A mechanism is described for facilitating person tracking and data security in machine learning at autonomous machines. A method of embodiments, as described...
US-1,030,3901 Secure processor and a program for a secure processor
The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated...
US-1,030,3899 Secure public cloud with protected guest-verified host control
A host Virtual Machine Monitor (VMM) operates "blindly," without the host VMM having the ability to access data within a guest virtual machine (VM) or the...
US-1,030,3894 Fine-grained access control for data manipulation language (DML) operations on relational data
Embodiments allow, within database security policies, the grant of data change operation-specific privileges to particular users to be applied within particular...
US-1,030,3867 External secure unit
A method for operating an external secure unit comprises at least a memory for storing data, a processor for processing the data, at least one interface for...
US-1,030,3860 Security through layers in an intelligent electronic device
The present disclosure provides for improving security in a meter or an intelligent electronic device (IED) through the use of a security key which is unique to...
US-1,030,3649 Storage media abstraction for uniform data storage
A storage abstraction system is described herein that exposes storage from an operating system as a uniform storage device and abstracts from applications the...
US-1,030,3623 Non-volatile memory for secure storage of authentication data
A first non-volatile memory may store first data and a second non-volatile memory may store second data. An authentication component may be coupled with the...
US-1,030,3517 Automated evaluation of computer programming
Techniques are described for analysis and evaluation of different computer programs developed by different users to accomplish programming tasks. A computer...
US-1,030,3411 Method for capturing, storing, accessing, and outputting digital content
A method for capturing and outputting digital content is herein disclosed and enabled, the output system includes an information apparatus, a server, and a...
US-1,030,3391 System and method for data storage, transfer, synchronization, and security
A system for storing and transmitting data in a highly compact format comprising reference codes to data chunklets contained in a library, wherein the data are...
US-1,030,3167 Automated drone systems
An automated drone security system for surveilling a location includes one or more drones with onboard sensors and an imaging device for measuring surveillance...
US-1,030,2807 Systems and methods for detecting threats and contraband in cargo
The present specification discloses systems and methods for identifying and reporting contents of a tanker, container or vehicle. Programmatic tools are...
US-1,030,1018 Fixed drone visualization in security systems
An unmanned aerial vehicle is described and includes a computer carried by the unmanned aerial vehicle to control flight of the unmanned aerial vehicle and at...
US-1,030,0700 Elongate printhead having robust electrical assembly
An inkjet printhead includes: a rigid elongate carrier having an ink supply channel and a lower surface having a plurality of printhead chips mounted thereon; a...
US-1,029,9307 Apparatus, system, and method of wirelessly transmitting and receiving data
A wireless media player and a related system and methodology. One feature of the wireless media player system pertains to a virtual connector system, apparatus,...
US-1,029,9304 Securely communicating a status of a wireless technology device to a non-paired device
A wireless technology device and method for securely communicating a status of a wireless technology device to a non-paired device, includes detecting a status...
US-1,029,9300 Secure systems and methods for establishing wireless audio sharing connection
A system and method for tethering wireless audio devices. The method includes establishing a first wireless connection between an intermediary device and a...
US-1,029,9128 Securing communications for roaming user equipment (UE) using a native blockchain platform
A network function (NF) entity in a communication network receives authentication data associated with a User Equipment (UE), determines the UE supports a...
US-1,029,8735 Method and apparatus for dynamic configuration of a multiprocessor health data system
A health monitoring system which can collect data generated from multiple health, fitness, and environmental data generating devices by a health application...
US-1,029,8612 System and method for time based anomaly detection in an in-vehicle communication network
A system and method for providing security to a network may include maintaining, by a processor, a model of an expected behavior of data communications over the...
US-1,029,8610 Efficient and secure user credential store for credentials enforcement using a firewall
Techniques for an efficient and secure store for credentials enforcement using a firewall are disclosed. In some embodiments, a system, process, and/or computer...
US-1,029,8607 Constructing graph models of event correlation in enterprise security systems
Methods and systems for detecting anomalous events include detecting anomalous events in monitored system data. An event correlation graph is generated by...
US-1,029,8603 Supervisory control and data acquisition
Aspects of the present disclosure relate to computer system security. A machine accesses a set of records corresponding to a set of users having access to a...
US-1,029,8591 Secure integration of independent cloud foundry applications in a fiori launchpad
An Open Authorization (OAuth) Client Secret of an application associated with a Multi-Tenant Application (MTA) deployed in a cloud-computing environment if read...
US-1,029,8584 System and method for secure control of resources of wireless mobile communication devices
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
US-1,029,8564 Secure authenticated distance measurement
The invention relates to a method for a first communication device to perform authenticated distance measurement between the first communication device and a...
US-1,029,8559 Pre-authenticated identification token
A pre-authenticated token system includes an identification token having a switch, a transmitter and receiver circuit, and a sensor; a docking station having...
US-1,029,8556 Systems and methods for secure storage and management of credentials and encryption keys
A system for storing and managing credentials and encryption keys includes a first data store, a second data store, a client device, and a secure key platform....
US-1,029,8554 System and method for enhanced data protection
In one embodiment, a method of secure network transmission is performed by a computer system. The method includes encrypting a payload via a first symmetric key...
US-1,029,8552 Digital broadcast methods using secure meshes and wavelets
Methods and apparatuses are presented for securely providing digital streaming data to subscriber devices using encrypted wavelet meshes. A recorded image may...
US-1,029,8549 Stateless access stratum security for cellular internet of things
Aspects of security schemes (e.g., integrity protection, encryption, or both) are described. A measure of access stratum security can be realized without...
US-1,029,8547 Systems, methods, and media for a cloud based social media network
System and methods for providing private social networks, which are cloud-based in some instances, are provided herein. A method includes receiving a selection...
US-1,029,8546 Asymmetrical encryption of storage system to protect copyright and personal information
Robust security of copyright-protected content is provided when such content is digitally stored in a storage device of a client device in encrypted form. The...
US-1,029,8545 Secure processing environment for protecting sensitive information
A processor-implemented method for a secure processing environment for protecting sensitive information is provided. The processor-implemented method may...
US-1,029,8445 Method for dynamic adjustment of a level of verbosity of a component of a communications network
A method for dynamic management of a first level of verbosity of a component defined in a data network, the data network having a control center, each component...
US-1,029,8398 Peer discovery, connection, and data transfer
Implementations relate to peer-to-peer discovery, connection, and data transfer providing privacy protection and increased security features.
US-1,029,8397 Setting a password on a device
Embodiments disclosed herein provide a server, a device and methods for providing security data to a device requiring a password for use in protecting a...
US-1,029,8386 Method and apparatus for secure communications in networks
An unencrypted media access control layer (MAC) protocol data unit (MPDU) having a header is received at a wireless network interface device. The header...
US-1,029,8385 Homomorphic processing unit (HPU) for accelerating secure computations under homomorphic encryption
Fully homomorphic encryption integrated circuit (IC) chips, systems and associated methods are disclosed. In one embodiment, an integrated circuit (IC)...
US-1,029,6902 Payment device with data entry keys
A payment device with data entry keys which are obscured from view when not in use. An example payment device includes a plurality of data entry keys for...
US-1,029,6767 Method and apparatus of providing real-time feedback for magnetic secure transmission
A user terminal comprising: i) a display module comprising a display screen and an interface circuitry for receiving a user input; and ii) a magnetic stripe...
US-1,029,6760 System of shared secure data storage and management
This disclosure relates to a storage provider for storing first encrypted data associated with first meta tags from a first publisher and second encrypted data...
US-1,029,6755 Data source based application sandboxing
A computing device and a method for a computing device to control access to data stored on a data store of the device. An access component of the device having...
US-1,029,6754 Method for controlling security system and electronic device thereof
A portable electronic device, a wearable device and methods for operating the same are provided. The portable electronic device includes a display, a...
US-1,029,6750 Robust data tagging
Users are authorized to access tagged metadata in a provider network. A revision control and binding mechanism may be applied to tagged metadata that is added...
US-1,029,6741 Secure memory implementation for secure execution of virtual machines
An embodiment involves secure memory implementation for secure execution of virtual machines. Data is processed in a first mode and a second mode, and commands...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.