Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,022,6213 Wearable digital device for personal health use for saliva, urine and blood testing and mobile wrist watch...
Provided are a wearable personal digital device and related methods. The wearable personal digital device may comprise a processor, a display, biometric...
US-1,022,5721 Smart wearable devices and system therefor
A description is therefore provided of technologies enhancing interoperability of devices located in a proximity from each other, with the goal of improving...
US-1,022,5238 Data security for content delivery networks
Various embodiments implement a secure content distribution architecture involving a content delivery network (CDN). A web server system can encrypt a content...
US-1,022,3633 Personalized EEG-based encryptor
A user-specific, electroencephalogram data-based secure encryption generator maps artificial neural network neuron elements to electroencephalogram data signals...
US-1,022,3544 Content aware hierarchical encryption for secure storage systems
In one embodiment, in response to a request received from a client for retrieving a data object stored in a storage system, a root key is obtained from the...
US-1,022,3213 Salted zero expansion all or nothing transformation
A method for execution by a dispersed storage network (DSN), the method begins by injecting generated data into a data segment to produce mixed data,...
US-1,022,2158 Secure smartphone-operated gun lock with apparatus for preventing firing in protected directions
Apparatus for locking and unlocking a gun to control its use includes a gun lock device that selects between two operative states: a locked state which prevents...
US-1,021,9200 Apparatus and method for link setup in wireless communication system
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-1,021,9193 Method and apparatus for providing services of network to terminal by using slice
The present disclosure relates to a communication technique of fusing a 5G communication system for supporting higher data transmission rate beyond a 4G system...
US-1,021,9152 Security architecture and solution for handling internet of things devices in a fifth generation system
A method of establishing a group trust relationship in an Internet of Things (IoT) system using a first IoT device within a group of IoT devices is provided....
US-1,021,9135 Near field communication (NFC) enhanced computing systems
Technologies are disclosed herein for utilizing near field communication ("NFC") to improve the security, performance, and configuration of computing systems....
US-1,021,8855 Doorbell call center
Techniques are described for enabling a service administrator to respond to a detected doorbell press at a property when an authorized user is unavailable to...
US-1,021,8742 System and method for providing network and computer firewall protection with dynamic address isolation to a device
A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to...
US-1,021,8731 Method and system for data breach and malware detection
Detecting cyber threat and malware, particularly zero-day malware is a major challenge for the security community. Signature-based methods of cyber threat and...
US-1,021,8730 Systems and methods of stateless processing in a fault-tolerant microservice environment
A system, method, and non-transitory computer-readable relating to network security are disclosed. In particular, embodiments described generally relate to...
US-1,021,8715 Secured network bridge
An apparatus and method are provided for implementing one or more security services to messages and data being communicated between a first network and a second...
US-1,021,8713 Global attestation procedure
A method, computer program product, and system for authenticating a computing device by geographic attestation includes a processor utilizing executing an...
US-1,021,8705 Multi-tenant identity and data security management cloud service
A system provides cloud-based identity and access management. The system receives a request from a client for an identity management service, authenticates the...
US-1,021,8682 Secure network protocol cryptographic processing
The present document describes systems and methods that utilize a cryptographic service for establishing a cryptographically protected communication session,...
US-1,021,8495 Secure computation method, secure computation system, secure computation server, registrant terminal, user...
Data processing is performed while personal information is kept concealed. A registrant terminal splits a registration input password and allocates the split...
US-1,021,8431 Space-based electronic data storage and transfer network system
A space-based electronic data storage and transfer network system is disclosed. The network system includes terrestrial access points, a plurality of...
US-1,021,8387 ECC memory controller supporting secure and non-secure regions
A system and method of utilizing ECC memory to detect software errors and malicious activities is disclosed. In one embodiment, after a pool of memory is freed,...
US-1,021,8358 Methods and apparatus for unloading data from a configurable integrated circuit
A system may include a host processor and a coprocessor for accelerating tasks received from the host processor. The coprocessor may include programmable...
US-1,021,8136 Interchangeable internal modular avionics platform assembly
Internal interchangeable modular avionics platform assemblies and methods for removably mounting and interchanging modular avionics platforms within an...
US-1,021,7381 Secure multi-party device pairing using sensor data
Content is securely shared between communication devices in an ad-hoc manner by employing common sensing context to establish pairing between the communication...
US-1,021,7348 Processing sensor data
Methods, systems, computer-readable media, and apparatuses for processing sensor data are presented. An example method comprises accessing, by a computing...
US-1,021,7337 Security device registration
A method of registering a security sensor device with a product device to be protected via the security sensor device includes obtaining sensor identification...
US-1,021,7158 Multi-factor routing system for exchanging business transactions
A system of routing a purchase order may include a purchase order identification unit configured to identifying a purchase order format associated with a...
US-1,021,7114 Methods and systems for providing labels to prevent counterfeiting of products
Embodiments provide methods and systems for providing labels to prevent counterfeiting of products. In an embodiment, the method includes accessing, by a...
US-1,021,7096 Systems and methods for convenient and secure mobile transactions
Systems and methods for conducting convenient and secure mobile transactions between a payment terminal and a mobile device, e.g., in a fueling environment, are...
US-1,021,7003 Systems and methods for automated analytics for security surveillance in operation areas
Systems and methods for cloud-based surveillance for an operation area are disclosed. At least two input capture devices, at least one safety control device and...
US-1,021,6983 Techniques for assessing group level cognitive states
A security monitoring technique includes receiving data related to one or more individuals from one or more cameras in an environment. Based on the input data...
US-1,021,6967 Volatile memory-based data-transfer device with automatic and user-initiated anti-tamper penalties
A USB-style data-transfer device employs volatile memory that is connected to an onboard power-storage device for data storage. Through this design, any data...
US-1,021,6958 Minimizing sensitive data exposure during preparation of redacted documents
A document review and security technique is provided that presents a first portion of a document to a first reviewer, wherein the first portion includes less...
US-1,021,6952 Location based disk drive access
Methods, apparatuses, systems, and devices are described for providing data security. In one method, data security is provided for a computing device having a...
US-1,021,6947 System and method for activating a data entry mechanism
Disclosed are systems and methods for activating a data entry mechanism. An example method comprises detecting, by a hardware processor, an activity state of...
US-1,021,6938 Recombinant threat modeling
Dynamically developing and maintaining threat models, threat landscapes and threat matrices are described. Specifically described are techniques on how to...
US-1,021,6928 Methods for restricting resources used by an application based on a base profile and an application specific...
In response to a request for launching an application within an operating system of a data processing system, one or more extended entitlements are extracted...
US-1,021,6926 Isolation of untrusted code in operating system without isolation capability
Code intended to operate in an operating system without an isolation mechanism is executed in isolation. The present system enables synthetic transactions to be...
US-1,021,6822 Data distribution methods and systems
Methods and related systems for secured and distributed data storage and communication are disclosed. For each byte of a given data set or file, data is split...
US-1,021,6745 Control method of recoverable file protection device and protection method of recoverable file
A control method of a recoverable file protection device and a protection method of a recoverable file are provided. After a file owner sets a secured content...
US-1,021,6449 Extended snapshot using backup and microservice
Embodiments are described for presenting a backed up data object to a client, in a native file format, in response to a request from the client to retrieve the...
US-1,021,6439 Protecting unallocated data within a storage volume
In one general embodiment, a computer-implemented method includes initializing a storage volume, receiving a request to secure unallocated data within the...
US-1,021,6404 Method of securing image data and electronic device adapted to the same
An electronic device and method is disclosed herein. The electronic device may include a memory configured to store image data including at least one object,...
US-1,021,4164 Watchman hub
A system for providing security to an in-vehicle communication network, the system comprising: a data monitoring and processing hub external to the in-vehicle...
US-1,021,2860 Adaptive automatic computer room air conditioners (CRAC) master control method and system
Described is an adaptive automatic computer room air conditioner (CRAC) or computer room air handler (CRAH, CRAC and CRAH is referred interchangeably in this...
US-1,021,2851 Data center air duct system
An air duct system is configured to be used with an air containment system that spans an aisle defined by rows of racks. The air duct system includes a...
US-1,021,2761 Systems for improved multi-channel network connectivity performance and security
Systems and methods that efficiently combine multiple wireless networks or devices resulting in faster, more reliable, and more secure mobile Internet. A...
US-1,021,2585 System and method for wireless network access protection and security architecture
Wireless network specific (WN-specific) key can be used to provide access protection over the radio access link. A WN-specific key may be associated with (or...
US-1,021,2404 Projection mapping system and apparatus
A projection system includes a projection apparatus embodied in a housing secured to a user. The projection apparatus has a processor in data communication with...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.