Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,930,020 Validation method and system for use in securing nomadic electronic transactions
A method involving a communication device, which comprises sending a request to a communication device; receiving a response from the communication device over...
US-9,930,016 Security key generation and management method of PDCP distributed structure for supporting dual connectivity
The present disclosure relates to a pre-5.sup.th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond...
US-9,929,964 System, apparatus and method for providing aggregation of connections with a secure and trusted virtual network...
A network system is provided between at least a first client site and a second client site. A client site network component is implemented at least at the first...
US-9,929,877 Systems, devices, and methods for generating a substantially continuous stream of audiovisual data during a...
When switching sources, resolutions or refresh rates in a video distribution network, switching times are reduced by maintaining video lock and security...
US-9,929,861 Secure database backup and recovery
As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system...
US-9,928,587 Analysis, secure access to, and transmission of array images
Systems and methods are provided the autocentering, autofocusing, acquiring, decoding, aligning, analyzing and exchanging among various parties, images, where...
US-9,928,546 System and method for processing data pertaining to financial assets
A method of processing data in connection with a security is provided. The security is collateralized by a plurality of home mortgage loans or by portions of...
US-9,928,542 Real-time congestion avoidance in a retail environment
A shopping list may be ordered in order to guide a shopper through a store in an efficient manner. Congestion in the store may be identified, such as using...
US-9,928,392 Barcode-reading system that obtains ranging data via targeting illumination
A barcode-reading system may include a barcode-reading enhancement accessory that is securable to a mobile device. The accessory may include an optic system...
US-9,928,386 Data protection system
A storage device of a data center may protect data stored on a storage medium of the storage device using a data security mechanism. The data security mechanism...
US-9,928,382 Systems, methods, and computer program products for managing secure elements
Systems, methods, and computer program products are provided for performing content management operations. At least one memory stores data, and a central...
US-9,928,379 Methods using mediation software for rapid health care support over a secured wireless network; methods of...
Some of these new methods harness distributed computing capabilities to integrate biometric abstraction processes, wireless network connectivity, and...
US-9,928,377 Systems and methods of monitoring and controlling enterprise information stored on a cloud computing service (CCS)
A computer-implemented method is described to monitor and control enterprise information stored on a cloud computing service (CCS). The method includes using a...
US-9,928,375 Mitigation of data leakage in a multi-site computing infrastructure
Embodiments of the invention relate to a method, system, and computer program product to dynamically mitigate data leakage in a file sharing environment....
US-9,928,366 Endpoint malware detection using an event graph
A data recorder stores endpoint activity on an ongoing basis as sequences of events that causally relate computer objects such as processes and files, and...
US-9,928,340 System and method for collaborative programming of data entry workflows between system developers, end users,...
The present invention is a system for collaborative programming of data entry workflows between end users, Electronic Health Record (EHR) system developers, and...
US-9,928,147 Forceful closure and automatic recovery of pluggable databases in a shared-everything cluster multitenant...
Embodiment provide that each pluggable database (PDB) in a container database is associated with a distinct distributed lock manager (DLM) domain. Thus, in...
US-9,927,980 Accessing point in time versions of a logical device in connection with I/O operations
Systems and techniques are provided for incremental Continuous Data Protection (iCDP) as a process to secure frequent, and space efficient, versions of...
US-9,927,978 Dispersed storage network (DSN) and system with improved security
A computing device includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational...
US-9,927,490 Integrated circuit with secure scan enable
An integrated circuit senses attempts to access security-related data stored in registers connectable into a scan chain when the attempt includes locally and...
US-9,927,073 Networked LED lighting system
An improved LED lighting system is provided for overhead ceiling lighting, as well as for other uses. The LED lighting system comprises elongated linear lamps...
US-9,925,956 Remote function control system with remote function device and associated wireless security sensor for a...
A remote function control system is for a vehicle including a data bus extending throughout the vehicle and coupled to a plurality of vehicle devices, and a...
US-9,925,935 In-vehicle communication system and in-vehicle communication method
An increase in the number of signal lines of a control apparatus for controlling devices of an automobile can be prevented and safety of the automobile can be...
US-RE46,768 System and method for identifying and assessing vulnerabilities on a mobile communications device
The invention is a system and method for identifying, assessing, and responding to vulnerabilities on a mobile communication device. Information about the...
US-9,924,557 Connecting a circuit-switched wireless access network to an IP multimedia subsystem
A network device performs a delayed registration in connection with phone call setup, if the network device does not know a phone number of a user in question...
US-9,924,404 Privacy protection for evaluating call quality
Apparatus and methods concerning simulation of call quality are disclosed. In an example embodiment, computing server is communicatively coupled to a VoIP...
US-9,924,360 AT command for secure ESM information
Systems and methods for transmitting AT commands indicating whether Evolved Packet System (EPS) Session Management (ESM) information should be transmitted...
US-9,924,359 Method, system and apparatus for enhancing security of beacon device
A method, system and apparatus for enhancing the security of a beacon device are herein disclosed. A service device includes a service communication unit and a...
US-9,924,357 Method for providing mobile communication provider information and device for performing same
A method for providing mobile communication provider information and a device for performing the same are disclosed. A terminal having an eUICC receives data,...
US-9,924,354 Key exchange method and apparatus
Embodiments of the present invention disclose a key exchange method and apparatus, which relate to the communications field, and can enable user equipments...
US-9,924,353 Method for configuring and transmitting key
The present application discloses a method for configuring and transmitting a key, which includes that: a) a serving cell (PCell) of UE determines a key (KeNB)...
US-9,923,987 Optimization of enhanced network links
A method and apparatus for dynamic network link acceleration provides a managed communication link for accelerated and reliable network communication between a...
US-9,923,925 Cyber security sharing and identification system
Systems and techniques for sharing security data are described herein. Security rules and/or attack data may be automatically shared, investigated, enabled,...
US-9,923,914 Systems and platforms for intelligently monitoring risky network activities
Technology for improving and monitoring data communication security is presented herein. The technology monitors a plurality of sources of risky activities,...
US-9,923,909 System and method for providing a self-monitoring, self-reporting, and self-repairing virtual asset configured...
A trigger event monitoring system is provided in one or more virtual assets. One or more trigger parameters, including security threat patterns, are defined and...
US-9,923,908 Data protection in a networked computing environment
Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a...
US-9,923,903 Method, a server and a client providing secured communication in a power distribution communication network
A technique is provided that addresses how to provide secured communication in a power distribution communication network. Specifically, upon receipt of a...
US-9,923,901 Integration user for analytical access to read only data stores generated from transactional systems
The technology disclosed preserves the tenant specificity and user specificity of the tenant data by associating user IDs to complementary special IDs referred...
US-9,923,894 System and method of facilitating the identification of a computer on a network
A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may...
US-9,923,891 Human body communication device with secure access
Systems, apparatuses, and methods may include a human body communication data storage device having at least first and second electrodes and a human body...
US-9,923,890 Generating and distributing pre-computed data (PCD) assets to a target device
The embodiments described herein describe technologies for pre-computed data (PCD) asset generation and secure deployment of the PCD asset to a target device in...
US-9,923,884 In-circuit security system and methods for controlling access to and use of sensitive data
The invention disclosed herein is an in-circuit security system for electronic devices. The in-circuit security system incorporates identity credential...
US-9,923,883 Downloadable security and protection methods and apparatus
Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional...
US-9,923,840 Improving performance and security of multi-processor systems by moving thread execution between processors...
In an embodiment, a processing resource allocation method is disclosed. The method may include identifying an instruction mapped to data having a preselected...
US-9,923,757 Reducing data sets related to network security events
This document describes techniques for reducing a size of data sets related to network security alarms or logs, or other messages. Preferably, the reduction is...
US-9,923,514 Security and tracking systems including energy harvesting components for providing autonomous electrical power
A system is provided that integrates a unique set of structural features for concealing self-powered sensor and communication devices in aesthetically neutral,...
US-9,922,209 Security data path verification
A formal verification approach verifies data access and data propagation paths in a circuit design by proving the unreachability of path cover properties of the...
US-9,922,063 Secure storage of secret data in a dispersed storage network
A method for secure storage of secret data begins with an originating device transforming the secret data to produce a plurality of secret data shares and...
US-9,922,045 Data management in a multi-tenant distributive environment
The present invention relates to a method and apparatus for data management in multi-tenant distributive environment. According to the embodiments of the...
US-9,920,550 Electronically monitored safety lockout devices, systems and methods
A system for monitoring a lockout condition of a component includes a lockout device, a lock unit, and a reader. The lockout device is moveable between a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.