Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,004,5201 Inter-network operator roaming policy configuration in mobile wireless data networks operated by cooperating...
A method carried out by communications between a home roaming configuration server and a visited roaming configuration server is described that facilitates...
US-1,004,5156 Physical security system and method
Systems (100) and methods (110) for operating a physical security surveillance system. The methods involve: detecting the constant unencrypted radio...
US-1,004,5095 Communication processing device, communication method, and communication system
Provided are a communication processing device and a communication system, capable of securely updating a communication protocol process with a simple...
US-1,004,5062 Networked personal video storage and delivery
A portable video delivery device includes data storage, a secure processor, and a wireless network interface that acts as an access point for a secure personal...
US-1,004,4780 Dynamic segregated secure data connection
A system can perform operations including receiving a first data stream from a first device, wherein the first data stream is associated with an active session...
US-1,004,4759 Conflict detection and resolution methods and apparatuses
Conflict detection and resolution methods and apparatuses relate to the field of communications technologies. The conflict detection method includes: acquiring,...
US-1,004,4757 Secure execution of enterprise applications on mobile devices
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application...
US-1,004,4756 Enabling an on-premises resource to be exposed to a public cloud application securely and seamlessly
An application deployed in a public cloud is enabled to access an on-premises resource securely and without requiring additional ports on a firewall. A pair of...
US-1,004,4745 Systems for computer network security risk assessment including user compromise analysis associated with a...
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for computer network security risk assessment. One of the...
US-1,004,4730 Methods, systems, and articles of manufacture for implementing adaptive levels of assurance in a financial...
Disclosed are methods, systems, and articles of manufacture for implementing adaptive levels of authentication assurance according to sensitivity or criticality...
US-1,004,4705 Session management for internet of things devices
The disclosure is directed to security management in communications involving computing devices, e.g. Internet of Things (IoT) devices. An IoT device can...
US-1,004,4701 Technologies for token-based authentication and authorization of distributed computing resources
Technologies for token-based access authorization to an application program interface (API) include an access management server to receive a service request...
US-1,004,4693 Security for confidential data
In an example embodiment, a submission of confidential data is received from a user. Then, the confidential data is encrypted using a first public key generated...
US-1,004,4690 Secure media capture, transfer, and storage
A secure media capture device may comprise a secure memory, a first sensor, a second sensor, a processor, and a communication module. The first sensor may be...
US-1,004,4685 Securing enterprise data on mobile devices
Embodiments include method, systems and computer program products for securing enterprise data in a mobile computing environment. Aspects include receiving, by...
US-1,004,4647 Systems and methods for controlling enrollment and secure persistent SMS texting account servicing with an...
The disclosed technology includes systems and methods for controlling enrollment and secure persistent SMS texting account servicing communications. A method is...
US-1,004,4551 Secure cloud management agent
Embodiments relate to providing a secure management agent for high-availability continuity for cloud systems. An aspect includes receiving operating parameters...
US-1,004,4550 Secure cloud management agent
Embodiments relate to providing a secure management agent for high-availability continuity for cloud systems. An aspect includes receiving operating parameters...
US-1,004,4510 Storing and using data with secure circuitry
An electronic device is provided. The electronic device includes a processor, a memory configured to connect to the processor, and an embedded secure element...
US-1,004,4509 Method for encrypting and storing data
Systems and methods for securely uploading a data file are presented. A client generates a symmetric encryption key and an initialization vector; encrypts the...
US-1,004,4501 Selective content security using visual hashing
In an approach to securing data using visual hashing, one or more computer processors receive a user access request for hashed image. The one or more computer...
US-1,004,4468 Optical transceiver and data mapping method using thereof
Disclosed is an optical transceiver. The optical transceiver includes a decoder for decoding an 8B10B line-coded signal, a data mapper for separating the...
US-1,004,4412 System and method for providing contactless payment with a near field communications attachment
A system and method in accordance with exemplary embodiments may include an attachment with a near field communication antenna, a secure element, a plug capable...
US-1,004,3590 Method, apparatus and system for securely transferring biological information
A system for providing product recommendations for two or more members of a group, including a wearable device comprising a reader for reading product...
US-1,004,3213 Systems and methods for improving computation efficiency in the detection of fraud indicators for loans with...
Certain embodiments of the disclosed technology include systems and methods for increasing efficiency in the detection of identity-based fraud indicators...
US-1,004,3186 Secure authentication system and method
Methods and systems pertaining secure transaction systems are disclosed. In one implementation, a computer with a verification token associated with a computer...
US-1,004,3180 System and method for secure transactions at a mobile device
A system and method for conducting money transfer transactions using mobile devices includes a money transfer host computer that facilitates the collection of...
US-1,004,3128 Data carrier
The present invention relates to a data carrier, especially a security document, such as an identification card, e.g. a passport or a driving license, a credit...
US-1,004,3105 Method and system to characterize video background changes as abandoned or removed objects
A method and system for analyzing video data in a security system. An analysis compares a current frame to a background model. The analysis system compares the...
US-1,004,3041 Multi-function, modular system for network security, secure communication, and malware protection
Representative embodiments are disclosed for providing network and system security. A representative apparatus includes an input-output connector coupleable to...
US-1,004,3029 Cloud storage encryption
Techniques are disclosed for securing data in a cloud storage. Plaintext files are stored as secured, encrypted files in the cloud. The ciphering scheme employs...
US-1,004,3026 Restricted replication for protection of replicated databases
Apparatuses and methods are disclosed for protection of data servers configured for data replication of a database. An example apparatus includes a processing...
US-1,004,3023 Method and device to access personal data of a person, a company, or an object
This invention aims to propose a method and a system allowing to supply certified reliable information without the source of the information being transmitted...
US-1,004,3017 Systems and methods for jurisdiction independent data storage in a multi-vendor cloud environment
A cloud based system for providing data security, the system having a processor which creates a source data file; wherein the source data file is split into at...
US-1,004,3013 Systems and methods for detecting gadgets on computing devices
The disclosed computer-implemented method for detecting gadgets on computing devices may include (i) identifying, on a computing device, a process containing...
US-1,004,2922 Database for chatter predictions
A chatter database system, which includes a central chatter database, which is fed with data corresponding to the machining and chatter conditions of machining...
US-1,004,2680 Cross-domain data sharing with permission control
An electronic device may maintain separate OS domains associated with security permissions. The OS domain may implement separate corresponding clipboard...
US-1,004,2354 Security system for industrial control infrastructure using dynamic signatures
An industrial control system hardened against malicious activity monitors highly dynamic control data to develop a dynamic thumbprint that can be evaluated to...
US-1,004,0338 Apparatus for controlling tint of display panel provided on vehicle window to adjust light transmittance
Disclosed is an apparatus for controlling tint of a display panel provided on a vehicle window to adjust light transmittance depending on ambient light...
US-1,003,9558 Arthroplasty jig and method of performing arthroplasty
A method and system for performing a total joint arthroplasty procedure on a patient's damaged bone region. A CT image or other suitable image is formed of the...
US-1,003,9496 Near field telemetry link for passing a shared secret to establish a secure radio frequency communication link...
A physiological condition monitoring system (e.g., a continuous glucose monitoring system) includes a physiological condition meter and a physiological...
US-1,003,9327 Computing device with enabled electronic vapor device
The present disclosure relates to an electronic vaping system. In an embodiment, the electronic vaping system may be paired (e.g., communicate, exchange data,...
US-1,003,9057 Optimized deployment of BLE network and power efficient and secure management of data exchange between BLE devices
The present disclosure is related to a system for managing data exchanges between Bluetooth Low Energy (BLE) devices. The system includes a plurality of BLE...
US-1,003,9001 Method for secured transmission of a data object
A method is disclosed comprising receiving identification information on an addressee, to whom an encrypted data object is sent by a transmission device or for...
US-1,003,8931 Embedded system for video processing with hardware means
An embedded system for video processing comprises hardware means for realizing the following functions: a) a server function, wherein for realizing the server...
US-1,003,8778 Locally securing sensitive data stored on a mobile phone
Locally securing sensitive data stored on a mobile phone. In one embodiment, a computer-implemented method for locally securing sensitive data stored on a...
US-1,003,8721 Enabling an on-premises resource to be exposed to a public cloud application securely and seamlessly
An application deployed in a public cloud is enabled to access an on-premises resource securely and without requiring additional ports on a firewall. A pair of...
US-1,003,8720 Master security policy server
A master policy server manages security polices for client computers through a network of local policy servers. Each local policy server is responsible for the...
US-1,003,8708 Geo-mapping system security events
A particular security event is identified that has been detected as targeting a particular computing device included in a particular computing system. A...
US-1,003,8707 Rarity analysis in network security anomaly/threat detection
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.