Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,032,6786 Methods for using organizational behavior for risk ratings
Among other things, traces are received of activities of an online user who is associated with an entity. By analysis of the traces a security state of the...
US-1,032,4862 Supporting oversubscription of guest enclave memory pages
Implementations of the disclosure provide for supporting oversubscription of guest enclave memory pages. In one implementation, a processing device comprising a...
US-1,032,1824 Patient monitor screen aggregation
A remote interface system according to some embodiments includes one or more patient monitoring devices having one or more sensors for patient monitoring, one...
US-1,032,1503 Method and apparatus for attaching a remote unit to a mobile core network via a standalone untrusted non-3GPP...
A method and apparatus attach a remote unit to a mobile core network via a standalone untrusted non-3GPP access network. A remote unit can be communicated with...
US-1,032,1309 Apparatuses and methods for wireless communication
One feature pertains to a method operational at a device. The method includes performing key agreement with a core network device, and generating an...
US-1,032,0789 Fast and secure way to fetch or post data and display it temporarily to a user
A method for interacting with one or more data resources is disclosed which decreases necessary user actions and improves security. In one embodiment, the...
US-1,032,0787 System and method of facilitating the identification of a computer on a network
A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may...
US-1,032,0784 Methods for utilizing fingerprinting to manage network security and devices thereof
Methods, non-transitory computer readable media, and security management computing devices are disclosed herein. With this technology, an executable code is...
US-1,032,0776 Protection of application passwords using a secure proxy
Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server....
US-1,032,0775 Eliminating abuse caused by password reuse in different systems
Methods, systems, and computer program products for eliminating abuse caused by password reuse in different computer systems are disclosed. For example, a...
US-1,031,8741 Data security and risk ranking tool
A risk ranking tool includes a retrieval engine, a data risk engine, an operational risk engine, and a data security engine. The data risk engine calculates,...
US-1,031,4216 Method of fabricating electronic cards including at least one printed pattern
The invention relates to a method for fabricating electronic cards by A) forming a plurality of card bodies in the form of a thick sheet with a plurality of...
US-1,031,3890 Method and device for receiving service through different wireless communication systems
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-1,031,3385 Systems and methods for data driven game theoretic cyber threat mitigation
System and methods for a data-driven security game framework that models an attacker based on exploit market data actively mined from the darknet to develop...
US-1,031,2957 Communication method and apparatus for wearable device in wireless communication system
The present invention relates to a technology for a sensor network, machine to machine (M2M) communication, machine type communication (MTC), and the Internet...
US-1,031,2940 Data processing apparatus and data processing method
The present technology relates to a data processing apparatus and a data processing method that are able to secure good communication quality in data...
US-1,030,6596 Method and system for connectionless transmission during uplink and downlink of data packets
A method and system for uplink-downlink transmission of data packets in a wireless cellular network, during idle state of User Equipment (UE) using ...
US-1,030,6526 Method and apparatus for controlling handover in a wireless communication system
A method and apparatus is provided that controls the handover between distributed units (DUs) (inter-DU handover) in an eNB including a central unit (CU) and a...
US-1,030,6520 Handover method between heterogeneous wireless communication techniques and device for same
The present invention relates to a handover method between heterogeneous wireless communication techniques and a device for same. A wireless access device is...
US-1,030,6500 Method and device for controlling data traffic during access to wireless LAN and cellular network
A communication method for incorporating an IoT technique with a 5G communication system for supporting a higher data transmission rate in comparison with a 4G...
US-1,030,6470 System and method for validating authenticity of base station and/or information received from base station
A communication method and a system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data rates beyond a 4.sup.th-Generation...
US-1,030,6465 Protecting sensitive data in a security area
Managing data security on a mobile device. Data associated with a mobile device is received; the data includes an identification (ID) of the mobile device and a...
US-1,030,6463 Secure data link for subscriber identification module (SIM)-based processor
The subject matter described herein includes methods, systems, and computer program products for providing a bi-directional data path to a SIM containing an...
US-1,030,6187 Adjustable movement detection doorbell
Systems, apparatuses, and methods relating to security system and automation monitoring are described. In one embodiment a method may include receiving motion...
US-1,030,6023 Pre-formed instructions for a mobile cloud service
Methods, systems, and computer readable mediums are disclosed for introducing pre-formed instruction sets to a mobile cloud service. In some examples, an...
US-1,030,6012 Secure network access to infusion pump
A system for secure network access to an infusion pump has an infusion pump and a server computer. The infusion pump includes a network interface circuit...
US-1,030,5995 Techniques for device independent session migration
Techniques for device independent session migration are presented. A secure mechanism is presented for a target device to receive a current authenticated...
US-1,030,5937 Dividing a data processing device into separate security domains
This invention provides secure, policy-based separation of data and applications on computer, especially personal computers that operate in different...
US-1,030,5924 Network security analysis system
A network security analysis system performs anomaly detection with low false positives by implementing a multiple perspective analysis of network data. The...
US-1,030,5922 Detecting security threats in a local network
Disclosed is a system for detecting security threats in a local network. A security analytics system collects data about entities in the local network. The...
US-1,030,5921 Network security apparatus and method of detecting malicious behavior in computer networks via cost-sensitive...
A network security apparatus includes a packet detector detecting transmission of data packets between a plurality of hosts and a plurality of domains and...
US-1,030,5906 Access heartbeat for a hardware security module
Systems, devices and processes are described for implementing an access heartbeat role on a hardware security module (HSM) that stores secure data on behalf of...
US-1,030,5904 Facilitating secure network traffic by an application delivery controller
Facilitation of secure network traffic by an application delivery controller is provided herein. In some examples, a method includes: (a) receiving a data...
US-1,030,5896 Authentication system
The invention relates to an authentication system, comprising a security element (1) having a changing or changeable surface (6), structure, volume,...
US-1,030,5888 Secure data entry via audio tones
A cloud client device identifies one or more devices within a predetermined range of the cloud client device operable to communicate with the cloud client...
US-1,030,5882 Using a service-provider password to simulate F-SSO functionality
A system and method for using a Service-Provider password to simulate F-SSO functionality. A processor receives from an F-SSO Identity Provider authentication...
US-1,030,5880 System for secure enrollment and secure verification of network users by a centralized identification service
A system and method for providing, as a service over a computer network (especially a packet-switched computer network) to a body of merchants connected to the...
US-1,030,5877 MRCP gateway for mobile devices
A system and method for securely bridging mobile-originated Media Resource Control Protocol (MRCP) transactions with at least one Media Resource Server. A...
US-1,030,5870 Cryptography and key management device verification
A method for operating a secure device having a plurality of mutually exclusive circuit zones, including a first circuit zone having a first level of security...
US-1,030,5869 Methods and systems for transferring secure data and facilitating new client acquisitions
Methods and systems for directly and securely transferring encrypted medical data between two remote locations, such as an imaging site and a diagnostic site,...
US-1,030,5868 Stream splitting moving target defense
Systems and methods for utilizing stream splitting Moving Target Defense (MTD) to provide enhanced computer system communication system security by splitting a...
US-1,030,5866 Data transmission method, base station and user equipment
A data transmission method, a base station, and user equipment are presented. The method includes performing rotation processing on a preset precoding matrix;...
US-1,030,5862 Secure communication with a mobile device
Method and system for securely communicating with a machine to machine, M2M, device comprising sharing a secret or data derived from the secret between the M2M...
US-1,030,5829 Database systems and methods for integrating data items collected from multiple data sources
Embodiments of the present disclosure relate to a database system for collecting and integrating electronic data items from multiple data sources. Embodiments...
US-1,030,5690 Two-step central matching
A method performed by a client device of enrolling biometric data of a user with a network node over a secure communication channel comprises capturing the...
US-1,030,5686 Encrypted group communications
Secure data transfers between communication nodes is performed using a group encryption key supplied by a remote management system. A first node transmits a...
US-1,030,4319 Monitoring and security devices comprising multiple sensors
A monitoring device comprises a single housing, a plurality of sensors supported by the housing to detect respective characteristics of a location, a processing...
US-1,030,4301 Wireless environmental data capture system and method for mesh networking
A mesh network-based environmental data capture system and method for providing communication between a base system having at least one wireless input capture...
US-1,030,4270 Secured communication system and data model to facilitate authorization to access rental property
Various embodiments relate generally to electrical and electronic hardware, computer software and systems, wired and wireless network communications, and...
US-1,030,4150 Apparatus and method for protecting real-time safety and security relevant video data
A system for generating and detecting watermarks within a video frame (e.g., video content) is described to determine whether a data interruption has occurred....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.