Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,001,5740 Voice and data continuity between wireless devices
An accessory wireless device partakes in a data session with a remote device. The data session may be a voice call or other service. To preserve the battery...
US-1,001,5652 Near-field wireless communication equipment, and near-field wireless communication method
A wireless communication equipment capable of securing the reliability and validity of transmission data, for example, a near-field wireless communication...
US-1,001,5542 Method and apparatus for secure storage and retrieval of live off disk media programs
A method and system are provided for securely storing and retrieving live off-disk media programs. Events delineate media segments, each of which are encrypted...
US-1,001,5208 Single proxies in secure communication using service function chaining
A first service node receives a message configured to set up a secure communication session between a client and a server, in which the first service node acts...
US-1,001,5199 Processing security-relevant events using tagged trees
Devices described herein are configured to propagate tags among data objects representing system components. Such devices may detect an event associated with a...
US-1,001,5197 Determining network security policies during data center migration and detecting security violation
Input data are received from a source environment comprising a plurality of servers and one or more applications running on at least one of the servers. One or...
US-1,001,5196 Fast reconfiguring environment for mobile computing devices
An example method includes receiving an indication of a selection of a first application environment that includes a first virtual environment associated with a...
US-1,001,5187 System and method for performing remote security assessment of firewalled computer
Methods and systems for scanning an endpoint terminal across an open computer network are disclosed. An exemplary method includes providing a scanner engine in...
US-1,001,5186 Method and apparatus for reducing security risk in a networked computer system architecture
An apparatus and associated method are provided for reducing a security risk in a networked computer system architecture. The method comprises receiving at a...
US-1,001,5177 Lateral movement detection for network security analysis
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,001,5168 System and method for secure control of resources of wireless mobile communication devices
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
US-1,001,5164 Modules to securely provision an asset to a target device
The embodiments described herein describe technologies for Module management, including Module creation and Module deployment to a target device in an operation...
US-1,001,5152 Securing data in a dispersed storage network
A method for execution by a dispersed storage and task (DST) processing unit includes transforming a counter seed into a set of counter values; obtaining an...
US-1,001,5150 Systems and methods for Smartkey information management
A system and method are provided for the secure sharing of information across and open network and for performing management of keys used for encrypting and...
US-1,001,5146 Computer implemented system and method for secure session establishment and encrypted exchange of data
A system(s) and method(s) for secure session establishment and secure encrypted exchange of data is disclosed. The system satisfies authentication requirement...
US-1,001,5137 Device for interconnecting communication networks with controlled security
The invention relates to a device for interconnecting at least two data-communication networks, connecting a first network qualified as a high-security network...
US-1,001,5018 Signing key log management
Cryptographic keys can include logging properties that enable those keys to be used only if the properties can be enforced by the cryptographic system requested...
US-1,001,4941 Photon data transmission method and transmission device for mobile terminal, and photon data receiving device
The present disclosure discloses a photon data transmission method and device for a mobile terminal, where to-be-transmitted data is encoded by tuning a light...
US-1,001,3983 Selective passive voice authentication
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for authenticating a user using a voice biometric program are...
US-1,001,3850 Methods and apparatus for providing secure logon to a gaming machine using a mobile device
A gaming system compatible with patron-controlled portable electronic devices, such as smart phones or tablet computers, is described. When a transaction is...
US-1,001,3833 Transponder key replication
A method and apparatus for replicating a transponder key is disclosed. The transponder replication device includes an antenna that reads a transponder code from...
US-1,001,3750 Object detection methods, display methods and apparatuses
Disclosed are object detection method, display methods and apparatuses. The method includes obtaining slice data of inspected luggage in the CT system;...
US-1,001,3582 Secure data entry device
A secure data entry device including a housing having at least one housing element, at least one additional element located within the housing, at least one...
US-1,001,3580 Security device with programmable systolic-matrix cryptographic module and programmable input/output interface
A system includes programmable systolic cryptographic modules for security processing of packets from a data source. A first programmable input/output interface...
US-1,001,3579 Secure routing of trusted software transactions in unsecure fabric
Various configurations and methods for securing and validating trusted input output (IO) data communications within fabric interconnects of processing circuitry...
US-1,001,3578 Apparatus for processing with a secure system manager
Method and apparatus for secure processing. The method includes detecting communication among secure and non-secure data entities, prohibiting execution of...
US-1,001,3574 Method and apparatus for secure storage and retrieval of encrypted files in public cloud-computing platforms
In one aspect, a computerized Encrypted Drive System (EDS) server useful for keyword extraction and indexing server of includes a computer store containing...
US-1,001,3567 Private and public sharing of electronic assets
The embodiments set forth techniques for implementing a cloud service that enables cloud data to be shared between different users in a secure manner. One...
US-1,001,3566 System and method for managing collaboration in a networked secure exchange environment
In embodiments of the present invention improved capabilities are described for securely viewing computer data content, such as documents, presentations,...
US-1,001,3565 System and method for secure transport of data from an operating system to a pre-operating system environment
An information handling system includes a trusted platform module (TPM) and a storage device, the TPM provides boot authentication for the information handling...
US-1,001,3560 Securely exchanging information during application startup
Provided is a method for securely exchanging information during application startup. A processor may send a request for a passphrase to one or more remote...
US-1,001,3527 Automatically assessing an anatomical surface feature and securely managing information related to the same
A facility for procuring and analyzing information about an anatomical surface feature from a caregiver that is usable to generate an assessment of the surface...
US-1,001,3390 Secure handle for intra-and inter-processor communications
A protocol element referred to as a secure handle is described which provides an efficient and reliable method for application-to-application signaling in...
US-1,001,3385 Programmable validation of transaction requests
A data processor includes an input/output bridge that provides enforcement of a security status on transactions between devices across the bridge. The bridge...
US-1,001,3364 Securing data using per tenant encryption keys
One embodiment is directed to a technique which secures data on a set of storage drives of a data storage system. The technique involves encrypting data from a...
US-1,001,3138 Method and apparatus for secure data entry using a virtual interface
Method and apparatus for secure data entry. In the method a virtual data entry interface is generated, and is outputted so as to be readable only by the user....
US-1,001,2993 Method and system for risk modeling in autonomous vehicles
A method for adaptive risk modeling for an autonomous vehicle, the method comprising: retrieving parameters of an identified driving mission of the autonomous...
US-1,001,2406 Method and apparatus for controlling temperature
The present disclosure relates to a sensor network, Machine Type Communication (MTC), Machine-to-Machine (M2M) communication, and technology for Internet of...
US-1,001,2009 Electric lock device for furniture and storage
An electric lock device for furniture or storage has an RFID transmitter/receiver for communication with portable data carriers. A controller detects a data...
US-1,001,1248 Cross correlation between connected vehicles and other online devices
Embodiments of the present invention disclose a method, computer system, and a computer program product for vehicle software security associated with a vehicle....
US-1,001,0777 Bat swing training system and method of use
A system for swing training with a bat, the system includes a training device, having a bat spacer attached to a sweet spot position on the bat about a barrel...
US-1,001,0010 Mobile video, audio, and sensory apparatus
A self-contained mobile surveillance apparatus has applicability in a variety of short or long term settings where security and documentation of activities are...
US-1,000,9826 Wide area network (WAN) backhaul for wireless relays in a data communication network
A wireless relay serves a first User Equipment (UE). An eNodeB wirelessly exchanges UE signaling data and UE user data with the first UE. The eNodeB processes...
US-1,000,9773 Secured data access from a mobile device executing a native mobile application and a headless browser
Systems, methods, and computer-readable storage devices to enable secured data access from a mobile device executing a native mobile application and a headless...
US-1,000,9762 Method and system to enable secure communication for inter-eNB transmission
The embodiments herein provide a method and system for creating a secure connection for a User Equipment (UE) in a wireless network including a UE, carrier...
US-1,000,9354 Trust relationships in a computerized system
Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in...
US-1,000,9344 Systems and methods for endpoint management classification
A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to...
US-1,000,9322 Secure virtualized mobile cellular device
Secure virtualizing of a mobile cellular device uses a cellular communication network having base transceiver station edge node servers. A virtualized-instance...
US-1,000,9180 System and method for generating auditable secure seeds from real-world data
An interface receives a first digital signature of real-world data. A memory stores the first digital signature as seed data. The interface receives a second...
US-1,000,9175 Secure communication
A method for allowing a first party and a second party to obtain shared secret information is provided. The method comprises the steps of: obtaining, by the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.