Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,016,2977 System for securing the critical data of an on-board airplane system of an aircraft
A data security system for securing the critical data of an on-board airplane avionics system comprising access control means for controlling access to the said...
US-1,016,2970 Automated intelligence graph construction and countermeasure deployment
Techniques for providing information security threat assessment and amelioration are disclosed. The techniques may include obtaining fundamental data, obtaining...
US-1,016,2949 Dynamic token having log function and working method therefor
A dynamic token having a log function and a working method therefor. After the dynamic token determines that a key interrupt flag is set, a keyboard is scanned...
US-1,016,2947 Methods and systems for generating history data of system use and replay mode for identifying security events...
Devices and methods are presented for managing data security. One example method includes receiving user identification information from a screen of a device...
US-1,016,2943 Streamlined digital rights management
A streamlined workflow for digital rights management (DRM) licensing for content such as media assets is achieved via an authentication server establishing an...
US-1,016,2827 Method and system for distributed control system (DCS) process data cloning and migration through secured file...
A method includes generating a migration image file for a software migration based on configuration parameters associated with a first node of an industrial...
US-1,016,1141 Load distribution structures for raised floor data center
Load distribution structures are provided for a raised floor tile(s) of a raised floor data center. The load distribution structure, which resides adjacent to...
US-1,016,0457 Vehicle occupant monitoring using infrared imaging
Methods and systems for monitoring vehicle occupants using infrared and other sensors are disclosed. The systems may use infrared sensor data to identify each...
US-1,015,8997 Wireless system with secure range determination
A wireless network may include devices that wirelessly transmit and receive packets. Each packet may include a preamble, a start-of-frame delimiter, a physical...
US-1,015,8991 Method and system for managing security keys for user and M2M devices in a wireless communication network...
Pre Shared Keys ("PSK") for application and data session security are generated using application authentication secret values stored in a SIM device/card. The...
US-1,015,8742 Multi-stage acceleration system and method
A Multi-Stage Acceleration System improves performance, security, and reduces data transferred for mobile devices using wireless networks by transforming...
US-1,015,8718 Sensor nodes with multicast transmissions in lighting sensory network
In one example, a method is provided for a lighting node within a lighting infrastructure to communicate data to other nodes within a lighting sensory network....
US-1,015,8674 Multi-level affinitization for enterprise security management
Methods and systems for assigning security settings to one or more nodes within an enterprise network are disclosed. One method includes receiving network...
US-1,015,8672 Context aware microsegmentation
Context aware microservice networks and contextual security policies for microservice networks are provided herein. In some embodiments, a system includes a...
US-1,015,8663 Incident response using asset configuration data
Systems, methods, and software described herein enhances how security actions are implemented within a computing environment. In one example, a method of...
US-1,015,8658 System for determining network anomalies
Described are techniques for determining abnormalities in the transmission of data using one or more networks. Responsive to a request or other data, multiple...
US-1,015,8652 Sharing model state between real-time and batch paths in network security anomaly detection
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,015,8651 Verifying secure transactions through distributed nodes
An example client device includes a processor configured construct a key to be used to encrypt or decrypt data of a communication session between the client...
US-1,015,8618 System and method for securely accessing data through web applications
A system for providing information server security in a distributed computing environment achieved by injecting a proprietary mediating entity into the...
US-1,015,8612 Imaging-based automatic data extraction with security scheme
A system and method for secure data transfer between two secure computer systems via display-based transfer in geometric form. A first computer network stores...
US-1,015,8611 System for multiplexing and demultiplexing blockchain ledgers via a cryptographic hash
Embodiments of the present invention provide a system for multiplexing and demultiplexing blockchain ledgers via a cryptographic hash. In particular, the...
US-1,015,8607 Secure processing environment for protecting sensitive information
A processor-implemented method for a secure processing environment for protecting sensitive information is provided. The processor-implemented method may...
US-1,015,8605 Delegated access control of an enterprise network
Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a...
US-1,015,8493 Solution for generating and issuing security codes with guaranteed issuer authenticity and origin
A method of generating, emitting and validating a security code in QR Code or Data Matrix formats, which may be printed in physical media, displayed in...
US-1,015,8490 Double authentication system for electronically signed documents
Disclosed is a double authentication system ("DAS") for electronically signing a first data from a user having a smart card, where the smart card has a personal...
US-1,015,8489 Password-less authentication for access management
An access management system is disclosed that can provide access to resources by password-less authentication. The access management system can provide multiple...
US-1,015,8483 Systems and methods for efficiently and securely storing data in a distributed data storage system
The present disclosure discloses a method of storing data in a distributed data storage system, the distributed data storage system including a plurality of...
US-1,015,8431 Dynamic relay assignment for jamming mitigation in wireless networks
A method for mitigating the effect of a localized jamming attack on a secure, tactical wireless network implements a dynamic relay assignment ("DRA") approach,...
US-1,015,8416 Unattended black side data link relay
An unattended apparatus and method for isolating and relaying secure communications under adverse circumstances without awareness of encryption keys uses known...
US-1,015,7526 System and method for a security system
An apparatus and method is presented for network video management and recording of video signals and video analytics generated by a network of IP-enabled...
US-1,015,7421 Secure analytical and advisory system for transaction data
Methods and systems are described herein for securely analyzing transaction data of a user. A server computing device establishes a secure connection with a...
US-1,015,7289 Progressive key rotation for format preserving encryption (FPE)
Aspects of the disclosure provide a technological improvement to a cipher by improving data security of format-preserving encryption (FPE), by, inter alia,...
US-1,015,7286 Platform for adopting settings to secure a protected file
Aspects of the present invention provide the ability to enforce access methods on data based upon a policy or policies identified within the metadata of a file....
US-1,015,7284 Multi-party encryption cube processing apparatuses, methods and systems
Computer-implemented systems and methods are disclosed herein for use within secure multi-party computation. A system and method are used for storing an...
US-1,015,7269 Verification system for secure transmission in a distributed processing network
A verification system, includes: an arithmetic/logic unit ("ALU") to perform one or more mathematical operations and compare selected variables; a register to...
US-1,015,6917 Input apparatus and controlling method thereof
An input apparatus capable of receiving an input is provided. The input apparatus includes a communicator configured to communicate with a first user terminal...
US-1,015,6900 Systems and methods for discerning eye signals and continuous biometric identification
Apparatus, systems, and methods are provided for substantially continuous biometric identification (CBID) of an individual using eye signals in real time. The...
US-1,015,6604 Semiconductor apparatus and method of operating the same
A semiconductor apparatus includes a debugging processor that performs a debugging operation related to at least one selected intellectual property (IP) block...
US-1,015,6582 Bicycle pedaling frequency sensor
The present disclosure is for a bicycle pedaling frequency sensor comprising a signal acquisition unit, a data transmission unit, and/or a data conversion unit....
US-1,015,4814 Wearable personal information system
A personal information system is provided. The system may include a portable information device having a housing including a top surface defined at least...
US-1,015,4444 Method and apparatus for improving handover success rate
The present disclosure relates to a communication technique for combining a 5G communication system for supporting a higher data transmission rate after a 4G...
US-1,015,4408 System and method for providing a public number-private number telephony system
This invention shows a method for operating a voice communications network that comprises dynamically associating a private number with at least one public...
US-1,015,4398 Methods and systems for node selection in multihop wireless sensor networks
A method and system for node selection in a multihop wireless sensor network is disclosed. The method includes: determining, at a source node, a leftover energy...
US-1,015,4084 Hybrid applications utilizing distributed models and views apparatuses, methods and systems
The HYBRID APPLICATIONS UTILIZING DISTRIBUTED MODELS AND VIEWS APPARATUSES, METHODS AND SYSTEMS ("HAP") transform hybrid application user inputs using HAP...
US-1,015,4066 Context-aware compromise assessment
Assessing compromises of data security is achieved by establishing access control policies for data files in storage devices across an enterprise. A list is...
US-1,015,4062 Rule lookup using predictive tuples based rule lookup cache in the data plane
This disclosure describes an approach to handle packets that arrive at a network security device, such as a router. At a data plane of the security device,...
US-1,015,4047 Method and system for generating a kill chain for monitoring computer network security
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,015,4044 Method, system, and computer program product for providing security and responsiveness in cloud based data...
A storage controller that is coupled to a plurality of storage clouds is maintained. The storage controller determines security requirements for performing a...
US-1,015,4037 Techniques for implementing a data storage device as a security device for managing access to resources
Techniques are disclosed for implementation of a data storage device as a security device for managing access to resources. These techniques can be implemented...
US-1,015,4031 User-wearable secured devices provided assuring authentication and validation of data storage and transmission
Described are user-wearable devices utilizing encryption authentication techniques to ensure security of any data transmission to and from these devices. In...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.