Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,002,1118 Predicting account takeover tsunami using dump quakes
Methods, systems, and computer program products for predicting an account takeover tsunami using dump quakes are disclosed. A computer-implemented method may...
US-1,002,1115 Integrated security system having rule optimization
Techniques are described for optimizing the placement of automatically generated rules within security policies. An administrator may, for example, interact...
US-1,002,1105 Mobile device enabled tiered data exchange via a vehicle
A mobile device enabled tiered data exchange via a vehicle is disclosed. A mobile device can access profile information related to a tiered-data sharing...
US-1,002,1088 Fast smart card logon
Methods and systems for faster and more efficient smart card logon and for giving a client device full domain access in a remote computing environment are...
US-1,002,1087 Method and system for providing a secure communication channel to portable privatized data
A system and method for communicating secure, privatized data stored on a first user device with a second user device requesting access thereto includes...
US-1,002,1078 System, apparatus and method for encryption and decryption of data transmitted over a network
A method and system for securing data transmitted between a client device and a server by obtaining input text at an intermediate module, processing the input...
US-1,002,1075 Multiple data center data security
Securely replicating backup data in a network having a production site and a plurality of remote sites by generating in the production site a data encryption...
US-1,002,1072 Security system and communication control method
A security system comprising: a first gateway device; a second gateway device; and a duplex communication line, wherein a first proxy part of the first gateway...
US-1,002,1050 Secure conversation and document binder
Disclosed are various embodiments for maintaining a collection of documents and user-defined messages made in conversations such that the collection may be...
US-1,002,1021 Broadband fallback for router
Systems for routing data over first and second broadband network. A router includes a first network interface that is configured to provide communication via a...
US-1,002,1016 VLAN to secure communication between virtual machines and in a multi-tenant public data center
A method for creating a set of virtual machines on a public datacenter. The method, from a first network controller of a private network, commands a second...
US-1,002,0987 Systems and methods for correlating sensory events and legacy system events utilizing a correlation engine for...
Monitoring systems and methods for use in security, safety, and business process applications utilizing a correlation engine are disclosed. Sensory data from...
US-1,002,0942 Token-based secure data management
In some implementations, tokens that are representative of sensitive data may be used in place of the sensitive data to maintain the security of the sensitive...
US-1,002,0936 Systems and methods for encryption and provision of information security using platform services
Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in...
US-1,002,0935 Systems and methods for encryption and provision of information security using platform services
Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in...
US-1,001,9703 Verifying a secure connection between a network beacon and a user computing device
A beacon device establishes a network connection with a user computing device. The beacon device determines the received signal strength indicator of the user...
US-1,001,9605 Systems, methods and apparatus for secure peripheral communication
An interface device includes a communication interface and a secure element. The communication interface receives input data and a selection of one of a...
US-1,001,9603 Secured memory system and method therefor
There is disclosed a cache memory controller for storing cache data within a cache, the cache data comprising an unsecured version data to corresponding secured...
US-1,001,9601 Method and apparatus for securely saving and restoring the state of a computing platform
An apparatus and method for securely suspending and resuming the state of a processor. For example, one embodiment of a method comprises: generating a data...
US-1,001,9590 Secure mobile phone document storage application
A method for a smart phone app is provided wherein entry to a secure data storage area is facilitated on a file or object level, and not on an app level,...
US-1,001,9588 Systems and/or methods for enabling cooperatively-completed rules-based data analytics of potentially sensitive...
Certain example embodiments relate to systems and/or methods for providing enhanced control over potentially sensitive data sharable among and/or between...
US-1,001,9581 Identifying stored security vulnerabilities in computer software applications
Identifying stored security vulnerabilities in computer software applications by providing via a first interface of a computer software application during...
US-1,001,9569 Dynamic patching for diversity-based software security
Methods, devices, and non-transitory storage media for dynamic patching of diversity-based software executing on a computing device. One of many variations of...
US-1,001,9555 Interactive respiratory device usage tracking system
A monitoring system for inhalers includes a tracker module configured to be secured to a variety of inhalers, including both controller and rescue inhalers. The...
US-1,001,9430 System and method for automatically filling out forms
The invention comprises a system and method for storing consumers' data and automatically filling out forms by sending this information to merchants, allowing...
US-1,001,9279 Transparent secure interception handling
A method and system for transparent secure interception handling is provided. The method and system include deploying a virtual machine (VM) in an environment...
US-1,001,9246 Device, method, and system for installing and managing applications in a handheld device
The object of the invention is to provide the user with improved operatability of an information-processing apparatus and usability of application programs as...
US-1,001,7156 Vehicle security system
A vehicle security system for monitoring a vehicle and notifying a user includes at least two image capture devices (ICD), sensors, a global positioning system...
US-1,001,7155 Cross correlation between connected vehicles and other online devices
Embodiments of the present invention disclose a method, computer system, and a computer program product for vehicle software security associated with a vehicle....
US-RE46,947 Data security method and device for computer modules
A security method for an attached computer module in a computer system. The security method reads a security identification number in an attached computer...
US-1,001,5766 Apparatus and method for securely tracking event attendees using IOT devices
Associating each of a plurality of an Internet of Things (IoT) devices with a different attendee at an event, the IoT devices configured to form local wireless...
US-1,001,5740 Voice and data continuity between wireless devices
An accessory wireless device partakes in a data session with a remote device. The data session may be a voice call or other service. To preserve the battery...
US-1,001,5652 Near-field wireless communication equipment, and near-field wireless communication method
A wireless communication equipment capable of securing the reliability and validity of transmission data, for example, a near-field wireless communication...
US-1,001,5542 Method and apparatus for secure storage and retrieval of live off disk media programs
A method and system are provided for securely storing and retrieving live off-disk media programs. Events delineate media segments, each of which are encrypted...
US-1,001,5208 Single proxies in secure communication using service function chaining
A first service node receives a message configured to set up a secure communication session between a client and a server, in which the first service node acts...
US-1,001,5199 Processing security-relevant events using tagged trees
Devices described herein are configured to propagate tags among data objects representing system components. Such devices may detect an event associated with a...
US-1,001,5197 Determining network security policies during data center migration and detecting security violation
Input data are received from a source environment comprising a plurality of servers and one or more applications running on at least one of the servers. One or...
US-1,001,5196 Fast reconfiguring environment for mobile computing devices
An example method includes receiving an indication of a selection of a first application environment that includes a first virtual environment associated with a...
US-1,001,5187 System and method for performing remote security assessment of firewalled computer
Methods and systems for scanning an endpoint terminal across an open computer network are disclosed. An exemplary method includes providing a scanner engine in...
US-1,001,5186 Method and apparatus for reducing security risk in a networked computer system architecture
An apparatus and associated method are provided for reducing a security risk in a networked computer system architecture. The method comprises receiving at a...
US-1,001,5177 Lateral movement detection for network security analysis
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,001,5168 System and method for secure control of resources of wireless mobile communication devices
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
US-1,001,5164 Modules to securely provision an asset to a target device
The embodiments described herein describe technologies for Module management, including Module creation and Module deployment to a target device in an operation...
US-1,001,5152 Securing data in a dispersed storage network
A method for execution by a dispersed storage and task (DST) processing unit includes transforming a counter seed into a set of counter values; obtaining an...
US-1,001,5150 Systems and methods for Smartkey information management
A system and method are provided for the secure sharing of information across and open network and for performing management of keys used for encrypting and...
US-1,001,5146 Computer implemented system and method for secure session establishment and encrypted exchange of data
A system(s) and method(s) for secure session establishment and secure encrypted exchange of data is disclosed. The system satisfies authentication requirement...
US-1,001,5137 Device for interconnecting communication networks with controlled security
The invention relates to a device for interconnecting at least two data-communication networks, connecting a first network qualified as a high-security network...
US-1,001,5018 Signing key log management
Cryptographic keys can include logging properties that enable those keys to be used only if the properties can be enforced by the cryptographic system requested...
US-1,001,4941 Photon data transmission method and transmission device for mobile terminal, and photon data receiving device
The present disclosure discloses a photon data transmission method and device for a mobile terminal, where to-be-transmitted data is encoded by tuning a light...
US-1,001,3983 Selective passive voice authentication
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for authenticating a user using a voice biometric program are...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.