Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,041,0011 Enabling secure big data analytics in the cloud
Methods are provided for enabling secure big data analytics in the cloud. A method includes reading a secure file, by a Secure Distributed File System in a...
US-1,041,0003 Multiple containers assigned to an application
The disclosed technology addresses the need in the art for assigning multiple containers to a single application. A container can be a specified area of a file...
US-1,040,9991 Technique for secure data loading to a system component
A USB device for secure data loading to a system component, such as of an aircraft. The USB device is operable in a mass storage mode and in a non-mass storage...
US-1,040,9984 Hierarchical data security measures for a mobile device
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for storing a plurality of stored fingerprints, wherein each...
US-1,040,9982 Secure data access for multi-purpose mobile devices
According to some embodiments, a proxy server comprises one or more processors operable to establish communication with a secure client application of a device....
US-1,040,9976 System and method for PIN entry on mobile devices
A system for entering a secure Personal Identification Number (PIN) into a mobile computing device includes a mobile computing device and a peripheral device...
US-1,040,9971 System and method for secretive storage of applications in portable computing device
The embodiments herein provide a system and method for an authentication-driven secret installation and access to applications and data on handheld computing...
US-1,040,9793 Secure and flexible inter-program communication
In one embodiment, a method for providing secure and flexible inter-program communication includes storing an ontology in a first data store, the ontology...
US-1,040,9491 Method of data analysis and extraction for embedded security devices
A method of data analysis and extraction for embedded security devices and belongs to the data recovery field, includes: Analyzing the DBR table of the first...
US-1,040,9406 Systems and methods for increased security in authentication code entry for touch-sensitive screen enabled devices
Systems and methods for increased security in authentication code entry for touch-sensitive screen enabled devices are disclosed. According to one embodiment, a...
US-1,040,8988 Techniques for enhanced diffusion lighting
Techniques for creating, configuring, and employing diffusion light devices are presented. Such light device(s) can comprise or be associated with a light...
US-1,040,8081 Inspection apparatus and methods of inspecting gas turbine engines
Inspection apparatus for a gas turbine engine, the inspection apparatus comprising: a sensor configured to generate data; a housing having an exterior surface...
US-1,040,6756 Tendon placement for high-altitude balloons
Aspects of the disclosure relate to manufacturing balloon envelopes for use in high-altitude mesh networks for packet-data communications. As an example, a gore...
US-1,040,5373 Distributed core architecture for implementing wireless communication networks
A system for implementing a distributed core architecture of a wireless communication network is provided. The system includes a plurality of devices configured...
US-1,040,5284 Power headroom report method and apparatus of UE
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-1,040,5270 Adaptive internet connectivity selection
Internet access has become ubiquitous and the means by which it is obtained varies widely. A mobile Hotspot is a device that includes a modem for mobile...
US-1,040,5207 Method and device for receiving broadcast information in wireless communication system
The present disclosure relates to a communication technique which combines a 5G (5th Generation) communication system, for supporting a higher data transmission...
US-1,040,5176 Operation of control protocol data units in packet data convergence protocol
A method and apparatus reports packet data control protocol (PDCP) status and PDCP resets in a wireless communication, using control PDUs that may have security...
US-1,040,4949 Secure aircraft camera monitoring system
Secure aircraft camera monitoring includes capturing images of an area of interest proximate to an aircraft, and securely transmitting the images as data files...
US-1,040,4866 System, network, device and stacked spectrum method for implementing spectrum sharing of multiple contiguous...
A system and method in various embodiments implements a virtual spectrum band stacking technique facilitating spectrum sharing by converting and combining...
US-1,040,4838 Systems and methods for selecting microservices to process protocol data streams
Systems and methods are described herein generally relating to network security, and in particular, embodiments described generally relate to systems and...
US-1,040,4756 Context-aware data loss prevention (DLP) for cloud security
A computer-implemented method for accessing a hosted service on client devices is described. The client devices include client software that uses a remotely...
US-1,040,4755 Deep application programming interface inspection (DAPII) for cloud security
A computer-implemented method for accessing a hosted service on client devices is described. The client devices include client software that uses a remotely...
US-1,040,4753 Method and apparatus for detecting security using an industry internet operating system
Disclosed area method and apparatus for detecting security using an industry internet operating system so as to address problems in the prior art of poor...
US-1,040,4751 Method for automated SIEM custom correlation rule generation through interactive network visualization
The present disclosure provides a dynamic method for automated Security Information and Event Management (SIEM) custom correlation rule generation through the...
US-1,040,4748 Cyber risk analysis and remediation using network monitored sensors and methods of use
Systems and methods for cyber risk analysis and remediation using network monitored sensors are provided herein. An example system includes one or more data...
US-1,040,4733 Active push-based remediation for reputation-based security systems
The present disclosure relates to initiating remediation of security risks on an endpoint system based on updated reputation data. According to one embodiment,...
US-1,040,4722 Systems and methods for providing security services during power management mode
Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a...
US-1,040,4719 Data verification method
Method for verifying data generated by an electronic device included in equipment, the electronic device including a computing unit, a one-time programmable...
US-1,040,4717 Method and device for the protection of data integrity through an embedded system having a main processor core...
A method for protecting data integrity through an embedded system having a main processor core and a security hardware module. The method includes the...
US-1,040,4712 Unobtrusive protection for large-scale data breaches utilizing user-specific data object access budgets
Techniques for unobtrusively protecting against large-scale data breaches over time are described. A security gateway coupled between clients and servers...
US-1,040,4703 Systems and methods for third-party interoperability in secure network transactions using tokenized data
Embodiments include methods and systems for enabling third-party data service interoperability, comprising receiving, from an electronic data server, a request...
US-1,040,4685 User security authentication system in internet and method thereof
The present invention relates to a user security authentication system in an Internet environment and a method therefor, which generate encrypted member...
US-1,040,4670 Data security service
A distributed computing environment utilizes a cryptography service. The cryptography service manages keys securely on behalf of one or more entities. The...
US-1,040,4668 Technique for securely performing an operation in an IoT environment
The present disclosure relates to a computing unit for securely performing an operation on encrypted data in an Internet of Things, IoT, environment. The...
US-1,040,4666 Security key generation and management method of PDCP distributed structure for supporting dual connectivity
The present disclosure relates to a pre-5.sup.th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond...
US-1,040,4663 File sharing over secure connections
An example method for file sharing over secure connections comprises: establishing a secure client connection; receiving a client request identifying a file...
US-1,040,4660 System and method for implementing content and network security inside a chip
Systems and methods for implementing content, streaming, and network security inside a chip or inside a computing device are disclosed. In exemplary...
US-1,040,4591 Status monitoring of inline network tools
A packet broker deployed in a visibility fabric may intelligently assign identifiers to data packets that are routed through sequences of one or more network...
US-1,040,4521 Remotely configurable routers with failover features, and methods and apparatus for reliable web-based...
Web-enabled routers are remotely and securely administered in a centralized fashion. A router receives a configuration profile from a dedicated web domain that...
US-1,040,4491 Device and method for estimating channel in communication system
Disclosed are: a communication technique for fusing, with IoT technology, a 5G communication system for supporting a data transmission rate higher than that of...
US-1,040,4478 Physical unclonable function using divided threshold distributions in non-volatile memory
A system and method for utilizing a security key stored in non-volatile memory, and for generating a PUF-based data set on an integrated circuit including...
US-1,040,4474 Systems and methods for container orchestration security
Systems and methods for container orchestration security employ one or more processors that separate a lifecycle of one or more containers into a plurality of...
US-1,040,4467 Blockchain digest augmention of media files including group-of-pictures video streams for MXF files
The present specification is directed toward the use of hash digests and blockchain technology to secure the integrity of a media file having Group-Of-Picture...
US-1,040,4464 Method and system for secure FIDO development kit with embedded hardware
A method for registration of a biometric template in a computing device includes: storing, in a first memory of a computing device, a biometric module;...
US-1,040,4461 Token security on a communication device
Techniques for enhancing the security of storing sensitive information or a token on a communication device may include sending a request for the sensitive...
US-1,040,4460 Data management method, computer readable recording medium thereof, user client for executing data management...
The present invention provides a data management method, a computer program for the same, a recording medium thereof, a user client for executing the method,...
US-1,040,4402 Security protection of terabit ethernet PCS layer using alignment markers
A method generates, from an input data stream, multiple lanes of a physical coding sublayer (PCS) signal. The method converts the data stream to a sequence of...
US-1,040,3161 Interface for accessing airspace data
A process is described that includes the generation and transmission of collision avoidance data and/or collision avoidance instructions based on data from 3-D...
US-1,040,3070 Secure access to physical resources using asymmetric cryptography
Digital certificates are signed by a server's private key and installed at lock controllers that restrict access to physical resources. The server's public key...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.