Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,841,014 Insulin pump data acquisition device and system
An insulin pump data acquisition device & system including: an insulin pump data acquisition device for use with an insulin pump, the data acquisition device...
US-9,840,341 IP-based satellite command, control, and data transfer
A method and system for satellite control in space using an IP-based satellite bus and all-IP compliant subsystems and payload(s) and a corresponding T&C...
US-9,839,244 Illuminated glove assembly
An illuminated glove assembly includes a glove and an illumination data controller. The glove has a body portion, a longitudinal glove axis, a pointer...
US-9,838,873 Secure wireless local area network (WLAN) for data and control traffic
A device receives capability information associated with a next hop device of a wireless local area network (WLAN). The device also determines, based on the...
US-9,838,758 Relevancy improvement through targeting of information based on data gathered from a networked device...
In one embodiment, a method of a relevancy-matching server includes matching primary data generated from a fingerprint data with targeted data based on a...
US-9,838,652 Light device has built-in digital data system for record image, sound
A LED Light device having built-in camera unit is powered by AC or-and DC power source for a lamp-holder, LED bulb, flashlight, garden, entrance door light or...
US-9,838,434 Creating and managing a network security tag
An apparatus, computer readable medium, and method are provided in one example embodiment and include a network device, an analysis module, and a tag module....
US-9,838,426 Honeyport active network security
A device comprises a processor. The processor is configured to generate a first signal using a first communication protocol. The first signal corresponds to...
US-9,838,418 Detecting malware in mixed content files
Computer systems and methods in various embodiments are configured to determine whether a file is likely to be malware-free or include malware. In an...
US-9,838,410 Identity resolution in data intake stage of machine data processing platform
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-9,838,408 System, device and method for detecting a malicious attack based on direct communications between remotely...
In an embodiment, a system, device and method for detecting a malicious attack is described. Herein, the system includes a security network device that conducts...
US-9,838,407 Detection of malicious web activity in enterprise computer networks
A processing device in one embodiment comprises a processor coupled to a memory and is configured to obtain internal log data of a computer network of an...
US-9,838,390 System and method for automatic wireless network authentication
A system and method are described for connecting an IoT device to a wireless router and/or access point. For example, one embodiment of a system comprises: an...
US-9,838,387 Security token with embedded data
A system and method are presented that provide authentication tokens to a local device from a remote server. The authentication token incorporates standard...
US-9,838,378 Securing a server before connecting the server to a data communications network
Securing a server before connecting the server to a data communications network in a data center may include: establishing a proximity-based communications...
US-9,838,377 Task segregation in a multi-tenant identity and data security management cloud service
A system provides cloud-based identity and access management. The system receives a request to perform an identity management service, and accesses a...
US-9,838,376 Microservices based multi-tenant identity and data security management cloud service
A system provides cloud-based identity and access management. The system receives a request for performing an identity management service, where the request...
US-9,838,361 Secure migration of virtual machines from source to target and transfer of VM descriptor and keys between...
Systems, methods, and non-transitory computer-readable medium are provided to secure data centers and cloud computing. A method receives network identifiers for...
US-9,838,360 Data transmission security improvements
A method of securely transmitting communication information from a first terminal operating in a first coordinate measurement domain to a second ...
US-9,838,289 Security network processor system and method
A system, method and computer program product are provided for scanning data received from a computer network. Included is a central processing unit for...
US-9,838,236 Direct synthesis of receiver clock
The Direct Synthesis of a Receiver Clock (DSRC) contributes a method, system and apparatus for reliable and inexpensive synthesis of inherently stable local...
US-9,838,214 Wi-Fi offload of cellular data
A security gateway system offloads cellular data from user equipment ("UE"). The system receives a dynamic host configuration protocol ("DHCP") message from a...
US-9,838,205 Network authentication method for secure electronic transactions
In a network authentication method, a client device stores a reference first private key portion obtained by encrypting a first private key portion of a private...
US-9,838,204 IoT communication utilizing secure asynchronous P2P communication and data exchange
A device may receive a connection request including a digital certificate from an endpoint for establishing a secure connection for a communication, the digital...
US-9,836,897 Lockbox access device and method with biometric security data
A lockbox access apparatus comprising a wireless communications device having a stored program configured to: cause the wireless communications device to...
US-9,836,787 Method and system for secure syndicated balance display
One or more financial accounts associated with a user are designated for balance monitoring and balance display. Balance increments are then defined and a...
US-9,835,661 Power control device and power control method
Information to be displayed on a display is generated in such a way that a gateway processes a measured value (with a time stamp) transmitted from a power...
US-9,833,710 Method and system for providing a secure shuffle of game objects across multiple entities
A computer-implemented method and system are provided for ensuring the integrity and security of digital shuffles of cards or objects across multiple entities...
US-9,833,709 Game console system, method and computer program product with anti-malware/spyware and parental control...
A system, method and computer program product are provided for securing a game console capable of processing game-related data. In use, the game-related data is...
US-9,832,650 Dynamic WLAN connections
A cellular communications network is configured to support calling over untrusted networks such as the Internet. A cellular communications device is used to...
US-9,832,649 Secure ID authentication
A secure ID authentication system for authenticating over a multi-channel cellular radio network a response from a user module comprising a SIM card to a...
US-9,832,602 Distributed method and system for determining the position of a mobile device using long-range signals and...
A method and system is described where a plurality of position reference devices use short-range wireless communication protocols to transmit positioning...
US-9,832,226 Automatic curation and modification of virtualized computer programs
In an embodiment, a data processing method comprises receiving a first instance of computer program data at a security unit having one or more processors;...
US-9,832,221 Systems and methods for monitoring the activity of devices within an organization by leveraging data generated...
A computer-implemented method for monitoring the activity of devices within an organization by leveraging data generated by an existing security solution...
US-9,832,219 System for tracking data security threats and method for same
An incident response system and method for tracking data security incidents in enterprise networks is disclosed. An Incident Manager application (IM) stores...
US-9,832,218 Interacting with a remote server over a network to determine whether to allow data exchange with a resource at...
Provided are a computer program product, system, and method for interacting with a remote server over a network to determine whether to allow data exchange with...
US-9,832,205 Cross provider security management functionality within a cloud service brokerage platform
Implementation of cross provider security in accordance with the disclosures made herein enables users of a system (e.g., a cloud services brokerage platform)...
US-9,832,200 Multi-tiered protection platform
A multi-tier platform provides additional security at a perimeter of a computer system, where an intermediate layer interacts with a web layer and controls data...
US-9,832,188 Virtual smart card to perform security-critical operations
A portable data or information carrier in the form of a smart card with partially or fully virtualized components. To maximize the confidentiality of...
US-9,832,182 Method for securing an electronic document
The object of this invention is a method for securing an electronic document. In particular, this invention relates to a method that prevents the forging of...
US-9,832,174 Authentication for cluster peering
A method and system for authenticating of the pairing of computing devices is described. In an example, a passphrase is established on computing devices. The...
US-9,832,172 Content protection for data as a service (DaaS)
The present disclosure is directed to content protection for Data as a Service (DaaS). A device may receive encrypted data from a content provider via DaaS, the...
US-9,832,169 Method and system for communicating over a segmented virtual private network (VPN)
An approach for providing secure communication services is disclosed. A secure data tunnel from a source node to a destination node is established via a...
US-9,832,123 Network named fragments in a content centric network
One embodiment provides a system that facilitates efficient and secure transportation of content. An intermediate node receives a packet that corresponds to a...
US-9,832,103 Method and apparatus for secure communication via multiple communication paths
A method for sending and receiving a data through multiple communication paths and an apparatus for receiving a data through multiple communication paths. A...
US-9,832,023 Verification of authenticity and responsiveness of biometric evidence and/or other evidence
Authenticity and responsiveness of evidence (e.g., biometric evidence) may be validated without regard for whether there is direct control over a sensor that...
US-9,832,019 Authentication in ubiquitous environment
In some embodiments, encrypted biometric data are stored in advance in a device that is possessed or carried by a user (for example, a smartcard, a...
US-9,832,015 Efficient key derivation for end-to-end network security with traffic visibility
Both end-to-end security and traffic visibility may be achieved by a system using a controller that derives a cryptographic key that is different for each...
US-9,831,918 Secure wireless peer-peer connection using near-field communication
A system (100) for establishing a secure wireless peer-to-peer (P2P) connection using near-field communication (NFC) comprising a first device (105), the first...
US-9,831,003 Device and method for repairing memory cell and memory system including the device
Provided are a method and an apparatus for repairing a memory cell in a memory test system. A test device detects a fail address by testing a memory device...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.