Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,924,360 AT command for secure ESM information
Systems and methods for transmitting AT commands indicating whether Evolved Packet System (EPS) Session Management (ESM) information should be transmitted...
US-9,924,359 Method, system and apparatus for enhancing security of beacon device
A method, system and apparatus for enhancing the security of a beacon device are herein disclosed. A service device includes a service communication unit and a...
US-9,924,357 Method for providing mobile communication provider information and device for performing same
A method for providing mobile communication provider information and a device for performing the same are disclosed. A terminal having an eUICC receives data,...
US-9,924,354 Key exchange method and apparatus
Embodiments of the present invention disclose a key exchange method and apparatus, which relate to the communications field, and can enable user equipments...
US-9,924,353 Method for configuring and transmitting key
The present application discloses a method for configuring and transmitting a key, which includes that: a) a serving cell (PCell) of UE determines a key (KeNB)...
US-9,923,987 Optimization of enhanced network links
A method and apparatus for dynamic network link acceleration provides a managed communication link for accelerated and reliable network communication between a...
US-9,923,925 Cyber security sharing and identification system
Systems and techniques for sharing security data are described herein. Security rules and/or attack data may be automatically shared, investigated, enabled,...
US-9,923,914 Systems and platforms for intelligently monitoring risky network activities
Technology for improving and monitoring data communication security is presented herein. The technology monitors a plurality of sources of risky activities,...
US-9,923,909 System and method for providing a self-monitoring, self-reporting, and self-repairing virtual asset configured...
A trigger event monitoring system is provided in one or more virtual assets. One or more trigger parameters, including security threat patterns, are defined and...
US-9,923,908 Data protection in a networked computing environment
Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a...
US-9,923,903 Method, a server and a client providing secured communication in a power distribution communication network
A technique is provided that addresses how to provide secured communication in a power distribution communication network. Specifically, upon receipt of a...
US-9,923,901 Integration user for analytical access to read only data stores generated from transactional systems
The technology disclosed preserves the tenant specificity and user specificity of the tenant data by associating user IDs to complementary special IDs referred...
US-9,923,894 System and method of facilitating the identification of a computer on a network
A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may...
US-9,923,891 Human body communication device with secure access
Systems, apparatuses, and methods may include a human body communication data storage device having at least first and second electrodes and a human body...
US-9,923,890 Generating and distributing pre-computed data (PCD) assets to a target device
The embodiments described herein describe technologies for pre-computed data (PCD) asset generation and secure deployment of the PCD asset to a target device in...
US-9,923,884 In-circuit security system and methods for controlling access to and use of sensitive data
The invention disclosed herein is an in-circuit security system for electronic devices. The in-circuit security system incorporates identity credential...
US-9,923,883 Downloadable security and protection methods and apparatus
Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional...
US-9,923,840 Improving performance and security of multi-processor systems by moving thread execution between processors...
In an embodiment, a processing resource allocation method is disclosed. The method may include identifying an instruction mapped to data having a preselected...
US-9,923,757 Reducing data sets related to network security events
This document describes techniques for reducing a size of data sets related to network security alarms or logs, or other messages. Preferably, the reduction is...
US-9,923,514 Security and tracking systems including energy harvesting components for providing autonomous electrical power
A system is provided that integrates a unique set of structural features for concealing self-powered sensor and communication devices in aesthetically neutral,...
US-9,922,209 Security data path verification
A formal verification approach verifies data access and data propagation paths in a circuit design by proving the unreachability of path cover properties of the...
US-9,922,063 Secure storage of secret data in a dispersed storage network
A method for secure storage of secret data begins with an originating device transforming the secret data to produce a plurality of secret data shares and...
US-9,922,045 Data management in a multi-tenant distributive environment
The present invention relates to a method and apparatus for data management in multi-tenant distributive environment. According to the embodiments of the...
US-9,920,550 Electronically monitored safety lockout devices, systems and methods
A system for monitoring a lockout condition of a component includes a lockout device, a lock unit, and a reader. The lockout device is moveable between a...
US-9,919,748 Vehicles with aerodynamic spoiler and retractable sensing systems
A vehicular sensing system, a vehicle and a method of performing one or both of vehicular mapping and navigating operations using the sensing system. The...
US-9,919,682 Remote function device and associated wireless security sensor for a vehicle having a data communications bus...
A remote function control system is for a vehicle including a data communications bus extending throughout the vehicle and coupled to a plurality of vehicle...
US-9,918,810 Method for producing a dental prosthesis with a template
The invention relates to a method for producing a dental prosthesis, wherein the dental prosthesis comprises a prosthesis base and a plurality of prosthesis...
US-9,917,818 Multi-tenant secure separation of data in a cloud-based application
Multi-tenant and single-tenant methodologies are blended into a single solution to provide cost savings of multi-tenancy along with data security and privacy of...
US-9,916,574 Secure computing device and method
A method and device are described for maintaining software components in a portable electronic device. The device includes memory storing software components...
US-9,916,457 Decoupled name security binding for CCN objects
A data-hosting system facilitates binding a decoupled name to a data object. During operation, the system can receive a command to generate a decoupled name...
US-9,915,965 Flexible, secure energy management system
Systems and techniques are disclosed for flexible, secure energy management that enable control of individual devices in a customer site's energy...
US-9,913,280 Method and apparatus of allocating resources for terminal in wireless communication system
Disclosed is a terminal effectively allocating communication resources to individual processes run by the user. The terminal may update a list of running...
US-9,913,135 System and method for electronic key provisioning and access management in connection with mobile devices
Novel systems and methods are disclosed for electronic key provisioning and access management in connection with mobile devices. The electronic keys can be...
US-9,913,113 Communicating utility data over a cellular network with priority
Embodiments of the present invention provide secure, reliable communications for utility control devices during emergency conditions. Emergency conditions...
US-9,912,723 Chained security credential distribution for sponsored data services
A method to facilitate secure access to sponsored content may include accessing a portal device to generate a campaign for a sponsored data service (SDS), and...
US-9,912,703 Security compliance framework usage
A method and system for improving usage of a security compliance framework is provided. The method includes authenticating a user for: access to the security...
US-9,912,686 Methods and systems for enhancing data security in a computer network
Network security risk assessment systems and methods are provided. The system has a remote subscriber computer, a risk assessment viewer application, and a risk...
US-9,912,647 Vehicle wireless internet security
Methods, systems, and computer program products for vehicle wireless internet security are provided. A connection request is received from a mobile device. A...
US-9,912,645 Methods and apparatus to securely share data
Methods and apparatus to securely share data are disclosed. An example includes retrieving, by executing an instruction with a processor at a first computing...
US-9,912,644 System and method to communicate sensitive information via one or more untrusted intermediate nodes with...
A system and method to communicate secure information between computing machines using an untrusted intermediate with resilience to disconnected network...
US-9,912,640 Secure network enrollment
A UE communicates with a network gateway to access a provisioning device via a provisioning network. The provisioning device uses identification data of the UE...
US-9,912,638 Systems and methods for integrating cloud services with information management systems
Systems and methods of integrating log data from a cloud system with an internal management system are described, wherein the cloud system is located externally...
US-9,912,549 Systems and methods for network analysis and reporting
Among other things, embodiments of the present disclosure can collect and analyze asset and network data from multiple sources, and use such data to present a...
US-9,912,483 Systems and methods to secure user identification
A computing apparatus configured to verify a digital signature applied on a set of data received from a user device, including an user ID assigned by a partner...
US-9,912,475 Vehicular entropy for random number generation
A method is provided for producing cryptographic keys, while a vehicle is in operation, for use in secure vehicle communications. The method may include...
US-9,912,472 Homomorphic database operations apparatuses, methods and systems
The HOMOMORPHIC DATABASE OPERATIONS APPARATUSES, METHODS AND SYSTEMS ("HEDO") transform transaction storage requests and homomorphic model queries using HEDO...
US-9,912,271 Linear actuator and method for controlling the same
The present invention provides a linear actuator including a motor; a linear driving unit coupled to the motor and including a magnet; a sensor unit configured...
US-9,911,297 Threat detection system having multi-hop, WiFi or cellular network arrangement of wireless detectors, sensors...
A data sensing and threat detection network comprising a plurality of wireless sensor devices and their related wireless sub-sensor devices, for communication...
US-9,911,294 Warning system and method using spatio-temporal situation data
The warning system using spatiotemporal situation data according to the present invention comprises: a situation detection unit including a sensor module for...
US-9,911,266 Multimode retail system
A multimode system for receiving data in a retail environment includes: a secure input module for receiving high security input and low security input from a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.