Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,041,7883 Doorbell camera package detection
A method for security and/or automation systems is described. In one embodiment, the method includes identifying image data from a signal, analyzing the image...
US-1,041,7849 Entry control system
An integrated security system which seamlessly assimilates with current generation logical security systems. The integrated security system incorporates a...
US-1,041,7845 Detecting unauthorized physical access via wireless electronic device identifiers
Monitoring a physical area for unauthorized access by a user of a wireless device includes setting a wireless signal scanning range using at least one wireless...
US-1,041,7722 Integrated fuel dispensing and accounting system
An interface system extends a prior-art fuel delivery pump and reservoir so that authorization to activate the fuel delivery pump can be obtained from a remote...
US-1,041,7715 Computer architectures and associated methods for enabling real-time data determinations and distribution
Computer architectures and associated methods for real-time data processing are disclosed. In some embodiments, a trial adjudication request for a cost...
US-1,041,7458 Securing an unprotected hardware bus
Techniques are disclosed for securing communication from an unprotected hardware bus. The described techniques may be implemented by placing a secure hardware...
US-1,041,7455 Hardware security module
Described are various embodiments of a hardware security module. For example, in one embodiment, a hardware security module is described to comprise: two or...
US-1,041,7441 Effectively validating dynamic database queries through database activity monitoring
A database activity monitoring service, operating independent of a database server, in response to intercepting a database server response issued by the...
US-1,041,7437 Maintaining data security in a network device
A network device for maintaining data security generates different keys corresponding to data received from a sender. The different keys comprise a secret key,...
US-1,041,7421 System and method for providing network security to mobile devices
A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected...
US-1,041,7419 Endpoint malware detection using an event graph
A data recorder stores endpoint activity on an ongoing basis as sequences of events that causally relate computer objects such as processes and files, and...
US-1,041,7418 Endpoint malware detection using an event graph
A data recorder stores endpoint activity on an ongoing basis as sequences of events that causally relate computer objects such as processes and files, and...
US-1,041,7411 Systems, methods, and apparatus for securing user documents
The invention is directed to systems, methods and apparatus for securing documents. The system comprises a server having a processor and a data storage device...
US-1,041,7409 Securing credentials with optical security features formed by quasi-random optical characteristics of...
Systems and methods are described for securing credentials with optical security features formed by quasi-random optical characteristics (QROCs) of credential...
US-1,041,7400 Systems and methods for providing real time security and access monitoring of a removable media device
In various embodiments, a method comprises detecting a removable media device coupled to a digital device, authenticating a password to access the removable...
US-1,041,7399 Accessing a secured software application
There is described a method for a first software application to access a secured software application on a computing device. The first software application is...
US-1,041,7234 Data flow modeling and execution
A data flow model format allows for improved data flow model creation and execution. The data flow models can provide a user with greater flexibility in...
US-1,041,7187 Secure compression
In embodiments, secure compression algorithms are provided that may be employed as a single operation on raw data to produce compressed and encrypted data. In...
US-1,041,6891 Systems and methods for transitioning and updating/tailoring machine instructions from a first system with an...
Systems and methods for transitioning and updating machine instructions from a first system with an older/initial component(s) to a second system or platform...
US-1,041,4192 Datasheet for a security and/or valuable document
The invention relates to a data sheet (1) for integration in a preferably book-like security and/or valuable document, wherein the data sheet (1) is formed of...
US-1,041,3733 Implantable medical device with gyroscope
An implantable medical device (IMD) that includes a housing, a first electrode secured relative to the housing, a second electrode secured relative to the...
US-1,041,3225 Pulse oximeter sensor assembly and methods of using same
A pulse oximeter sensor assembly and a method for monitoring and assessing a physical state of a subject with the assembly are provided. The assembly includes a...
US-1,041,2652 Apparatus and method for routing data packet to user equipment in LTE-WLAN aggregation system
The present disclosure relates to a communication method and system for converging a 5.sup.th-generation (5G) communication system for supporting higher data...
US-1,041,2629 Structure of MAC sub-header for supporting text generation mobile communication system and method and apparatus...
A communication technique of fusing a fifth generation (5G) communication system for supporting higher data transmission rate beyond a fourth generation (4G)...
US-1,041,2582 Method and apparatus for security communication of carrier aggregation between base stations
Embodiments of the invention disclose a method for security communication of carrier aggregation between base stations, which method comprises receiving, by a...
US-1,041,2420 Content-driven surveillance image storage optimization apparatus and method of operation
A content-driven video storage optimization apparatus applies motion analysis at purge time or when the images are initially archived. Retention meta data is...
US-1,041,2267 Document management system
Provided is a document management system for managing document data by applying access restrictions to each metadata acquired by character recognition of...
US-1,041,2199 Secure tactical network
A tactical network comprises a plurality of assets, at least some of the assets grouped into sub-groups. The assets within each subgroup communicate with each...
US-1,041,2113 Systems and methods for intelligently configuring computer security
A system and method that enables the configuration of computer security of a subject entity at a computer security platform includes collecting a corpus of...
US-1,041,2104 Data protection in a networked computing environment
Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a...
US-1,041,2103 Techniques for sharing network security event information
This disclosure provides an architecture for sharing information between network security administrators. Events converted to a normalized data format (CCF) are...
US-1,041,2100 System and methods for providing secure data connections in an aviation environment
A secure communication management (SCM) computer device for providing secure data connections in an aviation environment which, includes safety of flight...
US-1,041,2099 System security configurations based on assets associated with activities
Various systems, mediums, and methods may involve a data engine with various components. For example, a system with the data engine may include a segmentation...
US-1,041,2097 Method and system for providing distributed authentication
A system for distributed authentication provide third party authentication of access requests. A secure computing system is provided which ignores or otherwise...
US-1,041,2093 Preventing unauthorized access to secured information systems by injecting device data collectors
Aspects of the disclosure relate to providing information security and preventing unauthorized access to resources of an information system by injecting device...
US-1,041,2092 Method, apparatus, and system for restricting access
Techniques for restricting access to sensitive application(s) or data to a limited physical area are disclosed. Various embodiments are described in which a...
US-1,041,2063 End-to-end double-ratchet encryption with epoch key exchange
Systems, devices, and methods are disclosed for instantaneously decrypting data in an end-to-end encrypted secure messaging session while maintaining forward...
US-1,041,2051 System and method for satellite communications link
In one embodiment, a secure communications processor is provided. The secure communications data processor comprises a satellite datalink gateway; wherein the...
US-1,041,1901 Multi-user strong authentication token
Apparatus, methods and systems to secure remotely accessible applications using authentication devices are disclosed. More in particular apparatus, methods and...
US-1,041,1899 Data management systems and methods
This disclosure related to systems and methods that facilitate the secure collection and management of operational data relating to a power generation system...
US-1,041,1897 Secret sharing via blockchains
Confidential, secret data may be shared via one or more blockchains. Mortgage applications, medical records, financial records, and other electronic documents...
US-1,041,1893 Token key infrastructure and method
A Token Key Infrastructure and a method using Polymorphic Executable or its variants for the exchange of digital information, including digital data and digital...
US-1,041,1889 Chaotic-based synchronization for secure network communications
In an embodiment, an apparatus includes a first logic to receive from a first node a synchronization portion of a message and to generate a set of state...
US-1,041,1888 Cryptography method
The embodiments provide cryptography that is performed in each of two communicating devices and is based on information known only to the devices. The...
US-1,041,1882 Multiparty secure calculation method protected against a malevolent party
The invention proposes a method comprising the evaluation of a function F obtained by applying to n sub-functions f.sub.i a first operation, the evaluation...
US-1,041,1495 System for the monitoring and maintenance of remote autonomously powered lighting installations
A system of monitoring and/or maintaining remotely located autonomously powered lights, security systems, parking meters, and the like is operable to receive...
US-1,041,0569 Long-term history of display intensities
A data processing system can store a long-term history of pixel luminance values in a secure memory and use those values to create burn-in compensation values...
US-1,041,0568 Long-term history of display intensities
A data processing system can store a long-term history of pixel luminance values in a secure memory and use those values to create burn-in compensation values...
US-1,041,0490 Security system communicator and keypad device
Techniques are described for replacing a keypad of an existing security system within a property with a communication-enabled keypad device with dual...
US-1,041,0489 Security camera system
A security camera system for safeguarding a designated area includes at least one camera for encoding and transmitting streaming video of the designated area,...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.