Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,008,4753 Delivering security functions to distributed networks
Systems and methods for delivering security functions to a distributed network are described herein. An exemplary method may include: processing a data packet...
US-1,008,4628 Joint physical layer security and PAPR mitigation in OFDM systems
Systems and methods for securing orthogonal frequency division multiplexing (OFDM) transmission of data are discussed herein. Transceivers can sense the signal...
US-1,008,4602 Dynamic token and a working method thereof
A working method of a dynamic token, including the steps of grouping, by the dynamic token, the second hash data to obtain a plurality of byte groups,...
US-1,008,4600 Decentralized information protection for confidentiality and tamper-proofing on distributed database
In an embodiment, a computer-implemented data security method comprises: at a first computing device, receiving security service data from a first digital data...
US-1,008,4595 Algorithm-based anonymous customer references
Facilitation of management and utilization of domain-specific anonymous customer references (ACRs) for protection of subscriber privacy across different domains...
US-1,008,4594 Method, apparatus, and system for performing an establishment of a security context between a user equipment...
Embodiment of the present invention discloses a method, an apparatus, and a system for establishing a security context and relates to the communications field,...
US-1,008,4512 Proximity boundary based communication
Technology is described for proximity based communications. A proximity boundary can be defined with dimensions defined, in part, by a communication range of...
US-1,008,4030 Backplane substrate and organic light emitting diode display using the same
Disclosed are a backplane substrate which secures sufficient storage capacitance even when using small sub-pixels in a structure having very high resolution,...
US-1,008,3765 Methods for securely processing information having handwritten data
The present method provides for conversion of handwritten to data that is accurate and fast, yet with improved security. The method provides handwritten data...
US-1,008,3695 Dialog-based voiceprint security for business transactions
A system for biometrically securing business transactions uses speech recognition and voiceprint authentication to biometrically secure a transaction from a...
US-1,008,3596 Systems and methods of automated arming and disarming of a security system
Systems and methods of security are provided, including at least one of a plurality of sensors to detect a location of at least one user, and generate detection...
US-1,008,3564 Multimode retail system
A multimode system for receiving data in a retail environment includes: a secure input module for receiving high security input and low security input from a...
US-1,008,3425 System and method for a private and secure payment system using a merchant sales terminal
A secure payment system between a customer and a merchant, where the sales terminal wirelessly transmits a partial payment authorization transaction record...
US-1,008,3382 Image forming apparatus equipped with secure print function, method of controlling the same, and storage medium
An image forming apparatus capable of flexibly controlling whether or not to perform user authentication when a user performs operations related to functions of...
US-1,008,3325 Secure removable storage for aircraft systems
Techniques are disclosed for securing backup operational data (e.g., of an aircraft) maintained by a line-replaceable unit (LRU) in a removable storage media...
US-1,008,3309 Secure cloud storage distribution and aggregation
Methods and systems for secure cloud storage are provided. According to one embodiment, file storage policies are maintained for users of an enterprise network...
US-1,008,3304 Technologies for enhanced user authentication using advanced sensor monitoring
Technologies for information security include a computing device with one or more sensors. The computing device may authenticate a user and, after successful...
US-1,008,3297 Method of secure comparative processing
Method of secure comparative processing of the type in which a processor of an electronic component compares proof data (EPR, AUTH) that it receives as input...
US-1,008,3293 Timer and content security
A method, computer system, and a computer program product for timing secured content is provided. The present invention may include receiving a connection...
US-1,008,3286 Method and system for secured transfer of application data between electronic devices on simultaneous touch
A method and a system for transmitting data from a first electronic device to a second electronic device using a human body as a signal transmission path, are...
US-1,008,3284 Event-based security challenges
Concepts and technologies are disclosed herein for event-based security challenges. A computer can execute a security application. The computer can receive a...
US-1,008,3277 Secure computing systems and methods
The present disclosure relates to systems and methods for facilitating trusted handling of genomic and/or other sensitive information. Certain embodiments may...
US-1,008,3196 Creating secure virtual databases storing masked data
A database storage system creates secure snapshots or virtual databases based on a source database that stores sensitive information. The database storage...
US-1,008,3194 Process for obtaining candidate data from a remote storage server for comparison to a data to be identified
The invention presents a process for obtaining candidate reference data to compare to a data to be identified, implemented in a system comprising a client unit...
US-1,008,3130 Memory lock system with manipulatable input device and method of operation thereof
A security system for an external data storage apparatus and method of control thereof includes: a data storage, in which data is stored; a high-speed serial...
US-1,008,3081 Responding to a maintenance free storage container security threat
A method includes detecting a storage error regarding an encoded data slice. The method further includes determining failure mode information regarding a set of...
US-1,008,3040 Exception handling in a data processing apparatus having a secure domain and a less secure domain
Processing circuitry can operate in a secure domain and a less secure domain. In response to an initial exception from background processing performed by the...
US-1,008,3024 Application aware virtual patching
The technology disclosed relates to thwarting attempts in between software releases to take advantage of security holes in web applications. A virtual patch is...
US-1,008,2769 Producing images of security features
Processes and systems are described that can produce images including both three dimensional holographic images and two dimensional variable data, which can...
US-1,008,2454 Device and method for gasochromic porosity sensing
A method and apparatus for testing the porosity of an object, such as a secure instrument having a substrate, visual data, and a security feature, is disclosed....
US-1,008,2227 System and method for securing power and communications cables and associated hardware within crown molding
A system for crown molding that enables safely incorporating electrical and communications cabling within crown molding by creating one or more protected paths...
US-1,008,0965 Secure data encoding for low-resource remote systems
A method includes receiving an input artefact and a set of shared parameters comprising a coding frame, one or more positioned elements, a travel path, and an...
US-1,008,0307 Server rack
A server rack able to maintain electrical connections to its components during replacements includes a shell and brackets for data storage devices. The data...
US-1,008,0136 Credibility token system for over the air multi-programming of a wireless device and method of operation
A mobile secure agent on a wireless device executes co-resident authenticated data collection profiles provisioned by private profile producers. Each wireless...
US-1,008,0111 Techniques for communication using audio stickers
Techniques for securing the delivery of an audio message on a device are described. A method may include presenting a visual representation associated with an...
US-1,008,0101 Device, method, and computer program for grouping devices by location
The method simplifies the formation of groups of devices in secure spaces. Such spaces may be passenger compartments of vehicles, and the passenger compartments...
US-1,007,9914 Method for the secure and dynamic reloading of additional software from a webRTC server to a webRTC client
A computer arrangement and a computer-implemented method for the secure and dynamic reloading of additional software from a WebRTC server to a WebRTC can...
US-1,007,9857 Method of slowing down a communication in a network
Method of forestalling attacks in a network, by slowing down a communication in a network including at least one computer including malware aimed at...
US-1,007,9850 Systems and methods for provisioning cyber security simulation exercises
A computer-implemented method for provisioning cyber security simulation exercises may include (1) maintaining, at a data center level for a data center...
US-1,007,9841 Automated runtime detection of malware
One example method and correspond apparatus extracts a model of a computer application during load time and stores the model of the computer application in a...
US-1,007,9839 Activation of gateway device
Systems and methods comprising a touchscreen that includes a processor coupled to a security system at a premises. User interfaces presented via the touchscreen...
US-1,007,9838 Decryption of data between a client and a server
Technologies for securing communication may include monitoring a secured network connection between a client and a server. The secured network connection may be...
US-1,007,9829 Secure provisioning of devices for manufacturing and maintenance
Described herein are methods, apparatuses, and systems for secure provisioning of devices for manufacturing and maintenance. A method includes provisioning a...
US-1,007,9826 Methods and systems for data entry
User identities, password, etc. represent the barrier between a user's confidential data and any other third party seeking to access this data. As multiple...
US-1,007,9809 Moving a portion of a streaming application to a public cloud based on sensitive data
A streams manager determines which portions of a streaming application process sensitive data, and when performance of the streaming application needs to be...
US-1,007,9808 Security in mixed networks
A device may include a processor circuit configured to transmit, over a network medium, a request for transmission of a data communication to a first device of...
US-1,007,9684 Technologies for end-to-end biometric-based authentication and platform locality assertion
Technologies for end-to-end biometric-based authentication and locality assertion include a computing device with one or more biometric devices. The computing...
US-1,007,9460 Busbar, consumer unit, use of such a consumer unit, power transmission device and building element
The invention relates to a busbar having a profiled body which forms an elongate receiving channel, a first and a second groove being formed in the channel...
US-1,007,8967 Apparatus and system for and method of registration, admission and testing of a candidate
The present disclosure is directed to an apparatus and system for and method of registering, admitting and testing of a candidate. Test candidate can be...
US-1,007,8958 Method and system for logging security event data
Through the use of a persistent connection between security, monitoring and automation controller devices and provider supported servers in an operator domain,...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.