Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,041,0458 Bezel assembly for use with an automated transaction device
A bezel assembly for data reception is provided for use in a transactional device that comprises a door attached to open and close. The bezel assembly...
US-1,041,0451 System and method for securely controlling container unlocking based on biometric data
A locking container access system includes (i) at least one processor and (ii) a memory storing instructions for execution on at least one processor. The...
US-1,041,0446 Authentication based on through-body signals
Techniques are described for user authentication based on a signal that is transmitted through an individual's body, and detected using device(s) in physical...
US-1,041,0310 Integrated building evacuation system
An integrated building evacuation system includes an evacuation controller; a fire alarm system in communication with the evacuation controller; an HVAC system...
US-1,041,0223 Online social networking system for conducting commerce
An online social networking system for conducting commerce utilizes a grid environment, a widget architecture including a widget operating system, and semantic...
US-1,041,0213 Encapsulated security tokens for electronic transactions
Functional data for use in one or more digital transactions is secured by using an encapsulated security token (EST). In certain embodiments, the EST is created...
US-1,041,0212 Secure transaction object creation, propagation and invocation
Functional data of a cash channel is encapsulated by at least two parties in succession to define an at least twice-encapsulated data object. The encapsulation...
US-1,041,0208 Token identity devices
Disclosed embodiments include methods, systems, and computer-readable media configured to provide wearable devices storing tokens associated with digital...
US-1,041,0205 Apparatus and method for performing payment transaction using dynamic MST configuration
An apparatus and method for performing a payment transaction are provided. The method includes transmitting context data to a magnetic secure transmission (MST)...
US-1,041,0158 Systems and methods for evaluating cybersecurity risk
A computer-implemented method for evaluating cybersecurity risk may include (i) identifying telemetry data collected from endpoints of an entity, (ii)...
US-1,041,0154 Method and system for enabling data usage accounting through a relay
A method and system for enabling data usage accounting is described herein. The method can be practiced on a computing device that has secure applications and...
US-1,041,0107 Natural language platform for database system
An artificial intelligence assistant ("chatbot") operates within a multi-tenant database and allows users to interact with the underlying structured database...
US-1,041,0015 Systems and methods to secure personally identifiable information
A method implemented in a computing system hosting a three-dimensional virtual reality world. The computer system collects personally identifiable information...
US-1,041,0013 Methods and systems for controlling access to custom objects in a database
In embodiments, methods and systems for controlling access to custom objects are provided. These techniques for controlling access to custom objects can enable...
US-1,041,0011 Enabling secure big data analytics in the cloud
Methods are provided for enabling secure big data analytics in the cloud. A method includes reading a secure file, by a Secure Distributed File System in a...
US-1,041,0003 Multiple containers assigned to an application
The disclosed technology addresses the need in the art for assigning multiple containers to a single application. A container can be a specified area of a file...
US-1,040,9991 Technique for secure data loading to a system component
A USB device for secure data loading to a system component, such as of an aircraft. The USB device is operable in a mass storage mode and in a non-mass storage...
US-1,040,9984 Hierarchical data security measures for a mobile device
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for storing a plurality of stored fingerprints, wherein each...
US-1,040,9982 Secure data access for multi-purpose mobile devices
According to some embodiments, a proxy server comprises one or more processors operable to establish communication with a secure client application of a device....
US-1,040,9976 System and method for PIN entry on mobile devices
A system for entering a secure Personal Identification Number (PIN) into a mobile computing device includes a mobile computing device and a peripheral device...
US-1,040,9971 System and method for secretive storage of applications in portable computing device
The embodiments herein provide a system and method for an authentication-driven secret installation and access to applications and data on handheld computing...
US-1,040,9793 Secure and flexible inter-program communication
In one embodiment, a method for providing secure and flexible inter-program communication includes storing an ontology in a first data store, the ontology...
US-1,040,9491 Method of data analysis and extraction for embedded security devices
A method of data analysis and extraction for embedded security devices and belongs to the data recovery field, includes: Analyzing the DBR table of the first...
US-1,040,9406 Systems and methods for increased security in authentication code entry for touch-sensitive screen enabled devices
Systems and methods for increased security in authentication code entry for touch-sensitive screen enabled devices are disclosed. According to one embodiment, a...
US-1,040,8988 Techniques for enhanced diffusion lighting
Techniques for creating, configuring, and employing diffusion light devices are presented. Such light device(s) can comprise or be associated with a light...
US-1,040,8081 Inspection apparatus and methods of inspecting gas turbine engines
Inspection apparatus for a gas turbine engine, the inspection apparatus comprising: a sensor configured to generate data; a housing having an exterior surface...
US-1,040,6756 Tendon placement for high-altitude balloons
Aspects of the disclosure relate to manufacturing balloon envelopes for use in high-altitude mesh networks for packet-data communications. As an example, a gore...
US-1,040,5373 Distributed core architecture for implementing wireless communication networks
A system for implementing a distributed core architecture of a wireless communication network is provided. The system includes a plurality of devices configured...
US-1,040,5284 Power headroom report method and apparatus of UE
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-1,040,5270 Adaptive internet connectivity selection
Internet access has become ubiquitous and the means by which it is obtained varies widely. A mobile Hotspot is a device that includes a modem for mobile...
US-1,040,5207 Method and device for receiving broadcast information in wireless communication system
The present disclosure relates to a communication technique which combines a 5G (5th Generation) communication system, for supporting a higher data transmission...
US-1,040,5176 Operation of control protocol data units in packet data convergence protocol
A method and apparatus reports packet data control protocol (PDCP) status and PDCP resets in a wireless communication, using control PDUs that may have security...
US-1,040,4949 Secure aircraft camera monitoring system
Secure aircraft camera monitoring includes capturing images of an area of interest proximate to an aircraft, and securely transmitting the images as data files...
US-1,040,4866 System, network, device and stacked spectrum method for implementing spectrum sharing of multiple contiguous...
A system and method in various embodiments implements a virtual spectrum band stacking technique facilitating spectrum sharing by converting and combining...
US-1,040,4838 Systems and methods for selecting microservices to process protocol data streams
Systems and methods are described herein generally relating to network security, and in particular, embodiments described generally relate to systems and...
US-1,040,4756 Context-aware data loss prevention (DLP) for cloud security
A computer-implemented method for accessing a hosted service on client devices is described. The client devices include client software that uses a remotely...
US-1,040,4755 Deep application programming interface inspection (DAPII) for cloud security
A computer-implemented method for accessing a hosted service on client devices is described. The client devices include client software that uses a remotely...
US-1,040,4753 Method and apparatus for detecting security using an industry internet operating system
Disclosed area method and apparatus for detecting security using an industry internet operating system so as to address problems in the prior art of poor...
US-1,040,4751 Method for automated SIEM custom correlation rule generation through interactive network visualization
The present disclosure provides a dynamic method for automated Security Information and Event Management (SIEM) custom correlation rule generation through the...
US-1,040,4748 Cyber risk analysis and remediation using network monitored sensors and methods of use
Systems and methods for cyber risk analysis and remediation using network monitored sensors are provided herein. An example system includes one or more data...
US-1,040,4733 Active push-based remediation for reputation-based security systems
The present disclosure relates to initiating remediation of security risks on an endpoint system based on updated reputation data. According to one embodiment,...
US-1,040,4722 Systems and methods for providing security services during power management mode
Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a...
US-1,040,4719 Data verification method
Method for verifying data generated by an electronic device included in equipment, the electronic device including a computing unit, a one-time programmable...
US-1,040,4717 Method and device for the protection of data integrity through an embedded system having a main processor core...
A method for protecting data integrity through an embedded system having a main processor core and a security hardware module. The method includes the...
US-1,040,4712 Unobtrusive protection for large-scale data breaches utilizing user-specific data object access budgets
Techniques for unobtrusively protecting against large-scale data breaches over time are described. A security gateway coupled between clients and servers...
US-1,040,4703 Systems and methods for third-party interoperability in secure network transactions using tokenized data
Embodiments include methods and systems for enabling third-party data service interoperability, comprising receiving, from an electronic data server, a request...
US-1,040,4685 User security authentication system in internet and method thereof
The present invention relates to a user security authentication system in an Internet environment and a method therefor, which generate encrypted member...
US-1,040,4670 Data security service
A distributed computing environment utilizes a cryptography service. The cryptography service manages keys securely on behalf of one or more entities. The...
US-1,040,4668 Technique for securely performing an operation in an IoT environment
The present disclosure relates to a computing unit for securely performing an operation on encrypted data in an Internet of Things, IoT, environment. The...
US-1,040,4666 Security key generation and management method of PDCP distributed structure for supporting dual connectivity
The present disclosure relates to a pre-5.sup.th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.