Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,030,5924 Network security analysis system
A network security analysis system performs anomaly detection with low false positives by implementing a multiple perspective analysis of network data. The...
US-1,030,5922 Detecting security threats in a local network
Disclosed is a system for detecting security threats in a local network. A security analytics system collects data about entities in the local network. The...
US-1,030,5921 Network security apparatus and method of detecting malicious behavior in computer networks via cost-sensitive...
A network security apparatus includes a packet detector detecting transmission of data packets between a plurality of hosts and a plurality of domains and...
US-1,030,5906 Access heartbeat for a hardware security module
Systems, devices and processes are described for implementing an access heartbeat role on a hardware security module (HSM) that stores secure data on behalf of...
US-1,030,5904 Facilitating secure network traffic by an application delivery controller
Facilitation of secure network traffic by an application delivery controller is provided herein. In some examples, a method includes: (a) receiving a data...
US-1,030,5896 Authentication system
The invention relates to an authentication system, comprising a security element (1) having a changing or changeable surface (6), structure, volume,...
US-1,030,5888 Secure data entry via audio tones
A cloud client device identifies one or more devices within a predetermined range of the cloud client device operable to communicate with the cloud client...
US-1,030,5882 Using a service-provider password to simulate F-SSO functionality
A system and method for using a Service-Provider password to simulate F-SSO functionality. A processor receives from an F-SSO Identity Provider authentication...
US-1,030,5880 System for secure enrollment and secure verification of network users by a centralized identification service
A system and method for providing, as a service over a computer network (especially a packet-switched computer network) to a body of merchants connected to the...
US-1,030,5877 MRCP gateway for mobile devices
A system and method for securely bridging mobile-originated Media Resource Control Protocol (MRCP) transactions with at least one Media Resource Server. A...
US-1,030,5870 Cryptography and key management device verification
A method for operating a secure device having a plurality of mutually exclusive circuit zones, including a first circuit zone having a first level of security...
US-1,030,5869 Methods and systems for transferring secure data and facilitating new client acquisitions
Methods and systems for directly and securely transferring encrypted medical data between two remote locations, such as an imaging site and a diagnostic site,...
US-1,030,5868 Stream splitting moving target defense
Systems and methods for utilizing stream splitting Moving Target Defense (MTD) to provide enhanced computer system communication system security by splitting a...
US-1,030,5866 Data transmission method, base station and user equipment
A data transmission method, a base station, and user equipment are presented. The method includes performing rotation processing on a preset precoding matrix;...
US-1,030,5862 Secure communication with a mobile device
Method and system for securely communicating with a machine to machine, M2M, device comprising sharing a secret or data derived from the secret between the M2M...
US-1,030,5829 Database systems and methods for integrating data items collected from multiple data sources
Embodiments of the present disclosure relate to a database system for collecting and integrating electronic data items from multiple data sources. Embodiments...
US-1,030,5690 Two-step central matching
A method performed by a client device of enrolling biometric data of a user with a network node over a secure communication channel comprises capturing the...
US-1,030,5686 Encrypted group communications
Secure data transfers between communication nodes is performed using a group encryption key supplied by a remote management system. A first node transmits a...
US-1,030,4319 Monitoring and security devices comprising multiple sensors
A monitoring device comprises a single housing, a plurality of sensors supported by the housing to detect respective characteristics of a location, a processing...
US-1,030,4301 Wireless environmental data capture system and method for mesh networking
A mesh network-based environmental data capture system and method for providing communication between a base system having at least one wireless input capture...
US-1,030,4270 Secured communication system and data model to facilitate authorization to access rental property
Various embodiments relate generally to electrical and electronic hardware, computer software and systems, wired and wireless network communications, and...
US-1,030,4150 Apparatus and method for protecting real-time safety and security relevant video data
A system for generating and detecting watermarks within a video frame (e.g., video content) is described to determine whether a data interruption has occurred....
US-1,030,4046 Device and method in wireless communication system and wireless communication system
There is disclosed a device and method in a wireless communication system and a wireless communication system, the device including: a secure channel...
US-1,030,4044 Multi-factor mobile user authentication
A system and method are disclosed herein leveraging financial networks standards with mobile device data and secure processing and storage environment knowledge...
US-1,030,3953 Person tracking and privacy and acceleration of data using autonomous machines
A mechanism is described for facilitating person tracking and data security in machine learning at autonomous machines. A method of embodiments, as described...
US-1,030,3901 Secure processor and a program for a secure processor
The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated...
US-1,030,3899 Secure public cloud with protected guest-verified host control
A host Virtual Machine Monitor (VMM) operates "blindly," without the host VMM having the ability to access data within a guest virtual machine (VM) or the...
US-1,030,3894 Fine-grained access control for data manipulation language (DML) operations on relational data
Embodiments allow, within database security policies, the grant of data change operation-specific privileges to particular users to be applied within particular...
US-1,030,3867 External secure unit
A method for operating an external secure unit comprises at least a memory for storing data, a processor for processing the data, at least one interface for...
US-1,030,3860 Security through layers in an intelligent electronic device
The present disclosure provides for improving security in a meter or an intelligent electronic device (IED) through the use of a security key which is unique to...
US-1,030,3649 Storage media abstraction for uniform data storage
A storage abstraction system is described herein that exposes storage from an operating system as a uniform storage device and abstracts from applications the...
US-1,030,3623 Non-volatile memory for secure storage of authentication data
A first non-volatile memory may store first data and a second non-volatile memory may store second data. An authentication component may be coupled with the...
US-1,030,3517 Automated evaluation of computer programming
Techniques are described for analysis and evaluation of different computer programs developed by different users to accomplish programming tasks. A computer...
US-1,030,3411 Method for capturing, storing, accessing, and outputting digital content
A method for capturing and outputting digital content is herein disclosed and enabled, the output system includes an information apparatus, a server, and a...
US-1,030,3391 System and method for data storage, transfer, synchronization, and security
A system for storing and transmitting data in a highly compact format comprising reference codes to data chunklets contained in a library, wherein the data are...
US-1,030,3167 Automated drone systems
An automated drone security system for surveilling a location includes one or more drones with onboard sensors and an imaging device for measuring surveillance...
US-1,030,2807 Systems and methods for detecting threats and contraband in cargo
The present specification discloses systems and methods for identifying and reporting contents of a tanker, container or vehicle. Programmatic tools are...
US-1,030,1018 Fixed drone visualization in security systems
An unmanned aerial vehicle is described and includes a computer carried by the unmanned aerial vehicle to control flight of the unmanned aerial vehicle and at...
US-1,030,0700 Elongate printhead having robust electrical assembly
An inkjet printhead includes: a rigid elongate carrier having an ink supply channel and a lower surface having a plurality of printhead chips mounted thereon; a...
US-1,029,9307 Apparatus, system, and method of wirelessly transmitting and receiving data
A wireless media player and a related system and methodology. One feature of the wireless media player system pertains to a virtual connector system, apparatus,...
US-1,029,9304 Securely communicating a status of a wireless technology device to a non-paired device
A wireless technology device and method for securely communicating a status of a wireless technology device to a non-paired device, includes detecting a status...
US-1,029,9300 Secure systems and methods for establishing wireless audio sharing connection
A system and method for tethering wireless audio devices. The method includes establishing a first wireless connection between an intermediary device and a...
US-1,029,9128 Securing communications for roaming user equipment (UE) using a native blockchain platform
A network function (NF) entity in a communication network receives authentication data associated with a User Equipment (UE), determines the UE supports a...
US-1,029,8735 Method and apparatus for dynamic configuration of a multiprocessor health data system
A health monitoring system which can collect data generated from multiple health, fitness, and environmental data generating devices by a health application...
US-1,029,8612 System and method for time based anomaly detection in an in-vehicle communication network
A system and method for providing security to a network may include maintaining, by a processor, a model of an expected behavior of data communications over the...
US-1,029,8610 Efficient and secure user credential store for credentials enforcement using a firewall
Techniques for an efficient and secure store for credentials enforcement using a firewall are disclosed. In some embodiments, a system, process, and/or computer...
US-1,029,8607 Constructing graph models of event correlation in enterprise security systems
Methods and systems for detecting anomalous events include detecting anomalous events in monitored system data. An event correlation graph is generated by...
US-1,029,8603 Supervisory control and data acquisition
Aspects of the present disclosure relate to computer system security. A machine accesses a set of records corresponding to a set of users having access to a...
US-1,029,8591 Secure integration of independent cloud foundry applications in a fiori launchpad
An Open Authorization (OAuth) Client Secret of an application associated with a Multi-Tenant Application (MTA) deployed in a cloud-computing environment if read...
US-1,029,8584 System and method for secure control of resources of wireless mobile communication devices
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.