Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,039,7246 System and methods for malware detection using log based crowdsourcing analysis
A crowdsourcing log analysis system and methods for protecting computers and networks from malware attacks by analyzing data log information obtained from a...
US-1,039,7245 Interface with secure intermediary platform to generate data compatible with an external system in an oil and...
The present disclosure generally relates to an interface system and method of interfacing to generate data compatible with an external system in an oil and gas...
US-1,039,7209 Risk-aware multiple factor authentication based on pattern recognition and calendar
An embodiment of the invention provides a system and method for risk-aware multiple factor authentication based on pattern recognition and calendar. Recent...
US-1,039,7202 Secure communication channels
A method and system for negotiating a secure device-to-device communications channel between a first computing device and a second computing device, wherein the...
US-1,039,7200 Card-based dynamic password generation method and device
A card-based method for generating a dynamic password, in which the method comprises: power on a device, initialize a current running state as a first state,...
US-1,039,7194 Dynamic transmission of encrypted data
Embodiments of the present disclosure may be used to securely transmit data between multiple computing devices. Among other things, this can greatly extend the...
US-1,039,7192 Remotely accessing data on a secured server
An assistant computing device communicates with a remote computing device, and a requesting computing device. The remote computing device in communication with...
US-1,039,7186 Methods for internet communication security
The present disclosure relates to network security software cooperatively configured on plural nodes to authenticate and authorize devices, applications, users,...
US-1,039,7008 Management of secret data items used for server authentication
A security device (6) is provided for facilitating management of secret data items such as cryptographic keys which are used by a remote server (2) to...
US-1,039,7007 Enhanced security for industrial automation gateways
An industrial automation gateway providing an extended web of trust is provided. The industrial automation gateway includes a cloud communication interface...
US-1,039,7006 Network security with surrogate digital certificates
A computing device such as a network security device receives one or more digital certificates in a certificate chain and generates one or more surrogate...
US-1,039,7001 Secure mechanism for subsidy lock enforcement
A malicious party may attempt to avoid a mobile network operator (MNO) contract involved with subsidy-lock by inserting an interfering piece of hardware called...
US-1,039,7000 Multi-level authentication for secure supply chain asset management
An authentication system and method for authenticating an asset includes a Near Field Communication (NFC) tag associated with the asset, an NFC enabled user...
US-1,039,6985 Federated identity management based on biometric data
Techniques are described for cryptographic key generation based on biometric data associated with a user. Biometric data, such as fingerprint(s) and/or...
US-1,039,6984 Apparatus and system having multi-party cryptographic authentication
An electronic device includes one or more processors that perform at least one secure multiparty cryptographic process using a plurality of modules that jointly...
US-1,039,6967 Method and apparatus for managing downlink to uplink interference in wireless communication system
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-1,039,6824 Data processing device and data processing method
The present technology relates to a data processing device and a data processing method, which are capable of securing excellent communication quality in data...
US-1,039,5755 Stacked memory device using base die spare cell and method of repairing the same
Disclosed are a stacked memory device and a method of repairing the same, in which spare cells for a post-bond test and repair process are disposed in a base...
US-1,039,5494 Systems and methods of home-specific sound event detection
Systems and methods of a security system are provided, including detecting, by a sensor, a sound event, and selecting, by a processor coupled to the sensor, at...
US-1,039,5458 Secure vehicle access method and system
The present disclosure relates to a method and a system for securely accessing a vehicle. The method comprises a preliminary phase, a data exchange phase, and...
US-1,039,5308 Systems and methods for dynamic display of synthetic reference structure
Systems, methods, and computer-readable media are disclosed for using a synthetic reference structure to determine if an obligation is triggered. An exemplary...
US-1,039,5247 Systems and methods for facilitating a secure transaction at a non-financial institution system
The systems and methods discussed herein relate to securely transferring funds over a private network. Receiving transaction data related to a fund transfer...
US-1,039,5201 Method and system for risk measurement and modeling
A method and system for risk measurement and modeling, which may be used to identify and mitigate information security risks for an information system, and...
US-1,039,5066 Method for protecting a camera and a microphone from unauthorized access
The invention relates to digital data processing systems that use a microphone and/or a camera as a means of inputting information. More particularly, the...
US-1,039,5044 Method and apparatus for securing computer mass storage data
In general, embodiments of the invention include methods and apparatuses for securely storing computer system data. Embodiments of the invention encrypt and...
US-1,039,5043 Securely storing data in an elastically scalable dispersed storage network
A method for execution by a dispersed storage and task (DST) processing unit includes: generating an encoded data slice from a dispersed storage encoding of a...
US-1,039,5037 System and method for preserving data during an information handling system event using information handling...
An information handling system may include a non-volatile memory and a processor system coupled to the non-volatile memory to access the non-volatile memory....
US-1,039,5028 Virtualization based intra-block workload isolation
Generally, this disclosure provides systems, devices, methods and computer readable media for virtualization-based intra-block workload isolation. The system...
US-1,039,5021 Security and identification system and method using data collection and messaging over a dynamic mesh network...
Data is acquired across a deployed encrypted mesh network, using a digital security controlled, identification badge or tag or sensors, in a dual protocol...
US-1,039,5017 Selectively redacting digital footprint information in order to improve computer data security
A computer-implemented method improves a computer system's security through use of a simulated digital footprint. One or more processors retrieve a historical...
US-1,039,5005 System and method for providing real-time bi-directional charge capture-centralized conversation between...
A system for providing real-time bi-directional charge capture-centralized conversation between Billing and Provider entities, comprising a first computer...
US-1,039,4906 Physical location history with digital member entries or location history entries
A personalized way to digitally record a person's physical activities over time serves web searching, business advertising, nostalgia, security and object...
US-1,039,4905 Method and apparatus for a digital leg history
A personalized way to digitally record a person's physical activities over time serves web searching, business advertising, nostalgia, security and object...
US-1,039,4904 Physical location history with advertising
A personalized way to digitally record a person's physical activities over time serves web searching, business advertising, nostalgia, security and object...
US-1,039,4855 Graph-modeled data processing in a relational database
A system for processing graph-modeled data in a relational database is provided. In some implementations, the system performs operations comprising: receiving,...
US-1,039,4721 Integrated circuit security
An integrated circuit, having a security supervision system, comprising a plurality of functional circuit blocks interconnected to collectively performing data...
US-1,039,4492 Securing a media storage device using write restriction mechanisms
According to one embodiment, a system includes a media storage device, a processor, and logic integrated with and/or executable by the processor. The logic is...
US-1,039,4194 Adaptive control methods for buildings with security
A method controls a first switch terminal of a building occupied by one or more building occupant. A plurality of switch terminals are provided at the building....
US-1,039,3884 System and method for detecting the wearing by a patient of a foot ulcer offloading apparatus
A system and a method for detecting the wearing by a patient of a foot ulcer offloading apparatus are described. The system includes an electronic geolocation...
US-1,039,3570 Precision scale having a removable climate module
A precision balance including a weighing chamber (16); a draft shield (18, 20, 22), which surrounds the weighing chamber (16); a climate module (34), which is...
US-1,039,0335 Method and apparatus for transmitting uplink control information in carrier aggregation system
A communication method and a system for supporting a high data transmission rate are provided. The method and system fuses 5G communication systems with IoT...
US-1,039,0277 MOBIKE aware LTE to Wi-Fi handoff optimization
An embodiment of this disclosure provides a user equipment (UE) for managing handovers between different networks. The UE includes a memory and at least one...
US-1,039,0225 Mobile terminal security authentication method and system and mobile terminal
The present disclosure provides a mobile terminal security authentication method and system, and a mobile terminal thereof. The method includes: acquiring, by a...
US-1,038,9853 Apparatus and methods for content distribution to packet-enabled devices via a network bridge
Apparatus and methods for providing content to packet-enabled devices in a content distribution network. In one embodiment, a network architecture is disclosed...
US-1,038,9817 System-on-chip data security appliance and methods of operating the same
System-on-chip data security appliance ("SoC-DSA") and methods of operating the same. In one embodiment, the SoC-DSA includes data security mechanisms enclosed...
US-1,038,9751 Wireless data security between vehicle components
A mobile vehicle communications system and a method of determining the legitimacy of a wireless sensor signal received by an electronic control unit (ECU) in a...
US-1,038,9742 Security feature extraction for a network
Disclosed is a system for detecting security threats in a local network. A security analytics system collects data about entities in the local network. The...
US-1,038,9738 Malware communications detection
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,038,9736 Communication protocols in integrated systems
A system and methods comprise a touchscreen at a premises. The touchscreen includes a processor coupled to a security system at the premises. User interfaces...
US-1,038,9733 Data verification via independent processors of a device
A content request communication, e.g., generated using a first processor of a device, can be transmitted to a web server. A response communication including...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.