Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,039,7001 Secure mechanism for subsidy lock enforcement
A malicious party may attempt to avoid a mobile network operator (MNO) contract involved with subsidy-lock by inserting an interfering piece of hardware called...
US-1,039,7000 Multi-level authentication for secure supply chain asset management
An authentication system and method for authenticating an asset includes a Near Field Communication (NFC) tag associated with the asset, an NFC enabled user...
US-1,039,6985 Federated identity management based on biometric data
Techniques are described for cryptographic key generation based on biometric data associated with a user. Biometric data, such as fingerprint(s) and/or...
US-1,039,6984 Apparatus and system having multi-party cryptographic authentication
An electronic device includes one or more processors that perform at least one secure multiparty cryptographic process using a plurality of modules that jointly...
US-1,039,6967 Method and apparatus for managing downlink to uplink interference in wireless communication system
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-1,039,6824 Data processing device and data processing method
The present technology relates to a data processing device and a data processing method, which are capable of securing excellent communication quality in data...
US-1,039,5755 Stacked memory device using base die spare cell and method of repairing the same
Disclosed are a stacked memory device and a method of repairing the same, in which spare cells for a post-bond test and repair process are disposed in a base...
US-1,039,5494 Systems and methods of home-specific sound event detection
Systems and methods of a security system are provided, including detecting, by a sensor, a sound event, and selecting, by a processor coupled to the sensor, at...
US-1,039,5458 Secure vehicle access method and system
The present disclosure relates to a method and a system for securely accessing a vehicle. The method comprises a preliminary phase, a data exchange phase, and...
US-1,039,5308 Systems and methods for dynamic display of synthetic reference structure
Systems, methods, and computer-readable media are disclosed for using a synthetic reference structure to determine if an obligation is triggered. An exemplary...
US-1,039,5247 Systems and methods for facilitating a secure transaction at a non-financial institution system
The systems and methods discussed herein relate to securely transferring funds over a private network. Receiving transaction data related to a fund transfer...
US-1,039,5201 Method and system for risk measurement and modeling
A method and system for risk measurement and modeling, which may be used to identify and mitigate information security risks for an information system, and...
US-1,039,5066 Method for protecting a camera and a microphone from unauthorized access
The invention relates to digital data processing systems that use a microphone and/or a camera as a means of inputting information. More particularly, the...
US-1,039,5044 Method and apparatus for securing computer mass storage data
In general, embodiments of the invention include methods and apparatuses for securely storing computer system data. Embodiments of the invention encrypt and...
US-1,039,5043 Securely storing data in an elastically scalable dispersed storage network
A method for execution by a dispersed storage and task (DST) processing unit includes: generating an encoded data slice from a dispersed storage encoding of a...
US-1,039,5037 System and method for preserving data during an information handling system event using information handling...
An information handling system may include a non-volatile memory and a processor system coupled to the non-volatile memory to access the non-volatile memory....
US-1,039,5028 Virtualization based intra-block workload isolation
Generally, this disclosure provides systems, devices, methods and computer readable media for virtualization-based intra-block workload isolation. The system...
US-1,039,5021 Security and identification system and method using data collection and messaging over a dynamic mesh network...
Data is acquired across a deployed encrypted mesh network, using a digital security controlled, identification badge or tag or sensors, in a dual protocol...
US-1,039,5017 Selectively redacting digital footprint information in order to improve computer data security
A computer-implemented method improves a computer system's security through use of a simulated digital footprint. One or more processors retrieve a historical...
US-1,039,5005 System and method for providing real-time bi-directional charge capture-centralized conversation between...
A system for providing real-time bi-directional charge capture-centralized conversation between Billing and Provider entities, comprising a first computer...
US-1,039,4906 Physical location history with digital member entries or location history entries
A personalized way to digitally record a person's physical activities over time serves web searching, business advertising, nostalgia, security and object...
US-1,039,4905 Method and apparatus for a digital leg history
A personalized way to digitally record a person's physical activities over time serves web searching, business advertising, nostalgia, security and object...
US-1,039,4904 Physical location history with advertising
A personalized way to digitally record a person's physical activities over time serves web searching, business advertising, nostalgia, security and object...
US-1,039,4855 Graph-modeled data processing in a relational database
A system for processing graph-modeled data in a relational database is provided. In some implementations, the system performs operations comprising: receiving,...
US-1,039,4721 Integrated circuit security
An integrated circuit, having a security supervision system, comprising a plurality of functional circuit blocks interconnected to collectively performing data...
US-1,039,4492 Securing a media storage device using write restriction mechanisms
According to one embodiment, a system includes a media storage device, a processor, and logic integrated with and/or executable by the processor. The logic is...
US-1,039,4194 Adaptive control methods for buildings with security
A method controls a first switch terminal of a building occupied by one or more building occupant. A plurality of switch terminals are provided at the building....
US-1,039,3884 System and method for detecting the wearing by a patient of a foot ulcer offloading apparatus
A system and a method for detecting the wearing by a patient of a foot ulcer offloading apparatus are described. The system includes an electronic geolocation...
US-1,039,3570 Precision scale having a removable climate module
A precision balance including a weighing chamber (16); a draft shield (18, 20, 22), which surrounds the weighing chamber (16); a climate module (34), which is...
US-1,039,0335 Method and apparatus for transmitting uplink control information in carrier aggregation system
A communication method and a system for supporting a high data transmission rate are provided. The method and system fuses 5G communication systems with IoT...
US-1,039,0277 MOBIKE aware LTE to Wi-Fi handoff optimization
An embodiment of this disclosure provides a user equipment (UE) for managing handovers between different networks. The UE includes a memory and at least one...
US-1,039,0225 Mobile terminal security authentication method and system and mobile terminal
The present disclosure provides a mobile terminal security authentication method and system, and a mobile terminal thereof. The method includes: acquiring, by a...
US-1,038,9853 Apparatus and methods for content distribution to packet-enabled devices via a network bridge
Apparatus and methods for providing content to packet-enabled devices in a content distribution network. In one embodiment, a network architecture is disclosed...
US-1,038,9817 System-on-chip data security appliance and methods of operating the same
System-on-chip data security appliance ("SoC-DSA") and methods of operating the same. In one embodiment, the SoC-DSA includes data security mechanisms enclosed...
US-1,038,9751 Wireless data security between vehicle components
A mobile vehicle communications system and a method of determining the legitimacy of a wireless sensor signal received by an electronic control unit (ECU) in a...
US-1,038,9742 Security feature extraction for a network
Disclosed is a system for detecting security threats in a local network. A security analytics system collects data about entities in the local network. The...
US-1,038,9738 Malware communications detection
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,038,9736 Communication protocols in integrated systems
A system and methods comprise a touchscreen at a premises. The touchscreen includes a processor coupled to a security system at the premises. User interfaces...
US-1,038,9733 Data verification via independent processors of a device
A content request communication, e.g., generated using a first processor of a device, can be transmitted to a web server. A response communication including...
US-1,038,9732 Secure data verification technique
A technique for the secure exchange and verification of data between multiple entities that use compatible business management systems utilizes serializable...
US-1,038,9731 Multi-factor authentication using positioning data
Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system...
US-1,038,9728 Multi-level security enforcement utilizing data typing
A computer-implemented method, a computer system, and a computer program product are provided for enforcing multi-level security (MLS) on a message transmitted...
US-1,038,9727 Multi-level security enforcement utilizing data typing
A computer-implemented method, a computer system, and a computer program product are provided for enforcing multi-level security (MLS) on a message transmitted...
US-1,038,9719 Parameter based data access on a security information sharing platform
Example implementations relate to a security information sharing platform that enables sharing of security information among a plurality of members. For...
US-1,038,9716 Secure document storage system
A system is provided for the storage of data, the system having: an encrypted host platform disposed in a specific territory and upon which export controlled...
US-1,038,9714 Increased communication security
Authentication data may be generated and included in a Constrained Application Protocol (CoAP) message communicated from a first computer system to a second...
US-1,038,9708 Secure authentication of a user associated with communication with a service representative
A device detects a communication involving a user associated with an account and a service representative, and sends, to a user device associated with the...
US-1,038,9687 Secure document transmission
Embodiments of the invention relate to a method and a system for safely transmitting a document from a first network to a second network, while obviating the...
US-1,038,9685 Systems and methods for securely transferring selective datasets between terminals
Systems and methods for securely transmitting data between terminals include receiving, by a first communication device, an internet protocol (IP) packet via a...
US-1,038,9571 System implemented on the basis of a field broadband bus architecture of industrial internet
The disclosure relates to a system implemented on the basis of a field broadband bus architecture of industrial internet, where this system is based upon a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.