Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,029,0068 Graphical platform for interacting with unstructured data
A graphical platform enables users to leverage unstructured data in many different ways via access with many different types of devices that can be located...
US-1,029,0001 Data breach detection
A merchant data breach process comprises processing daily payment transaction data with a risk and compliance platform to obtain a fraud score for each...
US-1,028,9930 System and associated for online measurement of the optical characteristics of a glass sheet
A glass sheet optical inspection system installed online in a glass sheet processing system includes an apparatus for measuring small optical or obstructive...
US-1,028,9865 Systems and methods for providing kinship-based accessibility to securely stored data
A computer-implemented method for providing kinship-based accessibility to securely stored data may include (1) identifying encrypted data that is encrypted...
US-1,028,9864 Security tool to prevent sensitive data leakage
Embodiments include method, systems and computer program products for a security tool to prevent data leakage. In some embodiments, it may be determine that a...
US-1,028,9862 Storage efficient and unconditionally secure private information retrieval
A method of storing and retrieving a set of original data (E1, . . . , En) in and from a plurality of remote servers (SP1, . . . , SPI+1), comprises a coding...
US-1,028,9857 Enforcement of same origin policy for sensitive data
Methods, systems, and apparatus relating to enforcement of same origin policy of sensitive data are described. In an embodiment, a security agent may help...
US-1,028,9841 Graph-based attack chain discovery in enterprise security systems
Methods and systems for detecting anomalous events include detecting anomalous events in monitored system data. An event correlation graph is generated based on...
US-1,028,9825 Login access control for secure/private data
A login access control system is provided. The login access control system includes a camera configured to capture an input image of a subject purported to be a...
US-1,028,9814 Licensing in the cloud
At least one machine readable medium comprising a plurality of instructions that in response to being executed by a system cause the system to send a unique...
US-1,028,9812 Apparatus, system, and method of preventing forgery or falsification of electronic document based on content
The present invention includes: an electronic document receiving unit receiving an original electronic document; a text information extracting unit extracting...
US-1,028,9808 Method and system for secure data processing
Described herein are embodiments that relate to a method for use in data processing. An embodiment includes providing an arithmetic unit configured to perform...
US-1,028,9669 Filling information from mobile devices with security constraints
A system for a mobile device includes at least one processor operatively connected to a computer readable storage medium in the at least one processor is...
US-1,028,9601 Host controller, secure element and serial peripheral interface communications system
A host controller, a secure element, and a serial peripheral interface communications system are provided. The host controller is configured to connect to a...
US-1,028,9568 Application-driven storage systems for a computing system
Systems and methods that allow secure application-driven arbitrary compute in storage devices in a cloud-based computing system are provided. A computing system...
US-1,028,9543 Secure erasure of processed data in non-volatile memory by disabling distributed writing
An information processing apparatus which stores process target data in a non-volatile memory, cancels a writing distribution function with respect to the...
US-1,028,9346 Apparatus providing wireless access to storage devices
The invention provides methods and apparatus for the reading of data from digital memory devices, and methods and apparatus for the wireless transmittal of the...
US-1,028,8379 Riflescope aiming system
A riflescope aiming system that includes a telescopic sight, a multiple-zero-point elevation turret and a ballistics reference system. The multiple-zero-point...
US-1,028,6875 Methods and systems for vehicle security and remote access and safety control interfaces and notifications
Methods and systems are disclosed for managing personal security of a user of a vehicle. The vehicle has a plurality of active sensors. The active sensors...
US-RE47,394 Wirelessly transferring data to a packaged electronic device
An electronic device has first and second circuitry. A wireless trigger signal at the first circuitry causes the second circuitry to power up to receive a...
US-1,028,5045 Monitoring of embedded subscriber identity modules
A system for monitoring embedded subscriber identity modules (eSIMs) is disclosed. The monitoring system provides visibility into the end-to-end performance of...
US-1,028,4880 Adaptive security camera image compression method of operation
A lossy compression method optimizes bandwidth and storage for a security surveillance network. An appliance on a local network attached to event capture...
US-1,028,4617 Dynamic segregated secure data connection
A system can perform operations including receiving a first data stream from a first device, wherein the first data stream is associated with an active session...
US-1,028,4603 System and method for providing network and computer firewall protection with dynamic address isolation to a device
A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to...
US-1,028,4602 Integrating policies from a plurality of disparate management agents
Described herein are embodiments for managing policies of a mobile device. In embodiments, a mobile device receives policy containers from a plurality of...
US-1,028,4588 Dynamic selection of security posture for devices in a network using risk scoring
In one embodiment, a method for assessing security posture for entities in a computing network is implemented on a computing device and includes: receiving...
US-1,028,4586 Data loss prevention techniques for applications with save to web functionality
Techniques presented herein describe data loss prevention (DLP) methods for saving a file to a destination over a network via an application, such as a...
US-1,028,4568 System and method for secure transmission of streamed data frames
Data acquired, for example by a mobile platform, such as a sequence of images observed by a mobile platform, is grouped. A signature is computed for each group...
US-1,028,4566 Proximity detection system
Various systems and methods for providing a walk away lock are provided herein. A plurality of data packets may be received at a compute device from a user...
US-1,028,4557 Secure data proxy for cloud computing environments
An apparatus in one embodiment comprises a plurality of host devices configured to support execution of applications on behalf of one or more tenants of cloud...
US-1,028,4556 Systems and methods for verifying authentication requests using internet protocol addresses
A computer-implemented method for verifying authentication requests using IP addresses may include (i) collecting, by a computing system, data on IP address...
US-1,028,4543 System and method for secure online authentication
Disclosed are systems and methods for secure online authentication. An exemplary method comprises: determining, via a processor of a computing device, a...
US-1,028,4542 Intelligent certificate discovery in physical and virtualized networks
Mechanisms are provided, in a communication device associated with a first computing device, for capturing security data exchanged between the first computing...
US-1,028,4535 Secure database
Methods, systems, and apparatus, including a system that includes a secure hardware unit; and a database system including one or more processors; and a...
US-1,028,4530 Secure computer peripheral devices
A method for improving security of peripheral devices is described. In one embodiment, the method includes sending, by a processor of a peripheral device, at...
US-1,028,4525 Cross-domain data-gate for secure transmission of data over publicly shared datalinks
A device for secure transmission of vehicle data over vehicle datalinks that may be shared with passenger devices and are connected to a publicly shared network...
US-1,028,4521 Automatic security list offload with exponential timeout
Disclosed are systems, methods, and computer-readable storage media for automatic security list offload with exponential timeout. A second layer of a firewall...
US-1,028,4481 Communication device, communication method, and storage medium
A communication device includes a reception unit configured to receive data transmitted from another communication device in response to a notification...
US-1,028,4373 Smart grid secure communications method and apparatus
Apparatus and methods performing secure communications in an energy delivery system. Energy delivery systems may include phasor measurement units (PMU), phasor...
US-1,028,4372 Method and system for secure management of computer applications
Processing information is disclosed including receiving an application retrieval request sent by a terminal, the application retrieval request including...
US-1,028,4369 Secure app-to-app communication
Secure application-to-application communication is disclosed. A shared encryption key may be used to encrypt data to be transferred from a first mobile...
US-1,028,4225 Systems and methods for data compression
The transmission of broadcast data, such as financial data and news feeds, is accelerated over a communication channel using data compression and decompression...
US-1,028,2786 Techniques to visualize and gamify risk management services
Techniques for gamifying risk management services include associating a financial status of a user with a defensible position display element in a gameplay...
US-1,028,2730 Method for managing a transaction, corresponding server, computer program product and storage medium
A method for managing at least one transaction implemented by an electronic payment terminal having a magnetic stripe reader for reading a paycard of a user....
US-1,028,2724 Security system incorporating mobile device
In some embodiments, a first server computer may be provided. The first server computer may comprise a processor and a computer readable medium coupled to the...
US-1,028,2719 Secure and trusted device-based billing and charging process using privilege for network proxy authentication...
A user equipment with a primary identifier and a secondary identifier. The user equipment comprises a witness application stored in the memory, that when...
US-1,028,2682 Systems and methods for assignment of equipment to an officer
A system for tracking, assigning, and issuing equipment to security agency personnel (e.g., officers, administration, command, armorer). An armorer is assigned...
US-1,028,2650 System and apparatus for encrypted data collection using RFID cards
A secure smart card is described. The smart card can include a processor, a memory and a transceiver. The smart card can communicate with various terminals and...
US-1,028,2565 Computer security environment
A computer security environment that delays physical access to a computer system, detects intrusion attempts upon that computer system, using one or more...
US-1,028,2563 Video-based privacy supporting system
Computer display privacy and security for computer systems. In one aspect, the invention provides a computer-controlled system for regulating the interaction...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.