Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,038,2466 Cooperative cloud-edge vehicle anomaly detection
Example implementations of the present disclosure are directed to systems and methods directed to increasing the accuracy and speed that anomalous and malicious...
US-1,038,2465 Pattern matching based dataset extraction
Example systems generate a dataset for tuning an analyzer to probe activities related to a web facing application. The systems capture data streams received at...
US-1,038,2461 System for determining anomalies associated with a request
Described are techniques for identifying anomalous and non-anomalous requests based on metric values determined from a request. Weights to be associated with...
US-1,038,2454 Data mining algorithms adopted for trusted execution environment
Distributed systems for protecting networked computer assets from compromise are disclosed. The distributed system includes one or more enterprise event...
US-1,038,2452 Communication protocols in integrated systems
A system and methods comprise a touchscreen at a premises. The touchscreen includes a processor coupled to a security system at the premises. User interfaces...
US-1,038,2451 Integrated security system having rule optimization
Techniques are described for optimizing the placement of automatically generated rules within security policies. An administrator may, for example, interact...
US-1,038,2450 Network data obfuscation
Network data obfuscation is disclosed. For example, an obfuscation driver is initialized in an endpoint device connected to an obfuscation gateway over a secure...
US-1,038,2446 Computerized system, method and computer program product, for managing a computer program's operations
A computerized method of managing a computer remote session operation, comprising providing a server for hosting application execution; configuring a number of...
US-1,038,2445 Intelligent messaging system based temporary receiver registration for electronic message communications
An intelligent messaging server (herein `messaging server`) that is communicably coupled to trusted directory nodes receives, from a first user computing...
US-1,038,2442 Secure data transmission
A system may include a first network in which user device(s) and a HIP server are communicably coupled. The first network may include a secure data...
US-1,038,2429 Systems and methods for performing secure backup operations
The disclosed computer-implemented method for performing secure backup operations may include (i) identifying a group of backup servers with heterogeneous...
US-1,038,2428 Systems and methods for providing single sign-on authentication services
Embodiments of the disclosure enable a system to provide authentication services. The system includes a system server that receives data associated with an...
US-1,038,2425 Technologies for token-based authentication and authorization of distributed computing resources
Technologies for token-based access authorization to an application program interface (API) include an access management server to receive a service request...
US-1,038,2423 Systems and methods for providing multimedia content within an application and a security solution integrated...
A system is provided for downloading, for distribution and for acoustic reproduction of a music album, which includes at least one or several digital music...
US-1,038,2409 Secure multi-party protocol
A requestor and a responder may conduct secure communication by making API calls based on a secure multi-party protocol. The requestor may send a request data...
US-1,038,2400 Techniques for preventing large-scale data breaches utilizing differentiated protection layers
Techniques related to preventing large-scale data breaches utilizing differentiated data object (DO) protection layers are described. A security gateway placed...
US-1,038,2396 Utilizing management network for secured configuration and platform management
A network connection device having a security processor exchanges data traffic between a data network and a host computer via a network port. Security...
US-1,038,2209 Privacy control using unique identifiers associated with sensitive data elements of a group
A method, system and computer program product for privacy control. A unique identifier for each data element of a group of data elements (e.g., driver's license...
US-1,038,2208 Secure communications using organically derived synchronized processes
This disclosure provides a system and method for secure communications. The method can enable secure machine-to-machine communications within discrete security...
US-1,038,2205 Security system and method for using a blockchain service through privacy-aware blockchain arbitration server
A security method for using a blockchain service creates a secure blockchain to protect data through a privacy-aware blockchain arbitration server that has zero...
US-1,038,2201 Removable circuit for unlocking self-encrypting data storage devices
Security of data storage devices and servers can be improved by the system and methods described herein. In some embodiments, a key management device of a...
US-1,038,2196 System and method for secure communications based on locally stored values
This disclosure provides a system and method for secure communications. The method can enable secure machine-to-machine communications within discrete security...
US-1,038,2062 Data processing device and data processing method
A data processing device and a data processing method, which are capable of securing excellent communication quality in data transmission using an LDPC code. In...
US-1,038,1714 Data communications case
A data communications apparatus including a case. A power supply is secured inside the case. A router device is secured inside the case, the router device...
US-1,038,0872 Categorizing compliance with security protocols
To improve or ensure a standard of compliance with critical security protocols, performance is quantified by communicating data from an alarm system, access...
US-1,038,0813 Systems and methods for using motion pattern of a user for authentication
Systems and methods for using accelerations derived from a motion pattern for multi-factor authentication, the method including receiving, filtering, and...
US-1,038,0812 Vehicle transaction validation
A secure chain of data blocks is maintained at a given computing node, wherein the given computing node is part of a set of computing nodes in a distributed...
US-1,038,0385 Visual security device
A system can include a removable, non-reattachable security device and a circuit configured to stop or alter the operation of the system when the removable...
US-1,038,0372 Methods and systems for providing secured access to big data
In one embodiment, a method for providing access to big data is disclosed. The method includes receiving biometric data of a user to provide access to columns...
US-1,038,0361 Secure transaction method from a non-secure terminal
The invention relates to a transaction method, the method including the steps of: providing a terminal including a main processor, a graphic processor...
US-1,038,0360 Secured file sharing system
One embodiment provides a file sharing system. During operation, the system identifies a data file to be sent to a second device of a second user and generates...
US-1,038,0349 Security analysis using relational abstraction of data structures
Analyzing program code can include detecting an instance of a container within the program code using a processor, selecting a model container correlated with...
US-1,038,0335 Systems and methods for providing security to a host endpoint device
In various example embodiments disclosed herein, a Dynamic Security Architecture Environment (DSAE) security architecture is provided in an externally...
US-1,038,0324 Patient emergency response system
An improved emergency response system is provided. The system includes a patient or subscriber location database having a schedule of patient or subscriber...
US-1,038,0241 Modular system and method for managing chinese, japanese, and korean linguistic data in electronic form
A linguistic services center is described that interfaces with various natural language processing modules such that users of one module can take advantage of...
US-1,038,0202 Physical location history with URL and positioning system
A personalized way to digitally record a person's physical activities over time serves web searching, business advertising, nostalgia, security and object...
US-1,037,9839 Device and method for facilitating secure communications over a cellular network
A process for communicating utility-related data over at least one network is described. the process includes: collecting utility-related data at a hub device...
US-1,037,8863 Smart wearable mine detector
To improve the problems of conventional mine detectors, the purpose of the present invention is to provide a smart wearable mine detector comprising a human...
US-1,037,5571 Dual connectivity mode of operation of a user equipment in a wireless communication network
A system and method provide a security aspect for a UE in dual connectivity mode of operation in wireless communication networks. The system and method provide...
US-1,037,5202 Database selection in distributed computing systems
Techniques for database selection during site provisioning in distributed computing systems are disclosed herein. In one embodiment, a method can include...
US-1,037,5182 Methods, systems, and media for managing wind speed data
A system for collecting and managing wind speed data via an external communications network comprises one or more wind stations, each including an anemometer...
US-1,037,5174 Cloud integrated vehicle platform
A cloud integrated vehicle infotainment platform, method, and system are described. The system may include a cloud-integrated vehicle infotainment platform in...
US-1,037,5112 Method and apparatus for decryption of encrypted SSL data from packet traces
A system for decrypts encrypted Secure Sockets Layer (SSL) data from packet traces without using private keys or a proxy. Decryption of encrypted SSL data is...
US-1,037,5110 Luring attackers towards deception servers
Endpoints in a computer network create connections to a deception server without sending any payload data. The connections create records of the connection on...
US-1,037,5094 Wireless sensor network security
In some examples, a computing device may receive sensed data of a first sensor sent in a first transmission. The computing device may associate a first...
US-1,037,5089 Multi-host threat tracking
A system and method for tracking data security threats within an organization is proposed. A threat aggregator process executing on an analysis computer system...
US-1,037,5088 Routing systems and methods
Example routing systems and methods are described. In one implementation, an apparatus includes a network interface, a secure system, and a routing system...
US-1,037,5082 Method and apparatus for geographic location based electronic security management
Provided herein are embodiments directed to facilitating an authentication process before allowing an action. An example apparatus may be configured to receive...
US-1,037,5049 System and method for securely changing network configuration settings to multiplexers in an industrial control...
A secure control system includes a network of multiplexers that control end/field devices of an infrastructure system, such as an electric power grid. The...
US-1,037,5048 User identity verification method and system, and verification server
A user identity verification method is disclosed. The method includes receiving an identity verification request sent by a user through a client terminal;...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.