Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,038,2428 Systems and methods for providing single sign-on authentication services
Embodiments of the disclosure enable a system to provide authentication services. The system includes a system server that receives data associated with an...
US-1,038,2425 Technologies for token-based authentication and authorization of distributed computing resources
Technologies for token-based access authorization to an application program interface (API) include an access management server to receive a service request...
US-1,038,2423 Systems and methods for providing multimedia content within an application and a security solution integrated...
A system is provided for downloading, for distribution and for acoustic reproduction of a music album, which includes at least one or several digital music...
US-1,038,2409 Secure multi-party protocol
A requestor and a responder may conduct secure communication by making API calls based on a secure multi-party protocol. The requestor may send a request data...
US-1,038,2400 Techniques for preventing large-scale data breaches utilizing differentiated protection layers
Techniques related to preventing large-scale data breaches utilizing differentiated data object (DO) protection layers are described. A security gateway placed...
US-1,038,2396 Utilizing management network for secured configuration and platform management
A network connection device having a security processor exchanges data traffic between a data network and a host computer via a network port. Security...
US-1,038,2209 Privacy control using unique identifiers associated with sensitive data elements of a group
A method, system and computer program product for privacy control. A unique identifier for each data element of a group of data elements (e.g., driver's license...
US-1,038,2208 Secure communications using organically derived synchronized processes
This disclosure provides a system and method for secure communications. The method can enable secure machine-to-machine communications within discrete security...
US-1,038,2205 Security system and method for using a blockchain service through privacy-aware blockchain arbitration server
A security method for using a blockchain service creates a secure blockchain to protect data through a privacy-aware blockchain arbitration server that has zero...
US-1,038,2201 Removable circuit for unlocking self-encrypting data storage devices
Security of data storage devices and servers can be improved by the system and methods described herein. In some embodiments, a key management device of a...
US-1,038,2196 System and method for secure communications based on locally stored values
This disclosure provides a system and method for secure communications. The method can enable secure machine-to-machine communications within discrete security...
US-1,038,2062 Data processing device and data processing method
A data processing device and a data processing method, which are capable of securing excellent communication quality in data transmission using an LDPC code. In...
US-1,038,1714 Data communications case
A data communications apparatus including a case. A power supply is secured inside the case. A router device is secured inside the case, the router device...
US-1,038,0872 Categorizing compliance with security protocols
To improve or ensure a standard of compliance with critical security protocols, performance is quantified by communicating data from an alarm system, access...
US-1,038,0813 Systems and methods for using motion pattern of a user for authentication
Systems and methods for using accelerations derived from a motion pattern for multi-factor authentication, the method including receiving, filtering, and...
US-1,038,0812 Vehicle transaction validation
A secure chain of data blocks is maintained at a given computing node, wherein the given computing node is part of a set of computing nodes in a distributed...
US-1,038,0385 Visual security device
A system can include a removable, non-reattachable security device and a circuit configured to stop or alter the operation of the system when the removable...
US-1,038,0372 Methods and systems for providing secured access to big data
In one embodiment, a method for providing access to big data is disclosed. The method includes receiving biometric data of a user to provide access to columns...
US-1,038,0361 Secure transaction method from a non-secure terminal
The invention relates to a transaction method, the method including the steps of: providing a terminal including a main processor, a graphic processor...
US-1,038,0360 Secured file sharing system
One embodiment provides a file sharing system. During operation, the system identifies a data file to be sent to a second device of a second user and generates...
US-1,038,0349 Security analysis using relational abstraction of data structures
Analyzing program code can include detecting an instance of a container within the program code using a processor, selecting a model container correlated with...
US-1,038,0335 Systems and methods for providing security to a host endpoint device
In various example embodiments disclosed herein, a Dynamic Security Architecture Environment (DSAE) security architecture is provided in an externally...
US-1,038,0324 Patient emergency response system
An improved emergency response system is provided. The system includes a patient or subscriber location database having a schedule of patient or subscriber...
US-1,038,0241 Modular system and method for managing chinese, japanese, and korean linguistic data in electronic form
A linguistic services center is described that interfaces with various natural language processing modules such that users of one module can take advantage of...
US-1,038,0202 Physical location history with URL and positioning system
A personalized way to digitally record a person's physical activities over time serves web searching, business advertising, nostalgia, security and object...
US-1,037,9839 Device and method for facilitating secure communications over a cellular network
A process for communicating utility-related data over at least one network is described. the process includes: collecting utility-related data at a hub device...
US-1,037,8863 Smart wearable mine detector
To improve the problems of conventional mine detectors, the purpose of the present invention is to provide a smart wearable mine detector comprising a human...
US-1,037,5571 Dual connectivity mode of operation of a user equipment in a wireless communication network
A system and method provide a security aspect for a UE in dual connectivity mode of operation in wireless communication networks. The system and method provide...
US-1,037,5202 Database selection in distributed computing systems
Techniques for database selection during site provisioning in distributed computing systems are disclosed herein. In one embodiment, a method can include...
US-1,037,5182 Methods, systems, and media for managing wind speed data
A system for collecting and managing wind speed data via an external communications network comprises one or more wind stations, each including an anemometer...
US-1,037,5174 Cloud integrated vehicle platform
A cloud integrated vehicle infotainment platform, method, and system are described. The system may include a cloud-integrated vehicle infotainment platform in...
US-1,037,5112 Method and apparatus for decryption of encrypted SSL data from packet traces
A system for decrypts encrypted Secure Sockets Layer (SSL) data from packet traces without using private keys or a proxy. Decryption of encrypted SSL data is...
US-1,037,5110 Luring attackers towards deception servers
Endpoints in a computer network create connections to a deception server without sending any payload data. The connections create records of the connection on...
US-1,037,5094 Wireless sensor network security
In some examples, a computing device may receive sensed data of a first sensor sent in a first transmission. The computing device may associate a first...
US-1,037,5089 Multi-host threat tracking
A system and method for tracking data security threats within an organization is proposed. A threat aggregator process executing on an analysis computer system...
US-1,037,5088 Routing systems and methods
Example routing systems and methods are described. In one implementation, an apparatus includes a network interface, a secure system, and a routing system...
US-1,037,5082 Method and apparatus for geographic location based electronic security management
Provided herein are embodiments directed to facilitating an authentication process before allowing an action. An example apparatus may be configured to receive...
US-1,037,5049 System and method for securely changing network configuration settings to multiplexers in an industrial control...
A secure control system includes a network of multiplexers that control end/field devices of an infrastructure system, such as an electric power grid. The...
US-1,037,5048 User identity verification method and system, and verification server
A user identity verification method is disclosed. The method includes receiving an identity verification request sent by a user through a client terminal;...
US-1,037,5044 Apparatus and method for establishing secure communication channels in an internet of things (IoT) system
An apparatus and method are described for secure communication between IoT devices and an IoT service. For example, one embodiment of a system comprises: an...
US-1,037,5041 Method, system, and apparatus for secure wireless connection generation
Provided is a system and apparatus employing an extremely secure method of encrypting both wireless internet connections and wireless peripherals to a computer,...
US-1,037,5034 Secured transfer of data between datacenters
In various embodiments, a method of transferring data between datacenters may be performed. The method may include running a first plurality of host programs...
US-1,037,5032 System and method for data segmentation and distribution across multiple cloud storage points
The present invention is a system and method for data segmentation and distribution such that the user may distribute their data to a plurality of cloud-based...
US-1,037,5023 System, method and computer program product for accessing at least one virtual private network
A system for accessing at least one Virtual Private Network (VPN) includes a terminal, and can include at least one Security Policy Database (SPD). The terminal...
US-1,037,5019 Methods for internet communication security
The present disclosure relates to network security software cooperatively configured on plural nodes to authenticate and authorize devices, applications, users,...
US-1,037,4991 Approach for sharing electronic documents during electronic meetings
An approach is provided for sharing electronic documents during electronic meetings. Client devices of meeting participants are configured with a file sharing...
US-1,037,4983 Systems and methods for controlling secure persistent electronic communication account servicing with an...
The disclosed technology includes systems and methods for controlling enrollment and secure persistent SMS texting account servicing communications. A method is...
US-1,037,3481 Systems and methods for presenting security questions via connected security system
The various implementations described herein include methods, devices and systems for detecting trigger events and executing security protocols. In one aspect,...
US-1,037,3458 Automatic threat detection based on video frame delta information in compressed video streams
Apparatus and associated methods relate to identifying objects of interest and detecting motion to automatically detect a security threat as a function of video...
US-1,037,3413 Wearable security apparatus
A security system comprises a wearable security apparatus having an electronic display and a storage device that stores data regarding a wearer and a receiver...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.