Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,010,4796 Data storage securing device
A data storage securing device configured to receive a data storage comprises a shell, a bracket slidably installed in the shell, and a locking module. The...
US-1,010,4152 Inter-application communication and integration broker
A system for intermediated communication between applications running on the same computer is presented. The system routes communication between a first...
US-1,010,4122 Verified sensor data processing
Sensor data may be filtered in a secure environment. The filtering may limit distribution of the sensor data. Filtering may modify the sensor data, for example,...
US-1,010,4114 Method and apparatus for testing a security of communication of a device under test
A test apparatus for testing a security of communication of a device under test, DUT, wherein the test apparatus comprises an RF unit having an RF interface...
US-1,010,4113 Using machine learning for classification of benign and malicious webpages
In an embodiment, a data processing method providing an improvement in computer security, comprises selecting a uniform resource location (URL) for...
US-1,010,4102 Analytic-based security with learning adaptability
An analytics-based security monitoring system is adapted to receive data, such as in the form of event logs, from one or more network devices transferred...
US-1,010,4101 Method and apparatus for intelligent aggregation of threat behavior for the detection of malware
Embodiments disclosed herein are directed to intelligent malware detection. A scanner server is used to scan an endpoint device for malware. Various attributes...
US-1,010,4074 Independent biometric identification system
The inventive data processing system and method enable verifiable secure transfer of information between two or more parties, each having access to at least one...
US-1,010,4059 Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts
A permissions management system is disclosed for enabling a user to securely authorize a third-party system to access user account data and initiate...
US-1,010,4046 Content distribution systems and methods
A content dispensing device includes memory storing one or more executable programs, each of the programs compatible with a respective operating system, each...
US-1,010,4045 Verifying data security in a dispersed storage network
An integrity record is appended to data slices prior to being sent to multiple slice storage units. Each of the data slices includes a different encoded version...
US-1,010,4042 Security policy management
A method performed by a computing system includes, with a computing system, receiving an application and a security policy corresponding to the application, the...
US-1,010,4029 Email security architecture
A method for filtering unsolicited emails may comprise dynamically aggregating historical email data associated with a user or a group of users and dynamically...
US-1,010,3912 Phased information pulse method and apparatus
Data communication/transfer has been in binary form from the first simple service through today's complex internet systems. Binary uses zeros and ones...
US-1,010,3900 Network security analysis for smart appliances
A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows...
US-1,010,3889 Securely exchanging vehicular sensor information
Technologies for securely exchanging sensor information include an in-vehicle computing system of a vehicle to establish a trusted execution environment and a...
US-1,010,3879 Secure data upload/download service
A first device may receive data, to be provided to a second device, and an application identifier. The data and application identifier may be received from a...
US-1,010,3800 Method and apparatus for adaptive beam hopping in multi cell multi user communication system
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-1,010,2524 Access control and mobile security app
An illustrative apparatus includes a memory, a processor coupled to the memory, and a first set of instructions stored on the memory that can be executed by the...
US-1,010,2462 Optically variable data storage device
An optically variable device uses a data storage layer with a nano-optical bit system to store data. The optically variable device encodes the data using...
US-1,010,2401 Fuel dispenser user interface system architecture
A vending machine user interface can include a first controller operatively connected to an input device capable of receiving payment or account information....
US-1,010,2393 System and method for using unique device identifiers to enhance security
A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can...
US-1,010,2380 Method and apparatus to provide secure application execution
A technique to enable secure application and data integrity within a computer system. In one embodiment, one or more secure enclaves are established in which an...
US-1,010,2379 Real-time evaluation of impact- and state-of-compromise due to vulnerabilities described in enterprise threat...
Published enterprise threat detection (ETD) security notes are accessed in a computer data store. Applicability of the published ETD security notes are...
US-1,010,2363 System and method for user enrollment in a secure biometric verification system
A computer-implemented method and system for verifying the identity of a user in an identity authentication and biometric verification system which includes...
US-1,010,2356 Securing storage control path against unauthorized access
Techniques are described providing secure authentication of control commands executed on a data storage system. A pass code may be generated in accordance with...
US-1,010,2108 Injected instrumentation application monitoring and management
Techniques to instrument computer applications to receive run-time telemetry, and to perform analysis on collected telemetry are described. Telemetry...
US-1,010,2013 Method and system for dynamic configuration of multiprocessor system
A multiprocessor system used in a car, home, or office environment includes multiple processors that run different real-time applications. A dynamic...
US-1,010,1738 Secure control of automotive systems using mobile devices
Disclosed are systems and methods for secure control of automotive systems using mobile devices. An exemplary method comprises: connecting a vehicle, as a...
US-1,010,0556 Door and home security system and method
A door security system and method may increase the home security for elderly people without limiting the privacy of or convenience for residents. The method...
US-1,009,8207 Device and method for controlling a lighting means
A device for controlling a lighting means is provided, which comprises at least one communication means, configured to receive first data and transmit second...
US-1,009,8075 Apparatus and method for power control, reporting and uplink transmission
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-1,009,7999 Satisfying virtual machine security criteria using remote sensor devices
A virtual machine (VM) server may be used to enforce a set of security criteria upon a remote client device. The VM server may be configured to host a VM that...
US-1,009,7582 Secure data redaction and masking in intercepted data interactions
A system, and computer program product for modifying intercepted data interactions are provided in the illustrative embodiments. At a security application...
US-1,009,7578 Anti-cyber hacking defense system
Systems, devices, and methods for performing rate limiting and/or sending fabricated acknowledgments and/or silently dropping a received packet based on logged...
US-1,009,7576 Systems and methods for application security analysis
Systems and methods for analyzing applications for risk are provided. In an example method, the applications reside on a mobile device that is configurable to...
US-1,009,7574 Auto-tuning program analysis tools based on user feedback
User-guided machine learning (ML) significantly reduces false alarms generated by an automated analysis tool performing static security analysis. User...
US-1,009,7552 Network of trusted users
A system may include at least one server having a processor and a communication interface communicatively coupled to an Internet connection and a non-transitory...
US-1,009,7541 Computer security based on mouse device speed setting authentication
A method of performing operations by a processor of a computer terminal, includes determining an operation system (OS) speed scaling gain used by the OS to...
US-1,009,7536 Space-time separated and jointly evolving relationship-based network access and data protection system
A network security system that employs space-time separated and jointly-evolving relationships to provide fast network access control, efficient real-time...
US-1,009,7535 Methods and apparatuses for securely operating shared host computers with portable apparatuses
The present invention provides methods and apparatuses that utilize a portable apparatus to securely operate a host electronic device. Typically, each portable...
US-1,009,7530 Security authentication method and bidirectional forwarding detection BFD device
A security authentication method includes: receiving, by a control plane of a BFD device, a first BFD packet that is sent by a control plane of a peer BFD...
US-1,009,7525 System, apparatus and method for generating dynamic IPV6 addresses for secure authentication
Apparatus, system and method for authenticating a device for secure network communication. Identification data is configured as a hash of a public key for...
US-1,009,7522 Encrypted query-based access to data
A query-based system for sharing encrypted data, comprising at least one hardware processor; and at least one non-transitory memory device having embodied...
US-1,009,7518 Data encryption parameter dispersal
A method for securely distributing a profile within a dispersed storage network (DSN) that begins by encrypting a profile using a key. The method continues by...
US-1,009,7514 Filtering hidden data embedded in media files
Systems and methods for filtering unsafe content by a network security device are provided. According to one embodiment, a network security device captures...
US-1,009,7443 System and method for secure communications between a computer test tool and a cloud-based server
A system for providing data communication is provided. The system includes at least one computer test tool configured to perform one or more diagnostic tests on...
US-1,009,7367 System and method for providing network support services and premises gateway support infrastructure
A service management system communicates via wide area network with gateway devices located at respective user premises. The service management system remotely...
US-1,009,7354 Privacy control using unique identifiers associated with sensitive data elements of a group
A method, system and computer program product for privacy control. A unique identifier for each data element of a group of data elements (e.g., driver's license...
US-1,009,7265 Techniques for position-based actions using light-based communication
Techniques are disclosed for position-based actions using light-based communication (LCom). LCom signals can be used to encode or otherwise provide data which...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.