Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,014,9398 Method for improving fire prevention performance of vehicle-carried data recording device and protection device...
A method for improving fire prevention performance of a vehicle-carried data recording device and a protection device thereof are provided, where the method...
US-1,014,9344 Device and method of handling a radio resource control state change
A communication device for handling a radio resource control (RRC) state change comprises a storage unit for storing instructions and a processing circuit,...
US-1,014,9333 Communication data processing method, apparatus, and system
Embodiments of the present invention provide a communication data processing method, an apparatus, and a system. A communication data processing method...
US-1,014,9197 Methods and apparatus for secure connectionless uplink small data transmission
Certain aspects of the present disclosure generally relate to techniques for secure connectionless uplink transmissions by a wireless device. Such techniques...
US-1,014,9154 Apparatus and method for sharing WiFi security data in an internet of things (IoT) system
An apparatus for connecting an Internet of Things (IoT) hub to a wireless network, the apparatus including: 1) a security module to generate a first secret and...
US-1,014,9153 Wireless communication system
A wireless communication system comprises two communication units (101, 03) which exchange public key identification data using both Near Field Communication...
US-1,014,9150 Updating profiles for secondary wireless devices
Techniques to manage updates for eSIMs of a secondary wireless device are disclosed. Responsive to a user input, expiration of a timer, receipt of a message...
US-1,014,9144 Simulacrum of physical security device and methods
Described herein is a simulacrum security device and methods. In one embodiment, a simulacrum or likeness of a physical security device is provided for use in...
US-1,014,8915 Lighting system with monitoring and alarm function
The invention relates to the field of security, more particularly, to a lighting system with monitoring and alarm function. The illuminating module can supply...
US-1,014,8761 System-on-chip data security appliance and methods of operating the same
System-on-chip data security appliance ("SoC-DSA") and methods of operating the same. In one embodiment, the SoC-DSA includes data security mechanisms enclosed...
US-1,014,8752 Enterprise level security orchestration
Enterprise level security orchestration coordinates the safeguarding functions of safeguard software packages with respect to an installation. Multiple...
US-1,014,8736 Executing parallel jobs with message passing on compute clusters
A client may submit a job to a service provider that processes a large data set and that employs a message passing interface (MPI) to coordinate the collective...
US-1,014,8732 Secure remote computer network
A method of distributing data over multiple Internet connections is provided. The method includes the steps of: (a) providing a client computer with access to a...
US-1,014,8697 Unified host based security exchange between heterogeneous end point security agents
In one embodiment, a system includes a processing circuit and logic integrated with and/or executable by the processing circuit. The logic is configured to...
US-1,014,8686 Telemetry analysis system for physical process anomaly detection
Systems, methods, and apparatus, including computer programs encoded on computer storage media, for analyzing telemetry data from physical process sensors to...
US-1,014,8685 Event correlation across heterogeneous operations
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining a network security threat response. A data...
US-1,014,8679 Connected security system
Systems, methods, and apparatus, including computer programs encoded on computer storage media, for obtaining, processing, and presenting data related to...
US-1,014,8677 Model training and deployment in complex event processing of computer network data
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,014,8666 Unified online content manager apparatuses, methods, and systems
The UNIFIED ONLINE CONTENT MANAGER APPARATUSES, METHODS, AND SYSTEMS ("Online Content Manager") transforms identification information and selection data inputs...
US-1,014,8656 Securing shipment information accessed based on data encoded in machine-readable data blocks
Example embodiments provide a Shipment Preparation System ("SPS"), which facilitates the preparation of shipments, such as by producing shipping labels. In one...
US-1,014,8648 Virtual smart card to perform security-critical operations
A portable data or information carrier in the form of a smart card with partially or fully virtualized components. To maximize the confidentiality of...
US-1,014,8626 Systems and methods for facilitating mobile transactions
The invention relates to a method for enabling the user of at least one mobile terminal to access one or more of a plurality of services corresponding to a...
US-1,014,8625 Secure transfer and tracking of data using removable nonvolatile memory devices
A protected memory source device including removable non-volatile memory durably stores a signature such as a serial number or identifier, which is used to mark...
US-1,014,8617 Enhanced thread handling in security handshakingdomain name system bypass in user applications
Disclosed herein are methods, systems, and software for bypassing a domain name system. In one example, a method of operating a user communication device...
US-1,014,8504 Dynamic, load-based, auto-scaling network security microservices architecture
System, methods, and apparatuses used to monitor network traffic of a datacenter and report security threats are described. For example, one embodiment selects...
US-1,014,8448 Control messaging in a cable network
A method for providing data streams to a plurality of customer premises equipment (CPE) devices communicatively coupled to a network is provided. Downstream...
US-1,014,8439 Methods and systems for controlling medical device usage
Various embodiments provide systems and methods for securely transferring data from a secured site to a medical device. Some embodiments provide systems and...
US-1,014,8431 Master key generation and distribution for storage area network devices
Mechanisms are provided for generating a master key used to secure key objects associated with data blocks in a data center. A cryptographic node creation...
US-1,014,8428 Instruction and logic to provide SIMD secure hashing round slice functionality
Instructions and logic provide SIMD secure hashing round slice functionality. Some embodiments include a processor comprising: a decode stage to decode an...
US-1,014,8425 System and method for secure communications and data storage using multidimensional encryption
An encryption system and method has processors and a memory system, the memory system configured to hold at least one macroblock, an encryption key, and...
US-1,014,8424 Progressive key rotation for format preserving encryption (FPE)
Aspects of the disclosure provide a technological improvement to a cipher by improving data security of format-preserving encryption (FPE), by, inter alia,...
US-1,014,8423 Data security system with identifiable format-preserving encryption
A data security method including creating a token-including plaintext by including a predefined token into a plaintext, generating a cyphertext by encrypting...
US-1,014,8334 Method and apparatus for reference signal configurations for CSI-RS port sharing in mobile communication system...
A communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system...
US-1,014,7307 False alarm avoidance in security systems filtering low in network
Embodiments of intrusion detection systems are described and which include an intrusion detection panel that receives binary and metadata sensor data from which...
US-1,014,7284 Banking systems controlled by data bearing records
Aspects of the disclosure relate to deploying, configuring, and utilizing cash handling devices to provide dynamic and adaptable operating functions. A cash...
US-1,014,7251 Providing virtual and physical access to secure storage container
A device may obtain a first image depicting contents included in a secure storage container at a first point in time and first user account data associated with...
US-1,014,7249 Personal intermediary communication device
An intermediary device may be configured to allow an authorized visitor to access a secure facility (such as a home) on behalf of an owner. The intermediary...
US-1,014,7248 In vivo identity and security application implant and method
An implant including a platform that performs computations and that is configured to communicate with an external system, and at least one sensor that is...
US-1,014,7092 System and method for signing and authenticating secure transactions through a communications network
A system to sign and authenticate secure transactions with an institution through a communications network, comprising a terminal connected to a communications...
US-1,014,7089 Data protection with translation
Systems and methods are disclosed in which data associated with a transaction are protected with encryption. At an access device, a PIN associated with a...
US-1,014,6983 Fingerprint decryption method and device
The present disclosure is applicable to the technical field of fingerprint identification, and provides a fingerprint decryption method and device. The method...
US-1,014,6958 Privacy preserving statistical analysis on distributed databases
Aggregate statistics are securely determined on private data by first sampling independent first and second data at one or more clients to obtain sampled data,...
US-1,014,6957 Sensitive data aliasing
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed...
US-1,014,6954 System and method for data aggregation and analysis
In one embodiment, a method includes managing and controlling a plurality of data-access credentials. The method further includes accessing data from a...
US-1,014,6944 Recombinant threat modeling
Dynamically developing and maintaining threat models, threat landscapes and threat matrices are described. Specifically described are techniques on how to...
US-1,014,6937 Method for analyzing a logic circuit
A method for a logic circuit including a plurality of components and channels which are each assigned functional properties in a circuit model to simulate how...
US-1,014,6934 Security information sharing between applications
A system and method for sharing data and a risk assessment of the data comprises receiving data in a first application and obtaining a risk level of the data,...
US-1,014,6919 Multicomputer system for user data authentication and processing
Aspects of the disclosure relate to multicomputer processing and authentication of user data associated with telephone calls. A call security assessment...
US-1,014,6871 Method and apparatus for a digital leg history
A personalized way to digitally record a person's physical activities over time serves web searching, business advertising, nostalgia, security and object...
US-1,014,6782 Secure erasure of files by a filesystem
In one embodiment, a method is performed by a computing device configured to manage a filesystem stored on persistent storage. The method includes (a) receiving...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.