Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,844,061 LPI/LPD communication systems
In a wireless communication system, a secure communication link is provided by selecting a decoy data signal for transmission, generating a precoding matrix...
US-9,843,929 Apparatus and method for sharing WiFi security data in an internet of things (IoT) system
A method and system for connecting an Internet of Things (IoT) hub to a wireless network. One embodiment of the method includes establishing a secure...
US-9,843,926 System and method for preventing an attack on a networked vehicle
A system for preventing an attack on a networked vehicle via a wireless communication device including a wireless data traffic network, a security status...
US-9,843,925 Operation of control protocol data units in packet data convergence protocol
A method and apparatus reports packet data control protocol (PDCP) status and PDCP resets in a wireless communication, using control PDUs that may have security...
US-9,843,773 Signal security in a satellite signal distribution environment
Certain embodiments provide a set top box, comprising: a processing entity configured to obtain data for a channel stacking switch, to obtain a security data...
US-9,843,605 Security compliance framework deployment
A method and system for improving deployment of a security compliance framework is provided. The method includes deploying a data store that includes an...
US-9,843,599 Context aware threat protection
Methods and systems for dynamic threat protection are disclosed. An example method for dynamic threat protection may commence with receiving real-time...
US-9,843,598 Capture triggers for capturing network data
The disclosed embodiments provide a system that facilitates the processing of network data. During operation, the system provides a risk-identification...
US-9,843,595 Systems and methods for providing security services during power management mode
Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a...
US-9,843,576 Secure injection of context information in browsers
Systems and methods are directed to enabling a client device to insert customized content from a first server into a webpage received from a second server...
US-9,843,573 Determining website secure certificate status via partner browser plugin
Methods of the present inventions allow for determining website secure certificate status via a partner browser plugin. An exemplary method may comprise...
US-9,843,570 System and method for providing security monitoring
The present disclosure describes systems and methods for processing security sensor data that enhances the ability of a user to quickly and efficiently review...
US-9,843,564 Securing data using integrated host-based data loss agent with encryption detection
A method and system for securing data in a computer system provides the capability to secure information even when it leaves the boundaries of the organization...
US-9,843,458 Transmitting appliance-specific content to a user device
Methods and systems are presented for transmitting appliance-specific content to a user device associated with an appliance. In some embodiments, a third party...
US-9,843,445 System and methods for permitting open access to data objects and for securing data within the data objects
A system and methods for permitting open access to data objects and for securing data within the data objects is disclosed. According to one embodiment of the...
US-9,843,131 Cable connectors and methods for the assembly thereof
A cable connector and methods for the assembly thereof are disclosed. The cable connector eliminates potential for short events during plug insertion, provides...
US-9,843,127 Connector assembly
This disclosure presents a connector assembly for providing a waterproof connection to a case for an electronic device. The connector assembly includes a...
US-9,842,441 System and method for determining entry into a secured facility at a checkpoint
A system and method for determining entry into a secured facility at a checkpoint, wherein the method can comprise the steps of receiving by an Access Control...
US-9,842,227 Secure high speed data storage, access, recovery, and transmission
A method for storing a first data object includes: decomposing the first data object into a first fragment associated with a first original record locator and a...
US-9,842,222 Securely rebuilding an encoded data slice
A method begins by a requesting entity issuing a rebuild request regarding an encoded data slice to at least some of a set of distributed storage (DS) units. In...
US-9,842,217 Method and system for securing data
A method for securing user data includes the steps of: a) setting the user data as input data; b) randomly fragmenting the input data into a plurality of Atoms...
US-9,842,154 Secure data replication
One or more techniques and/or computing devices are provided for secure data replication. For example, a first storage controller may host first storage within...
US-9,842,151 System and method for uploading and management of contract-research-organization data to a sponsor company's...
The present disclosure provides a system and method for comprehensive data synchronization management between a sponsor-company's central ...
US-9,842,063 Encrypting data for storage in a dispersed storage network
A method includes retrieving a plurality of secure data packages from storage units. The method further includes separating the secure data packages into masked...
US-9,841,987 Transparent secure interception handling
A method and system for transparent secure interception handling is provided. The method and system include deploying a virtual machine (VM) in an environment...
US-9,841,798 Battery, battery controller, and method for the secured digital transmission of current measurement values
The invention relates to a method for the secured digital transmission of current measurement values and to a battery (1) and a battery controller (10) which...
US-9,841,760 System for remotely-operated systems
The invention relates to a remote-controlled system comprising: --at least one ground interface (3), from which an operator can control a remote-controlled...
US-9,841,014 Insulin pump data acquisition device and system
An insulin pump data acquisition device & system including: an insulin pump data acquisition device for use with an insulin pump, the data acquisition device...
US-9,840,341 IP-based satellite command, control, and data transfer
A method and system for satellite control in space using an IP-based satellite bus and all-IP compliant subsystems and payload(s) and a corresponding T&C...
US-9,839,244 Illuminated glove assembly
An illuminated glove assembly includes a glove and an illumination data controller. The glove has a body portion, a longitudinal glove axis, a pointer...
US-9,838,873 Secure wireless local area network (WLAN) for data and control traffic
A device receives capability information associated with a next hop device of a wireless local area network (WLAN). The device also determines, based on the...
US-9,838,758 Relevancy improvement through targeting of information based on data gathered from a networked device...
In one embodiment, a method of a relevancy-matching server includes matching primary data generated from a fingerprint data with targeted data based on a...
US-9,838,652 Light device has built-in digital data system for record image, sound
A LED Light device having built-in camera unit is powered by AC or-and DC power source for a lamp-holder, LED bulb, flashlight, garden, entrance door light or...
US-9,838,434 Creating and managing a network security tag
An apparatus, computer readable medium, and method are provided in one example embodiment and include a network device, an analysis module, and a tag module....
US-9,838,426 Honeyport active network security
A device comprises a processor. The processor is configured to generate a first signal using a first communication protocol. The first signal corresponds to...
US-9,838,418 Detecting malware in mixed content files
Computer systems and methods in various embodiments are configured to determine whether a file is likely to be malware-free or include malware. In an...
US-9,838,410 Identity resolution in data intake stage of machine data processing platform
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-9,838,408 System, device and method for detecting a malicious attack based on direct communications between remotely...
In an embodiment, a system, device and method for detecting a malicious attack is described. Herein, the system includes a security network device that conducts...
US-9,838,407 Detection of malicious web activity in enterprise computer networks
A processing device in one embodiment comprises a processor coupled to a memory and is configured to obtain internal log data of a computer network of an...
US-9,838,390 System and method for automatic wireless network authentication
A system and method are described for connecting an IoT device to a wireless router and/or access point. For example, one embodiment of a system comprises: an...
US-9,838,387 Security token with embedded data
A system and method are presented that provide authentication tokens to a local device from a remote server. The authentication token incorporates standard...
US-9,838,378 Securing a server before connecting the server to a data communications network
Securing a server before connecting the server to a data communications network in a data center may include: establishing a proximity-based communications...
US-9,838,377 Task segregation in a multi-tenant identity and data security management cloud service
A system provides cloud-based identity and access management. The system receives a request to perform an identity management service, and accesses a...
US-9,838,376 Microservices based multi-tenant identity and data security management cloud service
A system provides cloud-based identity and access management. The system receives a request for performing an identity management service, where the request...
US-9,838,361 Secure migration of virtual machines from source to target and transfer of VM descriptor and keys between...
Systems, methods, and non-transitory computer-readable medium are provided to secure data centers and cloud computing. A method receives network identifiers for...
US-9,838,360 Data transmission security improvements
A method of securely transmitting communication information from a first terminal operating in a first coordinate measurement domain to a second ...
US-9,838,289 Security network processor system and method
A system, method and computer program product are provided for scanning data received from a computer network. Included is a central processing unit for...
US-9,838,236 Direct synthesis of receiver clock
The Direct Synthesis of a Receiver Clock (DSRC) contributes a method, system and apparatus for reliable and inexpensive synthesis of inherently stable local...
US-9,838,214 Wi-Fi offload of cellular data
A security gateway system offloads cellular data from user equipment ("UE"). The system receives a dynamic host configuration protocol ("DHCP") message from a...
US-9,838,205 Network authentication method for secure electronic transactions
In a network authentication method, a client device stores a reference first private key portion obtained by encrypting a first private key portion of a private...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.