Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,012,2766 Policy-based secure containers for multiple enterprise applications
Technologies for providing policy-based secure containers for multiple enterprise applications include a client computing device and an enterprise policy...
US-1,012,2764 Multi-factor and context sensitive biometric authentication system
This disclosure describes techniques that facilitate granting an access privilege to a client device based on selectively authenticating biometric data....
US-1,012,2746 Correlation and consolidation of analytic data for holistic view of malware attack
In communication with security appliances, an electronic device for providing a holistic view of a malware attack is described. The electronic device features...
US-1,012,2745 Heuristics-based identification of IoT (internet of things) attacks in Wi-fi
Attacks from IoT (Internet of Things) devices (or other statins) on a Wi-Fi network are identified using heuristics. Frames are detected from an IoT device (or...
US-1,012,2740 Methods for establishing anomaly detection configurations and identifying anomalous network traffic and devices...
A method, non-transitory computer readable medium, and network security apparatus that monitors received network traffic to obtain signal data for signals...
US-1,012,2739 Rootkit detection system and method
A rootkit detection method includes obtaining, from a target system, first data comprising raw data stored in a data block of a storage drive, checking the...
US-1,012,2737 Local area network ecosystem of verified computer security resources
A router-level computer security component validates multiple endpoint computer security components on multiple endpoint devices in a local area network, based...
US-1,012,2734 Secure email verification service
Concepts and technologies are disclosed herein for providing and using a secure email verification service. A processor can receive verification data and...
US-1,012,2716 Secure storage device with on-board encryption control
A communication and security device for a portable computer having an interface for connecting the security device to a host device to enable the security...
US-1,012,2713 Method and device for the secure authentication and execution of programs
A device and a method for encrypting a virtual machine by on-the-fly encryption and decryption of the memory is described. The device comprises hardware and...
US-1,012,2694 LPI/LPD communication systems
In a wireless communication system, a secure communication link is provided by selecting a decoy data signal vector for transmission, generating a MIMO...
US-1,012,2693 Protocol based key management
A method, system, and computer usable program product for protocol based key management are provided in the illustrative embodiments. A key management protocol...
US-1,012,2592 System, method and computer program product for serving an application from a custom subdomain
In accordance with embodiments, there are provided mechanisms and methods for serving an application from a custom subdomain. These mechanisms and methods for...
US-1,012,2535 Electronic document notarization
A server receives a package of data including: a document designated for notarization, identification information including a photograph, photograph of a user,...
US-1,012,2533 Configuration updates for access-restricted hosts
A host machine operated for a specific purpose can have restricted access to other components in a multi-tenant environment in order to provide for the security...
US-1,012,2532 Security verification apparatus using biometric information and security verification method
A security verification apparatus using biometric information and a security verification method are described. The security verification apparatus includes a...
US-1,012,2529 System and method of enforcing a computer policy
A method and system of enforcing a computer policy uses a central server to manage user profiles, policies and encryption keys. The server securely supplies the...
US-1,012,2441 Method of utilizing a relay node in wireless communication system
The present invention relates to a wireless communication system and a user equipment (UE) providing wireless communication services, and more particularly, a...
US-1,012,2414 Spatially enabled secure communications
Spatially Enabled Communication technologies are disclosed. A proximity boundary can be defined by a communication range of one or more SRC devices configured...
US-1,012,1530 Implementing eFuse visual security of stored data using EDRAM
A method and circuit for implementing Electronic Fuse (eFuse) visual security of stored data using embedded dynamic random access memory (EDRAM), and a design...
US-1,012,1294 Rapid document detection and identification
An apparatus, method, and computer program product that intentionally illuminate at least one target item with electromagnetic energy having specific...
US-1,012,1145 Electronic registration for securely providing products and services
Some embodiments are directed to a method of providing a product and/or a service, at least one non-transitory computer-readable storage medium comprising...
US-1,012,1038 Dynamic barcode ticketing carrying encrypted validation transactions
Systems, methods, and devices for conducting a secure ticketing transaction at a first location within a transit system. A media reader described herein may...
US-1,012,1032 Systems and methods for dynamic control of a security system device based on tag information
Systems and methods for controlling at least one security device based on the behavior of at least one tag. The methods comprise: generating sensor data...
US-1,012,1026 Secure enclosure systems in a provider network
A secure containment enclosure such as an equipment rack is disclosed that includes an electronic locking system. The electronic locking system locks and, upon...
US-1,012,1022 Methods and systems for encrypting data using object-based screens
A system and method is provided for encrypting data for secure storage or transport. The method includes identifying a first object comprising a string of...
US-1,012,1021 System and method for automatically securing sensitive data in public cloud using a serverless architecture
Systems and methods are provided executing jobs immediately upon receipt of a notification. The systems and methods may include receiving, at a cloud compute...
US-1,012,1020 Systems and methods of providing access to secure data
The disclosed technology includes techniques for secure access to data associated with an organization and includes providing a user device access to a user...
US-1,012,1018 Secure data synchronization
Techniques for secure data synchronization are described. In one or more implementations, a determination is made as to whether enterprise data is stored...
US-1,012,1017 Delayed data access
A system uses information submitted in connection with a request to determine if and how to process the request. The information may be electronically signed by...
US-1,012,1015 Management of data privacy and security in a pervasive computing environment
A method to provide negotiation control to data such that a person or entity can negotiate the use of data gathered beyond what is needed for a particular use...
US-1,012,1009 Computer system for discovery of vulnerabilities in applications including guided tester paths based on...
A testing system for testing computer system security includes control logic interposed between tester computers and a computer system under test. Tester...
US-1,012,1006 Mediated secure boot for single or multicore processors
A system and methods are disclosed for securely booting a processing system using a three step secure booting process. Several embodiments are presented,...
US-1,012,1001 System and method for monolithic scheduling in a portable computing device using a hypervisor
Systems for a method for monolithic workload scheduling in a portable computing device ("PCD") having a hypervisor are disclosed. An exemplary method comprises...
US-1,012,0991 Systems and methods for initiating immediate data erasure on a device
A system and method of erasing data on a data handling device may include providing a device with a data storage element and a biometric characteristic scanning...
US-1,012,0985 Protecting media items using a media security controller
A media storage device includes a media security controller and a memory to store data that relates to a media item to be rendered by a rendering device. The...
US-1,012,0977 Secure healthcare management and communication system
A healthcare management and communication system including a central server, home base devices, and portable medical assistant devices (PMAD) providing secure...
US-1,012,0923 Data discovery and analysis tool
Resources for data lineage discovery, data lineage analysis, role-based security, notification. The resources may include or involve machine readable memory...
US-1,012,0915 Integrated framework for secured data provisioning and management
Methods and system are disclosed that provision contextual information associated with business data. In one aspect, a framework middleware receives a request...
US-1,012,0853 Grid data management
Systems and methods are provided for managing data in a grid. In one example approach, a method comprises importing data from a data source to a range of cells...
US-1,012,0608 System and method for computing message digests
A data de-duplication approach leverages acceleration hardware in SSDs for performing digest computations used in de-duplication operations and support on...
US-1,011,9661 Networked LED lighting system
An improved LED lighting system is provided for overhead ceiling lighting, as well as for other uses. The LED lighting system comprises elongated linear lamps...
US-1,011,9278 Load distribution structures for raised floor data center
Load distribution structures are provided for a raised floor tile(s) of a raised floor data center. The load distribution structure, which resides adjacent to...
US-1,011,7597 Apparatus, methods and articles for four dimensional (4D) flow magnetic resonance imaging using coherency...
An MRI image processing and analysis system may identify instances of structure in MRI flow data, e.g., coherency, derive contours and/or clinical markers based...
US-RE47,119 Enabling/disabling display data channel access to enable/disable high-bandwidth digital content protection
A switcher device comprises a multiplexer coupled in-between at least one input and output cards. The multiplexer detects the presence of an event signal from...
US-1,011,7309 Internet protocol security camera with behavior detection
An apparatus comprising a battery, a power adapter and a base. The battery may be configured to provide a power source. The power adapter may be configured to...
US-1,011,7101 Geographically based access management for internet of things device data
The proliferation of IOT devices has led to an increase in sensitive, cloud-stored data. To provide further protection, IOT device data may be secured by...
US-1,011,7063 Real-time locating system with limited or no infrastructure and method of use
A locating system includes a central server to receive and process data; a device to be secured or assigned to a person or asset, the device having one or more...
US-1,011,6998 Internet protocol television streaming methods and apparatus
A system, method, and apparatus for Internet Protocol television streaming are disclosed. An example apparatus includes a remote access point configured to...
US-1,011,6868 Display-integrated user-classification, security and fingerprint system
This disclosure provides systems, methods and apparatus related to biometric authentication of a user of an electronic device. An electronic display has a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.