Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,038,2954 System and method for providing a service to the user of a mobile terminal
A system for providing a service to the user of a mobile terminal. The system includes: an entity capable of generating an electronic ticket including...
US-1,038,2910 Wireless transfer protocol for electronic certificates
An electronic certificate system facilitates the secure application of certificates against wireless data transfers with a distributer system by a device user....
US-1,038,2891 Server capable of performing authentication with simplified and secure scheme that users who operate terminals...
A server which can communicate with a plurality of terminals includes an information obtaining unit obtaining position information of each terminal and...
US-1,038,2620 Protecting confidential conversations on devices
A first mobile device may receive user-input data for generation of an electronic message. The electronic message may be generated as the user-input data is...
US-1,038,2525 Managing transmission and storage of sensitive data
Systems and methods for injecting sensitive data into outgoing traffic on behalf of a user of a private network are provided. According to one embodiment, a...
US-1,038,2493 Method and system for creating and receiving neutralized data items
Computerized methods and systems receive neutralized data items on a first entity from a second entity over a network by receiving a first data item from the...
US-1,038,2489 Technologies for privacy-preserving security policy evaluation
Technologies for privacy-safe security policy evaluation include a cloud analytics server, a trusted data access mediator (TDAM) device, and one or more client...
US-1,038,2486 Event integration frameworks
Disclosed herein are representative embodiments of methods, apparatus, and systems for processing and managing information from a compliance and configuration...
US-1,038,2472 Graphical display of events indicating security threats in an information technology system
A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable...
US-1,038,2470 Interacting with a remote server over a network to determine whether to allow data exchange with a resource at...
Provided are a computer program product, system, and method for interacting with a remote server over a network to determine whether to allow data exchange with...
US-1,038,2466 Cooperative cloud-edge vehicle anomaly detection
Example implementations of the present disclosure are directed to systems and methods directed to increasing the accuracy and speed that anomalous and malicious...
US-1,038,2465 Pattern matching based dataset extraction
Example systems generate a dataset for tuning an analyzer to probe activities related to a web facing application. The systems capture data streams received at...
US-1,038,2461 System for determining anomalies associated with a request
Described are techniques for identifying anomalous and non-anomalous requests based on metric values determined from a request. Weights to be associated with...
US-1,038,2454 Data mining algorithms adopted for trusted execution environment
Distributed systems for protecting networked computer assets from compromise are disclosed. The distributed system includes one or more enterprise event...
US-1,038,2452 Communication protocols in integrated systems
A system and methods comprise a touchscreen at a premises. The touchscreen includes a processor coupled to a security system at the premises. User interfaces...
US-1,038,2451 Integrated security system having rule optimization
Techniques are described for optimizing the placement of automatically generated rules within security policies. An administrator may, for example, interact...
US-1,038,2450 Network data obfuscation
Network data obfuscation is disclosed. For example, an obfuscation driver is initialized in an endpoint device connected to an obfuscation gateway over a secure...
US-1,038,2446 Computerized system, method and computer program product, for managing a computer program's operations
A computerized method of managing a computer remote session operation, comprising providing a server for hosting application execution; configuring a number of...
US-1,038,2445 Intelligent messaging system based temporary receiver registration for electronic message communications
An intelligent messaging server (herein `messaging server`) that is communicably coupled to trusted directory nodes receives, from a first user computing...
US-1,038,2442 Secure data transmission
A system may include a first network in which user device(s) and a HIP server are communicably coupled. The first network may include a secure data...
US-1,038,2429 Systems and methods for performing secure backup operations
The disclosed computer-implemented method for performing secure backup operations may include (i) identifying a group of backup servers with heterogeneous...
US-1,038,2428 Systems and methods for providing single sign-on authentication services
Embodiments of the disclosure enable a system to provide authentication services. The system includes a system server that receives data associated with an...
US-1,038,2425 Technologies for token-based authentication and authorization of distributed computing resources
Technologies for token-based access authorization to an application program interface (API) include an access management server to receive a service request...
US-1,038,2423 Systems and methods for providing multimedia content within an application and a security solution integrated...
A system is provided for downloading, for distribution and for acoustic reproduction of a music album, which includes at least one or several digital music...
US-1,038,2409 Secure multi-party protocol
A requestor and a responder may conduct secure communication by making API calls based on a secure multi-party protocol. The requestor may send a request data...
US-1,038,2400 Techniques for preventing large-scale data breaches utilizing differentiated protection layers
Techniques related to preventing large-scale data breaches utilizing differentiated data object (DO) protection layers are described. A security gateway placed...
US-1,038,2396 Utilizing management network for secured configuration and platform management
A network connection device having a security processor exchanges data traffic between a data network and a host computer via a network port. Security...
US-1,038,2209 Privacy control using unique identifiers associated with sensitive data elements of a group
A method, system and computer program product for privacy control. A unique identifier for each data element of a group of data elements (e.g., driver's license...
US-1,038,2208 Secure communications using organically derived synchronized processes
This disclosure provides a system and method for secure communications. The method can enable secure machine-to-machine communications within discrete security...
US-1,038,2205 Security system and method for using a blockchain service through privacy-aware blockchain arbitration server
A security method for using a blockchain service creates a secure blockchain to protect data through a privacy-aware blockchain arbitration server that has zero...
US-1,038,2201 Removable circuit for unlocking self-encrypting data storage devices
Security of data storage devices and servers can be improved by the system and methods described herein. In some embodiments, a key management device of a...
US-1,038,2196 System and method for secure communications based on locally stored values
This disclosure provides a system and method for secure communications. The method can enable secure machine-to-machine communications within discrete security...
US-1,038,2062 Data processing device and data processing method
A data processing device and a data processing method, which are capable of securing excellent communication quality in data transmission using an LDPC code. In...
US-1,038,1714 Data communications case
A data communications apparatus including a case. A power supply is secured inside the case. A router device is secured inside the case, the router device...
US-1,038,0872 Categorizing compliance with security protocols
To improve or ensure a standard of compliance with critical security protocols, performance is quantified by communicating data from an alarm system, access...
US-1,038,0813 Systems and methods for using motion pattern of a user for authentication
Systems and methods for using accelerations derived from a motion pattern for multi-factor authentication, the method including receiving, filtering, and...
US-1,038,0812 Vehicle transaction validation
A secure chain of data blocks is maintained at a given computing node, wherein the given computing node is part of a set of computing nodes in a distributed...
US-1,038,0385 Visual security device
A system can include a removable, non-reattachable security device and a circuit configured to stop or alter the operation of the system when the removable...
US-1,038,0372 Methods and systems for providing secured access to big data
In one embodiment, a method for providing access to big data is disclosed. The method includes receiving biometric data of a user to provide access to columns...
US-1,038,0361 Secure transaction method from a non-secure terminal
The invention relates to a transaction method, the method including the steps of: providing a terminal including a main processor, a graphic processor...
US-1,038,0360 Secured file sharing system
One embodiment provides a file sharing system. During operation, the system identifies a data file to be sent to a second device of a second user and generates...
US-1,038,0349 Security analysis using relational abstraction of data structures
Analyzing program code can include detecting an instance of a container within the program code using a processor, selecting a model container correlated with...
US-1,038,0335 Systems and methods for providing security to a host endpoint device
In various example embodiments disclosed herein, a Dynamic Security Architecture Environment (DSAE) security architecture is provided in an externally...
US-1,038,0324 Patient emergency response system
An improved emergency response system is provided. The system includes a patient or subscriber location database having a schedule of patient or subscriber...
US-1,038,0241 Modular system and method for managing chinese, japanese, and korean linguistic data in electronic form
A linguistic services center is described that interfaces with various natural language processing modules such that users of one module can take advantage of...
US-1,038,0202 Physical location history with URL and positioning system
A personalized way to digitally record a person's physical activities over time serves web searching, business advertising, nostalgia, security and object...
US-1,037,9839 Device and method for facilitating secure communications over a cellular network
A process for communicating utility-related data over at least one network is described. the process includes: collecting utility-related data at a hub device...
US-1,037,8863 Smart wearable mine detector
To improve the problems of conventional mine detectors, the purpose of the present invention is to provide a smart wearable mine detector comprising a human...
US-1,037,5571 Dual connectivity mode of operation of a user equipment in a wireless communication network
A system and method provide a security aspect for a UE in dual connectivity mode of operation in wireless communication networks. The system and method provide...
US-1,037,5202 Database selection in distributed computing systems
Techniques for database selection during site provisioning in distributed computing systems are disclosed herein. In one embodiment, a method can include...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.