Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,021,8742 System and method for providing network and computer firewall protection with dynamic address isolation to a device
A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to...
US-1,021,8731 Method and system for data breach and malware detection
Detecting cyber threat and malware, particularly zero-day malware is a major challenge for the security community. Signature-based methods of cyber threat and...
US-1,021,8730 Systems and methods of stateless processing in a fault-tolerant microservice environment
A system, method, and non-transitory computer-readable relating to network security are disclosed. In particular, embodiments described generally relate to...
US-1,021,8715 Secured network bridge
An apparatus and method are provided for implementing one or more security services to messages and data being communicated between a first network and a second...
US-1,021,8713 Global attestation procedure
A method, computer program product, and system for authenticating a computing device by geographic attestation includes a processor utilizing executing an...
US-1,021,8705 Multi-tenant identity and data security management cloud service
A system provides cloud-based identity and access management. The system receives a request from a client for an identity management service, authenticates the...
US-1,021,8682 Secure network protocol cryptographic processing
The present document describes systems and methods that utilize a cryptographic service for establishing a cryptographically protected communication session,...
US-1,021,8495 Secure computation method, secure computation system, secure computation server, registrant terminal, user...
Data processing is performed while personal information is kept concealed. A registrant terminal splits a registration input password and allocates the split...
US-1,021,8431 Space-based electronic data storage and transfer network system
A space-based electronic data storage and transfer network system is disclosed. The network system includes terrestrial access points, a plurality of...
US-1,021,8387 ECC memory controller supporting secure and non-secure regions
A system and method of utilizing ECC memory to detect software errors and malicious activities is disclosed. In one embodiment, after a pool of memory is freed,...
US-1,021,8358 Methods and apparatus for unloading data from a configurable integrated circuit
A system may include a host processor and a coprocessor for accelerating tasks received from the host processor. The coprocessor may include programmable...
US-1,021,8136 Interchangeable internal modular avionics platform assembly
Internal interchangeable modular avionics platform assemblies and methods for removably mounting and interchanging modular avionics platforms within an...
US-1,021,7381 Secure multi-party device pairing using sensor data
Content is securely shared between communication devices in an ad-hoc manner by employing common sensing context to establish pairing between the communication...
US-1,021,7348 Processing sensor data
Methods, systems, computer-readable media, and apparatuses for processing sensor data are presented. An example method comprises accessing, by a computing...
US-1,021,7337 Security device registration
A method of registering a security sensor device with a product device to be protected via the security sensor device includes obtaining sensor identification...
US-1,021,7158 Multi-factor routing system for exchanging business transactions
A system of routing a purchase order may include a purchase order identification unit configured to identifying a purchase order format associated with a...
US-1,021,7114 Methods and systems for providing labels to prevent counterfeiting of products
Embodiments provide methods and systems for providing labels to prevent counterfeiting of products. In an embodiment, the method includes accessing, by a...
US-1,021,7096 Systems and methods for convenient and secure mobile transactions
Systems and methods for conducting convenient and secure mobile transactions between a payment terminal and a mobile device, e.g., in a fueling environment, are...
US-1,021,7003 Systems and methods for automated analytics for security surveillance in operation areas
Systems and methods for cloud-based surveillance for an operation area are disclosed. At least two input capture devices, at least one safety control device and...
US-1,021,6983 Techniques for assessing group level cognitive states
A security monitoring technique includes receiving data related to one or more individuals from one or more cameras in an environment. Based on the input data...
US-1,021,6967 Volatile memory-based data-transfer device with automatic and user-initiated anti-tamper penalties
A USB-style data-transfer device employs volatile memory that is connected to an onboard power-storage device for data storage. Through this design, any data...
US-1,021,6958 Minimizing sensitive data exposure during preparation of redacted documents
A document review and security technique is provided that presents a first portion of a document to a first reviewer, wherein the first portion includes less...
US-1,021,6952 Location based disk drive access
Methods, apparatuses, systems, and devices are described for providing data security. In one method, data security is provided for a computing device having a...
US-1,021,6947 System and method for activating a data entry mechanism
Disclosed are systems and methods for activating a data entry mechanism. An example method comprises detecting, by a hardware processor, an activity state of...
US-1,021,6938 Recombinant threat modeling
Dynamically developing and maintaining threat models, threat landscapes and threat matrices are described. Specifically described are techniques on how to...
US-1,021,6928 Methods for restricting resources used by an application based on a base profile and an application specific...
In response to a request for launching an application within an operating system of a data processing system, one or more extended entitlements are extracted...
US-1,021,6926 Isolation of untrusted code in operating system without isolation capability
Code intended to operate in an operating system without an isolation mechanism is executed in isolation. The present system enables synthetic transactions to be...
US-1,021,6822 Data distribution methods and systems
Methods and related systems for secured and distributed data storage and communication are disclosed. For each byte of a given data set or file, data is split...
US-1,021,6745 Control method of recoverable file protection device and protection method of recoverable file
A control method of a recoverable file protection device and a protection method of a recoverable file are provided. After a file owner sets a secured content...
US-1,021,6449 Extended snapshot using backup and microservice
Embodiments are described for presenting a backed up data object to a client, in a native file format, in response to a request from the client to retrieve the...
US-1,021,6439 Protecting unallocated data within a storage volume
In one general embodiment, a computer-implemented method includes initializing a storage volume, receiving a request to secure unallocated data within the...
US-1,021,6404 Method of securing image data and electronic device adapted to the same
An electronic device and method is disclosed herein. The electronic device may include a memory configured to store image data including at least one object,...
US-1,021,4164 Watchman hub
A system for providing security to an in-vehicle communication network, the system comprising: a data monitoring and processing hub external to the in-vehicle...
US-1,021,2860 Adaptive automatic computer room air conditioners (CRAC) master control method and system
Described is an adaptive automatic computer room air conditioner (CRAC) or computer room air handler (CRAH, CRAC and CRAH is referred interchangeably in this...
US-1,021,2851 Data center air duct system
An air duct system is configured to be used with an air containment system that spans an aisle defined by rows of racks. The air duct system includes a...
US-1,021,2761 Systems for improved multi-channel network connectivity performance and security
Systems and methods that efficiently combine multiple wireless networks or devices resulting in faster, more reliable, and more secure mobile Internet. A...
US-1,021,2585 System and method for wireless network access protection and security architecture
Wireless network specific (WN-specific) key can be used to provide access protection over the radio access link. A WN-specific key may be associated with (or...
US-1,021,2404 Projection mapping system and apparatus
A projection system includes a projection apparatus embodied in a housing secured to a user. The projection apparatus has a processor in data communication with...
US-1,021,2272 Near field communication enhanced computing systems
Technologies are disclosed herein for utilizing near field communication ("NFC") to improve the security, performance, and configuration of computing systems....
US-1,021,2186 Systems and methods for attack simulation on a production network
The disclosure is directed towards systems and methods for improving security in a computer network. The system can include a planner and a plurality of...
US-1,021,2177 System and method for managing terminal
The present invention is to provide a system and a method for managing a terminal to improve the security. The system for managing a terminal 1 connects to a...
US-1,021,2174 Method and system for reviewing identified threats for performing computer security monitoring
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,021,2169 Enforcing data security in a cleanroom data processing environment
Techniques for enforcing data security in a cleanroom data processing environment are described herein. In one or more embodiments, a virtual private cloud...
US-1,021,2168 Electronic device and control method thereof
An electronic device and a control method thereof are provided. The control method for the electronic device includes: acquiring a call instruction; calling a...
US-1,021,2165 Secured vital sign data group streams
A method and system for securely transmitting a plurality of data streams between a client device and a server that are in communication via standard Internet...
US-1,021,2153 Providing data security with a token device
A computer-implemented method for providing security to access and store data may include transferring first information for display from a token device having...
US-1,021,2134 Centralized management and enforcement of online privacy policies
Systems and methods for centralized management and enforcement of online privacy policies of a private network are provided. According to one embodiment,...
US-1,021,2133 Accelerated pattern matching using pattern functions
System, methods, and apparatuses enable a network security system to more efficiently perform pattern matching against data items. For example, the disclosed...
US-1,021,2132 Systems and methods for accelerated pattern matching
System, methods, and apparatuses enable a network security system to more efficiently perform pattern matching against data items. For example, the disclosed...
US-1,021,2129 Network interface card rate limiting
Systems and methods for limiting the rate of packet transmission from a NIC to a host CPU are provided. According to one embodiment, data packets are received...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.