Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,008,4804 Optimizing security analyses in SaaS environment
Embodiments of the present invention provide systems and methods for performing a security analysis on a set of observables by inferring malicious...
US-1,008,4802 Supervisory control and data acquisition
Aspects of the present disclosure relate to computer system security. A machine accesses a set of records corresponding to a set of users having access to a...
US-1,008,4799 Systems and methods for providing security services during power management mode
Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a...
US-1,008,4796 System, method and computer program product for managing access to systems, products, and data based on...
In accordance with embodiments, there are provided mechanisms and methods for managing access to data based on information associated with a physical location...
US-1,008,4787 Systems and methods for securing social media for users and businesses and rewarding for enhancing security
The disclosed system and method enhances security of people, organizations, and other entities that use what has been termed "social media." Recent trends have...
US-1,008,4777 Secure data processing method and system
The invention discloses a secure data processing method and system, wherein the secure data processing method comprises the following steps of: a security...
US-1,008,4771 Secure feature and key management in integrated circuits
A mechanism for providing secure feature and key management in integrated circuits is described. An example method includes receiving, by a root authority...
US-1,008,4769 Single sign-on between multiple data centers
Techniques are disclosed for a single sign-on (SSO) enterprise system with multiple data centers that can use a lightweight cookie on a user's client device....
US-1,008,4764 System for a secure encryption proxy in a content centric network
One embodiment provides a system that facilitates a secure encryption proxy in a content centric network. During operation, the system receives, by an...
US-1,008,4763 Methods and systems for establishing secure communication between devices via at least one intermediate device
Methods to establish communication between a first and second device via at least one intermediate device comprise, at the first device, generating an offer...
US-1,008,4757 Network privacy
A system and method of network privacy enables end-users of a Network to have legal title or rights to all data knowingly or unknowingly transmitted while...
US-1,008,4753 Delivering security functions to distributed networks
Systems and methods for delivering security functions to a distributed network are described herein. An exemplary method may include: processing a data packet...
US-1,008,4628 Joint physical layer security and PAPR mitigation in OFDM systems
Systems and methods for securing orthogonal frequency division multiplexing (OFDM) transmission of data are discussed herein. Transceivers can sense the signal...
US-1,008,4602 Dynamic token and a working method thereof
A working method of a dynamic token, including the steps of grouping, by the dynamic token, the second hash data to obtain a plurality of byte groups,...
US-1,008,4600 Decentralized information protection for confidentiality and tamper-proofing on distributed database
In an embodiment, a computer-implemented data security method comprises: at a first computing device, receiving security service data from a first digital data...
US-1,008,4595 Algorithm-based anonymous customer references
Facilitation of management and utilization of domain-specific anonymous customer references (ACRs) for protection of subscriber privacy across different domains...
US-1,008,4594 Method, apparatus, and system for performing an establishment of a security context between a user equipment...
Embodiment of the present invention discloses a method, an apparatus, and a system for establishing a security context and relates to the communications field,...
US-1,008,4512 Proximity boundary based communication
Technology is described for proximity based communications. A proximity boundary can be defined with dimensions defined, in part, by a communication range of...
US-1,008,4030 Backplane substrate and organic light emitting diode display using the same
Disclosed are a backplane substrate which secures sufficient storage capacitance even when using small sub-pixels in a structure having very high resolution,...
US-1,008,3765 Methods for securely processing information having handwritten data
The present method provides for conversion of handwritten to data that is accurate and fast, yet with improved security. The method provides handwritten data...
US-1,008,3695 Dialog-based voiceprint security for business transactions
A system for biometrically securing business transactions uses speech recognition and voiceprint authentication to biometrically secure a transaction from a...
US-1,008,3596 Systems and methods of automated arming and disarming of a security system
Systems and methods of security are provided, including at least one of a plurality of sensors to detect a location of at least one user, and generate detection...
US-1,008,3564 Multimode retail system
A multimode system for receiving data in a retail environment includes: a secure input module for receiving high security input and low security input from a...
US-1,008,3425 System and method for a private and secure payment system using a merchant sales terminal
A secure payment system between a customer and a merchant, where the sales terminal wirelessly transmits a partial payment authorization transaction record...
US-1,008,3382 Image forming apparatus equipped with secure print function, method of controlling the same, and storage medium
An image forming apparatus capable of flexibly controlling whether or not to perform user authentication when a user performs operations related to functions of...
US-1,008,3325 Secure removable storage for aircraft systems
Techniques are disclosed for securing backup operational data (e.g., of an aircraft) maintained by a line-replaceable unit (LRU) in a removable storage media...
US-1,008,3309 Secure cloud storage distribution and aggregation
Methods and systems for secure cloud storage are provided. According to one embodiment, file storage policies are maintained for users of an enterprise network...
US-1,008,3304 Technologies for enhanced user authentication using advanced sensor monitoring
Technologies for information security include a computing device with one or more sensors. The computing device may authenticate a user and, after successful...
US-1,008,3297 Method of secure comparative processing
Method of secure comparative processing of the type in which a processor of an electronic component compares proof data (EPR, AUTH) that it receives as input...
US-1,008,3293 Timer and content security
A method, computer system, and a computer program product for timing secured content is provided. The present invention may include receiving a connection...
US-1,008,3286 Method and system for secured transfer of application data between electronic devices on simultaneous touch
A method and a system for transmitting data from a first electronic device to a second electronic device using a human body as a signal transmission path, are...
US-1,008,3284 Event-based security challenges
Concepts and technologies are disclosed herein for event-based security challenges. A computer can execute a security application. The computer can receive a...
US-1,008,3277 Secure computing systems and methods
The present disclosure relates to systems and methods for facilitating trusted handling of genomic and/or other sensitive information. Certain embodiments may...
US-1,008,3196 Creating secure virtual databases storing masked data
A database storage system creates secure snapshots or virtual databases based on a source database that stores sensitive information. The database storage...
US-1,008,3194 Process for obtaining candidate data from a remote storage server for comparison to a data to be identified
The invention presents a process for obtaining candidate reference data to compare to a data to be identified, implemented in a system comprising a client unit...
US-1,008,3130 Memory lock system with manipulatable input device and method of operation thereof
A security system for an external data storage apparatus and method of control thereof includes: a data storage, in which data is stored; a high-speed serial...
US-1,008,3081 Responding to a maintenance free storage container security threat
A method includes detecting a storage error regarding an encoded data slice. The method further includes determining failure mode information regarding a set of...
US-1,008,3040 Exception handling in a data processing apparatus having a secure domain and a less secure domain
Processing circuitry can operate in a secure domain and a less secure domain. In response to an initial exception from background processing performed by the...
US-1,008,3024 Application aware virtual patching
The technology disclosed relates to thwarting attempts in between software releases to take advantage of security holes in web applications. A virtual patch is...
US-1,008,2769 Producing images of security features
Processes and systems are described that can produce images including both three dimensional holographic images and two dimensional variable data, which can...
US-1,008,2454 Device and method for gasochromic porosity sensing
A method and apparatus for testing the porosity of an object, such as a secure instrument having a substrate, visual data, and a security feature, is disclosed....
US-1,008,2227 System and method for securing power and communications cables and associated hardware within crown molding
A system for crown molding that enables safely incorporating electrical and communications cabling within crown molding by creating one or more protected paths...
US-1,008,0965 Secure data encoding for low-resource remote systems
A method includes receiving an input artefact and a set of shared parameters comprising a coding frame, one or more positioned elements, a travel path, and an...
US-1,008,0307 Server rack
A server rack able to maintain electrical connections to its components during replacements includes a shell and brackets for data storage devices. The data...
US-1,008,0136 Credibility token system for over the air multi-programming of a wireless device and method of operation
A mobile secure agent on a wireless device executes co-resident authenticated data collection profiles provisioned by private profile producers. Each wireless...
US-1,008,0111 Techniques for communication using audio stickers
Techniques for securing the delivery of an audio message on a device are described. A method may include presenting a visual representation associated with an...
US-1,008,0101 Device, method, and computer program for grouping devices by location
The method simplifies the formation of groups of devices in secure spaces. Such spaces may be passenger compartments of vehicles, and the passenger compartments...
US-1,007,9914 Method for the secure and dynamic reloading of additional software from a webRTC server to a webRTC client
A computer arrangement and a computer-implemented method for the secure and dynamic reloading of additional software from a WebRTC server to a WebRTC can...
US-1,007,9857 Method of slowing down a communication in a network
Method of forestalling attacks in a network, by slowing down a communication in a network including at least one computer including malware aimed at...
US-1,007,9850 Systems and methods for provisioning cyber security simulation exercises
A computer-implemented method for provisioning cyber security simulation exercises may include (1) maintaining, at a data center level for a data center...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.