Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,014,8648 Virtual smart card to perform security-critical operations
A portable data or information carrier in the form of a smart card with partially or fully virtualized components. To maximize the confidentiality of...
US-1,014,8626 Systems and methods for facilitating mobile transactions
The invention relates to a method for enabling the user of at least one mobile terminal to access one or more of a plurality of services corresponding to a...
US-1,014,8625 Secure transfer and tracking of data using removable nonvolatile memory devices
A protected memory source device including removable non-volatile memory durably stores a signature such as a serial number or identifier, which is used to mark...
US-1,014,8617 Enhanced thread handling in security handshakingdomain name system bypass in user applications
Disclosed herein are methods, systems, and software for bypassing a domain name system. In one example, a method of operating a user communication device...
US-1,014,8504 Dynamic, load-based, auto-scaling network security microservices architecture
System, methods, and apparatuses used to monitor network traffic of a datacenter and report security threats are described. For example, one embodiment selects...
US-1,014,8448 Control messaging in a cable network
A method for providing data streams to a plurality of customer premises equipment (CPE) devices communicatively coupled to a network is provided. Downstream...
US-1,014,8439 Methods and systems for controlling medical device usage
Various embodiments provide systems and methods for securely transferring data from a secured site to a medical device. Some embodiments provide systems and...
US-1,014,8431 Master key generation and distribution for storage area network devices
Mechanisms are provided for generating a master key used to secure key objects associated with data blocks in a data center. A cryptographic node creation...
US-1,014,8428 Instruction and logic to provide SIMD secure hashing round slice functionality
Instructions and logic provide SIMD secure hashing round slice functionality. Some embodiments include a processor comprising: a decode stage to decode an...
US-1,014,8425 System and method for secure communications and data storage using multidimensional encryption
An encryption system and method has processors and a memory system, the memory system configured to hold at least one macroblock, an encryption key, and...
US-1,014,8424 Progressive key rotation for format preserving encryption (FPE)
Aspects of the disclosure provide a technological improvement to a cipher by improving data security of format-preserving encryption (FPE), by, inter alia,...
US-1,014,8423 Data security system with identifiable format-preserving encryption
A data security method including creating a token-including plaintext by including a predefined token into a plaintext, generating a cyphertext by encrypting...
US-1,014,8334 Method and apparatus for reference signal configurations for CSI-RS port sharing in mobile communication system...
A communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system...
US-1,014,7307 False alarm avoidance in security systems filtering low in network
Embodiments of intrusion detection systems are described and which include an intrusion detection panel that receives binary and metadata sensor data from which...
US-1,014,7284 Banking systems controlled by data bearing records
Aspects of the disclosure relate to deploying, configuring, and utilizing cash handling devices to provide dynamic and adaptable operating functions. A cash...
US-1,014,7251 Providing virtual and physical access to secure storage container
A device may obtain a first image depicting contents included in a secure storage container at a first point in time and first user account data associated with...
US-1,014,7249 Personal intermediary communication device
An intermediary device may be configured to allow an authorized visitor to access a secure facility (such as a home) on behalf of an owner. The intermediary...
US-1,014,7248 In vivo identity and security application implant and method
An implant including a platform that performs computations and that is configured to communicate with an external system, and at least one sensor that is...
US-1,014,7092 System and method for signing and authenticating secure transactions through a communications network
A system to sign and authenticate secure transactions with an institution through a communications network, comprising a terminal connected to a communications...
US-1,014,7089 Data protection with translation
Systems and methods are disclosed in which data associated with a transaction are protected with encryption. At an access device, a PIN associated with a...
US-1,014,6983 Fingerprint decryption method and device
The present disclosure is applicable to the technical field of fingerprint identification, and provides a fingerprint decryption method and device. The method...
US-1,014,6958 Privacy preserving statistical analysis on distributed databases
Aggregate statistics are securely determined on private data by first sampling independent first and second data at one or more clients to obtain sampled data,...
US-1,014,6957 Sensitive data aliasing
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed...
US-1,014,6954 System and method for data aggregation and analysis
In one embodiment, a method includes managing and controlling a plurality of data-access credentials. The method further includes accessing data from a...
US-1,014,6944 Recombinant threat modeling
Dynamically developing and maintaining threat models, threat landscapes and threat matrices are described. Specifically described are techniques on how to...
US-1,014,6937 Method for analyzing a logic circuit
A method for a logic circuit including a plurality of components and channels which are each assigned functional properties in a circuit model to simulate how...
US-1,014,6934 Security information sharing between applications
A system and method for sharing data and a risk assessment of the data comprises receiving data in a first application and obtaining a risk level of the data,...
US-1,014,6919 Multicomputer system for user data authentication and processing
Aspects of the disclosure relate to multicomputer processing and authentication of user data associated with telephone calls. A call security assessment...
US-1,014,6871 Method and apparatus for a digital leg history
A personalized way to digitally record a person's physical activities over time serves web searching, business advertising, nostalgia, security and object...
US-1,014,6782 Secure erasure of files by a filesystem
In one embodiment, a method is performed by a computing device configured to manage a filesystem stored on persistent storage. The method includes (a) receiving...
US-1,014,6760 Biometrically secured user input for forms
Systems and methods for collecting biometrically secured financial form data from a user are described. A user input device may receive biometric data from the...
US-1,014,6706 Data security system
A data security system includes a first computer system including: a memory for containing data, and a processing unit connected to the memory for locking and...
US-1,014,6701 Address-dependent key generation with a substitution-permutation network
A method of providing security in a computer system includes producing an initial block of data from a respective address of a memory location. An updated block...
US-1,014,6198 System-based control of programmable devices
A requirement exists for machine-to-machine communications between the multiple Smart Devices and Networks (SDNs) a user has without in today's environment of...
US-1,014,5790 Image processing apparatus, image processing method, image capturing device and storage medium
An attempt is made to suppress the processing load while securing real-time properties of the image processing to improve visual recognizability of a captured...
US-1,014,5700 Vehicle firmware update using a vehicle gateway
Electronic components may be integrated in objects used by the trucking industry, such as truck, tractor trailer, cargo, and loading bay. These objects may then...
US-1,014,5617 Oven temperature monitoring system
An oven temperature monitoring system including a box top and a box body formed out of an alkene fluorocarbon material for monitoring the temperature and...
US-1,014,3418 Combination airflow, sound and pulse wave sensor pack with smartphone data aquisition and transfer
The system of the present invention is intended to provide a simple, out-of-clinic sleep disorders testing tool. It can be used for pretest screening and...
US-1,014,2920 Method and apparatus for communication in wireless communication system
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-1,014,2842 Securing communications of a wireless access point and a mobile device
A method includes receiving, at an access server, a communication from a network management device. The communication is sent from a mobile device via an...
US-1,014,2836 Secure mobile device
The present invention is a communication device with secure data storage having a secure platform with no network connection and a main mobile platform with at...
US-1,014,2794 Real-time, location-aware mobile device data breach prevention
A cognitive security service learns regular locations and usage of one or more mobile devices for a user at multiple times based on aggregated location and...
US-1,014,2769 Method and system for establishing a secure communication between remote UE and relay UE in a device to device...
The present disclosure relates to a communication method and system for converging a 5G communication system for supporting higher data rates beyond a 4G system...
US-1,014,2596 Method and apparatus of secured interactive remote maintenance assist
A system and method for using the system comprising a head mounted device (HMD), a remote maintenance server (RMS), and a control section operable to identify...
US-1,014,2394 Generating risk profile using data of home monitoring and security system
Methods and systems for premises management are described. An example system may comprise a premises management device and a touchscreen device. The touchscreen...
US-1,014,2377 Relevancy improvement through targeting of information based on data gathered from a networked device...
A system includes a client device capable of being associated with a number of networked devices through a computer network to: process an embedded object,...
US-1,014,2373 Security-connected framework
In an example, a security-connected platform is provided on a data exchange layer (DXL), which provides messaging on a publish-subscribe model. The DXL provides...
US-1,014,2356 Channel data encapsulation system and method for use with client-server data channels
Systems and methods are disclosed that relate to network security to monitor and report threats in network traffic of a datacenter. For example, one embodiment...
US-1,014,2354 Cloud-based communication account security
A request is received over a network to resolve a problem relating to a networked user device. The request is accepted in order to provide user service. Based...
US-1,014,2347 System for centralized control of secure access to process data network
A distributed block chain network having at least a private block chain portion, and in some cases a public block chain portion, allows users to take actions...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.