Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,025,7215 Identifying and disabling a rogue access point in a public wireless environment
A system for identifying a wireless security threat on a vehicle. The system includes a broadband controller including a data processor and memory in which the...
US-1,025,7190 Wi-fi enabled credential enrollment reader and credential management system for access control
A method according to one embodiment includes reading a unique credential identifier of a passive credential device, transmitting the unique credential...
US-1,025,7189 Using hardware based secure isolated region to prevent piracy and cheating on electronic devices
System and methods for using secure isolated technology to prevent piracy and cheating on electronic devices. In some examples, an electronic device can use...
US-1,025,7174 Methods and systems for providing secure and auditable transfer of encrypted data between remote locations
Methods and systems for directly and securely transferring encrypted medical data between two remote locations, such as an imaging site and a diagnostic site,...
US-1,025,7172 Risk-based encryption of communication on a computer system node
A streams manager assesses the security risk of streams communication and when possible turns off encryption of intranode communication between operators of a...
US-1,025,7169 Methods and systems of data security in browser storage
Mechanisms and methods are provided for managing OAuth access in a database network system, and extending the OAuth flow of authentication to securely store the...
US-1,025,7168 System and method for securing telecommunications traffic data
A method and system are provided for securing telecommunications traffic data. A method is provided for transmitting messages via a telecommunications network...
US-1,025,7163 Secured process control communications
Securing communications from a process plant to a remote system includes a data diode disposed therebetween that allows data to egress from the plant but...
US-1,025,7141 System and method for delivering inline interactive objects encapsulated in a message
A system and method for delivering text, media, and inline interactive data (called message content) encapsulated in a message-based conversation has been...
US-1,025,7124 Systems and methods for controlling enrollment and secure persistent electronic communication account servicing...
The disclosed technology includes systems and methods for controlling enrollment and secure persistent SMS texting account servicing communications. A method is...
US-1,025,6981 Secure logging for host security module
Embodiments include method, systems and computer program products for secure logging of host security module. In some embodiments, an event may be received. The...
US-1,025,6970 Secure data transformations
A system for performing a secure sequence of transformations of a data value, using encrypted representations of the data value is disclosed. The system...
US-1,025,6928 Method and apparatus for controlling operation based on distance between transmission device and reception device
A pre-5.sup.th-Generation (5G) or 5G communication system is provided for supporting higher data rates Beyond 4.sup.th-Generation (4G) communication system such...
US-1,025,5792 Security monitoring and control
Systems, methods, and software for monitoring and controlling a security system for a structure are provided herein. An exemplary method may include receiving...
US-1,025,5742 Method for providing measurement data of a device for processing security documents and security-document...
Described is a method for providing measurement data for value documents to a specified purpose of use employing a value-document processing device which has a...
US-1,025,5738 Authentication based on through-body signals detected in body area networks
Techniques are described for user authentication based on a signal that is transmitted through an individual's body, and detected using device(s) in physical...
US-1,025,5537 Dynamic authentication system and methods for use with legacy terminals
In one embodiment, the present invention provides a method and communication device with an emulated mag stripe capability. Information is transmitted in the...
US-1,025,5474 Enrollment using synthetic fingerprint image and fingerprint sensing systems
A fingerprint sensing system. The fingerprint sensing system includes: at least one sensor; at least one display device; at least one application processor; and...
US-1,025,5463 Secure computer architecture
A secure computer architecture is provided. With this architecture, data is received, in a component of an integrated circuit chip implementing the secure...
US-1,025,5459 Privacy enabled runtime
Technical solutions are described for preventing unauthorized transmission of data by a communication apparatus. An example computer-implemented method includes...
US-1,025,5458 Trust based access to records via encrypted protocol communications with authentication system
Systems and techniques are disclosed for trust based access to records via encrypted protocol communications with an authentication system. An example system is...
US-1,025,5448 Data security using high speed serial equalization
A system includes a transmit equalizer to equalize a data stream using a set of transmit parameters to generate an input signal. The system further includes a...
US-1,025,5445 Identifying destinations of sensitive data
Some embodiments of the invention may enhance security, usability, and/or efficiency for entities by identifying destination servers on behalf of the entity. In...
US-1,025,5444 Method and system for utilizing secure profiles in event detection
The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a...
US-1,025,5440 Secure processing systems and methods
This disclosure relates to systems and methods for enabling the use of secret digital or electronic information without exposing the sensitive information to...
US-1,025,5429 Setting an authorization level at enrollment
Systems, methods, and other embodiments associated with setting an authorization level at enrollment. According to one embodiment, a method includes a accessing...
US-1,025,5425 Secure authentication protocol systems and methods
An input device of a secure authentication protocol system may receive at least one user authentication factor in a pre-boot session. The input device may...
US-1,025,5421 Working method for multi-seed one-time password
Disclosed is a working method for a multi-seed one-time password, which falls within the field of information security. The method comprises: powering and...
US-1,025,5416 Secure biometric authentication with client-side feature extraction
Provided is a process that includes: receiving, with a first device, a request to authenticate a user; obtaining, with the first device, an unstructured-data...
US-1,025,5204 Key-based data security management
Embodiments of the present invention provide an approach for memory protection at a level of granularity above a "page" level (e.g., enhancing the protection...
US-1,025,5202 Multi-tenant encryption for storage class memory
Various embodiments are generally directed to the providing for mutual authentication and secure distributed processing of multi-party data. In particular, an...
US-1,025,5201 Local key management for storage devices
A method and system provide local key management for storage enclosures. The method includes retrieving first security content from a security vault of a...
US-1,025,5200 Data storage device and method of operation using multiple security protocols
A data storage device includes a memory and a controller that is coupled to the memory. The controller includes an authentication engine, an interface, and an...
US-1,025,5199 Evicting clean secure pages without encryption
Secure memory paging technologies are described. Embodiments of the disclosure may include checking attributes of secure page cache map to determine whether a...
US-1,025,5089 Self-deleting virtual machines
Securing a virtual machine to be executed on a host machine is accomplished by authenticating, by the virtual machine during an initial boot routine, an...
US-1,025,4760 Self-correcting controller systems and methods of limiting the operation of neural networks to be within one or...
Systems and methods for automatically self-correcting or correcting in real-time one or more neural networks after detecting a triggering event, or breaching...
US-1,025,4749 Systems and methods for virtually tagging and securing industrial equipment
In one embodiment, a non-transitory computer readable medium may include computer-executable instructions that, when executed by a processor, may cause...
US-1,025,4413 Method and apparatus for wireless communication in wireless communication system
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-1,025,4000 Device and a system for control and/or command
A device for control and/or command of a visual or thermal comfort element or security element of a building includes a display screen, and an electronic...
US-1,025,2800 Aerial drone deployed non-destructive evaluation scanner
A aerial drone deployed NDE scanner test unit (12) has a yoke to which four sets of offset pins (294, 354) pivotally secure a sensor probe (232) in a...
US-1,025,2700 Access and driving authorization system with increased security against relay attacks on the transponding interface
An authentication element, specifically a keyless go device for a vehicle. The authentication element has a transponding interface for transmitting an...
US-1,025,2132 System, and method for improving human response, sensitivity, and performance
Systems and methods for improving an individual's response are disclosed. A system for improving an individual's response comprises an item of headwear having a...
US-1,025,2070 Secure limited components for use with medical devices
In some examples, an ambulatory medical device is provided. The ambulatory medical device includes at least one sensor configured to acquire data descriptive of...
US-1,025,1706 System and methods for positioning bone cut guide
Systems and methods for positioning a cut guide using navigation-based techniques are discussed. A system for use in an orthopedic surgery on a target bone can...
US-1,025,1653 Method and system for planning/guiding alterations to a bone
A computer-assisted surgery system for guiding alterations to a bone, comprises a trackable member secured to the bone. The trackable member has a first...
US-1,025,1553 Dispensing drugs from a companion diagnostic linked smart pill
A mechanism is provided. The mechanism includes a user device and a smart pill within a host. The smart pill is communicatively connected to the user device for...
US-1,025,1060 Modifying access to a service based on configuration data
In one example, a system for accessing services comprises a processor to detect a change in a topology of the system and request configuration data or a...
US-1,025,0708 High performance distributed system of record
A high-performance distributed ledger and transaction computing network fabric over which large numbers of transactions (involving the transformation,...
US-1,025,0685 Creating layer 2 extension networks in a hybrid cloud computing system
Techniques for creating layer 2 (L2) extension networks are disclosed. One embodiment permits an L2 extension network to be created by deploying, configuring,...
US-1,025,0644 Detection and removal of unwanted applications
A protection application detects and removes unwanted applications. The protection application scans a client device for suspected unwanted applications. A...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.