Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,024,4384 Apparatus and method for profile installation in communication system
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-1,024,4382 Using a plurality of SIM cards at an electronic device
Apparatus with I/O modules such as a networked security camera with a plurality of wireless connections to continue to use at least one network connection is...
US-1,024,4122 Panel control over broadband
Systems and methods for communicating between components of a security and/or automation system include establishing a two-way call between a control panel and...
US-1,024,4076 Secure cloud interconnect private routing
A network device is located in a cloud routing services center that is separate from a customer network. The network device provides a user interface to...
US-1,024,4000 Apparatus and method for establishing seamless secure communications between components in an industrial...
A method includes establishing, using a connection policy at a first device, a security association with a second device of an industrial process control and...
US-1,024,3998 Metadata supporting cyber content sharing and governance and application method thereof
A method for identifying metadata for cyber content sharing and governance (abbreviated as an MDCCSG method) and application method thereof. The MDCCSG method...
US-1,024,3990 Systems and methods for detecting replay attacks on security space
A system and method for detecting replay attacks on secure data are disclosed. A system on a chip (SOC) includes a security processor. Blocks of data...
US-1,024,3988 Configurable network security
According to an example, configurable network security may include receiving data flows directed to end node modules of a server, and selecting data flows from...
US-1,024,3972 Correlation-based detection of exploit activity
A security agent implemented on a monitored computing device is described herein. The security agent is configured to receive an event notification indicative...
US-1,024,3970 Event views in data intake stage of machine data processing platform
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,024,3959 Secure cloud computing framework
A cloud computing system. The system comprises a network, a data store communicatively coupled to the network, a plurality of compute nodes, at least some of...
US-1,024,3953 Systems and methods for secure resource access and network communication
Systems and methods for secure resource access and network communication are provided. A plurality of policies are received on a client device, each policy...
US-1,024,3952 Anonymizing biometric data for use in a security system
An anonymized biometric representation of a target individual is used in a computer based security system. The system receives a record of a target individual...
US-1,024,3886 Bi-directional NAT traversal using endpoint assigned discriminators
A method for creating a secure link between any two endpoints in a network comprises: assigning a unique identifier to each endpoint of a network; for each...
US-1,024,3867 Vehicle security system
Systems and methods for addressing a vehicle condition are provided. In one example embodiment, a method includes receiving data indicative of a condition...
US-1,024,3837 Enabling split sessions across hybrid public safety and LTE networks
A special data splitter and data combiner is shown for low latency emergency and data intensive services so that multiple broadband and wireless networks can be...
US-1,024,3745 Method and system for producing a secure communication channel for terminals
A method, system, backend, terminal, and computer program product are disclosed for producing a secure communication channel for a terminal, the method having...
US-1,024,3733 Process and system for establishing a moving target connection for secure communications in client/server systems
A system and method performs a moving target blind rendezvous by exchanging data through a distributed hash table. The system allows users to securely send...
US-1,024,3727 Method and system for constant time cryptography using a co-processor
The present disclosure presents methods, apparatuses, and systems to bolster communication security, and more particularly to utilize a constant time...
US-1,024,3085 Semiconductor device and method of manufacturing same
An object is to provide a reliability-improved semiconductor device having a MONOS memory that rewrites data by injecting carriers into a charge storage...
US-1,024,2665 Controller systems and methods of limiting the operation of neural networks to be within one or more conditions
Systems and methods for automatically self-correcting or correcting in real-time one or more neural networks after detecting a triggering event, or breaching...
US-1,024,2561 Corner security detection device
A security detection device and system for reducing false triggers is provided. The security detection device is a corner mount devices that may be mounted on...
US-1,024,2552 Child safety alarm system
A vehicle having a horn and a light includes an alarm system secured to a ceiling of the vehicle. The alarm system includes a housing secured to the ceiling; a...
US-1,024,2541 Security and first-responder emergency lighting system
A network system in a building complex linking different locations together and facilitating information and data exchange and access, includes `N` number of...
US-1,024,2517 Garage door status and control via a security system
Methods, systems, and devices are described that are directed to status and control of a garage door system via an alarm system controller. A garage door system...
US-1,024,2362 Systems and methods for issuance of provisional financial accounts to mobile devices
Systems and methods permit secure and convenient provisional account creation for use in conducting payment transactions. The provisional account does not...
US-1,024,2360 Data protection system for online data
A data protection system for online data is described that can be used to obfuscate sensitive data to relieve security compliance requirements for one or more...
US-1,024,2232 Adaptive model for database security and processing
A security system determines authorizations for entities to access data objects. The security system may train an adaptive model to predict the intent of a user...
US-1,024,2231 System and method for securely transferring data over a computer network
The present invention provides a method, and associated computer system and computer program product, for masking selected vulnerable data portions of a data...
US-1,024,2222 Compartment-based data security
An embodiment of a non-transitory computer-readable storage medium stores instructions which, when processed by a processor, cause the processor to implement a...
US-1,024,2221 System and method for automatically securing sensitive data in public cloud using a serverless architecture
Systems and methods are provided executing jobs immediately upon receipt of a notification. The systems and methods may include receiving, at a cloud compute...
US-1,024,2219 Fragmenting data for the purposes of persistent storage across multiple immutable data structures
Provided is a process including: receiving one or more write requests; selecting a first subset of the values as corresponding to higher-security fields;...
US-1,024,2214 Dynamic change in plurality of security layers based on projected risk
A method and associated system. Before allowing a user to use a secured resource, a first security check may be performed with respect to the user and/or the...
US-1,024,2212 Preserving data protection and enabling secure content awareness in query services
Embodiments of the present disclosure include systems and methods for providing query service of secured contents. A data collection service collects data and...
US-1,024,2201 Systems and methods for predicting security incidents triggered by security software
A computer-implemented method for predicting security incidents triggered by security software may include (i) collecting, by a computing device, telemetry data...
US-1,024,2197 Methods and apparatus to use a security coprocessor for firmware protection
A data processing system (DPS) provides protection for firmware. The DPS comprises (a) a host module comprising a management engine and (b) a security module in...
US-1,024,2189 File format validation
A method for securely validating the file format type including receiving a file having a file format type, a header and a content block. The header has a...
US-1,024,2178 Methods and systems for enabling, tracking, and correlating anonymous user activity
Methods are disclosed for identity key management in networked application execution. In one embodiment, an identifier request is transmitted from a client...
US-1,024,2174 Secure information flow
Secure information flow may include a service receiving a request for data from a caller. The service may respond to the request with the requested data via a...
US-1,024,2170 Method and apparatus for obtaining sensing data
An electronic device according to various embodiments of the present disclosure may include at least one sensor module including a transmitter, a receiver, a...
US-1,024,2118 Multi-source electronic forms with concealed fields
Electronic multi-user forms are provided. The use of these forms may include displaying the forms to more than one user, receiving population data from one or...
US-1,024,1726 Using hard drive on panels for data storage
Methods and systems are described for controlling an automation and security system. According to at least one embodiment, an apparatus for data storage in an...
US-1,024,1486 System and method for passenger conveyance control and security via recognized user operations
A passenger conveyance system includes a processing module in communication with one or more sensors to receive the depth map data, and one or more security...
US-1,024,1200 Modular sonar transducer assembly systems and methods
Techniques are disclosed for systems and methods to provide accurate and reliable compact sonar systems for mobile structures. A modular sonar system includes...
US-1,023,9493 Security method for a security system of a vehicle
The invention relates to a security method (100) for a security system (200) of a vehicle (1) for activating at least one security-related function in the...
US-1,023,8008 Containment systems and related methods of use
The present disclosure provides advantageous containment systems configured to be deployed in a data center, and improved methods/systems for using the same....
US-1,023,7912 Method and apparatus for managing resources for D2D communication
The present disclosure relates to a communication method and system for converging a fifth generation (5G) communication system for supporting higher data rates...
US-1,023,7813 Method of performing cell selection and re-selection using PMAX parameters and system adapted thereto
The present disclosure relates to a communication method and system for converging a 5.sup.th Generation (5G) communication system for supporting higher data...
US-1,023,7806 Activation of a home automation controller
Embodiments of the present invention provide a single platform that provides controller functionality for each of security, monitoring and automation, as well...
US-1,023,7741 Central programmed loss and theft prevention
The proliferation of networked, wireless-enabled devices is challenged by the reliance upon password management and user knowledge of privacy and security...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.