Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,011,6752 System and method for bridging divergent information networks
A computer system is provided that enables secure, on demand communications across IT infrastructures that may be divergent, and that may be associated with...
US-1,011,6702 Security policy unification across different security products
A management entity generates for display multiple icons, each icon representing an actor or a resource in a networking environment, and defines a generic...
US-1,011,6696 Network privilege manager for a dynamically programmable computer network
A network security policy may be implemented at network switches as a set of active packet disposition directives. In a dynamically programmable network, the...
US-1,011,6683 Computer security vulnerability assessment
Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification...
US-1,011,6673 System and method for uploading and verifying a document
A computer implemented method may allow for the upload and verification of a document. In one aspect, the method may receive a file at a data server associated...
US-1,011,6670 Event specific relationship graph generation and application in a machine data processing platform
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,011,6667 System for conversion of an instrument from a non-secured instrument to a secured instrument in a process data...
Embodiments of the invention are directed to a system, method, or computer program product for generating and using a block chain distributed network for...
US-1,011,6651 Technologies for enhancing computer security
A method of securely transmitting data comprising (1) obtaining an unencrypted data stream comprising a first sequence of values, (2) segmenting a first portion...
US-1,011,6637 Secure telecommunications
The present disclosure describes techniques for configuring and participating in encrypted audio calls, audio conferences, video calls, and video conferences....
US-1,011,6636 Apparatus and method for secure transmission avoiding duplicate data
A first communication device determines whether an encryption key is stored in a first memory in association with an identifier of data requested to transmit,...
US-1,011,6634 Intercepting secure session upon receipt of untrusted certificate
A method for intercepting, by a security gateway, a secure data session comprises the steps of establishing a first secure data session between a client device...
US-1,011,6632 System, method and computer-accessible medium for secure and compressed transmission of genomic data
An exemplary system, method and computer-accessible medium can be provided for generating an encrypted reference-based secure-compression of randomly located...
US-1,011,6629 Systems and methods for obfuscation of data via an aggregation of cloud storage services
The present disclosure describes systems and methods for aggregation and management of cloud storage among a plurality of providers via file fragmenting to...
US-1,011,6626 Cloud based logging service
Methods and systems are provided for facilitating access to a cloud-based logging service. According to one embodiment, access to a cloud-based logging service...
US-1,011,6621 Method and system for messaging security
An e-mail firewall applies policies to e-mail messages transmitted between a first site and a plurality of second sites. The e-mail firewall includes a...
US-1,011,6504 Package integrated security features
Embodiments of the invention include a physiological sensor system. According to an embodiment the sensor system may include a package substrate, a plurality of...
US-1,011,6447 Secure authentication of user and mobile device
An authentication method is disclosed. To authenticate a user, a mobile device may request identification and verification from the user. Upon receiving a...
US-1,011,6445 Method and system for protected exchange of data
A result of application of a test to information about a user (U) is securely transmitted between a source of information (A) and a destination of information...
US-1,011,6441 Enhanced-security random data
A requirement for a pseudo-random number is identified. A usage context corresponding to the requirement is determined from among a plurality of usage contexts....
US-1,011,6438 Managing use of security keys
A method is used in managing use of security keys. Based on a request for use of a key that serves as part of a data security system, a set of criteria to apply...
US-1,011,6424 Method and apparatus for transmitting and receiving data
Provided is a technology related to a sensor network, machine to machine (M2M), machine type communication (MTC), and the Internet of things (IoT). Transmitting...
US-1,011,6094 Data-secure connector with indicator
A data-secure electrical connector is operable to provide electrical power to a portable electronic device via a connector that is capable of transmitting...
US-1,011,5278 Wireless security network and communication methods
A security network provides reduced power consumption and more robust communication of messages in comparison to conventional wireless systems. Reducing power...
US-1,011,5141 Secure proxy service
A system is configured to receive a network resource request from a user device configured with a browsing application, wherein the request includes...
US-1,011,5101 Wireless establishment of identity via bi-directional RFID
A method, a system, and a computer program product are provided for wireless establishment of identity via bi-directional radio-frequency identification (RFID)....
US-1,011,5100 Over the air management of payment application installed in mobile device
Systems, apparatus, and methods for managing an application installed on a mobile device, such as a mobile phone are provided, so as to prevent or limit...
US-1,011,5097 Protecting lottery receipts
A method and system for generation of ticket security codes is provided. The method includes generating, by a host computing system, a lottery transaction...
US-1,011,5047 Transaction card with secured magnetic strip and method for making the same
A transaction card construction and a method for making transaction cards provides increased security for transaction card magnetic strips. The transaction card...
US-1,011,4998 Security feature
According to one example, there is provided a method of generating a security feature that encodes data. The method comprises obtaining an n-bit code of data to...
US-1,011,4976 Systems, methods, and computer program products for interfacing multiple service provider trusted service...
System, methods, and computer program products are provided for interfacing between one of a plurality of service provider (SP) trusted service managers (TSM)...
US-1,011,4972 Intelligent database with secure tables
Methods to perform an operation comprising upon determining that a received query requests values of sensitive data stored in a secure database table of a...
US-1,011,4969 Ultra-secure blockchain-based electronic information transfer system
The system and method presents a secure blockchain enabled encryption. Incoming information and data files may be encrypted using any preferred method of...
US-1,011,4968 Proximity based content security
Embodiments include method, systems and computer program products for proximity based content security. Aspects include receiving a request to access a secured...
US-1,011,4962 Generating a stub file corresponding to a classified data file
Protecting data files is disclosed, including: in response to an indication that a data file has been generated by a client device, determining a security...
US-1,011,4961 Operator system for a process control system
An operator system for a process control system, wherein the operator system includes an operator server and at least one operator client connected to the...
US-1,011,4948 Hypervisor-based buffer overflow detection and prevention
Technologies for securing an electronic device include determining addresses of one or more memory pages, injecting for each memory page a portion of identifier...
US-1,011,4934 Calculating consecutive matches using parallel computing
Methods and systems for determining consecutive matches are provided. According to one embodiment, a class definition and a data stream are received by a...
US-1,011,4851 Systems and methods for verifiable, private, and secure omic analysis
Systems and methods for verifiable, private and secure omic analysis are provided. Secure multiparty computation techniques can be utilized to enable two...
US-1,011,4766 Multi-level independent security architecture
A system includes a plurality of data input ports, each port corresponding to one of a plurality of different levels of security classification; a security...
US-1,011,4429 Data storage device securing mechanism
A data storage device securing mechanism to secure at least one data storage device on a board includes a bottom plate, two side plates connected with two sides...
US-1,011,3279 Barrier systems with programmable light assembly
A method for using barrier systems includes positioning a plurality of barrier systems at a location, each barrier system having: a barrier having an interior...
US-1,011,2433 Optically variable tactile security feature
A security document and method of manufacturing the security document are disclosed. The security document includes a substrate including a laser reactive...
US-1,011,1268 System and method for NFC peer-to-peer authentication and secure data transfer
A reader device may generate a first identifier. The reader device may transmit the first identifier to a mobile device. The reader device may receive encrypted...
US-1,011,1257 Method and apparatus for transmitting and receiving data using plurality of carriers in mobile communication system
The present disclosure relates to converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system...
US-1,011,1031 Object detection and tracking system
A system and method for automated crowd sensing object detection. The invention senses a missing object's presence in proximity which is conducted using a...
US-1,011,0996 DC detection circuit and operational method of the same, semiconductor apparatus, and audio signal output apparatus
The DC detection circuit includes: a OR circuit configured to generate a logical OR flag on the basis of logical OR of values of X bits from a (MSB-1).sup.th...
US-1,011,0937 Next generation consumer telecommunications network
A telecommunications network for a high-rise Multi-Dwelling Unit (MDU) is provided. In the telecommunications network eliminates much of the wiring and space...
US-1,011,0780 Method and apparatus for authorizing a print device to perform a service using a portable memory device
A document printing system may include a print engine, a controller and a communication port. The communication port can read a portable memory device, which...
US-1,011,0683 Systems and methods for maintaining ownership of and avoiding orphaning of communication sessions
Systems and methods for improving the handing of communications between network applications in a computer system with connectivity services interfaces that...
US-1,011,0637 Directing audited data traffic to specific repositories
Data traffic is monitored on a network with data access elements thereof collected and compared to security rules. An audit data collection is sent to a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.