Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,021,7158 Multi-factor routing system for exchanging business transactions
A system of routing a purchase order may include a purchase order identification unit configured to identifying a purchase order format associated with a...
US-1,021,7114 Methods and systems for providing labels to prevent counterfeiting of products
Embodiments provide methods and systems for providing labels to prevent counterfeiting of products. In an embodiment, the method includes accessing, by a...
US-1,021,7096 Systems and methods for convenient and secure mobile transactions
Systems and methods for conducting convenient and secure mobile transactions between a payment terminal and a mobile device, e.g., in a fueling environment, are...
US-1,021,7003 Systems and methods for automated analytics for security surveillance in operation areas
Systems and methods for cloud-based surveillance for an operation area are disclosed. At least two input capture devices, at least one safety control device and...
US-1,021,6983 Techniques for assessing group level cognitive states
A security monitoring technique includes receiving data related to one or more individuals from one or more cameras in an environment. Based on the input data...
US-1,021,6967 Volatile memory-based data-transfer device with automatic and user-initiated anti-tamper penalties
A USB-style data-transfer device employs volatile memory that is connected to an onboard power-storage device for data storage. Through this design, any data...
US-1,021,6958 Minimizing sensitive data exposure during preparation of redacted documents
A document review and security technique is provided that presents a first portion of a document to a first reviewer, wherein the first portion includes less...
US-1,021,6952 Location based disk drive access
Methods, apparatuses, systems, and devices are described for providing data security. In one method, data security is provided for a computing device having a...
US-1,021,6947 System and method for activating a data entry mechanism
Disclosed are systems and methods for activating a data entry mechanism. An example method comprises detecting, by a hardware processor, an activity state of...
US-1,021,6938 Recombinant threat modeling
Dynamically developing and maintaining threat models, threat landscapes and threat matrices are described. Specifically described are techniques on how to...
US-1,021,6928 Methods for restricting resources used by an application based on a base profile and an application specific...
In response to a request for launching an application within an operating system of a data processing system, one or more extended entitlements are extracted...
US-1,021,6926 Isolation of untrusted code in operating system without isolation capability
Code intended to operate in an operating system without an isolation mechanism is executed in isolation. The present system enables synthetic transactions to be...
US-1,021,6822 Data distribution methods and systems
Methods and related systems for secured and distributed data storage and communication are disclosed. For each byte of a given data set or file, data is split...
US-1,021,6745 Control method of recoverable file protection device and protection method of recoverable file
A control method of a recoverable file protection device and a protection method of a recoverable file are provided. After a file owner sets a secured content...
US-1,021,6449 Extended snapshot using backup and microservice
Embodiments are described for presenting a backed up data object to a client, in a native file format, in response to a request from the client to retrieve the...
US-1,021,6439 Protecting unallocated data within a storage volume
In one general embodiment, a computer-implemented method includes initializing a storage volume, receiving a request to secure unallocated data within the...
US-1,021,6404 Method of securing image data and electronic device adapted to the same
An electronic device and method is disclosed herein. The electronic device may include a memory configured to store image data including at least one object,...
US-1,021,4164 Watchman hub
A system for providing security to an in-vehicle communication network, the system comprising: a data monitoring and processing hub external to the in-vehicle...
US-1,021,2860 Adaptive automatic computer room air conditioners (CRAC) master control method and system
Described is an adaptive automatic computer room air conditioner (CRAC) or computer room air handler (CRAH, CRAC and CRAH is referred interchangeably in this...
US-1,021,2851 Data center air duct system
An air duct system is configured to be used with an air containment system that spans an aisle defined by rows of racks. The air duct system includes a...
US-1,021,2761 Systems for improved multi-channel network connectivity performance and security
Systems and methods that efficiently combine multiple wireless networks or devices resulting in faster, more reliable, and more secure mobile Internet. A...
US-1,021,2585 System and method for wireless network access protection and security architecture
Wireless network specific (WN-specific) key can be used to provide access protection over the radio access link. A WN-specific key may be associated with (or...
US-1,021,2404 Projection mapping system and apparatus
A projection system includes a projection apparatus embodied in a housing secured to a user. The projection apparatus has a processor in data communication with...
US-1,021,2272 Near field communication enhanced computing systems
Technologies are disclosed herein for utilizing near field communication ("NFC") to improve the security, performance, and configuration of computing systems....
US-1,021,2186 Systems and methods for attack simulation on a production network
The disclosure is directed towards systems and methods for improving security in a computer network. The system can include a planner and a plurality of...
US-1,021,2177 System and method for managing terminal
The present invention is to provide a system and a method for managing a terminal to improve the security. The system for managing a terminal 1 connects to a...
US-1,021,2174 Method and system for reviewing identified threats for performing computer security monitoring
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,021,2169 Enforcing data security in a cleanroom data processing environment
Techniques for enforcing data security in a cleanroom data processing environment are described herein. In one or more embodiments, a virtual private cloud...
US-1,021,2168 Electronic device and control method thereof
An electronic device and a control method thereof are provided. The control method for the electronic device includes: acquiring a call instruction; calling a...
US-1,021,2165 Secured vital sign data group streams
A method and system for securely transmitting a plurality of data streams between a client device and a server that are in communication via standard Internet...
US-1,021,2153 Providing data security with a token device
A computer-implemented method for providing security to access and store data may include transferring first information for display from a token device having...
US-1,021,2134 Centralized management and enforcement of online privacy policies
Systems and methods for centralized management and enforcement of online privacy policies of a private network are provided. According to one embodiment,...
US-1,021,2133 Accelerated pattern matching using pattern functions
System, methods, and apparatuses enable a network security system to more efficiently perform pattern matching against data items. For example, the disclosed...
US-1,021,2132 Systems and methods for accelerated pattern matching
System, methods, and apparatuses enable a network security system to more efficiently perform pattern matching against data items. For example, the disclosed...
US-1,021,2129 Network interface card rate limiting
Systems and methods for limiting the rate of packet transmission from a NIC to a host CPU are provided. According to one embodiment, data packets are received...
US-1,021,1992 Secure certificate pinning in user provisioned networks
Embodiments are directed to a system and method of exchanging certificate pinning information between a server and client over an unprotected network by:...
US-1,021,1991 Method for downloading preauthorized applications to desktop computer using secure connection
A method and computer program product for establishing a connection and downloading server applications on a desktop. A user downloads and installs custom...
US-1,021,1989 Trusted indicators to secure visual outputs
Providing secure graphics outputs by performing at least the following: receive secure output data corresponding to a digital image, obtain one or more security...
US-1,021,1978 Data security in a disconnected environment
Systems and methods are provided for the detection and prevention of intrusions in data at rest systems such as file systems and web servers. The systems and...
US-1,021,1975 Managed secure computations on encrypted data
The subject disclosure is directed towards secure computations of encrypted data over a network. In response to user desired security settings with respect to...
US-1,021,1969 Secure system for the synchronized collection and distribution of transactional messages among untrusted...
A method and arrangement for the coordinated, distributed, and linearly ordered collection and publication of event streams (i.e. time series data) includes...
US-1,021,0717 Detecting RF transmission from an implanted device in a POS terminal
Various embodiments are configured to detect a foreign object that has been implanted into or onto a device, such as a secure POS terminal. The implanted object...
US-1,021,0683 Physical condition based intelligent house security system
Embodiments of the present invention disclose a method, computer program product, and system for determining a security level for accessing a restrictive area....
US-1,021,0516 Mobile devices for commerce over unsecured networks
Techniques for managing modules or applications installed in a mobile device are described. To provide authentic and secured transactions with another device,...
US-1,021,0477 Multi-tenant multi-user multi-airline cargo consolidation and processing center
A multi-tenant multi-user multi-airline cargo consolidation and processing center for processing cargo with an enclosed high security small footprint...
US-1,021,0470 Pervasive, domain and situational-aware, adaptive, automated, and coordinated big data analysis, contextual...
Real time security, integrity, and reliability postures of operational (OT), information (IT), and security (ST) systems, as well as slower changing security...
US-1,021,0388 Biometric template security and key generation
Methods and systems for securing biometric templates and generating secret keys are provided. One or more images are received. Interest points are identified...
US-1,021,0375 Mouse with embedded camera and embedded microphone for active biometric authentication
The invention provides a device and a method for frequent verifications of the identity of a user performed during a long session of client-server communication...
US-1,021,0349 Data processing apparatus and method using secure domain and less secure domain
A data processing apparatus has processing circuitry which has a secure domain and a less secure domain of operation. When operating in the secure domain the...
US-1,021,0341 Delayed data access
A system uses information submitted in connection with a request to determine if and how to process the request. The information may be electronically signed by...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.