Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,934,014 Automatic purposed-application creation
An electronic device (such as a cellular telephone) automatically installs and optionally personalizes a purposed application (which is sometimes referred to as...
US-9,933,969 Securing encoding data slices using an integrity check value list
A method includes retrieving a read threshold number of integrity check value list (ICVL) encoded data slices of a set of ICVL encoded data slices. The method...
US-9,933,959 Method for selectively performing a secure data erase to ensure timely erasure
A method and computer program product are provided to ensure a timely secure data erase by comparing a number of secure data erase operations in a queue to a...
US-9,931,976 Truck safety zone using a vehicle gateway
Electronic components may be integrated in objects used by the trucking industry, such as truck, tractor trailer, cargo, and loading bay. These objects may then...
US-9,930,591 Method and apparatus for providing service in wireless communication system
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-9,930,532 Systems and methods for secure out-of-band wireless device management
Systems and methods for secure out-of-band wireless device management are provided. In one embodiment, a network device comprises: a wireless radio module that...
US-9,930,529 Physical security in a shared, wireless data communications network
A shared data communications system includes a network file server and two routers, each with its own address. A first router provides wireless access to a...
US-9,930,520 Apparatus and method for profile installation in communication system
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-9,930,475 Customer service document with data storage device
A customer service document with an electrical data storage device is provided to deliver customer service information in a secured manner. The data storage...
US-9,930,217 Method and apparatus for authorizing a print device to perform a service using a portable memory device
A document printing system may include a print engine, a controller and a communication port. The communication port can read a portable memory device, which...
US-9,930,069 Operation of a security element with the set of operating parameters matched to the selected use profile
A method for operating a security element which is part of a mobile end device, and a security element, have functionality depending on a set of operating...
US-9,930,066 Infrastructure level LAN security
Techniques are disclosed for securing traffic flowing across multi-tenant virtualized infrastructures using group key-based encryption. In one embodiment, an...
US-9,930,060 Method for enforcing endpoint health standards
An approach for enforcing standards regarding security vulnerabilities for an endpoint user device associated with a user includes collecting, at an inline...
US-9,930,058 Analyzing cyber-security risks in an industrial control environment
A method of analyzing cyber-security risks in an industrial control system (ICS) including a plurality of networked devices includes providing a processor and a...
US-9,930,047 Transparent overlay and headless browser execution for welcome flow
Associating a website with a credential manager includes identifying the launch of a first instance of a website to be associated with a credential manager in a...
US-9,930,042 Controlled environment secure media streaming system
A Controlled Environment Secure Media Streaming System manages the delivery of content to Secured Devices. Cloud Services provide content to Integration Hub....
US-9,930,040 System and method for provisioning a security token
The provisioning of a security token object to a user is disclosed. The security token object is used for accessing a computing resource through a mobile...
US-9,930,039 Device authentication within deployable computing environment
A deployable computing environment may facilitate interaction and data sharing between users and devices. Users, devices, and relationships between the users...
US-9,930,026 Encryption/decryption in a cloud storage solution
The disclosure generally describes computer-implemented methods, software, and systems, including a method for decryption of data stored in the cloud. A record...
US-9,930,020 Validation method and system for use in securing nomadic electronic transactions
A method involving a communication device, which comprises sending a request to a communication device; receiving a response from the communication device over...
US-9,930,016 Security key generation and management method of PDCP distributed structure for supporting dual connectivity
The present disclosure relates to a pre-5.sup.th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond...
US-9,929,964 System, apparatus and method for providing aggregation of connections with a secure and trusted virtual network...
A network system is provided between at least a first client site and a second client site. A client site network component is implemented at least at the first...
US-9,929,877 Systems, devices, and methods for generating a substantially continuous stream of audiovisual data during a...
When switching sources, resolutions or refresh rates in a video distribution network, switching times are reduced by maintaining video lock and security...
US-9,929,861 Secure database backup and recovery
As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system...
US-9,928,587 Analysis, secure access to, and transmission of array images
Systems and methods are provided the autocentering, autofocusing, acquiring, decoding, aligning, analyzing and exchanging among various parties, images, where...
US-9,928,546 System and method for processing data pertaining to financial assets
A method of processing data in connection with a security is provided. The security is collateralized by a plurality of home mortgage loans or by portions of...
US-9,928,542 Real-time congestion avoidance in a retail environment
A shopping list may be ordered in order to guide a shopper through a store in an efficient manner. Congestion in the store may be identified, such as using...
US-9,928,392 Barcode-reading system that obtains ranging data via targeting illumination
A barcode-reading system may include a barcode-reading enhancement accessory that is securable to a mobile device. The accessory may include an optic system...
US-9,928,386 Data protection system
A storage device of a data center may protect data stored on a storage medium of the storage device using a data security mechanism. The data security mechanism...
US-9,928,382 Systems, methods, and computer program products for managing secure elements
Systems, methods, and computer program products are provided for performing content management operations. At least one memory stores data, and a central...
US-9,928,379 Methods using mediation software for rapid health care support over a secured wireless network; methods of...
Some of these new methods harness distributed computing capabilities to integrate biometric abstraction processes, wireless network connectivity, and...
US-9,928,377 Systems and methods of monitoring and controlling enterprise information stored on a cloud computing service (CCS)
A computer-implemented method is described to monitor and control enterprise information stored on a cloud computing service (CCS). The method includes using a...
US-9,928,375 Mitigation of data leakage in a multi-site computing infrastructure
Embodiments of the invention relate to a method, system, and computer program product to dynamically mitigate data leakage in a file sharing environment....
US-9,928,366 Endpoint malware detection using an event graph
A data recorder stores endpoint activity on an ongoing basis as sequences of events that causally relate computer objects such as processes and files, and...
US-9,928,340 System and method for collaborative programming of data entry workflows between system developers, end users,...
The present invention is a system for collaborative programming of data entry workflows between end users, Electronic Health Record (EHR) system developers, and...
US-9,928,147 Forceful closure and automatic recovery of pluggable databases in a shared-everything cluster multitenant...
Embodiment provide that each pluggable database (PDB) in a container database is associated with a distinct distributed lock manager (DLM) domain. Thus, in...
US-9,927,980 Accessing point in time versions of a logical device in connection with I/O operations
Systems and techniques are provided for incremental Continuous Data Protection (iCDP) as a process to secure frequent, and space efficient, versions of...
US-9,927,978 Dispersed storage network (DSN) and system with improved security
A computing device includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational...
US-9,927,490 Integrated circuit with secure scan enable
An integrated circuit senses attempts to access security-related data stored in registers connectable into a scan chain when the attempt includes locally and...
US-9,927,073 Networked LED lighting system
An improved LED lighting system is provided for overhead ceiling lighting, as well as for other uses. The LED lighting system comprises elongated linear lamps...
US-9,925,956 Remote function control system with remote function device and associated wireless security sensor for a...
A remote function control system is for a vehicle including a data bus extending throughout the vehicle and coupled to a plurality of vehicle devices, and a...
US-9,925,935 In-vehicle communication system and in-vehicle communication method
An increase in the number of signal lines of a control apparatus for controlling devices of an automobile can be prevented and safety of the automobile can be...
US-RE46,768 System and method for identifying and assessing vulnerabilities on a mobile communications device
The invention is a system and method for identifying, assessing, and responding to vulnerabilities on a mobile communication device. Information about the...
US-9,924,557 Connecting a circuit-switched wireless access network to an IP multimedia subsystem
A network device performs a delayed registration in connection with phone call setup, if the network device does not know a phone number of a user in question...
US-9,924,404 Privacy protection for evaluating call quality
Apparatus and methods concerning simulation of call quality are disclosed. In an example embodiment, computing server is communicatively coupled to a VoIP...
US-9,924,360 AT command for secure ESM information
Systems and methods for transmitting AT commands indicating whether Evolved Packet System (EPS) Session Management (ESM) information should be transmitted...
US-9,924,359 Method, system and apparatus for enhancing security of beacon device
A method, system and apparatus for enhancing the security of a beacon device are herein disclosed. A service device includes a service communication unit and a...
US-9,924,357 Method for providing mobile communication provider information and device for performing same
A method for providing mobile communication provider information and a device for performing the same are disclosed. A terminal having an eUICC receives data,...
US-9,924,354 Key exchange method and apparatus
Embodiments of the present invention disclose a key exchange method and apparatus, which relate to the communications field, and can enable user equipments...
US-9,924,353 Method for configuring and transmitting key
The present application discloses a method for configuring and transmitting a key, which includes that: a) a serving cell (PCell) of UE determines a key (KeNB)...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.