Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,024,3867 Vehicle security system
Systems and methods for addressing a vehicle condition are provided. In one example embodiment, a method includes receiving data indicative of a condition...
US-1,024,3837 Enabling split sessions across hybrid public safety and LTE networks
A special data splitter and data combiner is shown for low latency emergency and data intensive services so that multiple broadband and wireless networks can be...
US-1,024,3745 Method and system for producing a secure communication channel for terminals
A method, system, backend, terminal, and computer program product are disclosed for producing a secure communication channel for a terminal, the method having...
US-1,024,3733 Process and system for establishing a moving target connection for secure communications in client/server systems
A system and method performs a moving target blind rendezvous by exchanging data through a distributed hash table. The system allows users to securely send...
US-1,024,3727 Method and system for constant time cryptography using a co-processor
The present disclosure presents methods, apparatuses, and systems to bolster communication security, and more particularly to utilize a constant time...
US-1,024,3085 Semiconductor device and method of manufacturing same
An object is to provide a reliability-improved semiconductor device having a MONOS memory that rewrites data by injecting carriers into a charge storage...
US-1,024,2665 Controller systems and methods of limiting the operation of neural networks to be within one or more conditions
Systems and methods for automatically self-correcting or correcting in real-time one or more neural networks after detecting a triggering event, or breaching...
US-1,024,2561 Corner security detection device
A security detection device and system for reducing false triggers is provided. The security detection device is a corner mount devices that may be mounted on...
US-1,024,2552 Child safety alarm system
A vehicle having a horn and a light includes an alarm system secured to a ceiling of the vehicle. The alarm system includes a housing secured to the ceiling; a...
US-1,024,2541 Security and first-responder emergency lighting system
A network system in a building complex linking different locations together and facilitating information and data exchange and access, includes `N` number of...
US-1,024,2517 Garage door status and control via a security system
Methods, systems, and devices are described that are directed to status and control of a garage door system via an alarm system controller. A garage door system...
US-1,024,2362 Systems and methods for issuance of provisional financial accounts to mobile devices
Systems and methods permit secure and convenient provisional account creation for use in conducting payment transactions. The provisional account does not...
US-1,024,2360 Data protection system for online data
A data protection system for online data is described that can be used to obfuscate sensitive data to relieve security compliance requirements for one or more...
US-1,024,2232 Adaptive model for database security and processing
A security system determines authorizations for entities to access data objects. The security system may train an adaptive model to predict the intent of a user...
US-1,024,2231 System and method for securely transferring data over a computer network
The present invention provides a method, and associated computer system and computer program product, for masking selected vulnerable data portions of a data...
US-1,024,2222 Compartment-based data security
An embodiment of a non-transitory computer-readable storage medium stores instructions which, when processed by a processor, cause the processor to implement a...
US-1,024,2221 System and method for automatically securing sensitive data in public cloud using a serverless architecture
Systems and methods are provided executing jobs immediately upon receipt of a notification. The systems and methods may include receiving, at a cloud compute...
US-1,024,2219 Fragmenting data for the purposes of persistent storage across multiple immutable data structures
Provided is a process including: receiving one or more write requests; selecting a first subset of the values as corresponding to higher-security fields;...
US-1,024,2214 Dynamic change in plurality of security layers based on projected risk
A method and associated system. Before allowing a user to use a secured resource, a first security check may be performed with respect to the user and/or the...
US-1,024,2212 Preserving data protection and enabling secure content awareness in query services
Embodiments of the present disclosure include systems and methods for providing query service of secured contents. A data collection service collects data and...
US-1,024,2201 Systems and methods for predicting security incidents triggered by security software
A computer-implemented method for predicting security incidents triggered by security software may include (i) collecting, by a computing device, telemetry data...
US-1,024,2197 Methods and apparatus to use a security coprocessor for firmware protection
A data processing system (DPS) provides protection for firmware. The DPS comprises (a) a host module comprising a management engine and (b) a security module in...
US-1,024,2189 File format validation
A method for securely validating the file format type including receiving a file having a file format type, a header and a content block. The header has a...
US-1,024,2178 Methods and systems for enabling, tracking, and correlating anonymous user activity
Methods are disclosed for identity key management in networked application execution. In one embodiment, an identifier request is transmitted from a client...
US-1,024,2174 Secure information flow
Secure information flow may include a service receiving a request for data from a caller. The service may respond to the request with the requested data via a...
US-1,024,2170 Method and apparatus for obtaining sensing data
An electronic device according to various embodiments of the present disclosure may include at least one sensor module including a transmitter, a receiver, a...
US-1,024,2118 Multi-source electronic forms with concealed fields
Electronic multi-user forms are provided. The use of these forms may include displaying the forms to more than one user, receiving population data from one or...
US-1,024,1726 Using hard drive on panels for data storage
Methods and systems are described for controlling an automation and security system. According to at least one embodiment, an apparatus for data storage in an...
US-1,024,1486 System and method for passenger conveyance control and security via recognized user operations
A passenger conveyance system includes a processing module in communication with one or more sensors to receive the depth map data, and one or more security...
US-1,024,1200 Modular sonar transducer assembly systems and methods
Techniques are disclosed for systems and methods to provide accurate and reliable compact sonar systems for mobile structures. A modular sonar system includes...
US-1,023,9493 Security method for a security system of a vehicle
The invention relates to a security method (100) for a security system (200) of a vehicle (1) for activating at least one security-related function in the...
US-1,023,8008 Containment systems and related methods of use
The present disclosure provides advantageous containment systems configured to be deployed in a data center, and improved methods/systems for using the same....
US-1,023,7912 Method and apparatus for managing resources for D2D communication
The present disclosure relates to a communication method and system for converging a fifth generation (5G) communication system for supporting higher data rates...
US-1,023,7813 Method of performing cell selection and re-selection using PMAX parameters and system adapted thereto
The present disclosure relates to a communication method and system for converging a 5.sup.th Generation (5G) communication system for supporting higher data...
US-1,023,7806 Activation of a home automation controller
Embodiments of the present invention provide a single platform that provides controller functionality for each of security, monitoring and automation, as well...
US-1,023,7741 Central programmed loss and theft prevention
The proliferation of networked, wireless-enabled devices is challenged by the reliance upon password management and user knowledge of privacy and security...
US-1,023,7731 Communication system with PKI key pair for mobile terminal
A PKI key pair comprising a private key and a public key is arranged for the end device. The public key is stored at the communication partner. The...
US-1,023,7681 Registration management method for terminal accessing 5G network on non-3GPP access
A communication technique of fusing a fifth generation (5G) communication for supporting higher data transmission rate beyond a fourth generation (4G) system...
US-1,023,7576 3D-HEVC depth video information hiding method based on single-depth intra mode
The present invention disclosed a 3D-HEVC depth video information hiding method based on single-depth intra mode, which comprises information embedment part and...
US-1,023,7305 Methods and systems for enabling legal-intercept mode for a targeted secure element
Disclosed herein are methods and systems for enabling legal-intercept mode for a targeted secure element. In an embodiment, a method includes embedding a first...
US-1,023,7301 Management of cellular data usage during denial of service (DoS) attacks
Systems and methods for managing data usage of a cellular modem during DoS/DDoS attacks are provided. According to one embodiment, a network security device of...
US-1,023,7288 Method for deep data inspection over an industrial internet field broadband bus
The invention discloses a method for deep data inspection over an industrial internet field broadband bus, the method including: obtaining, by a first node, a...
US-1,023,7286 Content delivery network protection from malware and data leakage
Content Delivery Network (CDN) protection systems and methods, performed by a cloud node in a distributed security system include receiving traffic between one...
US-1,023,7282 Data leak protection
Methods and systems for Data Leak Prevention (DLP) in an enterprise network are provided. According to one embodiment, a network security device maintains a...
US-1,023,7260 Increased communication security
A system may include a first computer system and a second computer system. The first computer system may be configured to generate a Constrained Application...
US-1,023,7251 Communication device and system, data processing method and method for securely exchanging data
The present invention relates to a method for processing data in a communication device comprising a host and a security module associated with this host. This...
US-1,023,7237 Communication protocols in integrated systems
Systems and methods comprise a gateway that includes a processor coupled to a security system at a premises via a channel. The channel comprises a protocol of...
US-1,023,7182 Systems, methods, and apparatus for implementing agents in service appliances
The present disclosure describes several key features of an agent deployable on a service appliance: agent architecture/design, transport and channel...
US-1,023,7080 Tracking data usage in a secure session
A first device may obtain a session time record that includes information relating to a secure session. The session time record may include a content identifier...
US-1,023,7063 Distributed cryptographic key insertion and key delivery
A method of producing a secure integrated circuit (IC), including: loading the IC with a unique identification number (UID); loading the IC with a key...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.