Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,013,5842 Content-based isolation for computing device security
The subject disclosure is directed towards securing a computing device using content-based isolation. When the computing device requests content data having...
US-1,013,5841 Integrated security system having threat visualization and automated security device control
Techniques are described for taking direct actions, such as selectively blocking or allowing traffic and applications, while monitoring events from a graphical...
US-1,013,5836 Managing data privacy and information safety
Automatically screen data associated with a user that may have already been shared on a social network or about to be shared on the social network for a...
US-1,013,5817 Enhancing authentication and source of proof through a dynamically updatable biometrics database
The present invention provides for biometric authentication of users using current, updatable biometric data/standards. In this regard, the present invention...
US-1,013,5799 Systems and methods for cloud data security
Techniques for providing data security services with respect to cloud-based services are described. Examples include a security service provider ("SSP")...
US-1,013,5793 Security maximization for a computer related device based on real-time reaction
Methods and a system are provided that, in turn, are for providing security between a user device and a computer related device. A method includes providing a...
US-1,013,5792 Secure communications with internet-enabled devices
A network device allows inbound connections from external addresses to a computer on a local network while forbidding output connections from the computer to...
US-1,013,5791 Secure communications with internet-enabled devices
A network device allows inbound connections from external addresses to a computer on a local network while forbidding output connections from the computer to...
US-1,013,5790 Secure communications with internet-enabled devices
A network device allows inbound connections from external addresses to a computer on a local network while forbidding output connections from the computer to...
US-1,013,5786 Discovering and selecting candidates for sinkholing of network domains
Techniques for discovering and selecting candidates for sinkholing of network domains are provided. In some embodiments, a process for discovering and selecting...
US-1,013,5763 System and method for secure and efficient communication within an organization
The present disclosure relates to system(s) and method(s) for enabling secure and efficient communication between user devices within an organization....
US-1,013,5725 Data packet forwarding method, apparatus, and system
A data packet forwarding solution, which relates to the field of network transmission. A virtual switch in the solution saves a flow entry as an aging flow...
US-1,013,5689 Position parameterized recursive network architecture with topological addressing
A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the...
US-1,013,5633 Network security analysis for smart appliances
A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows...
US-1,013,5622 Flexible provisioning of attestation keys in secure enclaves
A computing platform implements one or more secure enclaves including a first provisioning enclave to interface with a first provisioning service to obtain a...
US-1,013,5612 Secure telecommunications
The present disclosure describes techniques for configuring and participating in encrypted audio calls, audio conferences, video calls, and video conferences....
US-1,013,5607 Distributed ledger interaction systems and methods
Distributed public ledger interaction methods and systems are presented by which one or more elements of a first smart contract are privately recorded on a...
US-1,013,4254 Intelligent security management system
The present specification describes a smart security management system for managing the flow of people through security checkpoints in order to optimize overall...
US-1,013,4207 Securing SCADA network access from a remote terminal unit
A first message from a remote terminal unit (RTU) is received, where the first message indicates that a motion has been detected. In response to receiving the...
US-1,013,4109 Depiction arrangement
The invention relates to a depiction arrangement for security papers, value documents, electronic display devices or other data carriers, having a grid image...
US-1,013,4038 Point of sale (POS) personal identification number (PIN) security
A key is securely injected into a POS PIN pad processor in its usual operating environment. In response to entry of a personal identification number (PIN) into...
US-1,013,3877 System and method for secure reciprocal exchange of data
A social media computer system includes a database that is in network communication with a first mobile phone and a second mobile phone. The database receives a...
US-1,013,3873 Temporary concealment of a subset of displayed confidential data
The present invention addresses the deficiencies of the art in respect to data security control and provides a method, system and computer program product for...
US-1,013,3870 Customizing a security report using static analysis
A control graph representing a model of data flow of a computer program can be generated during a static analysis. Respective edge weights can be assigned to...
US-1,013,3862 Timer and content security
A method, computer system, and a computer program product for timing secured content is provided. The present invention may include receiving a connection...
US-1,013,3548 System and method for providing mobile personal security platform
The present disclosure relates to a personal security platform. In particular, the present disclosure relates to such systems designed to be worn or attached to...
US-1,013,3540 Vehicle sound generator apparatus and method for controlling the same
The present invention provides a vehicle sound generator apparatus comprising a vehicle state sensing unit, a storage unit comprising a sound source storage...
US-1,013,3525 Autonomous secure printing
Methods and systems for virtual printing are described herein. A user may print to a virtual printer via a user device, and the user device may send print...
US-1,013,3497 SPI command censoring method and apparatus
A method in a memory system having a security device and a serial external electrically erasable read-only memory (EEPROM) is disclosed. The method includes...
US-1,013,3486 Status indicator on a data storage device
Methods, systems, and devices are described for displaying information on a visual display of a data storage device. The device may be an internal data storage...
US-1,013,0272 Personal safety and security mobile application responsive to changes in heart rate
A software app for a mobile device is disclosed for alerting a custodian of a person to be protected of an emergency situation involving the person to be...
US-1,012,9916 System and method for controlling network parameters for a plurality of home security/home system control panels
A computer processor implemented method (10) is provided to control network parameters for a plurality of networked control panels (12) for wireless...
US-1,012,9884 Multi-thread tx/rx and video data to improve throughput and reliability over cellular based communications systems
This process utilizes multiple threads over multiple paths (towers and/or carriers) in order to improve the above noted problems by dynamically splitting...
US-1,012,9842 Method and device for transmitting synchronization signal for device-to-device communication
The present invention relates to a communication technique for converging IoT technology with a 5G communication system for supporting a higher data...
US-1,012,9802 Layered connectivity in wireless systems
Techniques and devices are disclosed for efficient offloading and/or aggregation of resources by providing different levels of connection management in a...
US-1,012,9742 Method for synchronizing encryption information between SCell and UE
The present application discloses a method for synchronizing encryption information between a SCell and UE, which includes that: the SCell transmits a COUNT...
US-1,012,9736 Method and device for updating profile management server
A method to converge a 5.sup.th-Generation (5G) communication system to support higher data rates beyond a 4.sup.th-Generation (4G) system with a technology for...
US-1,012,9715 Reporting terminal capabilities for supporting short message service
A method and apparatus for receiving at least one IP-based registration message from a first UE is disclosed. The at least one IP-based registration message may...
US-1,012,9687 Compressed sensing with machine-to-machine communication
Some examples include a plurality of secure low-power compressive sensing sensor blocks able to communicate with each other and with a computing device to...
US-1,012,9370 Mapping between user interface fields and protocol information
A gateway device for implementing data security is described herein. The gateway device is coupled between a client device and a server device, and generates a...
US-1,012,9290 Dynamic adaptive defense for cyber-security threats
Disclosed is a cyber-security system that is configured to aggregate and unify data from multiple components and platforms on a network. The system allows...
US-1,012,9280 Modular event pipeline
A modular pipeline for event management in a computer environment is provided to enable the high volume of events that may be relevant to the security and...
US-1,012,9276 Methods and apparatus for identifying suspicious domains using common user clustering
Methods and apparatus are provided for identifying suspicious domains using common user clustering. An exemplary method comprises obtaining network event data...
US-1,012,9273 System and methods for computer network security involving user confirmation of network connections
Systems and methods for detecting anomalies in network traffic and providing notification to the users of the computers that generated the network traffic for...
US-1,012,9254 Automated provisioning of a network appliance
Certain embodiments disclose a method of provisioning security services for a domain or set of domains. The method comprises sending an electronic message to...
US-1,012,9244 Securing computing resources
Various examples are directed to systems and methods for providing access to computing resources. A resource system may receive an access request from a first...
US-1,012,9238 System for control of secure access and communication with different process data networks with separate...
A distributed block chain network having at least a private block chain portion, and in some cases a public block chain portion, allows users to take actions...
US-1,012,9237 System and method invoking security and profile utilities for global account registration
Systems and methods are disclosed herein for managing electronic access from remote devices to a plurality of back-end computer platforms. The system includes a...
US-1,012,9233 Method, device and system for network-based remote control over contactless secure storages
A typical system environment comprises a terminal device, a secure storage subsystem, and an interconnectivity component. The terminal device has a network...
US-1,012,9229 Peer validation
The present disclosure describes systems and methods for authenticating a called party during the initialization stage of establishing a secure ...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.