Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,023,7059 Diversified instruction set processing to enhance security
Disclosed are devices, systems, apparatus, methods, products, and other implementations, including a method that includes receiving a block of information from...
US-1,023,7057 Method and system for controlling the exchange of privacy-sensitive information
A method for controlling the exchange of private data, associated with a client device, between an application in execution on or for the device and a serving...
US-1,023,5852 Wireless security network and communication methods
A security network provides reduced power consumption and more robust communication of messages in comparison to conventional wireless systems. Reducing power...
US-1,023,5692 Consumer presence based deal offers
Systems and related methods facilitating payments with a mobile device are discussed herein. Circuitry in a networked-based central system, which may be a...
US-1,023,5618 Authentication feature in a barcode
A method for serializing products using a barcode and checking authenticity of barcodes. A printing modification introduces an authentication feature into the...
US-1,023,5599 Method and system to characterize video background changes as abandoned or removed objects
A method and system for analyzing video data in a security system. An analysis compares a current frame to a background model. The analysis system compares the...
US-1,023,5550 Methods and systems for capturing biometric data
A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an...
US-1,023,5511 Authentication integrity protection
Systems, methods, and processor-readable media are disclosed to adaptively secure access operations with respect to electronic resources. A request from an...
US-1,023,5503 In-vehicle content delivery system operable in autonomous mode and non-autonomous mode
Multimedia content may be delivered to content consumer devices via a content-delivery network. Encrypted content and cryptography keys for decrypting the...
US-1,023,5450 Semantic layer for processing machine data
Improved techniques for processing machine data are disclosed. Embodiments are operable to receive machine data input, interpret its meaning, and then represent...
US-1,023,5368 System and method for updating external file referenced by database with transactional consistency using SQL
A system and method for updating files in a file system that is linked to a database system which stores metadata pertaining to the files. Changes intended to...
US-1,023,5335 Systems and methods for cryptographically-secure queries using filters generated by multiple parties
Systems and methods that permit the querying of encrypted data in a cryptographically-secure manner. Generally, data that has been encrypted cannot be queried...
US-1,023,5304 Multi-crypto-color-group VM/enclave memory integrity method and apparatus
Embodiments of apparatus, method, and storage medium associated with MCCG memory integrity for securing/protecting memory content/data of VM or enclave are...
US-1,023,5176 Techniques for metadata processing
Techniques are described for metadata processing that can be used to encode an arbitrary number of security policies for code running on a processor. Metadata...
US-1,023,4383 Terahertz spectral imaging system and security surveillance system employing the same
A terahertz (THz) spectral imaging system includes a THz 2D imaging camera, a tunable THz bandpass filter before the THz camera, and a broadband THz light...
US-RE47,313 Securing digital content system and method
A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or...
US-1,023,1361 Fan system management
In some embodiments, a rack system is configured to comprise a removable fan system. The fan system enables thermal management of the rack system. The removable...
US-1,023,1299 Secure element having a light emitting diode
A method is for limiting a voltage in the reverse direction of a light emitting diode is disposed on a secure element. The light emitting diode is electrically...
US-1,023,1208 System and method of paging in next generation wireless communication system
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-1,023,1127 Methods and devices for performing a mobile network switch
A method of performing a switch from a first mobile network to a second mobile network by a mobile terminal comprising a secure element comprises the steps of:...
US-1,023,0997 Management device and image processing system
A resolution converter converts input image data to N types (N is a plural number) of image data having resolutions different with each other. A secret sharing...
US-1,023,0880 LED light has built-in camera-assembly for colorful digital-data under dark environment
A LED Light device for house or stores or business application having built-in camera-assembly is powered by AC or-and DC power source for a lamp-holder, LED...
US-1,023,0764 Inferential analysis using feedback for extracting and combining cyber risk information
Various embodiments of the present technology include methods of assessing risk of a cyber security failure in a computer network of an entity. Some embodiments...
US-1,023,0752 Systems and methods for attack simulation on a production network
The disclosure is directed towards systems and methods for improving security in a computer network. The system can include a planner and a plurality of...
US-1,023,0747 Explaining network anomalies using decision trees
In an embodiment, the method comprises receiving an identification of an anomaly associated with a false positive identification of a security threat by the...
US-1,023,0742 Space and time efficient threat detection
A security monitoring system operated by a downstream client continually collects event information indicating events that have occurred within the computing...
US-1,023,0740 Network security analysis for smart appliances
A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows...
US-1,023,0738 Procedure for platform enforced secure storage in infrastructure clouds
The present invention relates to a secure component for protecting data in a storage entity and a method at the secure component of protecting data in the...
US-1,023,0718 Split serving of computer code
A computer-implemented method for securing a content server system is disclosed. The method includes identifying that a request has been made by a client...
US-1,023,0717 Managed domains for remote content and configuration control on mobile information devices
A technique is disclosed for remotely managing isolated domains on mobile devices. A request is received from the mobile device to instantiate a managed domain....
US-1,023,0700 Transaction based message security
Apparatuses, systems, methods, and program products are disclosed for transaction based networks security. A data module determines a set of data that is common...
US-1,023,0698 Routing a data packet to a shared security engine
Examples disclose a system comprising an integrated circuit to determine whether a data packet should be processed by a shared security engine associated with a...
US-1,023,0695 Distribution of secure data with entitlement enforcement
An example method for distributing content includes receiving a first encrypted request for content over a first encrypted connection from a client. The method...
US-1,023,0694 Content inspection in privacy enhanced cloud conferencing
A media distribution network device connects to an online collaborative session between a first participant network device, a second participant network device,...
US-1,023,0693 Safechannel encrypted messaging system
Portable, hand-held electronic devices for and methods to enabling a user to interact with a native operating system (OS) running on a host device and a virtual...
US-1,023,0598 Method and system for providing visualization of instance data to identify and evaluate re-stacking policies in...
A re-stacking data visualization display is generated that includes individual graphic representations of instances (virtual computing systems) used to provide...
US-1,023,0529 Techniques to secure computation data in a computing environment
Techniques to secure computation data in a computing environment from untrusted code. These techniques involve an isolated environment within the computing...
US-1,023,0526 Out-of-band validation of domain name system records
An out-of-band Domain Name System (DNS) security technique uses a cryptographic blockchain for securing and validating DNS data in a chain of custody that...
US-1,023,0508 Method and apparatus for transmitting information related to a reference signal
The present disclosure relates to a communication method and system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data...
US-1,023,0446 Method and apparatus for transmitting diversity
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-1,023,0441 Method and apparatus for channel status information feedback in mobile communication system
A communication method and a system for converging a 5th-generation (5G) communication system for supporting higher data rates beyond a 4th-generation (4G)...
US-1,023,0437 User terminal, radio base station, and radio communication method
It is possible to secure radio resources allocated to an uplink data channel even when radio resources allocated to an uplink control channel increase. A user...
US-1,022,9746 OTP memory with high data security
A method of programming electrical fuses reliably is disclosed. If a programming current exceeds a critical current, disruptive mechanisms such as rupture,...
US-1,022,9584 Permitting processing system for a monitoring on demand security system
A premises apparatus is provided. The premises apparatus includes a processor configured to: determine that at least one monitoring service is being requested...
US-1,022,9570 Technologies for physical assault detection using secure clothing and/or clothing accessories
Technologies for detecting a physical assault against a user include one or more clothing sensor modules coupled to a garment of the user. Each clothing sensor...
US-1,022,9568 Anti-theft RFID system and method thereof
An anti-theft RFID system for monitoring the presence of a plurality of tagged items includes an RFID reader including an antenna and being configured to...
US-1,022,9399 Method and system for secure entry of identification data for the authentication of a transaction being...
A system for authentication and execution of a transaction at a self-service terminal. The system has a first computerized unit (PINSRV) which, in...
US-1,022,9350 Transaction card with secured magnetic strip and method for making the same
A transaction card construction and a method for making transaction cards provides increased security for transaction card magnetic strips. The transaction card...
US-1,022,9288 Enhanced data security platform
A method for providing data security comprises operatively connecting sensing elements with a user, sensing characteristics of the user via the sensing...
US-1,022,9281 Remote provisioning and authenticated writes to secure storage devices
A system for securing electronic devices includes a storage device including a storage device controller processor, at least one non-transitory machine readable...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.