Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,023,0717 Managed domains for remote content and configuration control on mobile information devices
A technique is disclosed for remotely managing isolated domains on mobile devices. A request is received from the mobile device to instantiate a managed domain....
US-1,023,0700 Transaction based message security
Apparatuses, systems, methods, and program products are disclosed for transaction based networks security. A data module determines a set of data that is common...
US-1,023,0698 Routing a data packet to a shared security engine
Examples disclose a system comprising an integrated circuit to determine whether a data packet should be processed by a shared security engine associated with a...
US-1,023,0695 Distribution of secure data with entitlement enforcement
An example method for distributing content includes receiving a first encrypted request for content over a first encrypted connection from a client. The method...
US-1,023,0694 Content inspection in privacy enhanced cloud conferencing
A media distribution network device connects to an online collaborative session between a first participant network device, a second participant network device,...
US-1,023,0693 Safechannel encrypted messaging system
Portable, hand-held electronic devices for and methods to enabling a user to interact with a native operating system (OS) running on a host device and a virtual...
US-1,023,0598 Method and system for providing visualization of instance data to identify and evaluate re-stacking policies in...
A re-stacking data visualization display is generated that includes individual graphic representations of instances (virtual computing systems) used to provide...
US-1,023,0529 Techniques to secure computation data in a computing environment
Techniques to secure computation data in a computing environment from untrusted code. These techniques involve an isolated environment within the computing...
US-1,023,0526 Out-of-band validation of domain name system records
An out-of-band Domain Name System (DNS) security technique uses a cryptographic blockchain for securing and validating DNS data in a chain of custody that...
US-1,023,0508 Method and apparatus for transmitting information related to a reference signal
The present disclosure relates to a communication method and system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data...
US-1,023,0446 Method and apparatus for transmitting diversity
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-1,023,0441 Method and apparatus for channel status information feedback in mobile communication system
A communication method and a system for converging a 5th-generation (5G) communication system for supporting higher data rates beyond a 4th-generation (4G)...
US-1,023,0437 User terminal, radio base station, and radio communication method
It is possible to secure radio resources allocated to an uplink data channel even when radio resources allocated to an uplink control channel increase. A user...
US-1,022,9746 OTP memory with high data security
A method of programming electrical fuses reliably is disclosed. If a programming current exceeds a critical current, disruptive mechanisms such as rupture,...
US-1,022,9584 Permitting processing system for a monitoring on demand security system
A premises apparatus is provided. The premises apparatus includes a processor configured to: determine that at least one monitoring service is being requested...
US-1,022,9570 Technologies for physical assault detection using secure clothing and/or clothing accessories
Technologies for detecting a physical assault against a user include one or more clothing sensor modules coupled to a garment of the user. Each clothing sensor...
US-1,022,9568 Anti-theft RFID system and method thereof
An anti-theft RFID system for monitoring the presence of a plurality of tagged items includes an RFID reader including an antenna and being configured to...
US-1,022,9399 Method and system for secure entry of identification data for the authentication of a transaction being...
A system for authentication and execution of a transaction at a self-service terminal. The system has a first computerized unit (PINSRV) which, in...
US-1,022,9350 Transaction card with secured magnetic strip and method for making the same
A transaction card construction and a method for making transaction cards provides increased security for transaction card magnetic strips. The transaction card...
US-1,022,9288 Enhanced data security platform
A method for providing data security comprises operatively connecting sensing elements with a user, sensing characteristics of the user via the sensing...
US-1,022,9281 Remote provisioning and authenticated writes to secure storage devices
A system for securing electronic devices includes a storage device including a storage device controller processor, at least one non-transitory machine readable...
US-1,022,9280 System and method to protect a resource using an active avatar
A data source owner in a computing system protects that source via a "virtual" or surrogate entity or "avatar." The entity is an object whose presence in the...
US-1,022,9279 Methods and systems for providing access control to secured data
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all...
US-1,022,9272 Identifying security boundaries on computing devices
During booting of a computing device, multiple security boundaries are generated. A security boundary refers to a manner of operation of a computing device or a...
US-1,022,9256 Techniques for preventing voice replay attacks
Technologies for authenticated audio login by a user of a computing device include generating a security token having a plurality of token characters. The...
US-1,022,9126 Method and system for applying data retention policies in a computing platform
Systems and methods for a multitenant computing platform. Original data is generated through operation of a computing platform system on behalf of an account of...
US-1,022,8988 Detecting anomalies in program execution
Techniques are described for detecting anomalous behavior in program execution. In one example, a method includes logging occurrence of one or more key events...
US-1,022,8695 Drone control device
In one general aspect, a drone control device includes a body, a motor that is configured to move the body, a network module, an input module, and a processor....
US-1,022,8673 Method, system and computer program product for controlling and/or regulating an electric energy system
A method for controlling and/or closed-loop controlling an electric energy system. Empirical data are provided in a first data storage device for stabilizing...
US-1,022,6687 Method and apparatus for using upstream communication in a card shuffler
A security system for a casino table card game has a casino table with i) indicia thereon for the placement of wagers, ii) a data entry system with an...
US-1,022,6213 Wearable digital device for personal health use for saliva, urine and blood testing and mobile wrist watch...
Provided are a wearable personal digital device and related methods. The wearable personal digital device may comprise a processor, a display, biometric...
US-1,022,5721 Smart wearable devices and system therefor
A description is therefore provided of technologies enhancing interoperability of devices located in a proximity from each other, with the goal of improving...
US-1,022,5238 Data security for content delivery networks
Various embodiments implement a secure content distribution architecture involving a content delivery network (CDN). A web server system can encrypt a content...
US-1,022,3633 Personalized EEG-based encryptor
A user-specific, electroencephalogram data-based secure encryption generator maps artificial neural network neuron elements to electroencephalogram data signals...
US-1,022,3544 Content aware hierarchical encryption for secure storage systems
In one embodiment, in response to a request received from a client for retrieving a data object stored in a storage system, a root key is obtained from the...
US-1,022,3213 Salted zero expansion all or nothing transformation
A method for execution by a dispersed storage network (DSN), the method begins by injecting generated data into a data segment to produce mixed data,...
US-1,022,2158 Secure smartphone-operated gun lock with apparatus for preventing firing in protected directions
Apparatus for locking and unlocking a gun to control its use includes a gun lock device that selects between two operative states: a locked state which prevents...
US-1,021,9200 Apparatus and method for link setup in wireless communication system
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-1,021,9193 Method and apparatus for providing services of network to terminal by using slice
The present disclosure relates to a communication technique of fusing a 5G communication system for supporting higher data transmission rate beyond a 4G system...
US-1,021,9152 Security architecture and solution for handling internet of things devices in a fifth generation system
A method of establishing a group trust relationship in an Internet of Things (IoT) system using a first IoT device within a group of IoT devices is provided....
US-1,021,9135 Near field communication (NFC) enhanced computing systems
Technologies are disclosed herein for utilizing near field communication ("NFC") to improve the security, performance, and configuration of computing systems....
US-1,021,8855 Doorbell call center
Techniques are described for enabling a service administrator to respond to a detected doorbell press at a property when an authorized user is unavailable to...
US-1,021,8742 System and method for providing network and computer firewall protection with dynamic address isolation to a device
A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to...
US-1,021,8731 Method and system for data breach and malware detection
Detecting cyber threat and malware, particularly zero-day malware is a major challenge for the security community. Signature-based methods of cyber threat and...
US-1,021,8730 Systems and methods of stateless processing in a fault-tolerant microservice environment
A system, method, and non-transitory computer-readable relating to network security are disclosed. In particular, embodiments described generally relate to...
US-1,021,8715 Secured network bridge
An apparatus and method are provided for implementing one or more security services to messages and data being communicated between a first network and a second...
US-1,021,8713 Global attestation procedure
A method, computer program product, and system for authenticating a computing device by geographic attestation includes a processor utilizing executing an...
US-1,021,8705 Multi-tenant identity and data security management cloud service
A system provides cloud-based identity and access management. The system receives a request from a client for an identity management service, authenticates the...
US-1,021,8682 Secure network protocol cryptographic processing
The present document describes systems and methods that utilize a cryptographic service for establishing a cryptographically protected communication session,...
US-1,021,8495 Secure computation method, secure computation system, secure computation server, registrant terminal, user...
Data processing is performed while personal information is kept concealed. A registrant terminal splits a registration input password and allocates the split...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.