Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,008,9246 Access files
Data security access and management may require a server dedicated to monitoring document access requests and enforcing rules and policies to limit access to...
US-1,008,9132 Methods and systems for providing a customized network
A method, system, and computer-readable medium for providing a secure computer network for the real time transfer of data are provided. The data is grouped and...
US-1,008,9116 Secure start system for an autonomous vehicle
A secure start system for an autonomous vehicle (AV) can include a compute stack and a communications router. The communications router can include an encrypted...
US-1,008,8841 Robotic assistance in security monitoring
Methods, systems, and apparatus, including computer programs encoded on storage devices, for monitoring, security, and surveillance of a property. In one...
US-1,008,8408 Friction coefficient measuring method of surface of specimen
A method of measuring a friction coefficient of a surface of a specimen includes: obtaining surface information of the specimen by using an atomic force...
US-1,008,6566 Apparatus for production of three-dimensional objects by stereolithography
A system for making three dimensional objects. The system may have a frame, a build platform movably coupled to the frame, a vat removably secured so that the...
US-1,008,6260 Method and apparatus for using upstream communication in a card shuffler
A security system for a casino table card game has a casino table with i) indicia thereon for the placement of wagers, ii) a data entry system with an...
US-1,008,5235 Method and system for datacasting and content management
A method and system for datacasting and content management. Such a system may have, as its core, a dashboard system for managing data feeds. A dashboard system...
US-1,008,4865 Mobile event notifications
Disclosed is a mobile event streaming system that receives customer application lifecycle and user events including a message, event source and a destination...
US-1,008,4846 Method and system for fast access to advanced visualization of medical scans using a dedicated web portal
A system for viewing at a client device a series of three-dimensional virtual views over the Internet of a volume visualization dataset contained on centralized...
US-1,008,4826 Protocol agnostic security by using out-of-band health check
A computer-implemented method provides an improvement in security breach detection and comprises using a broker computing device, calculating a digital...
US-1,008,4820 Method and system for IPSec security for IPP-USB data
A method of providing security for data being transferred over a Universal Serial Bus (USB) connection, the method comprising: setting an IPsec policy...
US-1,008,4817 Malware and exploit campaign detection system and method
A malware and exploit campaign detection system and method are provided that cannot be detected by the malware or exploit campaign. The system may provide...
US-1,008,4811 Systems and methods for adaptive security protocols in a managed system
Embodiments disclosed herein describe one or more servers of an enterprise system that may be configured to receive security and vulnerability information from...
US-1,008,4804 Optimizing security analyses in SaaS environment
Embodiments of the present invention provide systems and methods for performing a security analysis on a set of observables by inferring malicious...
US-1,008,4802 Supervisory control and data acquisition
Aspects of the present disclosure relate to computer system security. A machine accesses a set of records corresponding to a set of users having access to a...
US-1,008,4799 Systems and methods for providing security services during power management mode
Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a...
US-1,008,4796 System, method and computer program product for managing access to systems, products, and data based on...
In accordance with embodiments, there are provided mechanisms and methods for managing access to data based on information associated with a physical location...
US-1,008,4787 Systems and methods for securing social media for users and businesses and rewarding for enhancing security
The disclosed system and method enhances security of people, organizations, and other entities that use what has been termed "social media." Recent trends have...
US-1,008,4777 Secure data processing method and system
The invention discloses a secure data processing method and system, wherein the secure data processing method comprises the following steps of: a security...
US-1,008,4771 Secure feature and key management in integrated circuits
A mechanism for providing secure feature and key management in integrated circuits is described. An example method includes receiving, by a root authority...
US-1,008,4769 Single sign-on between multiple data centers
Techniques are disclosed for a single sign-on (SSO) enterprise system with multiple data centers that can use a lightweight cookie on a user's client device....
US-1,008,4764 System for a secure encryption proxy in a content centric network
One embodiment provides a system that facilitates a secure encryption proxy in a content centric network. During operation, the system receives, by an...
US-1,008,4763 Methods and systems for establishing secure communication between devices via at least one intermediate device
Methods to establish communication between a first and second device via at least one intermediate device comprise, at the first device, generating an offer...
US-1,008,4757 Network privacy
A system and method of network privacy enables end-users of a Network to have legal title or rights to all data knowingly or unknowingly transmitted while...
US-1,008,4753 Delivering security functions to distributed networks
Systems and methods for delivering security functions to a distributed network are described herein. An exemplary method may include: processing a data packet...
US-1,008,4628 Joint physical layer security and PAPR mitigation in OFDM systems
Systems and methods for securing orthogonal frequency division multiplexing (OFDM) transmission of data are discussed herein. Transceivers can sense the signal...
US-1,008,4602 Dynamic token and a working method thereof
A working method of a dynamic token, including the steps of grouping, by the dynamic token, the second hash data to obtain a plurality of byte groups,...
US-1,008,4600 Decentralized information protection for confidentiality and tamper-proofing on distributed database
In an embodiment, a computer-implemented data security method comprises: at a first computing device, receiving security service data from a first digital data...
US-1,008,4595 Algorithm-based anonymous customer references
Facilitation of management and utilization of domain-specific anonymous customer references (ACRs) for protection of subscriber privacy across different domains...
US-1,008,4594 Method, apparatus, and system for performing an establishment of a security context between a user equipment...
Embodiment of the present invention discloses a method, an apparatus, and a system for establishing a security context and relates to the communications field,...
US-1,008,4512 Proximity boundary based communication
Technology is described for proximity based communications. A proximity boundary can be defined with dimensions defined, in part, by a communication range of...
US-1,008,4030 Backplane substrate and organic light emitting diode display using the same
Disclosed are a backplane substrate which secures sufficient storage capacitance even when using small sub-pixels in a structure having very high resolution,...
US-1,008,3765 Methods for securely processing information having handwritten data
The present method provides for conversion of handwritten to data that is accurate and fast, yet with improved security. The method provides handwritten data...
US-1,008,3695 Dialog-based voiceprint security for business transactions
A system for biometrically securing business transactions uses speech recognition and voiceprint authentication to biometrically secure a transaction from a...
US-1,008,3596 Systems and methods of automated arming and disarming of a security system
Systems and methods of security are provided, including at least one of a plurality of sensors to detect a location of at least one user, and generate detection...
US-1,008,3564 Multimode retail system
A multimode system for receiving data in a retail environment includes: a secure input module for receiving high security input and low security input from a...
US-1,008,3425 System and method for a private and secure payment system using a merchant sales terminal
A secure payment system between a customer and a merchant, where the sales terminal wirelessly transmits a partial payment authorization transaction record...
US-1,008,3382 Image forming apparatus equipped with secure print function, method of controlling the same, and storage medium
An image forming apparatus capable of flexibly controlling whether or not to perform user authentication when a user performs operations related to functions of...
US-1,008,3325 Secure removable storage for aircraft systems
Techniques are disclosed for securing backup operational data (e.g., of an aircraft) maintained by a line-replaceable unit (LRU) in a removable storage media...
US-1,008,3309 Secure cloud storage distribution and aggregation
Methods and systems for secure cloud storage are provided. According to one embodiment, file storage policies are maintained for users of an enterprise network...
US-1,008,3304 Technologies for enhanced user authentication using advanced sensor monitoring
Technologies for information security include a computing device with one or more sensors. The computing device may authenticate a user and, after successful...
US-1,008,3297 Method of secure comparative processing
Method of secure comparative processing of the type in which a processor of an electronic component compares proof data (EPR, AUTH) that it receives as input...
US-1,008,3293 Timer and content security
A method, computer system, and a computer program product for timing secured content is provided. The present invention may include receiving a connection...
US-1,008,3286 Method and system for secured transfer of application data between electronic devices on simultaneous touch
A method and a system for transmitting data from a first electronic device to a second electronic device using a human body as a signal transmission path, are...
US-1,008,3284 Event-based security challenges
Concepts and technologies are disclosed herein for event-based security challenges. A computer can execute a security application. The computer can receive a...
US-1,008,3277 Secure computing systems and methods
The present disclosure relates to systems and methods for facilitating trusted handling of genomic and/or other sensitive information. Certain embodiments may...
US-1,008,3196 Creating secure virtual databases storing masked data
A database storage system creates secure snapshots or virtual databases based on a source database that stores sensitive information. The database storage...
US-1,008,3194 Process for obtaining candidate data from a remote storage server for comparison to a data to be identified
The invention presents a process for obtaining candidate reference data to compare to a data to be identified, implemented in a system comprising a client unit...
US-1,008,3130 Memory lock system with manipulatable input device and method of operation thereof
A security system for an external data storage apparatus and method of control thereof includes: a data storage, in which data is stored; a high-speed serial...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.