Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,037,2460 System and method for baseboard management controller assisted dynamic early host video on systems with a...
An information handling system includes a data processor, a security co-processor, and a baseboard management controller (BMC). The security co-processor...
US-1,037,2383 Providing secure access to data in mobile devices
Embodiments of the present disclosure provide a method, system and computer program product for providing a secure access to data in mobile devices by acquiring...
US-1,037,2357 Securely recovering stored data in a dispersed storage network
A method for execution by a dispersed storage and task (DST) execution unit that includes a processor includes receiving a slice pre-image request from a...
US-1,037,0872 Exit device systems and methods
An exit device according to one embodiment includes a plurality of sensors and an electronic dogging mechanism. The exit device is configured to locally analyze...
US-1,036,8383 Apparatus and method for providing multiple connections using different radio access technology in wireless...
The present disclosure relates to a communication method and system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data...
US-1,036,8238 Device and method of handling data transmission/reception for dual connectivity
A communication device for handling data transmission/reception for dual connectivity comprises a storage unit for storing instructions of connecting to a first...
US-1,036,8212 Method and apparatus for providing augmented reality services
The present disclosure relates to a communication technique and system for combining 5G communication systems with IoT technologies to achieve a higher data...
US-1,036,7986 Feedback for a privacy indicator on a security camera
Features are disclosed for a security camera including automated identification of disabled privacy indicators based on feedback included in monitored data...
US-1,036,7906 Method and apparatus for secure content delivery from a telecommunication network cache
According to one aspect, the teachings herein disclose a method and apparatus for a providing content over a secure connection to a subscriber device, where the...
US-1,036,7905 Integration framework and user interface for embedding transfer services into applications
Techniques are disclosed for providing secure transaction functionality embedded into host applications executing on transaction client devices, using an...
US-1,036,7903 Security systems for mitigating attacks from a headless browser executing on a client computer
Computer systems and methods in various embodiments are configured for improving the security and efficiency of server computers interacting through an...
US-1,036,7882 Offline content distribution networks
Approaches, techniques, and mechanisms are disclosed for the secure distribution of media content to devices having minimal or no Internet connectivity....
US-1,036,7844 Systems and methods of network security and threat management
The present disclosure generally provides systems and methods of network security and threat management. An exemplary system includes detection and prevention...
US-1,036,7843 Securing a network
Methods and systems for visualizing, analyzing, archiving and securing computer and internet of things (IoT) data networks are disclosed. The system includes a...
US-1,036,7840 Technologies for secure personalization of a security monitoring virtual network function
Technologies for secure personalization of a security monitoring virtual network function (VNF) in a network functions virtualization (NFV) architecture include...
US-1,036,7837 Optimizing security analyses in SaaS environments
Embodiments of the present invention provide systems and methods for performing a security analysis on a set of observables by inferring malicious...
US-1,036,7832 Reactive virtual security appliances
Methods and systems for monitoring network activity. Various embodiments may deploy virtual security appliances to a certain location or with a specific...
US-1,036,7828 Action response framework for data security incidents
An incident manager application (IM) for responding to data security incidents in enterprise networks is disclosed. An IM tracks the incidents in an enterprise...
US-1,036,7824 Policy management, enforcement, and audit for data security
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing, and enforcing policies on data security. A policy...
US-1,036,7821 Data driven role based security
Aspects extend to methods, systems, and computer program products for controlling performance of a requested user operation. It is determined if a requested...
US-1,036,7815 Protecting sensitive information from a secure data store
In embodiments of the present invention improved capabilities are described for the steps of receiving an indication that a computer facility has access to a...
US-1,036,7811 Methods for internet communication security
The present disclosure relates to network security software cooperatively configured on plural nodes to authenticate and authorize devices, applications, users,...
US-1,036,7800 Local data aggregation repository
Apparatuses, systems, methods, and computer program products are disclosed for a local repository of aggregated data. A hardware device comprises a local...
US-1,036,7795 Vehicle wireless internet security
Methods, systems, and computer program products for vehicle wireless internet security are provided. A connection request is received from a mobile device. A...
US-1,036,7794 Method and apparatus for securing a sensor or device
One embodiment of this invention describes a method and apparatus for the secure identification and validation of low complexity sensors or devices on a...
US-1,036,7793 Secure data exchange method between a communication device and a service provider based on asymmetric public...
The invention relates to a method for securely exchanging data (5) between a communication device (1) and a server (8) of a service provider (2) via a...
US-1,036,7790 Efficient sensor data delivery
A method is provided to enhance efficiency of sensor event data transmission over network. Specifically, a method is described to buffer a set of sensor data,...
US-1,036,7787 Intelligent firewall access rules
A firewall provides improved network security by allowing the use of dynamic objects in firewall rules, where the dynamic objects evaluate to a variable set of...
US-1,036,7704 Enterprise server behavior profiling
Generation of behavior profiling reports is provided for enterprise server devices in a network of enterprise server devices, as well as generation and...
US-1,036,7353 Managing queue distribution between critical datacenter and flexible datacenter
Systems include one or more critical datacenter connected to behind-the-meter flexible datacenters. The critical datacenter is powered by grid power and not...
US-1,036,7265 Magnetic communication method
The disclosure relates to a magnetic communication method that does not use induction. For example, a transmitter device may generate a magnetic field in a...
US-1,036,6794 Risk profiling using portal based scanners
A system and method for consolidating data collected using a hierarchical scanning system and assessing security risks regarding the shipping containers is...
US-1,036,6554 Systems and methods for securing a vehicle during extended idle
Methods and systems are provided for an extended secure idle (SI) for a mobile platform. The SI may be entered and exited responsive to a variety of SI entry...
US-1,036,6425 Method and system for secure order management system data encryption, decryption, and segmentation
An apparatus for segmented processing of order management system data is described herein. The apparatus generally includes: a front end interface that is...
US-1,036,6377 Wireless data communication interface
In some embodiments, the rendering a financial transaction record in a second format includes converting a tokenized first item of financial transaction...
US-1,036,6293 Computer system and method for improving security screening
In an example, a computing device comprises at least one processor, a memory, and a non-transitory computer-readable storage medium storing instructions thereon...
US-1,036,6248 System and method for providing data security in a hosted service system
Aspects of the present disclosure are directed to methods and systems for protecting sensitive data in a hosted service system. The system includes a host...
US-1,036,6239 Multi-party encryption cube processing apparatuses, methods and systems
Computer-implemented systems and methods are disclosed herein for use within secure multi-party computation. A system and method are used for storing an...
US-1,036,6224 System and method for securing secure memory allocations in an information handling system
An information handling system has a secure data storage partition allocation. Access to the secure storage partition is limited to a set of authorized...
US-1,036,6219 Preventing unauthorized access to secured information using identification techniques
A vehicle computing platform may receive driver sensor data indicating whether a driver seat in a vehicle is occupied. The vehicle computing platform may...
US-1,036,6213 Protecting an application via an intra-application firewall
One or more communication interfaces of a first application may be scanned. In response to the scanning, it may be determined that at least a first component of...
US-1,036,6212 Verification system for secure transmission in a distributed processing network
A verification system, includes: an arithmetic/logic unit ("ALU") to perform one or more mathematical operations and compare selected variables; a register to...
US-1,036,6129 Data security threat control monitoring system
A data security threat control and monitoring system and method described herein may provide visibility into users' activities and their access to sensitive...
US-1,036,6097 System and method for conducting searches at target devices
A method, apparatus and system for secure forensic investigation of a target machine by a client machine over a communications network. In one aspect the method...
US-1,036,5975 Backup data security classifcation
Systems and methods for backup data security classification. In an illustrative, non-limiting embodiment, an Information Handling System (IHS) may include one...
US-1,036,5376 Protected positioning, navigation, or timing signals resistant to spoofing
Positioning, navigation, and timing ("PNT") signals, such as those used in GNSS or LORAN systems, may be vulnerable to spoofing attacks. To generate trustworthy...
US-1,036,5116 Security system with traffic monitoring
The present disclosure relates to approaches for providing real time traffic information to a user using a control panel of a building automation system. The...
US-1,036,4799 Secure windfarm power production during a SCADA system offline mode
A system for generating power includes a supervisory control and data acquisition (SCADA) system that provides control commands to a plurality of turbine...
US-1,036,4056 Bagging system for a vending machine
A bagging system for a vending machine provides a bag loading device for loading the bag to a bag holder. The bag holder includes clamping arms for clamping...
US-RE47,546 Techniques for replicating changes to access control lists on investigative analysis data
Techniques for replicating changes to access control lists on investigative analysis data are disclosed. After a change is made in a database to an access...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.