Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,025,0582 Secure private location based services
Representative embodiments disclose unique mechanisms to use beacons to provide access to cloud services. In order to access the cloud services a user presents...
US-1,025,0571 Systems and methods for offloading IPSEC processing to an embedded networking device
A new approach is proposed that contemplates systems and methods to support a mechanism to offload IPSec/IKE processing of virtual machines (VMs) running on a...
US-1,025,0567 Communication system, wireless communication apparatus, and communication method
A wireless communication circuit includes a receiver to receive at least one of a beacon frame and a probe response frame from a first wireless communication...
US-1,025,0566 Communication system, wireless communication apparatus, and communication method
A wireless communication circuit includes a receiver to receive at least one of a beacon frame and a probe response frame from a first wireless communication...
US-1,025,0563 Secure device and proxy for secure operation of a host data processing system
Secure device and proxy operation include generating, using a processor, a first proxy and a first proxy companion paired with the first proxy and providing the...
US-1,025,0560 Network security method and device using IP address
The present invention provides a network security method, which comprises the steps of: maintaining information on blocked countries, to be blocked from data...
US-1,025,0498 Session aggregator brokering of data stream communication
A system for proving secure streamed data sessions is disclosed. The system comprises a first computer system executing an orchestrator virtualized network...
US-1,025,0451 Intelligent analytic cloud provisioning
A services platform acts as an intermediary between an existing enterprise analytic environment, and one or more underlying cloud service providers. The...
US-1,025,0390 Data health assurance using private proof of authority
A method of securing a network including parsing a first data packet into at least one portion using a first device, such that the at least one portion includes...
US-1,025,0386 Power management and security for wireless modules in "machine-to-machine" communications
Methods and systems are provided for power management and security for wireless modules in "Machine-to-Machine" communications. A wireless module operating in a...
US-1,024,9938 Data communications case having an internal antenna array
A data communications apparatus including a case having a base and a lid connectable to the base, the lid movable with respect to the base between an open...
US-1,024,9182 Remote vehicle system configuration, control, and telematics
A vehicle control system (VCS) includes external communication interfaces, such as a Bluetooth interface, for communicating with a user communication and...
US-1,024,9113 Secure entry system
A secure entry system is provided. The secure entry system includes an authorization apparatus including a reader for reading data, and a record medium, in...
US-1,024,9069 Monitoring system analytics
Techniques are described for presenting events detected by a monitoring system. A system receives a selection of a particular time period, identifies security...
US-1,024,8849 Technique for providing security to an area
A method for reducing violence within crowded venues is provided. The method includes reading license plates of vehicles passing into entry ports of a parking...
US-1,024,8838 Method and device for single molecule imaging
A device and method for imaging fluorescently labeled molecules (e.g., nucleic acids) includes securing a modular attachment device to the mobile phone with a...
US-1,024,8809 System and method for automatically securing sensitive data in public cloud using a serverless architecture
Systems and methods are provided executing jobs immediately upon receipt of a notification. The systems and methods may include receiving, at a cloud compute...
US-1,024,8787 Systems and methods for determining reputations of files
The disclosed computer-implemented method for determining reputations of files may include (i) identifying, on an endpoint device, a loadpoint data entry...
US-1,024,8780 Method and device for securing an object, corresponding control method and device secured object
A device to secure an object receives a digital file representing a photograph as an input. The photogram represents at least one portion of the object. An...
US-1,024,8773 Vehicle security accessory and methods of identity authentication
An accessory configured to authenticate a transaction is disclosed. The accessory comprises a communication circuit configured to communicate with a transaction...
US-1,024,8772 Secure communication between a virtual smartcard enclave and a trusted I/O enclave
A system for accessing a trusted execution environment includes instructions to transmit, from a first trusted execution environment, a request for a biometric...
US-1,024,8578 Methods and systems for protecting data in USB systems
The various embodiments described below are directed to providing authenticated and confidential messaging from software executing on a host (e.g. a secure...
US-1,024,8577 Using a characteristic of a process input/output (I/O) activity and data subject to the I/O activity to...
Provided are a computer program product, system, and method for detecting a security breach in a system managing access to a storage. Process Input/Output (I/O)...
US-1,024,8324 Oblivious parallel random access machine system and methods
A secure parallel processing technique for converting any parallel random access machine (PRAM) into an oblivious parallel random access machine (OPRAM), whose...
US-1,024,6187 Systems and methods to interchangeably couple tool systems with unmanned vehicles
In some embodiments, unmanned aerial task systems are provided that include a plurality of unmanned aerial vehicles (UAV) each comprising: a UAV control...
US-1,024,4568 Telecommunication system for relaying cellular coverage
A cellular telecommunications network architecture is described where certain UEs are configured to assist the network to improve coverage in regions of poor...
US-1,024,4394 Method and update gateway for updating an embedded control unit
A method for updating an embedded electronic control unit, including an update gateway requests from a hardware security module an update request destined for...
US-1,024,4384 Apparatus and method for profile installation in communication system
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-1,024,4382 Using a plurality of SIM cards at an electronic device
Apparatus with I/O modules such as a networked security camera with a plurality of wireless connections to continue to use at least one network connection is...
US-1,024,4122 Panel control over broadband
Systems and methods for communicating between components of a security and/or automation system include establishing a two-way call between a control panel and...
US-1,024,4076 Secure cloud interconnect private routing
A network device is located in a cloud routing services center that is separate from a customer network. The network device provides a user interface to...
US-1,024,4000 Apparatus and method for establishing seamless secure communications between components in an industrial...
A method includes establishing, using a connection policy at a first device, a security association with a second device of an industrial process control and...
US-1,024,3998 Metadata supporting cyber content sharing and governance and application method thereof
A method for identifying metadata for cyber content sharing and governance (abbreviated as an MDCCSG method) and application method thereof. The MDCCSG method...
US-1,024,3990 Systems and methods for detecting replay attacks on security space
A system and method for detecting replay attacks on secure data are disclosed. A system on a chip (SOC) includes a security processor. Blocks of data...
US-1,024,3988 Configurable network security
According to an example, configurable network security may include receiving data flows directed to end node modules of a server, and selecting data flows from...
US-1,024,3972 Correlation-based detection of exploit activity
A security agent implemented on a monitored computing device is described herein. The security agent is configured to receive an event notification indicative...
US-1,024,3970 Event views in data intake stage of machine data processing platform
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,024,3959 Secure cloud computing framework
A cloud computing system. The system comprises a network, a data store communicatively coupled to the network, a plurality of compute nodes, at least some of...
US-1,024,3953 Systems and methods for secure resource access and network communication
Systems and methods for secure resource access and network communication are provided. A plurality of policies are received on a client device, each policy...
US-1,024,3952 Anonymizing biometric data for use in a security system
An anonymized biometric representation of a target individual is used in a computer based security system. The system receives a record of a target individual...
US-1,024,3886 Bi-directional NAT traversal using endpoint assigned discriminators
A method for creating a secure link between any two endpoints in a network comprises: assigning a unique identifier to each endpoint of a network; for each...
US-1,024,3867 Vehicle security system
Systems and methods for addressing a vehicle condition are provided. In one example embodiment, a method includes receiving data indicative of a condition...
US-1,024,3837 Enabling split sessions across hybrid public safety and LTE networks
A special data splitter and data combiner is shown for low latency emergency and data intensive services so that multiple broadband and wireless networks can be...
US-1,024,3745 Method and system for producing a secure communication channel for terminals
A method, system, backend, terminal, and computer program product are disclosed for producing a secure communication channel for a terminal, the method having...
US-1,024,3733 Process and system for establishing a moving target connection for secure communications in client/server systems
A system and method performs a moving target blind rendezvous by exchanging data through a distributed hash table. The system allows users to securely send...
US-1,024,3727 Method and system for constant time cryptography using a co-processor
The present disclosure presents methods, apparatuses, and systems to bolster communication security, and more particularly to utilize a constant time...
US-1,024,3085 Semiconductor device and method of manufacturing same
An object is to provide a reliability-improved semiconductor device having a MONOS memory that rewrites data by injecting carriers into a charge storage...
US-1,024,2665 Controller systems and methods of limiting the operation of neural networks to be within one or more conditions
Systems and methods for automatically self-correcting or correcting in real-time one or more neural networks after detecting a triggering event, or breaching...
US-1,024,2561 Corner security detection device
A security detection device and system for reducing false triggers is provided. The security detection device is a corner mount devices that may be mounted on...
US-1,024,2552 Child safety alarm system
A vehicle having a horn and a light includes an alarm system secured to a ceiling of the vehicle. The alarm system includes a housing secured to the ceiling; a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.