Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,037,5044 Apparatus and method for establishing secure communication channels in an internet of things (IoT) system
An apparatus and method are described for secure communication between IoT devices and an IoT service. For example, one embodiment of a system comprises: an...
US-1,037,5041 Method, system, and apparatus for secure wireless connection generation
Provided is a system and apparatus employing an extremely secure method of encrypting both wireless internet connections and wireless peripherals to a computer,...
US-1,037,5034 Secured transfer of data between datacenters
In various embodiments, a method of transferring data between datacenters may be performed. The method may include running a first plurality of host programs...
US-1,037,5032 System and method for data segmentation and distribution across multiple cloud storage points
The present invention is a system and method for data segmentation and distribution such that the user may distribute their data to a plurality of cloud-based...
US-1,037,5023 System, method and computer program product for accessing at least one virtual private network
A system for accessing at least one Virtual Private Network (VPN) includes a terminal, and can include at least one Security Policy Database (SPD). The terminal...
US-1,037,5019 Methods for internet communication security
The present disclosure relates to network security software cooperatively configured on plural nodes to authenticate and authorize devices, applications, users,...
US-1,037,4991 Approach for sharing electronic documents during electronic meetings
An approach is provided for sharing electronic documents during electronic meetings. Client devices of meeting participants are configured with a file sharing...
US-1,037,4983 Systems and methods for controlling secure persistent electronic communication account servicing with an...
The disclosed technology includes systems and methods for controlling enrollment and secure persistent SMS texting account servicing communications. A method is...
US-1,037,3481 Systems and methods for presenting security questions via connected security system
The various implementations described herein include methods, devices and systems for detecting trigger events and executing security protocols. In one aspect,...
US-1,037,3458 Automatic threat detection based on video frame delta information in compressed video streams
Apparatus and associated methods relate to identifying objects of interest and detecting motion to automatically detect a security threat as a function of video...
US-1,037,3413 Wearable security apparatus
A security system comprises a wearable security apparatus having an electronic display and a storage device that stores data regarding a wearer and a receiver...
US-1,037,3412 System and method for controlling access to an access point
A security system comprises a positioning unit that determines locations of user devices relative to a threshold of the access point, a surveillance camera that...
US-1,037,3149 Secure data entry using a card reader with minimal display and input capabilities having a display
A card reader comprising a display configured to optionally graphically display a character; one or more sensors configured to receive user input, wherein the...
US-1,037,3135 System and method for performing secure online banking transactions
A method and system is provided for performing secure online banking transactions. An example method includes: collecting data related to at least one...
US-1,037,2947 Parsing, processing, and/or securing stream buffers
Described are examples for securely storing stream data received from a stream source. Stream data can be received from the stream source for storing in one or...
US-1,037,2932 Secure factory data generation and restoration
In various embodiments, methods, devices and systems for securely generating, sealing, and restoring factory-generated calibration and provisioning data for an...
US-1,037,2931 Cloud security platform
A data security system, including a security manager remotely controlling, via a network application programming interface, a cloud-based service that performs...
US-1,037,2924 Master device for controlling application security environments
Computer protection is weak with the methods currently available and there are risks of malicious users getting access to computers, corrupting important data,...
US-1,037,2922 Provisioning of a shippable storage device and ingesting data from the shippable storage device
When a client requests a data import job, a remote storage service provider provisions a shippable storage device that will be used to transfer client data from...
US-1,037,2893 Sensor-based authentication
Embodiments of the present disclosure relate to a new approach for sensor-based authentication to enhance mobile security. In the computer-implemented method,...
US-1,037,2873 System and method for documenting patient procedures
The local surveillance sub-system recognizes that a patient medical procedure has or will soon commence by sensing the presence of a healthcare professional in...
US-1,037,2733 Systems and methods for secure storage of user information in a user profile
Systems and methods are provided for securely storing information of a user in a user profile to prevent access to the information and minimize the amount of...
US-1,037,2628 Cross-domain security in cryptographically partitioned cloud
Solutions for secure memory access in a computing platform, include a multi-key encryption (MKE) engine as part of the memory interface between processor...
US-1,037,2626 System-on-chips and operation methods thereof
A system-on-chip includes a magnetic random access memory and a security interface. The magnetic random access memory includes a plurality of memory areas, each...
US-1,037,2625 Secure memory
Various examples are directed to systems and methods for securing a data storage device. A storage controller may receive a read request directed to the data...
US-1,037,2460 System and method for baseboard management controller assisted dynamic early host video on systems with a...
An information handling system includes a data processor, a security co-processor, and a baseboard management controller (BMC). The security co-processor...
US-1,037,2383 Providing secure access to data in mobile devices
Embodiments of the present disclosure provide a method, system and computer program product for providing a secure access to data in mobile devices by acquiring...
US-1,037,2357 Securely recovering stored data in a dispersed storage network
A method for execution by a dispersed storage and task (DST) execution unit that includes a processor includes receiving a slice pre-image request from a...
US-1,037,0872 Exit device systems and methods
An exit device according to one embodiment includes a plurality of sensors and an electronic dogging mechanism. The exit device is configured to locally analyze...
US-1,036,8383 Apparatus and method for providing multiple connections using different radio access technology in wireless...
The present disclosure relates to a communication method and system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data...
US-1,036,8238 Device and method of handling data transmission/reception for dual connectivity
A communication device for handling data transmission/reception for dual connectivity comprises a storage unit for storing instructions of connecting to a first...
US-1,036,8212 Method and apparatus for providing augmented reality services
The present disclosure relates to a communication technique and system for combining 5G communication systems with IoT technologies to achieve a higher data...
US-1,036,7986 Feedback for a privacy indicator on a security camera
Features are disclosed for a security camera including automated identification of disabled privacy indicators based on feedback included in monitored data...
US-1,036,7906 Method and apparatus for secure content delivery from a telecommunication network cache
According to one aspect, the teachings herein disclose a method and apparatus for a providing content over a secure connection to a subscriber device, where the...
US-1,036,7905 Integration framework and user interface for embedding transfer services into applications
Techniques are disclosed for providing secure transaction functionality embedded into host applications executing on transaction client devices, using an...
US-1,036,7903 Security systems for mitigating attacks from a headless browser executing on a client computer
Computer systems and methods in various embodiments are configured for improving the security and efficiency of server computers interacting through an...
US-1,036,7882 Offline content distribution networks
Approaches, techniques, and mechanisms are disclosed for the secure distribution of media content to devices having minimal or no Internet connectivity....
US-1,036,7844 Systems and methods of network security and threat management
The present disclosure generally provides systems and methods of network security and threat management. An exemplary system includes detection and prevention...
US-1,036,7843 Securing a network
Methods and systems for visualizing, analyzing, archiving and securing computer and internet of things (IoT) data networks are disclosed. The system includes a...
US-1,036,7840 Technologies for secure personalization of a security monitoring virtual network function
Technologies for secure personalization of a security monitoring virtual network function (VNF) in a network functions virtualization (NFV) architecture include...
US-1,036,7837 Optimizing security analyses in SaaS environments
Embodiments of the present invention provide systems and methods for performing a security analysis on a set of observables by inferring malicious...
US-1,036,7832 Reactive virtual security appliances
Methods and systems for monitoring network activity. Various embodiments may deploy virtual security appliances to a certain location or with a specific...
US-1,036,7828 Action response framework for data security incidents
An incident manager application (IM) for responding to data security incidents in enterprise networks is disclosed. An IM tracks the incidents in an enterprise...
US-1,036,7824 Policy management, enforcement, and audit for data security
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing, and enforcing policies on data security. A policy...
US-1,036,7821 Data driven role based security
Aspects extend to methods, systems, and computer program products for controlling performance of a requested user operation. It is determined if a requested...
US-1,036,7815 Protecting sensitive information from a secure data store
In embodiments of the present invention improved capabilities are described for the steps of receiving an indication that a computer facility has access to a...
US-1,036,7811 Methods for internet communication security
The present disclosure relates to network security software cooperatively configured on plural nodes to authenticate and authorize devices, applications, users,...
US-1,036,7800 Local data aggregation repository
Apparatuses, systems, methods, and computer program products are disclosed for a local repository of aggregated data. A hardware device comprises a local...
US-1,036,7795 Vehicle wireless internet security
Methods, systems, and computer program products for vehicle wireless internet security are provided. A connection request is received from a mobile device. A...
US-1,036,7794 Method and apparatus for securing a sensor or device
One embodiment of this invention describes a method and apparatus for the secure identification and validation of low complexity sensors or devices on a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.