Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,045,1413 Surface topography apparatus and method
An optical method for determining an orientation of surface texture of a mechanical part includes: i) acquiring data for a first areal surface topography image...
US-1,044,8409 Channel allocation device and method in wireless communication system
The present disclosure relates to a communication method and system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data...
US-1,044,7971 System for continuously monitoring movements in general
A system for continuous monitoring in general, preferably for use in surveillance, which includes three electronic units operationally linked to one another,...
US-1,044,7819 Apparatus, method and system for a tunneling client access point
The disclosure details the implementation of a tunneling client access point (TCAP) that is a highly secure, portable, power efficient storage and data...
US-1,044,7719 Security breach reporting and incident management system
A breach reporting and incident management (BRIM) system and method are disclosed. The system and method include a network hardware and software platform...
US-1,044,7716 Systems and methods for processing hypervisor-generated event data
Systems, methods, and apparatuses enable a network security system to more efficiently process and respond to events generated by hypervisors and other...
US-1,044,7697 Data leakage and information security using access control
A system that includes a first network device in a first network configured to send a file from a plurality of files to a compliance controller in the first...
US-1,044,7688 System for secure communications
A system and method provides security features for inter-computer communications. A user identifier of the user that cannot be used to log the user in to a data...
US-1,044,7681 Secure asymmetric key application data sharing
To establish a sign on session among single sign on (SSO)-enabled applications, a user can be prompted by an application for an access code. An access interval...
US-1,044,7676 Securing application programming interfaces (APIS) through infrastructure virtualization
Methods and systems for the secure exchange of data within a network are provided. A method includes, registering, by a computer system, one or more stubs...
US-1,044,7672 Facilitating encrypted persistent storage in browsers
Disclosed are some implementations of systems, apparatus, methods and computer program products for encrypting and securely storing session data during a...
US-1,044,7665 IPv6 link local secure network with biometric security to secure IOT devices
A method, a computer program product, and a multi-function peripheral are disclosed, which secures a device using a link local network for transmission of data....
US-1,044,7657 Method and apparatus for transmitting and receiving secure and non-secure data
A communications system, and a method suitable for use therein, are described which are suitable for transmitting and receiving both secure and non-secure data....
US-1,044,7655 Method for controlling transmission security of industrial communications flow based on SDN architecture
The present invention discloses a method for controlling transmission security of an industrial communication flow based on an SDN architecture. The method...
US-1,044,7560 Data leakage protection in cloud applications
A computer-implemented method for data leakage protection is disclosed. A monitoring template corresponding to the cloud application is selected based upon...
US-1,044,7484 Multi-user strong authentication token
Apparatus, methods and systems to secure remotely accessible applications using authentication devices are disclosed. More in particular apparatus, methods and...
US-1,044,7483 Secure firmware updates for remote vehicles
Systems and methods of secure firmware updates on remote vehicles are provided. The system receives a request from a vehicle for an update to vehicle firmware,...
US-1,044,7474 Dispersed data storage system data decoding and decryption
A computing system retrieves securely stored encrypted and encoded data from a dispersed data storage system. The computing system includes a processing module...
US-1,044,7472 Block computing for information silo
Systems and method for applying security measures to data sets requiring external quantum-level processing. Specifically, segmenting a data set into a plurality...
US-1,044,7470 Secure and disruption-tolerant communications for unmanned underwater vehicles
An underwater communications system includes a network communication interface, one or more computer processors, and a memory containing computer program code...
US-1,044,6268 Systems and methods for maintaining and processing proprietary or sensitive data in a cloud-hybrid application...
Systems, methods, and apparatuses for maintaining and processing proprietary or sensitive data using an application implemented in a split/hybrid-cloud system...
US-1,044,6252 Data storage device and method for data error management
A data storage device with high security is disclosed. A nonvolatile memory provides a storage space divided into a plurality of first-level cells. The...
US-1,044,5968 Method for verifying a security device comprising a signature
A method for verifying a security device including an image having a signature. The method may include operations for acquiring the image in order to obtain a...
US-1,044,5769 Systems and methods for audience measurement
To provide secure single-source panel audience measurement data while providing confidentiality and security of panel membership, an audience measurement server...
US-1,044,5746 Method for checking compliance of payment application in virtualized environment
The invention provides a compliance detecting method of payment applications in a virtualized environment, and pertains to the field of security technology of...
US-1,044,5740 Computer implemented systems and methods for fraud prevention in data transactions across disparate computing...
In one embodiment, a local computer network includes profile information local identifications for multiple organizations. Remote profile information is stored...
US-1,044,5736 Wallet management system
Provided are a system and method for managing digital wallets and thereby preventing unauthorized transactions. An exemplary method includes receiving a...
US-1,044,5728 Computer implemented systems and methods for secure data transactions across disparate computing networks
In one embodiment, a local computer network includes profile information local identifications for multiple organizations. Remote profile information is stored...
US-1,044,5722 Systems and methods for enabling secure transactions with mobile devices
Techniques for enabling transactions using mobile devices are described herein. A mobile device is configured to wirelessly receive from a provider of products...
US-1,044,5721 Method and system for data security utilizing user behavior and device identification
Systems and methods are provided for detecting the likelihood that a transaction is fraudulent using user access pattern data and device fingerprint data. One...
US-1,044,5692 Monitoring device and method of operating a monitoring device to transmit data
A monitoring device and a method of operating the monitoring device are disclosed. The monitoring device includes a first substrate adapted to be secured to a...
US-1,044,5629 Secure QR code service
Methods and apparatus for generating a secure QR code. In an embodiment, a directory service computer receives a secure QR code request from a merchant device...
US-1,044,5556 Optical system for biometric identification of a user
The present disclosure relates to the field of biometric identification of a user, in particular, to a system and method of identifying a user. The method of...
US-1,044,5524 Compromise free cloud data encryption and security
A cloud data encryption and security system includes a central computing authority and a network of computing devices. At least some of the computing devices...
US-1,044,5484 Enabling access to data
Systems, methods and apparatus for enabling access to secure data. A first module is arranged to generate a limited use passcode and make the passcode available...
US-1,044,5311 Anomaly detection
Analyzing log data, such as security log data and machine data, is disclosed. A baseline is built for a set of machine data. The baseline is built at least in...
US-1,044,5263 Carrier board with removable memory module power fail protection
A carrier board for use with a host computing system includes bus connectors for one or more removable memory modules. The carrier board includes energy storage...
US-1,044,5179 Securely storing data in a dispersed storage network
Methods and systems for changing dispersed storage error encoding parameters of sets of encoded data slices relating to portions of a data file involve...
US-1,044,5107 Security design for a wake up frame
Methods and systems for waking up an electronic device having a wake-up receiver circuit. A signal is transmitted, carrying a wake-up frame (WUF) including a...
US-1,044,2183 Method for configuring a dryer device in a security printing press, and a security printing press
A method is provided for configuring a drying device in a printing machine, in particular in a value document printing machine. The printing machine has at...
US-1,044,0565 System and method of counter management and security key update for device-to-device group communication
A system and a method of counter management and security key update for device-to-device (D2D) communication are provided. The method includes creating by a...
US-1,044,0123 Method and system for secure bidirection communication for industrial devices
A method and system for establishing bidirectional remote communication between a Remote Service Portal and a plurality of drives is described. The method and...
US-1,044,0056 Method for deploying an application in a secure element
Method for deploying an authentication application in a secure element of a communication terminal comprising a non-secure processing unit executing a program...
US-1,044,0047 Systems and methods for mapping internet protocol addresses for an organization
The disclosed computer-implemented method for mapping Internet Protocol addresses for an organization may include (1) receiving information for an organization...
US-1,044,0042 Domain feature classification and autonomous system vulnerability scanning
In an embodiment, a data processing method providing an improvement in computer security, comprises selecting, from a domain name queue comprising a plurality...
US-1,044,0039 Delayed replication for protection of replicated databases
Apparatuses and methods are disclosed for protection of data servers configured for data replication of a database. As an example, one apparatus includes at...
US-1,044,0017 Secure health data storage and transaction system
Embodiments of the invention are directed to a system, method, or computer program product for a transaction apparatus for secure data storage and consolidation...
US-1,044,0014 Portable secure access module
Examining virtualized credentials of a holder includes verifying authenticity of a device of a relying party using a verifying device secret that is provided in...
US-1,044,0000 Secure data provisioning
A first instruction to store an entity identification (ID) in a memory of a device may be received. The entity ID may be stored in the memory in response to...
US-1,043,9999 Point-to-point secure data store and communication system and method
A method for encryption of a private media package by a first processing device which includes at least three key components of a regret management flag, a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.