Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,026,2163 Cryptographic ASIC with unique internal identifier
A cryptographic ASIC and method for autonomously storing a unique internal identifier into a one-time programmable memory in isolation by a foundry. The...
US-1,026,2156 Real-time feature level software security
Systems and techniques for real-time feature level software security are described herein. A request may be received from a computing device for data from the...
US-1,026,2146 Application-to-application messaging over an insecure application programming interface
Disclosed are various approaches for a secure communication session between applications installed on a client device. The secure communication session can be...
US-1,026,2141 Secure processor with resistance to external monitoring attacks
A computing device includes a secure storage hardware to store a secret value and processing hardware comprising at least one of a cache or a memory. During a...
US-1,026,2128 Tokenized data security
Various devices, methods, systems, and computer readable storage are provided for tokenizing data. In some examples, credit card numbers are tokenized using a...
US-1,026,2127 Systems and method for securely sharing and executing data and models
A simulation computer device for securely executing a model includes at least one processor in communication with at least one memory device. The simulation...
US-1,026,1943 Securely moving data across boundaries
Data to be moved from a source system to a target system, for a set of tenants, is first identified. The data is enumerated by a first computing instance in the...
US-1,026,1794 Techniques for metadata processing
Techniques are described for metadata processing that can be used to encode an arbitrary number of security policies for code running on a processor. Metadata...
US-1,026,1782 Software container registry service
A request to store, in first data store associated with a customer of a computing resource service provider, a software image is received, the request including...
US-1,026,1739 System for capturing and outputting digital content over a network that includes the internet
An output system for capturing and outputting digital content is herein disclosed and enabled. The output system includes an information apparatus (e.g., a...
US-1,026,1528 Wireless thermostat and system
A secure wireless thermostat and system comprising the thermostat are described and taught. The temperature control unit replaces the traditional thermostat by...
US-1,025,9468 Active vehicle performance tuning based on driver behavior
The driver's driving behavior will be recorded and a signature will be created either on vehicle or on a cloud data center. The driver signature can be accessed...
US-1,025,9427 Vehicle security system using sensor data
A method and system for monitoring a vehicle for security. The method includes determining when a trigger event occurs to the vehicle based on a first input...
US-1,025,9253 Flexible band
A flexible band configured to be connected to a data page and to a booklet, wherein the flexible band extends along a main direction and includes an upper side...
US-1,025,9116 Robot system
A robot system includes: a recognition means that recognizes an operator in distance image data as a security surveillance target; an area setting means that...
US-1,025,8262 Sweat sensing device communication security and compliance
The invention addresses confounding difficulties involving continuous sweat analyte measurement. Specifically, the present invention provides: at least one...
US-1,025,8172 Systems and methods for acquiring data from articles of merchandise on display
Embodiments of the present invention are directed to systems, devices, and methods for displaying and securing articles of merchandise. In one example, a...
US-1,025,7785 Device and method for controlling standby power of mobile terminal
Disclosed are: a communication technique combining, with IoT technology, a 5G communication system for supporting a data transmission rate higher than that of a...
US-1,025,7748 Structure of MAC sub-header for supporting next generation mobile communication system and method and apparatus...
A communication technique of fusing a fifth generation (5G) communication system for supporting higher data transmission rate beyond a fourth generation (4G)...
US-1,025,7747 Structure of MAC sub-header for supporting next generation mobile communication system and method and apparatus...
A communication technique of fusing a fifth generation (5G) communication system for supporting higher data transmission rate beyond a fourth generation (4G)...
US-1,025,7698 Method and apparatus for managing security key in a near field D2D communication system
The present disclosure relates to a pre-5th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond 4th-Generation...
US-1,025,7680 Methods and systems for purchasing, sharing and transferring ownership of digital music using authenticated...
Methods for securely purchasing, sharing and transferring music files using NFC technology. Method of sharing a music playlist using near field communication...
US-1,025,7669 PTX data analytic engine notifying group list of detected risk event
A method of operating a push-to-anything (PTX) platform includes receiving, by a data analytics engine (DAE) of the PTX platform, a first input signal from a...
US-1,025,7474 Network configurations for integrated accessory control
An integrated accessory control system can efficiently set up a new media streaming session with one or more accessories. A session identifier for the new...
US-1,025,7434 Multiview body camera system with environmental sensors and alert features
A multiview body camera system comprising a vest, a helmet, shoulder pads, camera units providing video, directional microphones providing audio, sensors...
US-1,025,7340 Confidentiality-smart voice delivery of text-based incoming messages
Methods, computer program products, and systems are presented. The methods include, for instance: a voice delivery application, running on a mobile device of a...
US-1,025,7315 Secure proxied data retrieval from third-party services
In one embodiment, a social networking system transmits a client proxy application to a client device in order to export data from a third-party site that has...
US-1,025,7227 Computer security threat correlation
A computer security threat sharing technology is described. An example method may include receiving security threat information transmitted over a computing...
US-1,025,7216 Method and system for obtaining and analyzing forensic data in a distributed computer infrastructure
A system for obtaining and analyzing forensic data in a distributed computer infrastructure. The system includes a plurality of computing devices and at least...
US-1,025,7215 Identifying and disabling a rogue access point in a public wireless environment
A system for identifying a wireless security threat on a vehicle. The system includes a broadband controller including a data processor and memory in which the...
US-1,025,7190 Wi-fi enabled credential enrollment reader and credential management system for access control
A method according to one embodiment includes reading a unique credential identifier of a passive credential device, transmitting the unique credential...
US-1,025,7189 Using hardware based secure isolated region to prevent piracy and cheating on electronic devices
System and methods for using secure isolated technology to prevent piracy and cheating on electronic devices. In some examples, an electronic device can use...
US-1,025,7174 Methods and systems for providing secure and auditable transfer of encrypted data between remote locations
Methods and systems for directly and securely transferring encrypted medical data between two remote locations, such as an imaging site and a diagnostic site,...
US-1,025,7172 Risk-based encryption of communication on a computer system node
A streams manager assesses the security risk of streams communication and when possible turns off encryption of intranode communication between operators of a...
US-1,025,7169 Methods and systems of data security in browser storage
Mechanisms and methods are provided for managing OAuth access in a database network system, and extending the OAuth flow of authentication to securely store the...
US-1,025,7168 System and method for securing telecommunications traffic data
A method and system are provided for securing telecommunications traffic data. A method is provided for transmitting messages via a telecommunications network...
US-1,025,7163 Secured process control communications
Securing communications from a process plant to a remote system includes a data diode disposed therebetween that allows data to egress from the plant but...
US-1,025,7141 System and method for delivering inline interactive objects encapsulated in a message
A system and method for delivering text, media, and inline interactive data (called message content) encapsulated in a message-based conversation has been...
US-1,025,7124 Systems and methods for controlling enrollment and secure persistent electronic communication account servicing...
The disclosed technology includes systems and methods for controlling enrollment and secure persistent SMS texting account servicing communications. A method is...
US-1,025,6981 Secure logging for host security module
Embodiments include method, systems and computer program products for secure logging of host security module. In some embodiments, an event may be received. The...
US-1,025,6970 Secure data transformations
A system for performing a secure sequence of transformations of a data value, using encrypted representations of the data value is disclosed. The system...
US-1,025,6928 Method and apparatus for controlling operation based on distance between transmission device and reception device
A pre-5.sup.th-Generation (5G) or 5G communication system is provided for supporting higher data rates Beyond 4.sup.th-Generation (4G) communication system such...
US-1,025,5792 Security monitoring and control
Systems, methods, and software for monitoring and controlling a security system for a structure are provided herein. An exemplary method may include receiving...
US-1,025,5742 Method for providing measurement data of a device for processing security documents and security-document...
Described is a method for providing measurement data for value documents to a specified purpose of use employing a value-document processing device which has a...
US-1,025,5738 Authentication based on through-body signals detected in body area networks
Techniques are described for user authentication based on a signal that is transmitted through an individual's body, and detected using device(s) in physical...
US-1,025,5537 Dynamic authentication system and methods for use with legacy terminals
In one embodiment, the present invention provides a method and communication device with an emulated mag stripe capability. Information is transmitted in the...
US-1,025,5474 Enrollment using synthetic fingerprint image and fingerprint sensing systems
A fingerprint sensing system. The fingerprint sensing system includes: at least one sensor; at least one display device; at least one application processor; and...
US-1,025,5463 Secure computer architecture
A secure computer architecture is provided. With this architecture, data is received, in a component of an integrated circuit chip implementing the secure...
US-1,025,5459 Privacy enabled runtime
Technical solutions are described for preventing unauthorized transmission of data by a communication apparatus. An example computer-implemented method includes...
US-1,025,5458 Trust based access to records via encrypted protocol communications with authentication system
Systems and techniques are disclosed for trust based access to records via encrypted protocol communications with an authentication system. An example system is...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.