Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,043,2591 Establishing a communication event using secure signaling
A communication event is established between an initiating device and a responding device under the control of a remote communications controller. In a...
US-1,043,2590 Establishing a communication event using secure signalling
A communication event is established between an initiating device and a responding device under the control of a remote communications controller. In a...
US-1,043,2586 Technologies for high-performance network fabric security
Technologies for fabric security include one or more managed network devices coupled to one or more computing nodes via high-speed fabric links. A managed...
US-1,043,2585 Autonomous decentralization of centralized stateful security services with systematic tamper resistance
In an embodiment, a computer implemented method comprises, using a first server, detecting one or more changes to identity information that is stored in a first...
US-1,043,2404 Remote control of secure installations
Communication apparatus includes a one-way, hardware-actuated data relay, which includes a first hardware interface configured to receive a command from a...
US-1,043,2403 Secure communication between infusion pump and server
An infusion pump and server computer have improved network access security. The infusion pump has a network interface circuit to provide communications over a...
US-1,043,2401 Secure file sharing method and system
Systems and methods are provided for securely sharing data. A processor forms two or more shares of a data set encrypted with a symmetric key, the data set...
US-1,043,2291 Method and apparatus for managing user plane operation in wireless communication system
The present disclosure relates to a pre-5.sup.th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond...
US-1,043,2288 Method and apparatus for reporting channel state information in wireless communication system
A communication technique is provided for converging a 5.sup.th generation (5G) communication system for supporting higher data rates beyond a 4.sup.th...
US-1,043,1124 Self-destructive documents for information security and privacy protection
The inventor here discloses destructive (self-destructing) documents useful for the protection of confidential information. The invention comprises a document...
US-1,043,1063 RFID sales security system
Various switchable RFID devices are disclosed. These switchable RFID devices may include one or more RFID tags and one or more switches. Some of these one or...
US-1,043,1031 Remote electronic physical layer access control using an automated infrastructure management system
Systems and methods for physical layer access control are provided. In one embodiment, a method using an automated infrastructure management system comprising a...
US-1,043,0997 Method of managing proxy objects
A method of managing Proxy Objects by attaching Meta Data to each Proxy and HD Object. The Meta Data enables the user to programmatically swap one Proxy Object...
US-1,043,0882 Distributed data processing
A computer system includes a front end interface configured for data communications over a network with data producer terminals, multiple distributed data...
US-1,043,0875 Integration and enhancement of business systems with external services
A system integration tool integrates an external service to run in conjunction with or as part of a remote business accounting system. The system integration...
US-1,043,0701 Magnetic secure transmission device, electronic device and mobile system including the same
A magnetic secure transmission (MST) system includes a switching circuit, an inductor, and a control circuit. The control circuit is configured to control the...
US-1,043,0669 Methods, servers and systems for operating on security inspection data
A method, server and system for operating on security inspection data is disclosed. In one aspect, an example method performed by a server for operating on...
US-1,043,0604 Systems and methods for securing data in electronic communications
Systems and methods are provided for providing data security. Credit-related data provided by a credit database can be received. The credit-related data can...
US-1,043,0575 System and method for user enrollment in a secure biometric verification system
A computer-implemented method and system for verifying the identity of a user in an identity authentication and biometric verification system which includes...
US-1,043,0571 Trusted UI authenticated by biometric sensor
The security of a personal image in an apparently trusted UI is improved through the use of a fingerprint sensor hardwired to a Trusted Execution Environment....
US-1,043,0569 Multicomputer system for user data authentication and processing
Aspects of the disclosure relate to multicomputer processing and authentication of user data associated with telephone calls. A call security assessment...
US-1,043,0430 Computer relational database method and system having role based access control
A computer method, system and apparatus control access to secured data in a plurality of databases. A repository is coupled to the databases and has a security...
US-1,043,0350 Secure storage of data through a multifaceted security scheme
This disclosure is directed to a computing system that performs techniques relating to the secure storage, maintenance, and retrieval of data. Techniques...
US-1,043,0177 Method for updating a package
The invention is a method of updating a first executable code comprised in a first package in a secure element, a class instance being instantiated from said...
US-1,042,9804 Methods of integrating multiple management domains
An integrated solution strategy that integrates multiple domains together in a seamless and standardized way for increasing a users control over facilities and...
US-RE47,633 Systems/methods of conducting a financial transaction using a smartphone
Embodiments of inventive concepts are provided wherein a mobile device, such as a smartphone, may be configured to communicate with a base station, using a...
US-1,042,5869 Method and device for service continuity of terminal
Disclosed are: a communication method for incorporating an IoT technique with a 5G communication system for supporting a higher data transmission rate than that...
US-1,042,5794 System and method for secure pairing of bluetooth devices
A mobile device includes a Bluetooth transceiver, the Bluetooth transceiver being in an idle power state when not securely paired to a second Bluetooth...
US-1,042,5771 Real-time, location-aware mobile device data breach prevention
A cognitive security service receives, as input to a recurrent neural network, a matrix of regular locations and usage for a user at multiple times as reported...
US-1,042,5456 Request processing system using a splitting engine
A system includes a request processing system which enables the system to reduce request processing time, increase overall throughput of the system, while...
US-1,042,5447 Incident response bus for data security incidents
A system and method for responding to data security incidents in enterprise networks using an incident response bus (IR bus) within an incident management...
US-1,042,5442 Correlating forensic data collected from endpoint devices with other non-forensic data
Techniques and mechanisms are disclosed enabling efficient collection of forensic data from client devices, also referred to herein as endpoint devices, of a...
US-1,042,5438 Enriching compromised data using corporate and social network inferred content
Compromised enterprise data is enriched using inferred content from social networks and other public databases. Compromised enterprise data is enriched by...
US-1,042,5424 Systems and methods for integrated communications
A notification is received that a first user device and a second user device would like to share a data set. The data set is retrieved from a database. A first...
US-1,042,5413 Secure provisioning of devices for manufacturing and maintenance
Described herein are methods, apparatuses, and systems for secure provisioning of devices for manufacturing and maintenance. A method includes provisioning a...
US-1,042,5411 Systems and apparatuses for a secure mobile cloud framework for mobile computing and communication
Systems and apparatuses for a secure mobile cloud framework (referred to as MobiCloud) for mobile computing and communication are disclosed. Embodiments of...
US-1,042,5407 Secure transaction and access using insecure device
The present invention enables secure transactions or access using insecure endpoint devices, such as computers, tablets and smart-phones. These insecure devices...
US-1,042,5402 Cloud key directory for federating data exchanges
Embodiments are directed to securing data using attribute-based encryption. In an embodiment, a computer system encrypts a portion of data with an...
US-1,042,5388 Protecting sensitive data security
A method for protecting encrypted data may includes encrypting, by a client terminal, the sensitive data by using a key in response to receipt of the sensitive...
US-1,042,5386 Policy enforcement point for a multi-tenant identity and data security management cloud service
A system provides cloud-based identity and access management. The system receives a request by a web gate for an identity management service for reaching an...
US-1,042,5385 Dual motherboard configuration data transport appliance
A data transport computing device includes a housing, a drive bay framing assembly including an upper platform bracket and a lower platform bracket, a first...
US-1,042,5141 Method and device for transmitting reference signal in communication system
Disclosed is a communication scheme and a system therefor, the communication scheme for merging, with IoT technology, a 5G communication system for supporting a...
US-1,042,5103 Data processing device and data processing method
The present technology relates to a data processing device and a data processing method, which are capable of securing excellent communication quality in data...
US-1,042,4258 Liquid crystal display device and a method for driving thereof
A liquid crystal display (LCD) may be described. The LCD can include a source driver; data lines electrically connected to the source driver; switches;...
US-1,042,4172 End user protection against ATM keypad overlay
Methods, systems, and computer program products for data entry device security are provided. Aspects include receiving an indication of a user presence at a...
US-1,042,4142 Access control system bypass for audit and electronic safe locks
The disclosed system and method allows opening of a safe by either the safe's electronic lock, and/or by any on-site or remote access control systems. The...
US-1,042,4034 Systems and methods for protecting user identity within online content providing environments
A computer-implemented method for protecting user identity within online content providing environments uses a security content management system (CMS)...
US-1,042,3960 Hacker-resistant balance monitoring
Methods of and systems for securely monitoring a balance of a payment account include storing, in a first database, ledger data and storing, in a second...
US-1,042,3952 Encapsulated security tokens for electronic transactions
Functional data for use in one or more digital transactions are secured by using an encapsulated security token (EST). In certain embodiments, the EST is...
US-1,042,3912 Systems and/or methods for providing enhanced control over and visibility into workflows where potentially...
Certain example embodiments relate to systems and/or methods for providing enhanced control over potentially sensitive data sharable among and/or between...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.