Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,017,8177 Apparatus and method for using an internet of things edge secure gateway
A gateway is configured to perform a method that includes receiving data from a first device using a first protocol. The first protocol is a cloud based...
US-1,017,8134 Management apparatus and method for controlling management apparatus
A device management apparatus sets a first password required to reflect a security policy managed by the device management apparatus on a device or change the...
US-1,017,8129 Network security method and device
A network security method and a device relating to the field of network communication where the method includes, recording a correspondence between an Internet...
US-1,017,8121 Domain reputation evaluation process and method
A system for the identification and subsequent rating of domains based on a result derived from a proprietary algorithm configured to detect when a new domain...
US-1,017,8118 Data surveillance system
Data surveillance techniques are presented for the detection of security issues, especially of the kind where privileged data may be stolen by steganographic,...
US-1,017,8105 System for providing levels of security access to a process data network
Embodiments enable a system to determine, authorize, and adjust access, writing, retrieval, and validation rights of users and entities associated with one or...
US-1,017,8077 Preventing persistent storage of cryptographic information using signaling
Organizations maintain and generate large amounts of sensitive information using computer hardware resources and services of a service provider. Furthermore,...
US-1,017,8076 Cryptographic security functions based on anticipated changes in dynamic minutiae
Dynamic key cryptography validates mobile device users to cloud services by uniquely identifying the user's electronic device using a very wide range of...
US-1,017,8075 Client-side encryption with DRM
A technique for extending security to a data object (e.g., a document, a file, a message, etc.) once it has been shared and during collaboration with others who...
US-1,017,8070 Methods and systems for providing security to distributed microservices
Systems for providing security to distributed microservices are provided herein. In some embodiments, a system includes a plurality of microservices, each of...
US-1,017,8026 Flexible inline arrangements for guiding traffic through network tools
A packet broker deployed in a visibility fabric may intelligently assign identifiers to data packets that are routed through sequences of one or more network...
US-1,017,7963 Network visibility appliances for cloud computing architectures
With exponential growth in virtualized traffic within physical data centers, many end users (e.g., individuals and enterprises) have begun moving work processes...
US-1,017,7908 Secure storage decryption system
A system for secure retrieval of stored data includes an encrypted key database and a processor. The encrypted key database is configured to store an encrypted...
US-1,017,7837 Approaches for high speed global packet data services for LEO/MEO satellite systems
A satellite system comprises LEO satellites and MEO satellites, and a control plane protocol architecture. The PHY, MAC, MAC/RLC and RRC layers are optimized...
US-1,017,6882 Secure storage apparatus
In one embodiment, an apparatus includes a non-volatile memory, a one-time programmable (OTP) memory, and a processor operative to write data values to the...
US-1,017,6706 Using degree of confidence to prevent false security system alarms
A device and method for analyzing an event at a premises is provided. In one embodiment the device includes a processor and a memory configured to store...
US-1,017,6682 Constant infrared detection for security
A system and method for securing an edge zone in a space, while not restricting normal activities in the space, is provided. The system and method comprises an...
US-1,017,6541 Medical information navigation engine (MINE) system
A method of transacting medical information includes receiving medical information from a medical sources, identifying, mapping, and consolidating the received...
US-1,017,6418 System and apparatus for encrypted data collection using RFID cards
A secure smart card is described. The smart card can include a processor, a memory and a transceiver. The smart card can communicate with various terminals and...
US-1,017,6334 Data security using alternative encoding
A system and method for protecting text from unauthorized access. An original data set including a plurality of character code values is received, where each...
US-1,017,6329 Systems and methods for detecting unknown vulnerabilities in computing processes
The disclosed computer-implemented method for detecting unknown vulnerabilities in computing processes may include (1) monitoring a computing environment that...
US-1,017,6319 Maintaining secure clustered software with a container-based architecture
The subject matter of this specification can be implemented in, among other things, a method that includes receiving, by a processing device in a...
US-1,017,6317 Method and apparatus for managing super user password on smart mobile terminal
The present invention discloses a method and an apparatus for managing a super user password on a smart mobile terminal, wherein the method for managing the...
US-1,017,6310 System and method for privacy-enhanced data synchronization
A system, apparatus, method, and machine readable medium are described for establishing a trust circle between multiple devices. For example, one embodiment of...
US-1,017,6305 Method and system for secure distribution of selected content to be protected
The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related...
US-1,017,6122 Direct memory access authorization in a processing system
A processor employs a hardware encryption module in the memory access path between an input/out device and memory to cryptographically isolate secure...
US-1,017,5911 Image file distribution apparatus, image file recovery apparatus, image file distribution method, image file...
Provided are an image file distribution apparatus, an image file recovery apparatus, an image file distribution method, an image file recovery method, an image...
US-1,017,5771 Secured compact keyboard
A keyboard of a data entry device includes a printed circuit board, a spacer having a plurality of key-positioning locations, a plurality of keys, each key...
US-1,017,5215 Method and device for quantification of plant chlorophyll content
A system for measuring chlorophyll concentration in a leaf sample includes a leaf-holding illuminator device with a main body containing a power source, a...
US-1,017,3773 Systems and methods for operating drones in response to an incident
A response system may be provided. The response system may include a security system and an autonomous drone. The security system includes a security sensor and...
US-1,017,3130 Information processing system, extended input device, and information processing method
In a state where an extended input device is secured to a data transmission device, an image capturing unit of the data transmission device captures an image of...
US-1,017,2153 Method and apparatus for scheduling uplink data in mobile communication system
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-1,017,2003 Communication security processing method, and apparatus
The present invention provides a communication security processing method and an apparatus. The communication security processing method includes: determining,...
US-1,017,2000 Method and system for managing security keys for user and M2M devices in a wireless communication network...
Pre Shared Keys ("PSK") for application and data session security are generated using application authentication secret values stored in a SIM device/card. The...
US-1,017,1540 Method and apparatus for streaming video security
A streaming video security device is provided that comprises an input LAN interface, at least one streaming video decoder, an output LAN interface, at least one...
US-1,017,1537 Segregation of electronic personal health information
A dynamic secure mobile network is provided to enable the transfer and storage of private data. The dynamic secure mobile network can provide secured...
US-1,017,1532 Methods and systems for detection and classification of multimedia content in secured transactions
An apparatus is provided for detecting the presence of multimedia content in one or more transactions and for classifying the multimedia content in the one or...
US-1,017,1505 Preventative enterprise change management
Embodiments for implementing change control management in computing center environments by a processor. A physical activity of a user performing an action in...
US-1,017,1499 Zone-based security architecture for intra-vehicular wireless communication
Systems and methods provide secure and wireless intra-vehicular communication. An intra-vehicular communication system has a secured network segment including a...
US-1,017,1498 Secure crypto module including electrical shorting security layers
A security matrix layer between a first and second conductive shorting layers are located within a printed circuit board (PCB) that carries out cryptographic...
US-1,017,1497 Systems and methods for detecting online fraud
Described systems and methods enable a swift and efficient detection of fraudulent Internet domains, i.e., domains used to host or distribute fraudulent...
US-1,017,1494 Scarecrow for data security
A method, computer program product and/or system receives information pertaining to network data traffic from and/or to a network accessible resource, analyzes...
US-1,017,1487 Generating a virtual database to test data security of a real database
Determining a data security risk level of a virtual database is provided. An object catalog corresponding to a real database is imported into the virtual...
US-1,017,1486 Security and authentication daisy chain analysis and warning system
An approach is disclosed that provides a security and authentication daisy chain analysis and warning system to a user. The approach monitors sets of user...
US-1,017,1480 Cloud-based surveillance with intelligent tamper protection
In one embodiment, a security system includes a central communication unit and a first surveillance device. The central communication unit is communicatively...
US-1,017,1463 Secure transport layer authentication of network traffic
Technologies are disclosed herein for transport layer network data authentication. A token packet is attached to network data sent from a client software...
US-1,017,1461 System and method of secure encryption for electronic data transfer
A system for secure transfer of encrypted data involves a sender client, a recipient client, a main server, and a key server. The sender client receives...
US-1,017,1460 Proximity-based system for automatic application or data access and item tracking
A system and method provide automatic access to applications or data. A portable physical device, referred to herein as a Personal Digital Key or "PDK", stores...
US-1,017,1455 Protection of application passwords using a secure proxy
Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server....
US-1,017,1450 Global time based authentication of client devices
A system for authenticating client devices for communication with one or more wireless communications networks, includes a client device configured to receive a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.