Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,042,3912 Systems and/or methods for providing enhanced control over and visibility into workflows where potentially...
Certain example embodiments relate to systems and/or methods for providing enhanced control over potentially sensitive data sharable among and/or between...
US-1,042,3909 Method and system for managing business deals
In accordance with embodiments, there are provided mechanisms and methods for managing business deals. The mechanisms and methods for managing business deals...
US-1,042,3806 Secure multiparty computation on spreadsheets
Systems, computer-readable media and methods for enabling secure computation on spreadsheet software. A secure spreadsheet is implemented as an add-in to an...
US-1,042,3804 Cryptographic separation of users
Techniques are disclosed relating to securely storing data in a computing device. In one embodiment, a computing device includes a secure circuit configured to...
US-1,042,3802 Establishing data security over an internet of things (IoT) network
Embodiments of the present disclosure provide a technique for establishing data security over an Internet of Things (IoT) network. According to an embodiment, a...
US-1,042,3801 Data bookmark distribution
Computer systems and methods are provided for distributing a data bookmark. An interface of a device that is secured in a private network receives a scope...
US-1,042,3800 Secure intelligent networked architecture, processing and execution
Provided are exemplary systems and methods for secure intelligent networked architecture, processing and execution. Exemplary embodiments include an intelligent...
US-1,042,3799 Methods and apparatus for scalable metrics gathering from secure data centers
A method for integrating a new secure datacenter into a data storage network is provided. The method detects, by an accessible datacenter connected to the data...
US-1,042,3783 Methods and apparatus to recover a processor state during a system failure or security event
Methods and apparatus to recover a processor state during a system failure or security event are disclosed. An example apparatus to recover data includes a...
US-1,042,3774 System and method for establishing secure communication channels between virtual machines
Disclosed are systems and methods for establishing secure communication between virtual machines, and, more particularly, to a system and method for...
US-1,042,3755 System and method for motor control center configuration
Motor control centers are designed and configured by a series of interface screens that are served to a configuration computer. The system configuration may be...
US-1,042,3478 Security enhanced out of process user space handling of hardware events
Systems and methods that enable user space processing threads to handle hardware events (e.g., page faults) for another processing thread in a security-enhanced...
US-1,042,3309 Device integration framework
Systems, devices, and methods for managing a security system are described. A method may comprise receiving a request to join a security system by a user...
US-1,042,3137 SCADA sensor gateway
Devices that transfer and communicate tap dial position changes to a remote location are bulky, cost prohibitive, and electronically noisy. A method and device...
US-1,042,2919 X-ray inspection system that integrates manifest data with imaging/detection processing
The present specification discloses systems and methods for integrating manifest data for cargo and light vehicles with their X-ray images generated during...
US-1,042,0139 Uplink scheduling for license assisted access
Uplink scheduling for license assisted access (LAA) mode systems is discussed in which a base station transmits a conditional grant to served user equipments...
US-1,041,9980 Method and apparatus for managing session to change a user plane function in a wireless communication system
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-1,041,9973 Structure of MAC sub-header for supporting next generation mobile communication system and method and apparatus...
A communication technique of fusing a fifth generation (5G) communication system for supporting higher data transmission rate beyond a fourth generation (4G)...
US-1,041,9931 Security for network computing environment using centralized security system
Systems, methods, and articles of manufacture comprising processor-readable storage media are provided for implementing security for a network environment using...
US-1,041,9907 Proximity application discovery and provisioning
Methods, non-transitory processor-readable storage media, systems, and devices for provisioning devices associated with wireless identity transmitters. An...
US-1,041,9529 Hybrid applications utilizing distributed models and views apparatuses, methods and systems
The HYBRID APPLICATIONS UTILIZING DISTRIBUTED MODELS AND VIEWS APPARATUSES, METHODS AND SYSTEMS ("HAP") transform hybrid application user inputs using HAP...
US-1,041,9494 Managing the collection of forensic data from endpoint devices
Techniques and mechanisms are disclosed enabling efficient collection of forensic data from client devices, also referred to herein as endpoint devices, of a...
US-1,041,9491 System and method for monitoring computing servers for possible unauthorized access
A system is provided that includes one or more computing servers and a processing circuit for analyzing data transactions of the computing servers. Each of the...
US-1,041,9488 Delegating security policy management authority to managed accounts
A system may delegate authority to manage aspects of a security policy developed by administrative personnel to standard users (e.g. non-administrative...
US-1,041,9486 Enhancing enterprise security on mobile platforms
Systems and methods for managing and implementing secure runtime software hooking on devices are provided. The system and method disclosed includes components...
US-1,041,9484 System and method for communicating with security devices within secure networks
A system and method for diagnosing and/or configuring a security device included within a secure network is disclosed. A technician mobile computing device...
US-1,041,9481 Methods and systems for overlapping protection domain in network devices
Methods and systems for securing data are provided. For example, one method includes receiving at an adapter, data with a first type of error protection code...
US-1,041,9478 Identifying malicious messages based on received message data of the sender
Systems and methods for providing an improvement to computer security relating to electronic digital messages are provided. In an embodiment, a computing device...
US-1,041,9471 Securing a network
Methods and systems for visualizing, analyzing, archiving and securing computer and internet of things (IoT) data networks are disclosed. The system includes a...
US-1,041,9467 System, method, and apparatus for data loss prevention
Disclosed is a computer security device configured to monitor data traffic between computing devices on a local area network and an external network in order to...
US-1,041,9465 Data retrieval in security anomaly detection platform with shared model state between real-time and batch paths
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,041,9463 Event specific entity relationship discovery in data intake stage of a distributed data processing system
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,041,9462 Event information access interface in data intake stage of a distributed data processing system
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,041,9459 System and method for providing data and device security between external and host devices
A secure data exchange system comprising a security device including a first external device plug, and a security engine operative to enforce a security policy...
US-1,041,9455 Cyber-security presence monitoring and assessment
Methods, computer-readable media, software, and apparatuses may monitor consumer information in order to determine a probability of a data breach associated...
US-1,041,9450 Detection of anomalies, threat indicators, and threats to network security
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,041,9411 Network-visitability detection
A state of visitability of a network interface can be determined by transmitting, via a network interface, a security request including data of a trigger. The...
US-1,041,9409 Method and apparatus for secure network communications
Methods and apparatuses are disclosed for secure network communications. An exemplary method may include sending a handshake request message to a server. The...
US-1,041,9408 In-place authentication scheme for securing intra-vehicle communication
In some implementations, a scheme for data communication in an automobile includes generating a cleartext message to be transmitted to a second ECU, generating...
US-1,041,9405 Systems and devices for encrypting, converting and interacting with medical images
A network device and a peripheral device for attachment with a medical imaging device provides for the encryption and conversion of a medical image into a...
US-1,041,9404 Enabling comparable data access control for lightweight mobile devices in clouds
A new efficient framework based on a Constant-size Ciphertext Policy Comparative Attribute-Based Encryption (CCP-CABE) approach. CCP-CABE assists lightweight...
US-1,041,9402 Addressing a trusted execution environment using signing key
Methods, systems, and devices are described herein for delivering protected data to a nested trusted execution environment (TrEE) associated with an untrusted...
US-1,041,9401 Methods and systems for securing data in the public cloud
Computer implemented systems and methods are provided for securing data. In some embodiments, a system for securing data may comprise one or more processors...
US-1,041,9396 Deep packet inspection with enhanced data packet analyzers
Examples provide a deep packet inspection for performing security operations on network data packets by a plurality of enhanced packet analyzers. A copy of a...
US-1,041,9394 Providing scalable cloud-based security services
The disclosed embodiments disclose techniques for providing a cloud-based security service. During operation, a dispatcher virtual machine (VM) executing in a...
US-1,041,9345 Network named fragments in a content centric network
A system facilitates efficient and secure transportation of content. An intermediate node receives a packet that corresponds to a fragment of a content object...
US-1,041,9221 Systems and methods for privacy-enabled biometric processing
In one embodiment, a set of feature vectors can be derived from any biometric data, and then using a deep neural network ("DNN") on those one-way homomorphic...
US-1,041,9212 Methods, systems, apparatuses, and devices for securing network communications using multiple security protocols
The disclosed embodiments describe a data exchange method, apparatus, and device. In one embodiment, the method is applied to a sender device performing data...
US-1,041,9087 Apparatus and method for transmitting and receiving phase compensation reference signal
A method and system for converging a 5th-generation (5G) communication system for supporting higher data rates beyond a 4th-generation (4G) system with a...
US-1,041,9021 Systems and methods of data compression
The transmission of broadcast data, such as financial data and news feeds, is accelerated over a communication channel using data compression and decompression...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.