Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,009,1186 Secure authenticated distance measurement
The invention relates to a method for a first communication device to perform authenticated distance measurement between the first communication device and a...
US-1,009,1170 Method and apparatus for distributing encryption and decryption processes between network devices
In one embodiment, a method includes establishing at a security device, a secure session for transmitting data between a client device and an end host,...
US-1,009,1157 Systems and methods for transmitting and displaying private message data via a text input application
The present disclosure relates to systems and methods for transmitting and displaying private messages securely using a mobile device. The mobile device...
US-1,009,1004 Large-scale simultaneous digital signature service system based on hash function and method thereof
Disclosed are a system and method of a large-scale simultaneous digital signature service based on a hash function. According to the system and method, the main...
US-1,009,0998 Multiple authority data security and access
A request to perform one or more operations using a second key that is inaccessible to a customer of a computing resource service provider is received from the...
US-1,008,9858 Security-focused network monitoring system
In some implementations, data from security monitoring devices of a facility is collected and analyzed within the facility and the results of the analysis is...
US-1,008,9842 Smart-home security system with keypad device resistant to anomalous treatment
Security keypad device for detecting tampering includes a keypad, a high power wireless module for communicating data via a local area network, a low power...
US-1,008,9803 Entry control system
An integrated security system which seamlessly assimilates with current generation logical security systems. The integrated security system incorporates a...
US-1,008,9627 Cryptographic authentication and identification method using real-time encryption
A method for securing data and safeguarding its origin, in which the data are transmitted from a customer device to a center in an encrypted manner using...
US-1,008,9621 Data support with tan-generator and display
The invention creates a data carrier, in particular chip card, in particular smart card, having a device for generating one-time passwords and having a display...
US-1,008,9606 System and method for trusted mobile device payment
This invention is related to secure payments using data codes displayed on a mobile device, for example a QR code displayed on a cell-phone. The invention...
US-1,008,9508 System and method of embedding a two dimensional code with concealed secure message
The present invention embodies a technique to embed a graphic representation and/or a concealed message such as but not limited to two dimensional codes such as...
US-1,008,9493 Decentralized token table generation
New tokenization tables are derived at intervals in order to increase the security of tokenized data that is transferred between two endpoints. Generation of...
US-1,008,9489 Transparent client application to arbitrate data storage between mutable and immutable data repositories
Provided is a process including: receiving a first write request from an application requesting to write data to a first remote database via a network;...
US-1,008,9484 Method and system for destroying sensitive enterprise data on portable devices
Systems and methods for destroying sensitive enterprise data on portable devices are provided. Such systems and methods may include providing a portable device...
US-1,008,9481 Securing recorded data
A method, executed by a computer, for recording data includes splitting a file into sequential extents, reordering the sequential extents into non-sequential...
US-1,008,9473 Software nomenclature system for security vulnerability management
Systems and methods for securing a computer system are described herein. The systems and methods, which are computer-implemented, involve receiving, by a...
US-1,008,9471 System and methods for secure firmware validation
An electronic device, such as a dynamic transaction card having an EMV chip, that acts as a TPM having a memory, an applet, and a cryptographic coprocessor...
US-1,008,9462 System and method for providing network security to mobile devices
A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected...
US-1,008,9449 System, method, and device for controlled access to a network
A device for controlling network access comprising a first transceiver configured in as open access point device, a second transceiver configured in client mode...
US-1,008,9448 System and method for program security protection
Systems and methods are provided for program security protection. An exemplary method for program security protection may comprise obtaining data packets...
US-1,008,9447 Instructions and logic to fork processes of secure enclaves and establish child enclaves in a secure enclave...
Instructions and logic fork processes and establish child enclaves in a secure enclave page cache (EPC). Instructions specify addresses for secure storage...
US-1,008,9438 Integrated system and method for the acquisition, processing and production of health care records and services
The highly secure method and system acquires, processes and produces health care (HC) data and service records from multiple local devices, notwithstanding...
US-1,008,9373 Wide-scale replication of similarly structured data
A service metadata replication system includes an ingester that scrapes or receives service data including metadata values for service objects from various...
US-1,008,9315 Systems, apparatus, and methods for accessing data from a database as a file
System, apparatus, and method are provided for accessing data from a database as a file. Data is organized more securely in database than a file system, but...
US-1,008,9246 Access files
Data security access and management may require a server dedicated to monitoring document access requests and enforcing rules and policies to limit access to...
US-1,008,9132 Methods and systems for providing a customized network
A method, system, and computer-readable medium for providing a secure computer network for the real time transfer of data are provided. The data is grouped and...
US-1,008,9116 Secure start system for an autonomous vehicle
A secure start system for an autonomous vehicle (AV) can include a compute stack and a communications router. The communications router can include an encrypted...
US-1,008,8841 Robotic assistance in security monitoring
Methods, systems, and apparatus, including computer programs encoded on storage devices, for monitoring, security, and surveillance of a property. In one...
US-1,008,8408 Friction coefficient measuring method of surface of specimen
A method of measuring a friction coefficient of a surface of a specimen includes: obtaining surface information of the specimen by using an atomic force...
US-1,008,6566 Apparatus for production of three-dimensional objects by stereolithography
A system for making three dimensional objects. The system may have a frame, a build platform movably coupled to the frame, a vat removably secured so that the...
US-1,008,6260 Method and apparatus for using upstream communication in a card shuffler
A security system for a casino table card game has a casino table with i) indicia thereon for the placement of wagers, ii) a data entry system with an...
US-1,008,5235 Method and system for datacasting and content management
A method and system for datacasting and content management. Such a system may have, as its core, a dashboard system for managing data feeds. A dashboard system...
US-1,008,4865 Mobile event notifications
Disclosed is a mobile event streaming system that receives customer application lifecycle and user events including a message, event source and a destination...
US-1,008,4846 Method and system for fast access to advanced visualization of medical scans using a dedicated web portal
A system for viewing at a client device a series of three-dimensional virtual views over the Internet of a volume visualization dataset contained on centralized...
US-1,008,4826 Protocol agnostic security by using out-of-band health check
A computer-implemented method provides an improvement in security breach detection and comprises using a broker computing device, calculating a digital...
US-1,008,4820 Method and system for IPSec security for IPP-USB data
A method of providing security for data being transferred over a Universal Serial Bus (USB) connection, the method comprising: setting an IPsec policy...
US-1,008,4817 Malware and exploit campaign detection system and method
A malware and exploit campaign detection system and method are provided that cannot be detected by the malware or exploit campaign. The system may provide...
US-1,008,4811 Systems and methods for adaptive security protocols in a managed system
Embodiments disclosed herein describe one or more servers of an enterprise system that may be configured to receive security and vulnerability information from...
US-1,008,4804 Optimizing security analyses in SaaS environment
Embodiments of the present invention provide systems and methods for performing a security analysis on a set of observables by inferring malicious...
US-1,008,4802 Supervisory control and data acquisition
Aspects of the present disclosure relate to computer system security. A machine accesses a set of records corresponding to a set of users having access to a...
US-1,008,4799 Systems and methods for providing security services during power management mode
Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a...
US-1,008,4796 System, method and computer program product for managing access to systems, products, and data based on...
In accordance with embodiments, there are provided mechanisms and methods for managing access to data based on information associated with a physical location...
US-1,008,4787 Systems and methods for securing social media for users and businesses and rewarding for enhancing security
The disclosed system and method enhances security of people, organizations, and other entities that use what has been termed "social media." Recent trends have...
US-1,008,4777 Secure data processing method and system
The invention discloses a secure data processing method and system, wherein the secure data processing method comprises the following steps of: a security...
US-1,008,4771 Secure feature and key management in integrated circuits
A mechanism for providing secure feature and key management in integrated circuits is described. An example method includes receiving, by a root authority...
US-1,008,4769 Single sign-on between multiple data centers
Techniques are disclosed for a single sign-on (SSO) enterprise system with multiple data centers that can use a lightweight cookie on a user's client device....
US-1,008,4764 System for a secure encryption proxy in a content centric network
One embodiment provides a system that facilitates a secure encryption proxy in a content centric network. During operation, the system receives, by an...
US-1,008,4763 Methods and systems for establishing secure communication between devices via at least one intermediate device
Methods to establish communication between a first and second device via at least one intermediate device comprise, at the first device, generating an offer...
US-1,008,4757 Network privacy
A system and method of network privacy enables end-users of a Network to have legal title or rights to all data knowingly or unknowingly transmitted while...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.