Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,000,3610 System for tracking data security threats and method for same
An incident response system and method for tracking data security incidents in enterprise networks is disclosed. An Incident Manager application (IM) stores...
US-1,000,3605 Detection of clustering in graphs in network security analysis
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,000,3603 Computer security based on hierarchical cache latency signature authentication
A processor is coupled to a hierarchical memory structure which includes a plurality of levels of cache memories that hierarchically cache data that is read by...
US-1,000,3591 Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts
A permissions management system is disclosed for enabling a user to securely authorize a third-party system to access user account data and initiate...
US-1,000,3577 Secure transmission of local private encoding data
A method of secure transfer of local private encoding data between a first communication device and a second communication device, the first communication...
US-1,000,3549 System for allocating sensor network resources
The technology relates to allocating the resource costs of a sensor network. In particular, an auction model is used to control the demand-side of sensor...
US-1,000,3461 Power management and security for wireless modules in "machine-to-machine" communications
Methods and systems are provided for power management and security for wireless modules in "Machine-to-Machine" communications. A wireless module operating in a...
US-1,000,3124 Data communications case having an internal antenna array
A data communications apparatus including a case having a base and a lid connectable to the base, the lid movable with respect to the base between an open...
US-1,000,2635 Systems and methods for information capture
Disclosed herein are information capture systems and related methods. An information capture system includes a sensor secured to an object configured to be...
US-1,000,2474 Access control based on rhythmic pattern repetition
Techniques are described for controlling access based on pattern repetition. A rhythmic pattern may be communicated to a portable computing device of an...
US-1,000,2362 Composite security marking
The present invention relates to the field of anti-counterfeit protection of products. Specifically, the invention is directed to a composite security marking...
US-1,000,2277 Reader device for reading a marking comprising a physical unclonable function
The present invention relates to the field of anti-counterfeit protection of products. Specifically, the invention is directed to a method of reading with a...
US-1,000,2259 Information security/privacy in an always listening assistant device
An always-listening-capable computing device includes a receiver for input from a user, a module for communication with a remote server, and a gate-keeping...
US-1,000,2255 Method and device for controlling security screen in electronic device
A device and a method for controlling a security screen in an electronic device are provided. The electronic device includes a display module, a first memory...
US-1,000,2250 Security agent
A security agent is described herein. The security agent is configured to observe events, filter the observed events using configurable filters, route the...
US-1,000,2248 Mobile device data security system
Systems, computer program products, and methods are described herein for a mobile device data security system. The present invention is configured to establish...
US-9,998,926 Security enabled predictive mobile data caching
An approach to preemptive mobile data caching is provided, the approach involves retrieving personal user data associated with a user of a mobile computing...
US-9,998,629 Rights management in a distributed image capture system
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on...
US-9,998,520 Information processing terminal and method
An information processing terminal displays a confirmation screen for confirming whether to delete data relating to a web site, in a case where a movement from...
US-9,998,496 Logging and monitoring usage of cloud-based hosted storage services
A computer-implemented method for accessing a hosted service on client devices is described. The client devices include client software that uses a remotely...
US-9,998,494 Methods and apparatus for secure communication in a vehicle-based data communication system
A method provides secure communication between a first module and a second module within a vehicle communication network. A first anti-replay counter is...
US-9,998,493 Systems and methods for key logger prevention security techniques
An applet may be downloaded or provided to a web browser when a user visits a site in order to protect data input by the user from being captured by malicious...
US-9,998,478 Enterprise-wide security for computer devices
A system and method for securing data in mobile devices (104) includes a computing mode (102) and a plurality of mobile devices (104). A node security program...
US-9,998,466 System and method for secure control of resources of wireless mobile communication devices
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
US-9,998,455 Protection of application passwords using a secure proxy
Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server....
US-9,998,450 Automatically generating certification documents
A certification application automatically generates a certification document associated with a service. A transformation module retrieves a component...
US-9,998,447 System and method for secure access of a remote system
A system and method for providing a user with secure access to devices operatively connected to a network comprising at least one processing device that has...
US-9,998,434 Secure dynamic communication network and protocol
In a secure cloud for transmitting packets of digital data, the packets may be repeatedly scrambled (i.e., their data segments reordered) and then unscrambled,...
US-9,998,426 Bi-directional data security for control systems
A cyber-security device includes a processor operable to process messages with a data validation rule-set; an external communication interface configured for...
US-9,998,288 Management of secret data items used for server authentication
A security device (6) is provided for facilitating management of secret data items such as cryptographic keys which are used by a remote server (2) to...
US-9,998,281 Set of servers for "machine-to-machine" communications using public key infrastructure
A set of servers can support secure and efficient "Machine to Machine" communications using an application interface and a module controller. The set of servers...
US-9,998,255 Fiber optic light intensity encryption
A fiber optic light intensity encryption method is provided. The method includes determining light intensities associated with multi-frequency light pulses...
US-9,996,837 Integration of secure protocols into a fraud detection system
Embodiments of the present invention are directed to methods and systems for performing a secure authentication process by leveraging the historical transaction...
US-9,996,792 Data carrier
The present invention relates to a data carrier, especially a security document, such as an identification card, comprising authentication data comprising...
US-9,996,711 Asset protection of integrated circuits during transport
An integrated circuit (IC) provisioned for asset protection has a primary circuit portion, such as a microprocessor or system-on-chip, that can be selectively...
US-9,996,709 Secure computer architecture
A secure computer architecture is provided. With this architecture, data is received, in a component of an integrated circuit chip implementing the secure...
US-9,996,705 Determining potential sharing of private data associated with a private network domain to improve data security
Techniques for determining potential sharing of private data are described herein. The techniques may include identifying content having computer readable...
US-9,996,698 Automated management of confidential data in cloud environments
A shared networked storage may be separated from a key vault system. A storage request with data to be stored and the storage request with a confidentiality...
US-9,996,692 Method and system for using principal components analysis (PCA) to display trends in aircraft cyber events in...
A system, method, and computer readable media for using principal components analysis (PCA) to graphically display cyber event information about an aircraft or...
US-9,996,688 Systems and methods for controlling access to computer applications or data
Solutions for controlling access to computer applications or data are disclosed. For instance, certain systems advantageously secure access to applications and...
US-9,996,679 Methods and apparatus for device authentication and secure data exchange between a server application and a device
In some embodiments, a method includes sending an authentication request to a client device to obtain a utilization code in response to a request from the...
US-9,996,377 Virtual machine migration via a mobile device
Embodiments relate to virtual machine (VM) migration via a mobile device. A method includes requesting, by a mobile device, a source computer to capture a state...
US-9,996,376 Virtual machine monitoring method and system thereof
A virtual machine monitoring method and a system thereof are provided. The virtual machine monitoring method includes: detecting at least one hardware resource...
US-9,996,309 Method and apparatus for providing search information
The present disclosure relates to technologies for sensor networks, machine-to-machine (M2M), machine-type communication (MTC), and Internet of things (IoT)....
US-9,994,380 Ruggedized enclosure for data storage device
The embodiments provide a rugged enclosure for an external drive. The enclosure is configured to provide shock protection and protect the external drive from...
US-9,993,737 Constructing social networks using monitored game play
Features are described to use data from game play to construct social networks of users. For example determining that a user played a game with a certain...
US-9,993,080 Beam mounted chair assembly
Beam mounted chair assemblies may include at least two standards supported on a floor, a beam secured to, and supported by, the standards, and a plurality of...
US-9,992,814 Secure toll-free application data access
Secure toll-free application data network access is disclosed. Respective limits for registered traffic (e.g., application provider addresses; content type;...
US-9,992,683 Secure communications with wearable devices
Various embodiments described herein include systems and methods directed towards allowing a wearable device with one or more sensors to communicate with a...
US-9,992,670 Machine-to-machine cellular communication security
Facilitating authentication on communication between a mobile terminal and a server is achieved. The communication is made through a Serving GPRS Support Node...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.