Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,013,6327 Location verification based on environmental sensor data
Techniques are described for determining and/or verifying the location of a device based on environmental data. A device may provide location information...
US-1,013,6312 Communicating messages with intermittently available encryption credentials
Some embodiments relate to a device that transmits/receives encrypted communications with another device. A first device, such as a smart phone or smart watch,...
US-1,013,6310 Secure data transmission
A wireless device and a method for secure data transmission is described. Information representing biometric data of a user is obtained. The information is...
US-1,013,6037 Glare visor for security cameras
An apparatus comprising a camera sensor and a lens hood. The camera sensor may be configured to capture video data of an environment near the apparatus. The...
US-1,013,5876 Security compliance framework usage
A method and system for improving usage of a security compliance framework is provided. The method includes authenticating a user for: access to the security...
US-1,013,5872 System and method for context aware mobile policies
A system and method for network policy enforcement for portable data devices such as smartphones, tablets or notebook computers uses the portable device to...
US-1,013,5869 Information processing system, information processing apparatus, and method for controlling information...
An information processing system includes a first information processing apparatus for setting a security policy, and a second information processing apparatus...
US-1,013,5866 Method of preventing drive-by hacking, and apparatus and system therefor
The present disclosure relates to a method of preventing drive-by hacking, and an apparatus and a system therefor. A method of preventing drive-by hacking in a...
US-1,013,5862 Testing security incident response through automated injection of known indicators of compromise
Disclosed are various embodiments for testing the security incident response of an organization through automated injection of a known indicator of compromise....
US-1,013,5857 Structuring data and pre-compiled exception list engines and internet protocol threat prevention
Blocking high-risk IP connections in real-time while allowing tailoring of an acceptable risk profile to match the security requirements of network resources....
US-1,013,5856 Auto-tuning program analysis tools using machine learning
Machine learning (ML) significantly reduces false alarms generated by an automated analysis tool performing static security analysis. Using either user-supplied...
US-1,013,5855 Near-real-time export of cyber-security risk information
This disclosure provides an apparatus and method for near-real-time export of cyber-security risk information, including but not limited to in industrial...
US-1,013,5848 Network security threat detection using shared variable behavior baseline
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,013,5847 Reverse shell network intrusion detection
A client system such as a database system may be vulnerable to intrusion by an unauthorized user or system through a reverse secure shell connection that...
US-1,013,5842 Content-based isolation for computing device security
The subject disclosure is directed towards securing a computing device using content-based isolation. When the computing device requests content data having...
US-1,013,5841 Integrated security system having threat visualization and automated security device control
Techniques are described for taking direct actions, such as selectively blocking or allowing traffic and applications, while monitoring events from a graphical...
US-1,013,5836 Managing data privacy and information safety
Automatically screen data associated with a user that may have already been shared on a social network or about to be shared on the social network for a...
US-1,013,5817 Enhancing authentication and source of proof through a dynamically updatable biometrics database
The present invention provides for biometric authentication of users using current, updatable biometric data/standards. In this regard, the present invention...
US-1,013,5799 Systems and methods for cloud data security
Techniques for providing data security services with respect to cloud-based services are described. Examples include a security service provider ("SSP")...
US-1,013,5793 Security maximization for a computer related device based on real-time reaction
Methods and a system are provided that, in turn, are for providing security between a user device and a computer related device. A method includes providing a...
US-1,013,5792 Secure communications with internet-enabled devices
A network device allows inbound connections from external addresses to a computer on a local network while forbidding output connections from the computer to...
US-1,013,5791 Secure communications with internet-enabled devices
A network device allows inbound connections from external addresses to a computer on a local network while forbidding output connections from the computer to...
US-1,013,5790 Secure communications with internet-enabled devices
A network device allows inbound connections from external addresses to a computer on a local network while forbidding output connections from the computer to...
US-1,013,5786 Discovering and selecting candidates for sinkholing of network domains
Techniques for discovering and selecting candidates for sinkholing of network domains are provided. In some embodiments, a process for discovering and selecting...
US-1,013,5763 System and method for secure and efficient communication within an organization
The present disclosure relates to system(s) and method(s) for enabling secure and efficient communication between user devices within an organization....
US-1,013,5725 Data packet forwarding method, apparatus, and system
A data packet forwarding solution, which relates to the field of network transmission. A virtual switch in the solution saves a flow entry as an aging flow...
US-1,013,5689 Position parameterized recursive network architecture with topological addressing
A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the...
US-1,013,5633 Network security analysis for smart appliances
A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows...
US-1,013,5622 Flexible provisioning of attestation keys in secure enclaves
A computing platform implements one or more secure enclaves including a first provisioning enclave to interface with a first provisioning service to obtain a...
US-1,013,5612 Secure telecommunications
The present disclosure describes techniques for configuring and participating in encrypted audio calls, audio conferences, video calls, and video conferences....
US-1,013,5607 Distributed ledger interaction systems and methods
Distributed public ledger interaction methods and systems are presented by which one or more elements of a first smart contract are privately recorded on a...
US-1,013,4254 Intelligent security management system
The present specification describes a smart security management system for managing the flow of people through security checkpoints in order to optimize overall...
US-1,013,4207 Securing SCADA network access from a remote terminal unit
A first message from a remote terminal unit (RTU) is received, where the first message indicates that a motion has been detected. In response to receiving the...
US-1,013,4109 Depiction arrangement
The invention relates to a depiction arrangement for security papers, value documents, electronic display devices or other data carriers, having a grid image...
US-1,013,4038 Point of sale (POS) personal identification number (PIN) security
A key is securely injected into a POS PIN pad processor in its usual operating environment. In response to entry of a personal identification number (PIN) into...
US-1,013,3877 System and method for secure reciprocal exchange of data
A social media computer system includes a database that is in network communication with a first mobile phone and a second mobile phone. The database receives a...
US-1,013,3873 Temporary concealment of a subset of displayed confidential data
The present invention addresses the deficiencies of the art in respect to data security control and provides a method, system and computer program product for...
US-1,013,3870 Customizing a security report using static analysis
A control graph representing a model of data flow of a computer program can be generated during a static analysis. Respective edge weights can be assigned to...
US-1,013,3862 Timer and content security
A method, computer system, and a computer program product for timing secured content is provided. The present invention may include receiving a connection...
US-1,013,3548 System and method for providing mobile personal security platform
The present disclosure relates to a personal security platform. In particular, the present disclosure relates to such systems designed to be worn or attached to...
US-1,013,3540 Vehicle sound generator apparatus and method for controlling the same
The present invention provides a vehicle sound generator apparatus comprising a vehicle state sensing unit, a storage unit comprising a sound source storage...
US-1,013,3525 Autonomous secure printing
Methods and systems for virtual printing are described herein. A user may print to a virtual printer via a user device, and the user device may send print...
US-1,013,3497 SPI command censoring method and apparatus
A method in a memory system having a security device and a serial external electrically erasable read-only memory (EEPROM) is disclosed. The method includes...
US-1,013,3486 Status indicator on a data storage device
Methods, systems, and devices are described for displaying information on a visual display of a data storage device. The device may be an internal data storage...
US-1,013,0272 Personal safety and security mobile application responsive to changes in heart rate
A software app for a mobile device is disclosed for alerting a custodian of a person to be protected of an emergency situation involving the person to be...
US-1,012,9916 System and method for controlling network parameters for a plurality of home security/home system control panels
A computer processor implemented method (10) is provided to control network parameters for a plurality of networked control panels (12) for wireless...
US-1,012,9884 Multi-thread tx/rx and video data to improve throughput and reliability over cellular based communications systems
This process utilizes multiple threads over multiple paths (towers and/or carriers) in order to improve the above noted problems by dynamically splitting...
US-1,012,9842 Method and device for transmitting synchronization signal for device-to-device communication
The present invention relates to a communication technique for converging IoT technology with a 5G communication system for supporting a higher data...
US-1,012,9802 Layered connectivity in wireless systems
Techniques and devices are disclosed for efficient offloading and/or aggregation of resources by providing different levels of connection management in a...
US-1,012,9742 Method for synchronizing encryption information between SCell and UE
The present application discloses a method for synchronizing encryption information between a SCell and UE, which includes that: the SCell transmits a COUNT...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.