Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,029,9307 Apparatus, system, and method of wirelessly transmitting and receiving data
A wireless media player and a related system and methodology. One feature of the wireless media player system pertains to a virtual connector system, apparatus,...
US-1,029,9304 Securely communicating a status of a wireless technology device to a non-paired device
A wireless technology device and method for securely communicating a status of a wireless technology device to a non-paired device, includes detecting a status...
US-1,029,9300 Secure systems and methods for establishing wireless audio sharing connection
A system and method for tethering wireless audio devices. The method includes establishing a first wireless connection between an intermediary device and a...
US-1,029,9128 Securing communications for roaming user equipment (UE) using a native blockchain platform
A network function (NF) entity in a communication network receives authentication data associated with a User Equipment (UE), determines the UE supports a...
US-1,029,8735 Method and apparatus for dynamic configuration of a multiprocessor health data system
A health monitoring system which can collect data generated from multiple health, fitness, and environmental data generating devices by a health application...
US-1,029,8612 System and method for time based anomaly detection in an in-vehicle communication network
A system and method for providing security to a network may include maintaining, by a processor, a model of an expected behavior of data communications over the...
US-1,029,8610 Efficient and secure user credential store for credentials enforcement using a firewall
Techniques for an efficient and secure store for credentials enforcement using a firewall are disclosed. In some embodiments, a system, process, and/or computer...
US-1,029,8607 Constructing graph models of event correlation in enterprise security systems
Methods and systems for detecting anomalous events include detecting anomalous events in monitored system data. An event correlation graph is generated by...
US-1,029,8603 Supervisory control and data acquisition
Aspects of the present disclosure relate to computer system security. A machine accesses a set of records corresponding to a set of users having access to a...
US-1,029,8591 Secure integration of independent cloud foundry applications in a fiori launchpad
An Open Authorization (OAuth) Client Secret of an application associated with a Multi-Tenant Application (MTA) deployed in a cloud-computing environment if read...
US-1,029,8584 System and method for secure control of resources of wireless mobile communication devices
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
US-1,029,8564 Secure authenticated distance measurement
The invention relates to a method for a first communication device to perform authenticated distance measurement between the first communication device and a...
US-1,029,8559 Pre-authenticated identification token
A pre-authenticated token system includes an identification token having a switch, a transmitter and receiver circuit, and a sensor; a docking station having...
US-1,029,8556 Systems and methods for secure storage and management of credentials and encryption keys
A system for storing and managing credentials and encryption keys includes a first data store, a second data store, a client device, and a secure key platform....
US-1,029,8554 System and method for enhanced data protection
In one embodiment, a method of secure network transmission is performed by a computer system. The method includes encrypting a payload via a first symmetric key...
US-1,029,8552 Digital broadcast methods using secure meshes and wavelets
Methods and apparatuses are presented for securely providing digital streaming data to subscriber devices using encrypted wavelet meshes. A recorded image may...
US-1,029,8549 Stateless access stratum security for cellular internet of things
Aspects of security schemes (e.g., integrity protection, encryption, or both) are described. A measure of access stratum security can be realized without...
US-1,029,8547 Systems, methods, and media for a cloud based social media network
System and methods for providing private social networks, which are cloud-based in some instances, are provided herein. A method includes receiving a selection...
US-1,029,8546 Asymmetrical encryption of storage system to protect copyright and personal information
Robust security of copyright-protected content is provided when such content is digitally stored in a storage device of a client device in encrypted form. The...
US-1,029,8545 Secure processing environment for protecting sensitive information
A processor-implemented method for a secure processing environment for protecting sensitive information is provided. The processor-implemented method may...
US-1,029,8445 Method for dynamic adjustment of a level of verbosity of a component of a communications network
A method for dynamic management of a first level of verbosity of a component defined in a data network, the data network having a control center, each component...
US-1,029,8398 Peer discovery, connection, and data transfer
Implementations relate to peer-to-peer discovery, connection, and data transfer providing privacy protection and increased security features.
US-1,029,8397 Setting a password on a device
Embodiments disclosed herein provide a server, a device and methods for providing security data to a device requiring a password for use in protecting a...
US-1,029,8386 Method and apparatus for secure communications in networks
An unencrypted media access control layer (MAC) protocol data unit (MPDU) having a header is received at a wireless network interface device. The header...
US-1,029,8385 Homomorphic processing unit (HPU) for accelerating secure computations under homomorphic encryption
Fully homomorphic encryption integrated circuit (IC) chips, systems and associated methods are disclosed. In one embodiment, an integrated circuit (IC)...
US-1,029,6902 Payment device with data entry keys
A payment device with data entry keys which are obscured from view when not in use. An example payment device includes a plurality of data entry keys for...
US-1,029,6767 Method and apparatus of providing real-time feedback for magnetic secure transmission
A user terminal comprising: i) a display module comprising a display screen and an interface circuitry for receiving a user input; and ii) a magnetic stripe...
US-1,029,6760 System of shared secure data storage and management
This disclosure relates to a storage provider for storing first encrypted data associated with first meta tags from a first publisher and second encrypted data...
US-1,029,6755 Data source based application sandboxing
A computing device and a method for a computing device to control access to data stored on a data store of the device. An access component of the device having...
US-1,029,6754 Method for controlling security system and electronic device thereof
A portable electronic device, a wearable device and methods for operating the same are provided. The portable electronic device includes a display, a...
US-1,029,6750 Robust data tagging
Users are authorized to access tagged metadata in a provider network. A revision control and binding mechanism may be applied to tagged metadata that is added...
US-1,029,6741 Secure memory implementation for secure execution of virtual machines
An embodiment involves secure memory implementation for secure execution of virtual machines. Data is processed in a first mode and a second mode, and commands...
US-1,029,6727 System for interactive matrix manipulation control of streamed data and media
An interactive streaming media and application service provider system can securely stream high resolution, multiple formats of video and data. Different data...
US-1,029,6576 Filling information from mobile devices with security constraints
A system for a mobile device includes at least one processor operatively connected to a computer readable storage medium in the at least one processor is...
US-1,029,6412 Processing run-time error messages and implementing security policies in web hosting
A user administers web hosting on user's server from his computer remotely. When a run time error is generated, an error message is sent to a server connected...
US-1,029,6355 Method for the configuration of electronic devices, in particular for the configuration of components of an...
As part of the method for the configuration of electronic devices and, in particular for the configuration of components of an access control system for persons...
US-1,029,5751 Optically-secured adaptive software-defined optical sensor network architecture
A method and network are provided for a reconfigurable optical sensor network. The method includes configuring, by a controller, the reconfigurable optical...
US-1,029,5350 Providing a route guide using building information modeling (BIM) data
A request for a route guide to a destination in a building is received from a user terminal device. BIM data for the building is received, including material...
US-1,029,5349 Flight management system for an aircraft and method of securing open world data using such a system
A flight management system for an aircraft and method of securing open world data using such a system. The flight management system includes at least two flight...
US-1,029,3842 On-board device, signaling system, and control method of moving vehicle
An on-board device is loaded in a moving vehicle and includes a control device configured to control the traveling of the moving vehicle. In the control device,...
US-1,029,2049 Enabling a software application to be executed on a mobile station
The invention enables a software application to be executed on a mobile station in dependence of a SIM. Challenge data originating from the software application...
US-1,029,2039 Systems and methods for enhanced mobile data roaming and connectivity
System and methods are provided for provisioning mobile data services in mobile network systems. By taking advantage of a bifurcated authentication process, the...
US-1,029,1686 Managed peer-to-peer applications, systems and methods for distributed data access and storage
Secure and remote operation of a remote computer from a local computer over a network includes authenticating a remote computer for connection to a computer...
US-1,029,1683 Service processing system and service processing method
In a case where a service for performing specified processings of document data as one job is processed in a cooperative manner on a network, a service...
US-1,029,1645 Determining maliciousness in computer networks
A computer implemented method provides a technical solution to the technical problem of detecting and preventing malicious activity in a computer network, the...
US-1,029,1638 Cloud activity threat detection for sparse and limited user behavior data
A cloud security system and method implements cloud activity threat detection using analysis of cloud usage user behavior. In particular, the cloud security...
US-1,029,1635 Identity resolution in data intake of a distributed data processing system
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,029,1633 Bandwidth conserving signature deployment with signature set and network security
A malware detection system comprising a signature generator for combining malware signatures into a malware signature filter with a fixed false positive rate; a...
US-1,029,1619 System, method, and device for delivering communications and storing and delivering data
A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is...
US-1,029,1596 Installation of a terminal in a secure system
A system comprising a terminal and a server, wherein the terminal is installed in the system by the server being configured to: identify the terminal; generate...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.