Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,005,7253 Cloaked data system
Systems and methods of securely storing and retrieving data are disclosed. A database may include a table of data with rows and columns and encrypted at rest....
US-1,005,7252 System for secure communications
A system and method provides security features for inter-computer communications. After a user has proved an association with one of several firms, a user...
US-1,005,7243 System and method for securing data transport between a non-IP endpoint device that is connected to a gateway...
A method of securing data transport between an endpoint device, without an IP address and connected to a gateway device, and a connected service using a...
US-1,005,7234 Systems and methods for providing network security monitoring
Systems and methods are disclosed for providing network security monitoring in a computer network. In an embodiment, network configuration data may be gathered...
US-1,005,7224 System and method for initializing a shared secret system
Embodiments as described herein provide systems and methods for sharing secrets between a device and another entity. The shared secret may be generated on the...
US-1,005,7223 Data protection keys
One embodiment provides a client device. The client device includes a Trusted Platform Module (TPM). The TPM includes a secure controller to extend a secure...
US-1,005,7222 Decentralized and distributed secure home subscriber server device
A decentralized and distributed secure home subscriber server is provided. First data can be sent representing a first nonce string to a mobile device; and in...
US-1,005,7218 Network address-based encryption
A system for encrypting data and transferring or storing data securely may include a computing device including an encryptor configured to generate an...
US-1,005,7217 System and method to secure sensitive content in a URI
A system and method for transmitting data using a data transfer protocol, including receiving, at the first device, a request from the second device, the...
US-1,005,7214 DNSSEC lightweight database access protocol gateway
A system that converts standardized lightweight database access protocol (LDAP) requests into a series of domain name system (DNS) requests to look up requested...
US-1,005,7070 Secure access control to an embedded device through a networked computer
A method for secure access control to a power tool enables secure access to an embedded computing device in the power tool from a web application in another...
US-1,005,7066 Devices, systems and methods for authenticated intravascular device use and reuse
Devices, systems, and methods for reconditioning an intravascular device for reuse are provided. The method includes reading first security data from a memory...
US-1,005,7065 System and method for securely storing and utilizing password validation data
A system and method for storing and accessing password verification data on multi-user computer systems that prevents remote attacks. Along with ...
US-1,005,7059 Systems and methods for "machine-to-machine" (M2M) communications between modules, servers, and an application...
Methods and systems are provided for supporting efficient and secure "Machine-to-Machine" (M2M) communications using a module, a server, and an application. A...
US-1,005,7054 Method and system for remotely keyed encrypting/decrypting data with prior checking a token
A method for encrypting a message by a host device includes requesting, by the host device, a message key from a secure device and generating, by the secure...
US-1,005,6985 Broadband communication network architecture with train control network and train serving network combined, and...
A broadband communication network architecture with a train control network and a train serving network combined, is characterized by, comprising a trusted...
US-1,005,6933 Electronic device and method for controlling display on basis of information of accessory device and accessory...
An accessory device of a portable electronic device is provided. The accessory device includes a first cover that is detachably attached to at least a portion...
US-1,005,5984 Unmanned aerial vehicle system and method of use
An unmanned aerial vehicle (UAV) system includes a command center having a computing device an unmanned aerial vehicle (UAV) with a body, the UAV to communicate...
US-1,005,5901 Method and apparatus for remotely communicating vehicle information to the cloud
The present invention relates generally to the communication of vehicle data, diagnostics and related information with a network remote from the vehicle, and...
US-1,005,5801 Systems and methods for generating structured data based on scanned documents
A system and method for efficiently and securely converting physical documents, including handwritten reports, into structured data stored in databases is...
US-1,005,5728 Form factor with an alias code and a secure chip ID
Systems and methods may comprise RFID data acquisition technology which may be embedded in a fob or tag for use in completing financial transactions. This fob...
US-1,005,5607 Security layer and methods for protecting tenant data in a cloud-mediated computing network
A system for protecting data managed in a cloud-computing network from malicious data operations includes an Internet-connected server and software executing on...
US-1,005,5602 Securely processing range predicates on cloud databases
Methods, systems, and computer program products for securely processing range predicates on cloud databases are provided herein. A computer-implemented method...
US-1,005,5601 Method and system for securing data
A first access key, which is provided by a key server for decrypting a file and the encrypted file is published on a public network by a first user. Every time...
US-1,005,5599 Processing method for making electronic documents secure
Disclosed are systems and processing methods that may be performed by first, second, and third processor units to give access to an item of sensitive text data...
US-1,005,5596 Data protection system
A storage device of a data center may protect data stored on a storage medium of the storage device using a data security mechanism. The data security mechanism...
US-1,005,5595 Secure credentials control method
Methods, apparatus, and systems are provided to secure access to an account of a user. The account may have a system administrator. The user may have a...
US-1,005,5580 Technologies for multi-factor security analysis and runtime control
Technologies for client-level web application runtime control and multi-factor security analysis by a computing device include receiving application code...
US-1,005,5568 Encryption authorization dongle having volatile memory
Embodiments of the present invention disclose a method, computer program product, and device for accessing encrypted data. A communication link may be...
US-1,005,5556 Technologies for authenticating a user of a computing device based on authentication context state
Technologies for authenticating a user of a computing device based on an authentication context state includes generating context state outputs indicative of...
US-1,005,5384 Advanced zero-knowledge document processing and synchronization
Techniques disclosed herein decouple a document's structure from its general content wherein the structure is retained in plaintext (both at a client device and...
US-1,005,5380 Dynamic clock lane assignment for increased performance and security
A lane within a processor bus that communicatively connects a transmitter and a receiver is dynamically assigned as a clock lane. The clock lane subsequently...
US-1,005,5283 Securely distributing random keys in a dispersed storage network
A method includes encrypting first data segment using first encryption key (EK1) to produce first encrypted data segment (DS), appending the first encrypted DS...
US-1,005,5155 Secure system on chip
A secure SoC IC is disclosed herein. In embodiments, a SoC IC for computing may comprise a plurality of processor cores, wherein each processor core has at...
US-1,005,1716 Lighting control apparatus and method
A lighting control apparatus (106) may include an accelerometer (118), a wireless communication interface (112), and a secure connection (125) for securing the...
US-1,005,1661 Method and apparatus for communicating using unlicensed bands in mobile communication system
The present disclosure relates to a communication method and system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data...
US-1,005,1465 Method and system for securely transferring a message
In a method and system for securely transferring a message (N) from a transmitter unit (SE) to a receiver unit (EE), a message sent by a transmitter unit (SE)...
US-1,005,1464 Apparatus and methods for electronic subscriber identity module (ESIM) installation and interoperability
Methods and apparatus for managing processing of electronic Subscriber Identity Modules (eSIM) data at a mobile device are disclosed. An eSIM management entity...
US-1,005,1231 Arrangement for, and method of, securing a data capture session of a portable data capture device
A sensor senses when a portable, handheld data capture device has been dropped from a user's hand and is in free fall in a venue. A control system automatically...
US-1,005,1146 Verifiable check and security document system
A secured document with a security architecture having a plurality of security elements for authentication, wherein at least one security element is printed...
US-1,005,1112 Non-intrusive user authentication system
A system for secure user authentication of a mobile electronic device includes a touch-based user interface of the mobile electronic device, a processor, and a...
US-1,005,1111 Separating sensitive data from mobile devices for theft prevention
Concepts and technologies are disclosed herein for separating sensitive data from mobile devices for theft prevention. According to one aspect, a system...
US-1,005,1035 Method and apparatus for providing secure file transmission
An approach is provided for enabling the transmission of files independent of a file transfer application or the throughput capabilities of the sending or...
US-1,005,1007 Network traffic control device, and security policy configuration method and apparatus thereof
A network traffic control device, and a security policy configuration method. The network traffic control device identifies a source, a destination, and an...
US-1,005,1001 Efficient and secure user credential store for credentials enforcement using a firewall
Techniques for an efficient and secure store for credentials enforcement using a firewall are disclosed. In some embodiments, a system, process, and/or computer...
US-1,005,0981 Attack detection through signal delay monitoring
The present disclosure is directed to attack detection through signal delay monitoring. An example system may comprise at least one device including a physical...
US-1,005,0978 Systems and methods for securing command and data interfaces to sensors and devices through the use of a...
Various embodiments of the invention increase security of a network of interoperable devices. In certain embodiments, this is accomplished by a security module...
US-1,005,0970 System and method for data center security enhancements leveraging server SOCs or server fabrics
A data center security system and method are provided that leverage server systems on a chip (SOCs) and/or server fabrics. In more detail, server interconnect...
US-1,005,0964 Method and system for securing data communicated in a network
According to a first aspect of the present disclosure, a method is conceived for securing data communicated in a network, the method comprising: receiving, by a...
US-1,005,0959 Synthetic genomic variant-based secure transaction devices, systems and methods
Various devices, systems, structures and methods are disclosed related to securely authorizing a transaction by synchronizing digital genomic data with...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.