Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,027,5767 Method and system for generating cryptograms for validation in a webservice environment
A method for generating cryptograms in a webservice environment includes: receiving, in a first environment of a computing system, a credential request...
US-1,027,5747 System and method for instant issue of personalized financial transaction cards
In a method for instantly issuing a personalized financial transaction card to a customer a bank employee receives customer information and card information...
US-1,027,5627 Reader device for reading a marking comprising a physical unclonable function
The present disclosure relates to the field of anti-counterfeit protection of products. Specifically, the disclosure is directed to a method of reading with a...
US-1,027,5613 Identity breach notification and remediation
In one aspect, the present disclosure relates to a method for improved security in a networked computing environment, the method comprising: receiving, from a...
US-1,027,5599 Device and method for providing trusted platform module services
The invention concerns a circuit having a first processing device which has one or more first platform configuration registers for storing one or more data...
US-1,027,5589 Identity verification using autonomous vehicles
Various embodiments are generally directed to identity verification using autonomous vehicles. A security policy may be used to determine when identity...
US-1,027,5577 Digital media content management apparatus and method
A digital media content management apparatus and method for securely storing a content file on a computer readable medium and playing the content file from the...
US-1,027,5466 De-duplication aware secure delete
A mechanism is provided in a data processing system for de-duplication aware secure delete. Responsive to receiving a secure delete request for a file, the...
US-1,027,5046 Accessing and interacting with information
In some implementations, an access device may sense movement in six degrees of freedom for interacting with information in a user interface. In some...
US-1,027,4960 Automatic guided vehicle
An automatic guided vehicle comprising a fork carriage with a fork, a propulsion drive system, a sensor to acquire position data of objects located in a...
US-1,027,4350 Mobile device and method for meter configuring and data collection
A mobile device includes a transceiver coupled to an antenna configured to send wireless signals to and receive wireless signals from a fluid meter that is...
US-1,027,3002 IMU pod and method of retrieval of the same
A pod assembly which includes a pod and an inertial measurement unit positioned within the pod. The pod assembly further includes deceleration hardware...
US-1,027,2933 Railway safety critical systems with task redundancy and asymmetric communications capability
A railway safety critical application system substitutes commercial off-the-shelf (COTS) hardware and/or software for railway-domain specific product...
US-1,027,2200 Managing communications to and from a handset device controlling a therapeutic product delivery device
A communication method of managing communications to and from a handset device controlling a therapeutic product delivery device is described. The method...
US-1,027,0745 Securely transporting data across a data diode for secured process control communications
Securely transporting data across a unidirectional data diode interconnecting a process plant to a remote system includes provisioning, using join key material,...
US-1,026,7047 Load distribution structures for raised floor data center
Load distribution structures are provided for a raised floor tile(s) of a raised floor data center. The load distribution structure, which resides adjacent to...
US-1,026,7022 Electronic faucet
An electronic faucet assembly includes a mixing valve and a user interface in communication with a controller. Input to the user interface illustratively causes...
US-1,026,5700 System for improving diabetes testing and reducing counterfeiting
A diabetes test system for measuring blood glucose levels is provided, which includes a glucose meter, at least one diabetic test strip, and a container or...
US-1,026,5193 Acetabular cup prosthesis alignment system and method
Technologies for aligning an acetabular prosthetic component in a patient's surgically prepared acetabulum include a reference sensor module securable to the...
US-1,026,5010 Sensor-based systems and methods for monitoring maternal position and other parameters
Sensor-based systems, devices, and methods are disclosed for monitoring for an aortocaval compression condition in a pregnant woman. A sensor device may be...
US-1,026,4972 Dispensing drugs from a companion diagnostic linked smart pill
A mechanism is provided. The mechanism includes a user device and a smart pill within a host. The smart pill is communicatively connected to the user device for...
US-1,026,4440 Apparatus and method for rapid electronic device discovery
An apparatus, method, and computer program product that intentionally illuminate at least one target device with electromagnetic energy having specific...
US-1,026,4170 LED light has adjustable-angle sensor to cover 180 horizon detect-range
A LED Light device having built-in camera-assembly is powered by AC or-and DC power source by (1) prongs or (2) AC Plug-wires or (3) another conductive-piece or...
US-1,026,4078 System and method of providing secure data transfer
A system and method is provided for providing secure accelerated data transfer. The system may transparently provide accelerated data transfer between a client...
US-1,026,4066 Peer-to-peer data sharing between internet-of-things platforms
Techniques are described for sharing data among Internet of Things (IoT) networks. An IoT network may include a platform that collects data generated by IoT...
US-1,026,4016 Methods, systems and application programmable interface for verifying the security level of universal resource...
The present disclosure discloses a method of allowing Web View to verify the security level of a web content and inform the user with regards to the security...
US-1,026,4010 Method and apparatus for testing a security of communication of a device under test
A test apparatus (1) for testing a security of communication of a device under test, DUT, (4), wherein the test apparatus (1) comprises an RF unit (2) having an...
US-1,026,4006 Cloud service usage risk analysis based on user location
A system and method for filtering detected anomalies in cloud service usage activities associated with an enterprise uses a trusted location analysis to filter...
US-1,026,3985 Work method for smart key device
A work method for a smart key device. A host machine acquires data from a trusted server via a browser and then transmits the data to a smart key device; the...
US-1,026,3971 Preventing unauthorized access to secured information systems by injecting device data collectors
Aspects of the disclosure relate to providing information security and preventing unauthorized access to resources of an information system by injecting device...
US-1,026,3970 System, method and architecture for secure sharing of customer intelligence
A key master service capable of operating on a service provider in a network enables is disclosed. The key master enables authorized parties to securely...
US-1,026,3962 User authentication over networks
Methods are provided for authenticating user authentication data, associated with a user ID, at an authentication system. The authentication system comprises an...
US-1,026,3956 Physical level-based security system for data security of security terminal and method using the same
A physical level-based security system for data security of a security terminal and a method using the system. The security system includes at least one normal...
US-1,026,3955 Multi-tiered protection platform
A multi-tier platform provides security at a perimeter of a computer system, where an intermediate layer interacts between a web layer and an application layer....
US-1,026,3880 Method apparatus, and computer program product for dynamic security based grid routing
A method of routing data that is part of a grid job including steps of: receiving a data packet at a routing device; determining whether the data packet is...
US-1,026,3803 System and method for providing network support services and premises gateway support infrastructure
A service management system communicates via wide area network with gateway devices located at respective user premises. The service management system remotely...
US-1,026,3785 Cryptography method and system for securing data via electronic transmission
Securing information is increasingly difficult. With technological advances and tools/information sharing between hackers it is becoming even more difficult to...
US-1,026,3777 Systems and methods for secure communications using organically derived synchronized encryption processes
Organically Derived Synchronized Processes provide encryption parameter management in a certificate-less system. A first node generates a parameter data set...
US-1,026,3681 Method and apparatus for reporting periodic channel state information in mobile communication system using...
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-1,026,2752 Method and apparatus for identifying erroneous data in at least one memory element
A method for identifying erroneous data in at least one memory element, particularly a register, that includes at least one flip-flop that is intended to allow...
US-1,026,2484 Location tracking for locking device
Disclosed are methods, systems, and computer-readable media for wireless key management for authentication. Authentication includes transmitting a request to a...
US-1,026,2482 High security document storage and retrieval system
A document storage and retrieval system for securely storing documents. A mass storage device contains document identification data and document location...
US-1,026,2314 System and method for enabling a mobile communication device to operate as a financial presentation device
A provisioning system for enabling a mobile communication device to operate as a financial presentation device (FPD) presentable to providers of goods or...
US-1,026,2163 Cryptographic ASIC with unique internal identifier
A cryptographic ASIC and method for autonomously storing a unique internal identifier into a one-time programmable memory in isolation by a foundry. The...
US-1,026,2156 Real-time feature level software security
Systems and techniques for real-time feature level software security are described herein. A request may be received from a computing device for data from the...
US-1,026,2146 Application-to-application messaging over an insecure application programming interface
Disclosed are various approaches for a secure communication session between applications installed on a client device. The secure communication session can be...
US-1,026,2141 Secure processor with resistance to external monitoring attacks
A computing device includes a secure storage hardware to store a secret value and processing hardware comprising at least one of a cache or a memory. During a...
US-1,026,2128 Tokenized data security
Various devices, methods, systems, and computer readable storage are provided for tokenizing data. In some examples, credit card numbers are tokenized using a...
US-1,026,2127 Systems and method for securely sharing and executing data and models
A simulation computer device for securely executing a model includes at least one processor in communication with at least one memory device. The simulation...
US-1,026,1943 Securely moving data across boundaries
Data to be moved from a source system to a target system, for a set of tenants, is first identified. The data is enumerated by a first computing instance in the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.