Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,012,7389 Performing operations on intelligent storage with hardened interfaces
A storage device can include processing and cryptographic capability enabling the device to function as a hardware security module (HSM). This includes the...
US-1,012,7385 Automated security vulnerability exploit tracking on social media
Embodiments automate tracking of exploit information related to initially-identified security vulnerabilities, through the data mining of social networks....
US-1,012,7383 Resource usage optimized auditing of database shared memory
A system, and computer program product for security auditing of database transactions are provided in the illustrative embodiments. For a specified period, an...
US-1,012,7172 Single SDIO interface with multiple SDIO units
A system and method communicates with one of two or more secure digital input output (SDIO) units that only one SDIO unit responds when it is being addressed....
US-1,012,7022 Tools and methods for real-time dataflow programming language
A dataflow programming language can be used to express reactive dataflow programs that can be used in pattern-driven real-time data analysis. One or more tools...
US-1,012,6961 Securely recovering stored data in a dispersed storage network
A method for execution by a dispersed storage and task (DST) execution unit that includes a processor includes receiving a slice pre-image request from a...
US-1,012,6832 Split rotating keyboard system
A split rotating keyboard system for use in easing muscle strain and mitigating the effects of carpal tunnel syndrome associated with the usage of conventional...
US-1,012,3703 Health monitoring apparatus with wireless capabilities for initiating a patient treatment with the aid of a...
Individuals who suffer from certain kinds of medical conditions, particularly conditions that only sporadically exhibit measurable symptoms, can feel helpless...
US-1,012,3360 System and method for secure wireless communication
A system and method for secure wireless communication for transferring or sharing data between at least two devices over a wireless network. A set of pictures...
US-1,012,3213 Methods and devices for securing radio resources for an LTE-U data transmission
A method for securing radio resources for a Long Term Evolution-unlicensed, LTE-U, data transmission is disclosed. The method includes transmitting a plurality...
US-1,012,2985 Camera based safety mechanisms for users of head mounted displays
The disclosure provides methods and systems for warning a user of a head mounted display that the user approaches an edge of field of view of a camera or one or...
US-1,012,2900 Camera mounting device
A web cam device includes a camera housing, a camera disposed in the camera housing, a data cable coupled to the camera that extends from the camera housing,...
US-1,012,2888 Information processing system, terminal device and method of controlling display of secure data using augmented...
An information processing system includes a server, and a terminal device communicable with the server via a network. The terminal device includes a display, an...
US-1,012,2766 Policy-based secure containers for multiple enterprise applications
Technologies for providing policy-based secure containers for multiple enterprise applications include a client computing device and an enterprise policy...
US-1,012,2764 Multi-factor and context sensitive biometric authentication system
This disclosure describes techniques that facilitate granting an access privilege to a client device based on selectively authenticating biometric data....
US-1,012,2746 Correlation and consolidation of analytic data for holistic view of malware attack
In communication with security appliances, an electronic device for providing a holistic view of a malware attack is described. The electronic device features...
US-1,012,2745 Heuristics-based identification of IoT (internet of things) attacks in Wi-fi
Attacks from IoT (Internet of Things) devices (or other statins) on a Wi-Fi network are identified using heuristics. Frames are detected from an IoT device (or...
US-1,012,2740 Methods for establishing anomaly detection configurations and identifying anomalous network traffic and devices...
A method, non-transitory computer readable medium, and network security apparatus that monitors received network traffic to obtain signal data for signals...
US-1,012,2739 Rootkit detection system and method
A rootkit detection method includes obtaining, from a target system, first data comprising raw data stored in a data block of a storage drive, checking the...
US-1,012,2737 Local area network ecosystem of verified computer security resources
A router-level computer security component validates multiple endpoint computer security components on multiple endpoint devices in a local area network, based...
US-1,012,2734 Secure email verification service
Concepts and technologies are disclosed herein for providing and using a secure email verification service. A processor can receive verification data and...
US-1,012,2716 Secure storage device with on-board encryption control
A communication and security device for a portable computer having an interface for connecting the security device to a host device to enable the security...
US-1,012,2713 Method and device for the secure authentication and execution of programs
A device and a method for encrypting a virtual machine by on-the-fly encryption and decryption of the memory is described. The device comprises hardware and...
US-1,012,2694 LPI/LPD communication systems
In a wireless communication system, a secure communication link is provided by selecting a decoy data signal vector for transmission, generating a MIMO...
US-1,012,2693 Protocol based key management
A method, system, and computer usable program product for protocol based key management are provided in the illustrative embodiments. A key management protocol...
US-1,012,2592 System, method and computer program product for serving an application from a custom subdomain
In accordance with embodiments, there are provided mechanisms and methods for serving an application from a custom subdomain. These mechanisms and methods for...
US-1,012,2535 Electronic document notarization
A server receives a package of data including: a document designated for notarization, identification information including a photograph, photograph of a user,...
US-1,012,2533 Configuration updates for access-restricted hosts
A host machine operated for a specific purpose can have restricted access to other components in a multi-tenant environment in order to provide for the security...
US-1,012,2532 Security verification apparatus using biometric information and security verification method
A security verification apparatus using biometric information and a security verification method are described. The security verification apparatus includes a...
US-1,012,2529 System and method of enforcing a computer policy
A method and system of enforcing a computer policy uses a central server to manage user profiles, policies and encryption keys. The server securely supplies the...
US-1,012,2441 Method of utilizing a relay node in wireless communication system
The present invention relates to a wireless communication system and a user equipment (UE) providing wireless communication services, and more particularly, a...
US-1,012,2414 Spatially enabled secure communications
Spatially Enabled Communication technologies are disclosed. A proximity boundary can be defined by a communication range of one or more SRC devices configured...
US-1,012,1530 Implementing eFuse visual security of stored data using EDRAM
A method and circuit for implementing Electronic Fuse (eFuse) visual security of stored data using embedded dynamic random access memory (EDRAM), and a design...
US-1,012,1294 Rapid document detection and identification
An apparatus, method, and computer program product that intentionally illuminate at least one target item with electromagnetic energy having specific...
US-1,012,1145 Electronic registration for securely providing products and services
Some embodiments are directed to a method of providing a product and/or a service, at least one non-transitory computer-readable storage medium comprising...
US-1,012,1038 Dynamic barcode ticketing carrying encrypted validation transactions
Systems, methods, and devices for conducting a secure ticketing transaction at a first location within a transit system. A media reader described herein may...
US-1,012,1032 Systems and methods for dynamic control of a security system device based on tag information
Systems and methods for controlling at least one security device based on the behavior of at least one tag. The methods comprise: generating sensor data...
US-1,012,1026 Secure enclosure systems in a provider network
A secure containment enclosure such as an equipment rack is disclosed that includes an electronic locking system. The electronic locking system locks and, upon...
US-1,012,1022 Methods and systems for encrypting data using object-based screens
A system and method is provided for encrypting data for secure storage or transport. The method includes identifying a first object comprising a string of...
US-1,012,1021 System and method for automatically securing sensitive data in public cloud using a serverless architecture
Systems and methods are provided executing jobs immediately upon receipt of a notification. The systems and methods may include receiving, at a cloud compute...
US-1,012,1020 Systems and methods of providing access to secure data
The disclosed technology includes techniques for secure access to data associated with an organization and includes providing a user device access to a user...
US-1,012,1018 Secure data synchronization
Techniques for secure data synchronization are described. In one or more implementations, a determination is made as to whether enterprise data is stored...
US-1,012,1017 Delayed data access
A system uses information submitted in connection with a request to determine if and how to process the request. The information may be electronically signed by...
US-1,012,1015 Management of data privacy and security in a pervasive computing environment
A method to provide negotiation control to data such that a person or entity can negotiate the use of data gathered beyond what is needed for a particular use...
US-1,012,1009 Computer system for discovery of vulnerabilities in applications including guided tester paths based on...
A testing system for testing computer system security includes control logic interposed between tester computers and a computer system under test. Tester...
US-1,012,1006 Mediated secure boot for single or multicore processors
A system and methods are disclosed for securely booting a processing system using a three step secure booting process. Several embodiments are presented,...
US-1,012,1001 System and method for monolithic scheduling in a portable computing device using a hypervisor
Systems for a method for monolithic workload scheduling in a portable computing device ("PCD") having a hypervisor are disclosed. An exemplary method comprises...
US-1,012,0991 Systems and methods for initiating immediate data erasure on a device
A system and method of erasing data on a data handling device may include providing a device with a data storage element and a biometric characteristic scanning...
US-1,012,0985 Protecting media items using a media security controller
A media storage device includes a media security controller and a memory to store data that relates to a media item to be rendered by a rendering device. The...
US-1,012,0977 Secure healthcare management and communication system
A healthcare management and communication system including a central server, home base devices, and portable medical assistant devices (PMAD) providing secure...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.