Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,953,146 Mobile communications device providing heuristic security authentication features and related methods
A mobile communications device includes a plurality of first input devices capable of passively collecting input data, a second input device(s) capable of...
US-9,952,790 Application security policy actions based on security profile exchange
In one embodiment, a method includes receiving, at a first host, a security profile related to a first data socket descriptor indicating risk to data security...
US-9,950,261 Secure data encoding for low-resource remote systems
A method includes identifying a string and parameters. The parameters include a coding frame, elements, and a travel path. The method includes traversing the...
US-9,949,249 Method and apparatus for spatial multiplexing in wireless communication system
The present disclosure relates to a communication method and system for converging a 5th-Generation communication system to support higher data rates beyond a...
US-9,949,132 Near field communication (NFC) device and method for selectively securing records in a near field communication...
A method and device for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message in a Near Field Communication (NFC)...
US-9,949,130 Data security for internet of things (IOT) devices
System for monitoring of IoT data traffic between an IoT device connected via a cellular network and a server using Internet Protocol (IP), where the IP...
US-9,949,128 Method of personalizing a security element cooperating with an apparatus
The invention relates to a method of personalizing a security element cooperating with an apparatus. This personalization includes downloading data, which is...
US-9,949,113 Updating profiles for secondary wireless devices
Techniques to manage updates for eSIMs of a secondary wireless device are disclosed. Responsive to a user input, expiration of a timer, receipt of a message...
US-9,949,111 Apparatuses, methods and systems for interfacing with a trusted subscription management platform
Apparatuses, methods, and systems are provided for implementing a trusted subscription management platform. The platform allows the remote creation,...
US-9,948,682 Data resource control through a control policy defining an authorized context for utilization of a protected...
Disclosed is a method, a device, and/or a system of a data resource control data structure. In one embodiment, a computer-implemented method includes receiving...
US-9,948,680 Security configuration file conversion with security policy optimization
Systems and methods for converting a configuration file from a first language into a second language with policy optimization and auditing are provided....
US-9,948,678 Method and system for gathering and contextualizing multiple events to identify potential security incidents
A method and system for aggregating and correlating disparate and unrelated events to enable faster security event detection. A plurality of event logs...
US-9,948,677 System and method for secure synchronization of data across multiple computing devices
A computer implemented method and apparatus comprises detecting a file content update on a first client computer system, the file to be synchronized on a...
US-9,948,663 Systems and methods for predicting security threat attacks
A computer-implemented method for predicting security threat attacks may include (1) identifying candidate security threat targets with latent attributes that...
US-9,948,660 Computer security based on hierarchical cache latency signature authentication
A processor is coupled to a hierarchical memory structure which includes a plurality of levels of cache memories that hierarchically cache data that is read by...
US-9,948,659 Context based management for secure augmented reality applications
An example system that allows a camera enabled application, such as an augmented reality application, to run in a protected area may include a first device...
US-9,948,654 Method for accessing a plurality of services by a mobile terminal user, and related secure device
The invention relates to a method for enabling the user of at least one mobile terminal to access a plurality of services, said method consisting of: creating...
US-9,948,638 System and method of secure personal identification
A system and method for securely and automatically identifying users to an inquirer for purposes of obtaining user identifying information is described. The...
US-9,948,637 System and method for data security on big data sets
Systems and methods of securely storing and retrieving data are disclosed. A database may include a table of data with rows and columns and encrypted at rest....
US-9,948,631 Implementing single sign-on in a transaction processing system
A single sign-on is implemented in an online transaction processing system. A security token extracted from a transaction request is received. The security...
US-9,948,628 Method for enabling lawful interception by providing security information
A method and apparatus are provided. Information associated with a lawful interception of communication data of a user equipment is received. Security...
US-9,948,621 Policy based cryptographic key distribution for network group encryption
Various embodiments include a method for managing a group of devices in communication with each other and sharing a set of keys. The method may include opening...
US-9,948,619 System and method for encryption key management in a mixed infrastructure stream processing framework
A system and method for protecting streams in a mixed infrastructure includes determining processing elements that are to access a data stream in a stream...
US-9,948,617 Secure software updates
Improved techniques to update software in electronic devices that are already in use are disclosed. In one embodiment, software can be updated in a secure and...
US-9,948,611 Packet tagging for improved guest system security
Some embodiments provide a novel method for monitoring network requests from a machine. The method captures the network request at various layers of a protocol...
US-9,948,606 Enhancing privacy and security on a SDN network using SDN flow based forwarding control
A computer implemented method for providing security on a software defined network (SDN). The method comprises providing a master SDN controller for managing...
US-9,948,583 Channel based communication and transaction system
System and methods are provided for receiving identification information from remote user devices associated with users. The identification information serves...
US-9,948,552 Cloud-based services exchange
In general, a cloud-based services exchange (or "cloud exchange") for interconnecting multiple cloud service providers with multiple cloud service customers is...
US-9,948,508 Inherent power-over-data bus signaling for secure operating mode switching
A method for changing an operating mode of a processing unit of a network node is described. The processing unit is connected to a communication and supply line...
US-9,948,466 Devices, systems, and methods for authenticated intravascular device use and reuse
Devices, systems, and methods for reconditioning an intravascular device for reuse are provided. The method includes reading first security data from a memory...
US-9,948,465 Digital data locker system providing enhanced security and protection for data storage and retrieval
The subject matter herein is directed to a digital data locker that acts as an intermediary between end users operating end user device and document providers....
US-9,948,354 Magnetic coupling device with reflective plate and methods for use therewith
Aspects of the subject disclosure may include, for example, a coupling device including a receiving portion that receives a radio frequency signal conveying...
US-9,947,066 Method, apparatus and system for inserting watermark data
An apparatus and method for a sensor network, machine-to-machine (M2M) communication, machine type communication (MTC), and Internet of things (IoT) are...
US-9,947,009 Method and system for graphic and sonic encryption for securing data and electronic devices
A method of verifying a transaction between a first party and a second party using a first graphical symbol having at least a two-dimensional array of different...
US-9,946,898 Security systems and methods for encoding and decoding digital content
Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data...
US-9,946,894 Data processing method and data processing device
Provided is a data processing method in a data processing device that is connected to an external storage device and that is equipped with a storage device, the...
US-9,946,892 Location based disk drive access
Methods, apparatuses, systems, and devices are described for providing data security. In one method, data security is provided for a computing device having a...
US-9,946,887 Method and apparatus for determining privacy policy based on data and associated values
A method includes determining at least one value for at least one instance of data; determining at least one privacy policy, at least one security policy, or a...
US-9,946,884 System and method for cryptographic suite management
Systems and methods for cryptographic suite management are described. A system for cryptographic suite management has a cryptographic suite management unit...
US-9,946,880 Software vulnerability analysis method and device
The present disclosure includes: searching a code clone corresponding to a used source code from any analysis target source code; detecting a security sink and...
US-9,946,871 Isolation and presentation of untrusted data
Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application....
US-9,946,744 Customer vehicle data security method
A database system and method for managing and storing sensitive and non-sensitive vehicle data. Received vehicle data messages are processed to separate out...
US-9,946,662 Double-mix Feistel network for key generation or encryption
A method of providing security in a computer system includes dividing a block of data into initial left and right halves, and calculating updated left and right...
US-9,945,575 Method and apparatus for controlling temperature
The present disclosure relates to a sensor network, Machine Type Communication (MTC), Machine-to-Machine (M2M) communication, and technology for Internet of...
US-9,944,497 System and method for monitoring a transport of a passenger transportation device or transport unit
A transport-monitoring module for monitoring a transport of a transport unit of a passenger-transportation device is arranged on the transport unit. The...
US-9,944,110 QR code containing machine readable DNA and nanoparticles
A security code is provided having a diffractive holographic code of a quick response type, a data-matrix two-dimensional code or other bar code types, formed...
US-9,943,227 Selective data transmission method and system based on central monitoring system
The present invention provides a selective data transmission method and a system based on a central monitoring system. The selective data transmission method...
US-9,942,751 Audio proximity-based mobile device data sharing
At least two mobile devices introduce one another and select data for transfer to and receipt by at least one receiving mobile device using audio...
US-9,942,747 Dynamic utilization of services by a temporary device
A system for dynamically providing or utilizing services and applications on a temporary or new device is provided. A user can send a message with a secure code...
US-9,942,626 Low power wireless RF communication platform and ad-hoc security network utilizing same
Wireless radio frequency communications platform may include a plurality of sensor units communicatively coupled over a wireless radio frequency communication...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.