Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,012,1530 Implementing eFuse visual security of stored data using EDRAM
A method and circuit for implementing Electronic Fuse (eFuse) visual security of stored data using embedded dynamic random access memory (EDRAM), and a design...
US-1,012,1294 Rapid document detection and identification
An apparatus, method, and computer program product that intentionally illuminate at least one target item with electromagnetic energy having specific...
US-1,012,1145 Electronic registration for securely providing products and services
Some embodiments are directed to a method of providing a product and/or a service, at least one non-transitory computer-readable storage medium comprising...
US-1,012,1038 Dynamic barcode ticketing carrying encrypted validation transactions
Systems, methods, and devices for conducting a secure ticketing transaction at a first location within a transit system. A media reader described herein may...
US-1,012,1032 Systems and methods for dynamic control of a security system device based on tag information
Systems and methods for controlling at least one security device based on the behavior of at least one tag. The methods comprise: generating sensor data...
US-1,012,1026 Secure enclosure systems in a provider network
A secure containment enclosure such as an equipment rack is disclosed that includes an electronic locking system. The electronic locking system locks and, upon...
US-1,012,1022 Methods and systems for encrypting data using object-based screens
A system and method is provided for encrypting data for secure storage or transport. The method includes identifying a first object comprising a string of...
US-1,012,1021 System and method for automatically securing sensitive data in public cloud using a serverless architecture
Systems and methods are provided executing jobs immediately upon receipt of a notification. The systems and methods may include receiving, at a cloud compute...
US-1,012,1020 Systems and methods of providing access to secure data
The disclosed technology includes techniques for secure access to data associated with an organization and includes providing a user device access to a user...
US-1,012,1018 Secure data synchronization
Techniques for secure data synchronization are described. In one or more implementations, a determination is made as to whether enterprise data is stored...
US-1,012,1017 Delayed data access
A system uses information submitted in connection with a request to determine if and how to process the request. The information may be electronically signed by...
US-1,012,1015 Management of data privacy and security in a pervasive computing environment
A method to provide negotiation control to data such that a person or entity can negotiate the use of data gathered beyond what is needed for a particular use...
US-1,012,1009 Computer system for discovery of vulnerabilities in applications including guided tester paths based on...
A testing system for testing computer system security includes control logic interposed between tester computers and a computer system under test. Tester...
US-1,012,1006 Mediated secure boot for single or multicore processors
A system and methods are disclosed for securely booting a processing system using a three step secure booting process. Several embodiments are presented,...
US-1,012,1001 System and method for monolithic scheduling in a portable computing device using a hypervisor
Systems for a method for monolithic workload scheduling in a portable computing device ("PCD") having a hypervisor are disclosed. An exemplary method comprises...
US-1,012,0991 Systems and methods for initiating immediate data erasure on a device
A system and method of erasing data on a data handling device may include providing a device with a data storage element and a biometric characteristic scanning...
US-1,012,0985 Protecting media items using a media security controller
A media storage device includes a media security controller and a memory to store data that relates to a media item to be rendered by a rendering device. The...
US-1,012,0977 Secure healthcare management and communication system
A healthcare management and communication system including a central server, home base devices, and portable medical assistant devices (PMAD) providing secure...
US-1,012,0923 Data discovery and analysis tool
Resources for data lineage discovery, data lineage analysis, role-based security, notification. The resources may include or involve machine readable memory...
US-1,012,0915 Integrated framework for secured data provisioning and management
Methods and system are disclosed that provision contextual information associated with business data. In one aspect, a framework middleware receives a request...
US-1,012,0853 Grid data management
Systems and methods are provided for managing data in a grid. In one example approach, a method comprises importing data from a data source to a range of cells...
US-1,012,0608 System and method for computing message digests
A data de-duplication approach leverages acceleration hardware in SSDs for performing digest computations used in de-duplication operations and support on...
US-1,011,9661 Networked LED lighting system
An improved LED lighting system is provided for overhead ceiling lighting, as well as for other uses. The LED lighting system comprises elongated linear lamps...
US-1,011,9278 Load distribution structures for raised floor data center
Load distribution structures are provided for a raised floor tile(s) of a raised floor data center. The load distribution structure, which resides adjacent to...
US-1,011,7597 Apparatus, methods and articles for four dimensional (4D) flow magnetic resonance imaging using coherency...
An MRI image processing and analysis system may identify instances of structure in MRI flow data, e.g., coherency, derive contours and/or clinical markers based...
US-RE47,119 Enabling/disabling display data channel access to enable/disable high-bandwidth digital content protection
A switcher device comprises a multiplexer coupled in-between at least one input and output cards. The multiplexer detects the presence of an event signal from...
US-1,011,7309 Internet protocol security camera with behavior detection
An apparatus comprising a battery, a power adapter and a base. The battery may be configured to provide a power source. The power adapter may be configured to...
US-1,011,7101 Geographically based access management for internet of things device data
The proliferation of IOT devices has led to an increase in sensitive, cloud-stored data. To provide further protection, IOT device data may be secured by...
US-1,011,7063 Real-time locating system with limited or no infrastructure and method of use
A locating system includes a central server to receive and process data; a device to be secured or assigned to a person or asset, the device having one or more...
US-1,011,6998 Internet protocol television streaming methods and apparatus
A system, method, and apparatus for Internet Protocol television streaming are disclosed. An example apparatus includes a remote access point configured to...
US-1,011,6868 Display-integrated user-classification, security and fingerprint system
This disclosure provides systems, methods and apparatus related to biometric authentication of a user of an electronic device. An electronic display has a...
US-1,011,6752 System and method for bridging divergent information networks
A computer system is provided that enables secure, on demand communications across IT infrastructures that may be divergent, and that may be associated with...
US-1,011,6702 Security policy unification across different security products
A management entity generates for display multiple icons, each icon representing an actor or a resource in a networking environment, and defines a generic...
US-1,011,6696 Network privilege manager for a dynamically programmable computer network
A network security policy may be implemented at network switches as a set of active packet disposition directives. In a dynamically programmable network, the...
US-1,011,6683 Computer security vulnerability assessment
Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification...
US-1,011,6673 System and method for uploading and verifying a document
A computer implemented method may allow for the upload and verification of a document. In one aspect, the method may receive a file at a data server associated...
US-1,011,6670 Event specific relationship graph generation and application in a machine data processing platform
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,011,6667 System for conversion of an instrument from a non-secured instrument to a secured instrument in a process data...
Embodiments of the invention are directed to a system, method, or computer program product for generating and using a block chain distributed network for...
US-1,011,6651 Technologies for enhancing computer security
A method of securely transmitting data comprising (1) obtaining an unencrypted data stream comprising a first sequence of values, (2) segmenting a first portion...
US-1,011,6637 Secure telecommunications
The present disclosure describes techniques for configuring and participating in encrypted audio calls, audio conferences, video calls, and video conferences....
US-1,011,6636 Apparatus and method for secure transmission avoiding duplicate data
A first communication device determines whether an encryption key is stored in a first memory in association with an identifier of data requested to transmit,...
US-1,011,6634 Intercepting secure session upon receipt of untrusted certificate
A method for intercepting, by a security gateway, a secure data session comprises the steps of establishing a first secure data session between a client device...
US-1,011,6632 System, method and computer-accessible medium for secure and compressed transmission of genomic data
An exemplary system, method and computer-accessible medium can be provided for generating an encrypted reference-based secure-compression of randomly located...
US-1,011,6629 Systems and methods for obfuscation of data via an aggregation of cloud storage services
The present disclosure describes systems and methods for aggregation and management of cloud storage among a plurality of providers via file fragmenting to...
US-1,011,6626 Cloud based logging service
Methods and systems are provided for facilitating access to a cloud-based logging service. According to one embodiment, access to a cloud-based logging service...
US-1,011,6621 Method and system for messaging security
An e-mail firewall applies policies to e-mail messages transmitted between a first site and a plurality of second sites. The e-mail firewall includes a...
US-1,011,6504 Package integrated security features
Embodiments of the invention include a physiological sensor system. According to an embodiment the sensor system may include a package substrate, a plurality of...
US-1,011,6447 Secure authentication of user and mobile device
An authentication method is disclosed. To authenticate a user, a mobile device may request identification and verification from the user. Upon receiving a...
US-1,011,6445 Method and system for protected exchange of data
A result of application of a test to information about a user (U) is securely transmitted between a source of information (A) and a destination of information...
US-1,011,6441 Enhanced-security random data
A requirement for a pseudo-random number is identified. A usage context corresponding to the requirement is determined from among a plurality of usage contexts....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.