Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,004,3590 Method, apparatus and system for securely transferring biological information
A system for providing product recommendations for two or more members of a group, including a wearable device comprising a reader for reading product...
US-1,004,3213 Systems and methods for improving computation efficiency in the detection of fraud indicators for loans with...
Certain embodiments of the disclosed technology include systems and methods for increasing efficiency in the detection of identity-based fraud indicators...
US-1,004,3186 Secure authentication system and method
Methods and systems pertaining secure transaction systems are disclosed. In one implementation, a computer with a verification token associated with a computer...
US-1,004,3180 System and method for secure transactions at a mobile device
A system and method for conducting money transfer transactions using mobile devices includes a money transfer host computer that facilitates the collection of...
US-1,004,3128 Data carrier
The present invention relates to a data carrier, especially a security document, such as an identification card, e.g. a passport or a driving license, a credit...
US-1,004,3105 Method and system to characterize video background changes as abandoned or removed objects
A method and system for analyzing video data in a security system. An analysis compares a current frame to a background model. The analysis system compares the...
US-1,004,3041 Multi-function, modular system for network security, secure communication, and malware protection
Representative embodiments are disclosed for providing network and system security. A representative apparatus includes an input-output connector coupleable to...
US-1,004,3029 Cloud storage encryption
Techniques are disclosed for securing data in a cloud storage. Plaintext files are stored as secured, encrypted files in the cloud. The ciphering scheme employs...
US-1,004,3026 Restricted replication for protection of replicated databases
Apparatuses and methods are disclosed for protection of data servers configured for data replication of a database. An example apparatus includes a processing...
US-1,004,3023 Method and device to access personal data of a person, a company, or an object
This invention aims to propose a method and a system allowing to supply certified reliable information without the source of the information being transmitted...
US-1,004,3017 Systems and methods for jurisdiction independent data storage in a multi-vendor cloud environment
A cloud based system for providing data security, the system having a processor which creates a source data file; wherein the source data file is split into at...
US-1,004,2922 Database for chatter predictions
A chatter database system, which includes a central chatter database, which is fed with data corresponding to the machining and chatter conditions of machining...
US-1,004,2680 Cross-domain data sharing with permission control
An electronic device may maintain separate OS domains associated with security permissions. The OS domain may implement separate corresponding clipboard...
US-1,004,2354 Security system for industrial control infrastructure using dynamic signatures
An industrial control system hardened against malicious activity monitors highly dynamic control data to develop a dynamic thumbprint that can be evaluated to...
US-1,004,0338 Apparatus for controlling tint of display panel provided on vehicle window to adjust light transmittance
Disclosed is an apparatus for controlling tint of a display panel provided on a vehicle window to adjust light transmittance depending on ambient light...
US-1,003,9558 Arthroplasty jig and method of performing arthroplasty
A method and system for performing a total joint arthroplasty procedure on a patient's damaged bone region. A CT image or other suitable image is formed of the...
US-1,003,9496 Near field telemetry link for passing a shared secret to establish a secure radio frequency communication link...
A physiological condition monitoring system (e.g., a continuous glucose monitoring system) includes a physiological condition meter and a physiological...
US-1,003,9327 Computing device with enabled electronic vapor device
The present disclosure relates to an electronic vaping system. In an embodiment, the electronic vaping system may be paired (e.g., communicate, exchange data,...
US-1,003,9057 Optimized deployment of BLE network and power efficient and secure management of data exchange between BLE devices
The present disclosure is related to a system for managing data exchanges between Bluetooth Low Energy (BLE) devices. The system includes a plurality of BLE...
US-1,003,9001 Method for secured transmission of a data object
A method is disclosed comprising receiving identification information on an addressee, to whom an encrypted data object is sent by a transmission device or for...
US-1,003,8931 Embedded system for video processing with hardware means
An embedded system for video processing comprises hardware means for realizing the following functions: a) a server function, wherein for realizing the server...
US-1,003,8778 Locally securing sensitive data stored on a mobile phone
Locally securing sensitive data stored on a mobile phone. In one embodiment, a computer-implemented method for locally securing sensitive data stored on a...
US-1,003,8721 Enabling an on-premises resource to be exposed to a public cloud application securely and seamlessly
An application deployed in a public cloud is enabled to access an on-premises resource securely and without requiring additional ports on a firewall. A pair of...
US-1,003,8720 Master security policy server
A master policy server manages security polices for client computers through a network of local policy servers. Each local policy server is responsible for the...
US-1,003,8708 Geo-mapping system security events
A particular security event is identified that has been detected as targeting a particular computing device included in a particular computing system. A...
US-1,003,8707 Rarity analysis in network security anomaly/threat detection
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,003,8701 Method for detecting security error in mobile telecommunications system and device of mobile telecommunications
According to one embodiment, a method of performing a re-establishment procedure in a mobile communication system includes: receiving at least one packet data...
US-1,003,8694 System and method for security mode-based authorization for data management operations in a multi-tenant...
According to one embodiment, a request is received from a remote device of a user for performing a data management operation from source data represented by a...
US-1,003,8693 Facilitating secure network traffic by an application delivery controller
Facilitation of secure network traffic by an application delivery controller is provided herein. In some examples, a method includes: (a) receiving a data...
US-1,003,8689 Dynamic password generation
Aspects of the present disclosure relate to dynamically generating a security challenge and corresponding password. A set of user activity data may be obtained...
US-1,003,8674 Secure mobile data sharing
Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for providing secure mobile data sharing. Actions can...
US-1,003,8669 Path control system, control device, and path control method
To provide a path control system, a control device and a path control method that can achieve reduction of the load on a gateway device, there are included a...
US-1,003,8565 Methods and systems for bypassing authenticity checks for secure control modules
Methods and systems are provided for bypassing an authenticity check for a secure control module. In one embodiment, a method includes: receiving authenticity...
US-1,003,8557 Secure object access
A method of a security system to provide access by a requester to an encrypted data object stored in an object store, the requester being authenticated by the...
US-1,003,8551 Securing enterprise data on mobile devices
Embodiments include method, systems and computer program products for securing enterprise data in a mobile computing environment. Aspects include receiving a...
US-1,003,8550 Instruction and logic to provide a secure cipher hash round functionality
Instructions and logic provide secure cipher hashing algorithm round functionality. Some embodiments include a processor comprising: a decode stage to decode an...
US-1,003,8475 Proximity boundary based communication using radio frequency (RF) communication standards
Technology is described for proximity based communications. A proximity boundary can be defined with dimensions defined by a communication range of one of a...
US-1,003,8339 Dual mode wireless power receiver
A dual mode wireless power receiver (DMWPR) selectively applying a received power to a load device and utilizing at least a part of the power to power-up,...
US-1,003,7653 Peer-to-peer (P2P) code exchange facilitation in centrally managed online service
Technologies are generally provided for a hybrid architecture of an enhanced networked environment implementing a centralized management of peer-to-peer (P2P)...
US-1,003,7557 Connecting transaction entities to one another securely and privately, with interaction recording
A system and method for connecting first and second transaction entities includes displaying a transaction associated with the first transaction entity where...
US-1,003,7523 Over the air update of payment transaction data stored in secure memory
A system, apparatus, and method for processing payment transactions that are conducted using a mobile device that includes a contactless element, such as an...
US-1,003,7487 Single-chip financial audio IC card
The application discloses a single-chip financial audio IC card, including a security chip, a contact module, a non-contact module and an audio module switch....
US-1,003,7441 Bus protection with improved key entropy
An apparatus includes a processor and a bus encryption unit. The processor is configured to communicate information over a secured data bus, and to communicate...
US-1,003,7438 Setting security features of programmable logic devices
Systems and methods are disclosed for allowing security features to be selectively enabled during device configuration. For example, a programmable integrated...
US-1,003,7436 Device using secure storage and retrieval of data
An appliance is capable of storing and processing data related to details surrounding its ownership, behavior, and history within itself in a secure and...
US-1,003,7435 Providing secure indexes for searching encrypted data
Providing an encrypted search index for performing searches on encrypted documents, the method comprising: (i) providing a set of documents, the documents...
US-1,003,7432 Implementing file security settings based on context
One embodiment provides a method including: obtaining, using a processor, at least one file; accessing, using a processor, context data associated with the at...
US-1,003,7428 Data security using request-supplied keys
Requests are submitted to a request processing entity where the requests include a cryptographic key to be used in fulfilling the request. The request...
US-1,003,7418 Pre-boot authentication credential sharing system
A pre-boot authentication (PBA) credential sharing system includes a secure subsystem including an off-host processing system and a secure storage. A credential...
US-1,003,7330 Security via dynamic data movement in a cloud-based environment
Methods, apparatuses, and embodiments related to improving security of data that is stored at a data store distributed over a computer network or remote...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.