Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,075,9052 Method and apparatus for robotic launch and capture of a UAV
An apparatus and system for launching and/or capturing an unmanned aerial vehicle (UAV). The apparatus includes a moving substrate having an electromagnetic end...
US-1,075,7915 Long-range electronic identification system
An identification system is provided employing tags which may be targeted by a coherent energy beam such as a laser emanating from a query device controlled by...
US-1,075,7754 Techniques for securing PDCP control PDU
Techniques are described herein to secure a packet data convergence protocol (PDCP) control protocol data unit (PDU). A base station may determine a security...
US-1,075,7629 Handover method
A method of performing network handover between wireless local area network devices for a mobile device connected to a voice service via a secure data tunnel to...
US-1,075,7573 Method and system for authenticating a user
The invention relates to a method and system for authenticating a user, wherein an application transmits a query comprising identification data to an...
US-1,075,7568 System and method for communicating digital data using media content
The embodiments herein disclose an apparatus and method especially developed for the direct application in transmission involving user devices with some...
US-1,075,7425 Image encryption through dynamic compression code words
Embodiments of a system and method for secure processing of image data are described. Image data included in image files may be encrypted and compressed in a...
US-1,075,7227 Security-oriented compression
A method of data nibble-histogram compression can include determining a first amount of space freed by compressing the input data using a first compression...
US-1,075,7219 Secure network access to medical device
A method of improving network access security on a medical device includes opening a communication port on the medical device to establish a communication...
US-1,075,7194 Web-cloud hosted unified physical security system
A system comprises a web-cloud security subsystem that hosts, manages, and analyzes data related to a plurality of hosted applications that provide at least one...
US-1,075,7131 Systems and methods for attack simulation on a production network
The disclosure is directed towards systems and methods for improving security in a computer network. The system can include a planner and a plurality of...
US-1,075,7123 Dynamic record identification and analysis computer system with event monitoring components
Aspects of the disclosure relate to deploying and utilizing a dynamic record identification and analysis computer system with event monitoring components. A...
US-1,075,7113 Communications bus signal fingerprinting
Methods are provided herein for communications bus signal fingerprinting. A security module monitors a plurality of voltage lines of at least one electronic...
US-1,075,7111 Information flow enforcement for multilevel secure systems
A multilevel security fabric with address management units communicatively coupled to ports of a communication fabric and nodes of a multilevel security system...
US-1,075,7105 On-demand network security system
An on-demand virtual security system between a client and a server in communication with a network, the system including an orchestrator, wherein upon receiving...
US-1,075,7094 Trusted container
A secure identifier is derived, using a secured microcontroller of a computing device, that is unique to a pairing of the computing device and a particular...
US-1,075,7090 Secure application access system
A proxy server receives a synchronization request from an application program resident on a user device. The proxy server determines that the user device...
US-1,075,7081 Homomorphic encryption in a healthcare network environment, system and methods
A system and method for homomorphic encryption in a healthcare network environment is provided and includes receiving digital data over the healthcare network...
US-1,075,7078 Systems and methods for providing multi-level network security
Systems and methods for providing network security include receiving, by a first server of a first network, data having a destination of a second network;...
US-1,075,7073 Delegated access control of an enterprise network
Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a...
US-1,075,6964 Internet of things configuration method and system for secure low-power-consumption proxy device
An IoT configuration method and system for secure low power consumption proxy devices, the method comprising: registering an intelligent terminal and securely...
US-1,075,6914 Broadcast resource congestion control method and apparatus for use in wireless communication system
The present invention relates to a communication technology and system converging the fifth generation (5G) communication system for supporting a data rate...
US-1,075,6908 User authentication with self-signed certificate and identity verification
In embodiments, an authentication server interfaces between a user device with a self-signed certificate and a verifying computer that accepts a user name and...
US-1,075,6892 Protecting data in a multi-tenant cloud-based system
Methods and apparatus, including computer program products, are provided for securing data in a multi-tenant cloud-based system. In some implementations, there...
US-1,075,6891 Secure data communication
Methods and systems for transmitting data are described. A random data stream is generated. A data stream is generated comprising the random data stream and...
US-1,075,6888 Managing key encryption keys using a key wrapping tree
Methods and systems for securely deleting electronic files and other data stored within a data storage system are described. Each file or separately deletable...
US-1,075,6887 Method and system for securely replicating encrypted deduplicated storages
A method and system for securely replicating encrypted deduplicated storages. Specifically, the method and system disclosed herein entail the replication and...
US-1,075,6799 Method and device for transmitting and receiving channel state information in mobile communication system
Disclosed are: a communication technique for merging, with the Internet of Things (IoT) technology, a 5th-generation (5G) communication system for supporting a...
US-1,075,5554 Vector magnetic tamper detection for sensors
A magnetometer sensor that detects tampering is described. The sensor samples magnetometer data and computes a set of vectors based on the magnetometer data....
US-1,075,5512 Authentication based on through-body signals
Techniques are described for user authentication based on a signal that is transmitted through an individual's body, and detected using device(s) in physical...
US-1,075,5508 Method and system for access control
The present disclosure generally relates to a computerized method comprising: communicating access details of the facility from the mobile device to the...
US-1,075,5274 Virtualization and secure processing of data
Systems, methods, and non-transient machine-interpretable data representing executable instruction sets and/or other products for the processing of data for the...
US-1,075,5265 Officially authorized virtual identification cards
A system that allows users to display valid identification via a mobile device. Authentic and valid IDs and secure folders are verified by a certificate...
US-1,075,5264 Methods and systems for secure online payment
A secure online payment system in which, upon initiation by a card holder of a payment operation to an online merchant, the card holder is directed to a...
US-1,075,5217 Systems and methods for digital workflow and communication
Systems and methods for authoring and performing procedural workflows, and engaging in multimedia communication, remote assistance, training, data entry,...
US-1,075,5172 Secure training of multi-party deep neural network
A deep neural network may be trained on the data of one or more entities, also know as Alices. An outside computing entity, also known as a Bob, may assist in...
US-1,075,5156 Configurable integrity protected link for secure accelerator communication
Systems, methods, and apparatuses associated with data exchanged between a processor and a hardware accelerator are disclosed. In various embodiments, a method...
US-1,075,4997 Security data diode
A controller area network (CAN) controller and transceiver device implementing an output CAN network as a mirror of an adjacent connected input CAN network, the...
US-1,075,4992 Self-encrypting drive
A data security system, and a method of operation thereof, includes a data security transceiver or receiver; an authentication subsystem operatively connected...
US-1,075,4988 Anti-rollback version upgrade in secured memory chip
A secured storage system includes a non-volatile memory and a controller. The non-volatile memory is configured to store a first data item and a respective...
US-1,075,4987 Secure micro-service data and service provisioning for IoT platforms
A computer-implemented method for context-based, fine-grained data access control to microservice data is provided. The method may include retrieving a sensor...
US-1,075,4974 Secure data sharing in a multi-tenant database system
Systems, methods, and devices for implementing secure views for zero-copy data sharing in a multi-tenant database system are disclosed. A method includes...
US-1,075,4973 Secure cloud storage system
Disclosed herein are system, method, and computer program product embodiments for a secured cloud storage system. An embodiment operates by receiving a...
US-1,075,4960 Support for increased number of concurrent keys within multi-key cryptographic engine
A server includes a processor core including system memory, and a cryptographic engine storing a key data structure. The data structure is to store multiple...
US-1,075,4958 Vulnerability risk mitigation platform apparatuses, methods and systems
The VULNERABILITY RISK MITIGATION PLATFORM APPARATUSES, METHODS AND SYSTEMS ("VRMP") transforms vulnerability risk info request, malware correlation analysis...
US-1,075,4957 Non-transitory computer readable medium for creating a virtual machine manager
Methods and systems for performing an authenticated boot; performing a continuous data protection; performing automatic protection and optionally a...
US-1,075,4956 Security stack for embedded systems
A method for executing a security stack can include executing a bootloader included in a memory resource of an electronic device in response to the bootloader...
US-1,075,4954 Securely exchanging information during application startup
Provided is a method for securely exchanging information during application startup. A processor may send a request for a passphrase to one or more remote...
US-1,075,4931 Methods for configuring security restrictions of a data processing system
According to one embodiment, a security manager of a first operating system executed by a processor of a data processing system receives a request received from...
US-1,075,4628 Extracting web API endpoint data from source code to identify potential security threats
Embodiments disclosed herein are related to computing systems, and methods for extracting web API endpoint data from source code. Source code for various web...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.