Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,934,609 Method and apparatus for identifying and monitoring VoIP media plane security keys for service provider lawful...
A mechanism is described that enables encrypted end-point communications in a VoIP network to be accessed by a service provider. The mechanism includes a...
US-8,934,435 Method and system for managing information among personalized and shared resources with a personalized portable...
A user's request via a portable or handheld wireless communication device (HWCD) to process data may result in discovery of one or more networked resources...
US-8,932,409 Supercritical fluid cleaning of banknotes and secure documents
A method and apparatus for cleaning a stack of secure instruments is disclosed. Each secure instrument includes a substrate, visual data and a security feature....
US-8,932,137 System and method for secure automated data collection
The invention provides for an automated data collection having an endpoint coupled to at least one gaming machine to collect data from the at least one gaming...
US-8,931,695 Secure voting via multimedia processing resources
A voting server receives votes from a multimedia processing resource (MPR) and executes instructions for determining whether a user location is an approved...
US-8,931,195 Secure smartphone-operated gun lock with means for overriding release of the lock
A gun locking and unlocking device, which may be configured to be disposed adjacent the trigger of a gun to alternatively prevent or enable firing, includes a...
US-8,931,109 Context-based security screening for accessing data
A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with...
US-8,931,108 Hardware enforced content protection for graphics processing units
A graphics processing unit (GPU) is configured to access a first memory unit according to one of an unsecure mode and a secure mode. The GPU may include a...
US-8,931,080 Method and system for controlling the execution of a function protected by authentification of a user, in...
A method and system for controlling the execution of a function protected by authentication of a user and which is provided for example for the access to a...
US-8,931,069 Authentication with massively pre-generated one-time passwords
Embodiments of the invention provide systems and methods for the storage of One-Time Passwords (OTPs) on a device (principal) that needs to authenticate from...
US-8,931,063 Methods and apparatuses for securely operating shared host computers with portable apparatuses
The present invention provides methods and apparatuses that utilize a portable apparatus to securely operate a host electronic device. Typically, each portable...
US-8,931,053 Method and apparatus for wireless security enhancement using multiple attributes monitoring, continuous and...
The present invention is an adaptive secure wireless communications system and method. Generally, the present invention may be operable to address challenges...
US-8,931,048 Data system forensics system and method
A system and method for creates, maintains and monitors individuals, organizations and artifacts relating to the same over time with respect to pedigree and...
US-8,931,043 System and method for determining and using local reputations of users and hosts to protect information in a...
A method in an example embodiment includes correlating a first set of event data from a private network and determining a local reputation score of a host in...
US-8,931,042 Dividing a data processing device into separate security domains
This invention creates separation between personal applications and corporate applications on a data processing device, so that both types of applications can...
US-8,931,033 Integrating policies from a plurality of disparate management agents
Described herein are embodiments for managing policies of a mobile device. In embodiments, a mobile device receives policy containers from a plurality of...
US-8,930,711 Critical security parameter generation and exchange system and method for smart-card memory modules
A storage device contains a smart-card device and a memory device, which is connected to a controller. The storage device may be used in the same manner as a...
US-8,930,709 Method and apparatus for sequential authentication using one or more error rates characterizing each security...
Methods and apparatus are provided for sequential authentication of a user that employ one or more error rates characterizing each security challenge. According...
US-8,930,707 Near field communication (NFC) device and method for selectively securing records in a near field communication...
A method and apparatus for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message in a Near Field Communication (NFC)...
US-8,930,702 Strong authentication token with acoustic data input
Strong authentication tokens for generating dynamic security values having an acoustical input interface for acoustically receiving input data are disclosed....
US-8,930,700 Remote device secure data file storage system and method
A remote device secure data file storage system and method of securely storing data files at a remote device, includes a host system having a database and a...
US-8,930,699 Short-range secure data communication method based on sound wave or audio, and apparatus thereof
The present invention discloses an apparatus, a system and a method for short-range sound wave communication. The system realizes non-contact secure...
US-8,930,697 Securing digital content system and method
A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or...
US-8,930,689 Securing email conversations
At least a portion of a transmission of an outgoing first email from a first email account to at least a second email account is encrypted. Second email address...
US-8,930,688 Apparatus and method for providing security service of user interface
An apparatus and method for providing a security service for UI applications in a network system. In a network supporting a user interface, encryption-unneeded...
US-8,930,687 Secure distributed deduplication in encrypted data storage
In an encrypted storage system employing data deduplication, encrypted data units are stored with the respective keyed data digests. A secure equivalence...
US-8,930,655 Transient storage device configuration silo
A device configuration silo is arranged to be accessed as an IEEE 1667-compatible silo which exposes interfaces to a host application to make changes to the...
US-8,930,623 Method of securing data in storage device and storage device thereof
After a file is stored in a storage device, the file is segmented into a first segment and a second segment, the latter of which is relocated to a removable...
US-8,930,573 Computer networks with unique identification
A computer network is described in which the data-link layer address, e.g., MAC address, of the network cards of client nodes are used to uniquely identify the...
US-8,930,550 Selectable non-interactive entity application proxy method and system
A selectable security method and system. The method includes retrieving first configuration data associated with a non interactive entity (NIE) software...
US-8,930,494 Secure method of synchronizing cache contents of a mobile browser with a server
A method of securely synchronizing cache contents of a mobile browser with a server includes initiating a session between the browser and server, including...
US-8,930,382 High performance secure data access in a parallel processing system
A mechanism is provided for secure data access in a parallel processing system. A database having two tables is provided. A subset of the tables' primary key...
US-8,930,327 Method and system for scrubbing information from heap dumps
In production applications that process and transfer secure and sensitive customer data, the heap dump files of these applications, which may be useful for...
US-8,930,313 System and method for managing replication in an object storage system
An object storage system, such as a content addressed storage system, manages replication of objects across network locations to balance storage space and data...
US-8,930,232 Claim and progression management
The present invention is a computer implemented method and system for gathering information from a user related to, filing for, and obtaining government...
US-8,930,041 Methods of operation for plug-in wireless safety device
An aftermarket plug-in safety device that allows a vehicle to communicate with other vehicles or infrastructures in a V2X communications system. The device...
US-8,929,552 Electronic information and cryptographic key management system
Systems and methods of electronic information securement. The invention provides for the securement of electrical information and cryptographic keys through...
US-8,929,544 Scalable and secure key management for cryptographic data processing
A method and system for secure and scalable key management for cryptographic processing of data is described herein. In the method, a General Purpose...
US-8,929,188 Content transmitting apparatus for transmitting content with copy control information, content identification...
A content transmitting apparatus and the like which execute copy control of content more securely than conventional, and can count copy number correctly...
US-8,928,948 Method of creating non-patterned security elements
Described herein is a method to encode infrared (IR) security watermarks using a named color dictionary within a PDL in a device independent manner. A set of...
US-8,928,623 Auxiliary user input device
Systems and methods for providing an auxiliary user input device (101, 501, 601) for use with a mobile electronic device (181, 681). The methods involve:...
US-8,928,453 Mechatronic locking apparatus
The mechatronic locking apparatus comprises a control circuit (4), from which information signals can be transmitted to a control circuit (6) of the lock...
US-8,925,882 Mount for telemetry receiver
A mount for a telemetry receiver having a data connector and used in conjunction with a cage for housing animals and having at least one wall. The mount...
US-8,925,801 Securing communications with a pin pad
Described in an example embodiment herein is an apparatus comprising an input device and a processor communicatively coupled with the input device. The...
US-8,925,098 Data security and access tracking in memory
A memory device includes but is not limited to a substrate, a non-volatile memory array integrated on the substrate, and data security logic integrated with the...
US-8,925,095 System and method for a distributed application of a network security system (SDI-SCAM)
A widely distributed security system (SDI-SCAM) that protects computers at individual client locations, but which constantly pools and analyzes information...
US-8,925,094 Automatic synthesis of unit tests for security testing
Performing security analysis on a computer program under test (CPUT). The CPUT can be analyzed to identify data pertinent to potential security vulnerabilities...
US-8,925,093 System and method for performing remote security assessment of firewalled computer
Methods and systems for scanning an endpoint terminal across an open computer network are disclosed. An exemplary method includes providing a scanner engine in...
US-8,925,083 Cyber security in an automotive network
Preventing spoofing in an automotive network includes monitoring, by electronic control unit, data packets on a bus in the automotive network. Upon determining,...
US-8,925,082 Cooperative intrusion detection ecosystem for IP reputation-based security
An intrusion detection system (IDS) is enhanced to operate in a cluster of such systems, and IDSs organized into a cluster cooperate to exchange IP reputation...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.