Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,793,758 Security, fraud detection, and fraud mitigation in device-assisted services systems
A device that detects an attempted installation of update software on the device, the update software purporting to be a modification, update, or replacement of...
US-8,793,722 Protection method and device for the secure distribution of audio-visual works
A process for secure distribution of video sequences coded in accordance with a nominal stream format including visual data and data for configuration of...
US-8,793,508 Local trusted services manager for a contactless smart card
Systems, methods, computer programs, and devices are disclosed herein for deploying a local trusted service manager within a secure element of a contactless...
US-8,793,504 Validating a system with multiple subsystems using trusted platform modules and virtual platform modules
Software validation is provided for a breakout system having multiple subsystems at the edge of a mobile data network. The software validation utilizes one or...
US-8,793,493 System and method of secure encryption for electronic data transfer
A system for secure transfer of encrypted data involves a sender client, a recipient client, a main server, and a key server. The sender client receives...
US-8,793,489 Method and system for controlling data access to organizational data maintained in hierarchical
Embodiments are described for a system and method of controlling access to information in an organization by defining a hierarchical organizational structure of...
US-8,793,488 Detection of embedded resource location data
Systems, methods and apparatus for a distributed security that detects embedded resource request identifiers. The system can identify requests, such as HTTP...
US-8,793,483 Computer-based, automated workflow system for sending secure reports
Computer-based systems and method for automating the workflow for generating and sending e-mails with attached reports to external recipients in order to reduce...
US-8,793,457 Method and system for policy-based secure destruction of data
An apparatus, system, and method are disclosed for policy-based secure destruction of data. The method for policy-based secure destruction of data is provided....
US-8,793,302 Secure implementation of network-based sensors
Sensing apparatus includes a network camera, which is configured to capture images of a scene and to output a sequence of data packets containing digitized...
US-8,793,211 System and method for secure information sharing with untrusted recipients
System, method and computer program product for modelling information sharing domains as Partially Observable Markov Decision Processes (POMDP), and that...
US-8,793,204 Classification device and classification method
Provided is a classification device capable of classifying time series data of location information into groups in which continuity of time is secured. The...
US-8,793,185 System and method for securing information distribution via email
A method facilitating secure financial transactions using email is presented comprising the steps of receiving bill data at a server implementing the method,...
US-8,792,939 Non-wireless bidirectional communication between a mobile device and associated secure element using an audio port
In some embodiments, a system includes a mobile communication device and a secure element physically coupled to the mobile communication device. The mobile...
US-8,792,862 Providing enhanced security for wireless telecommunications devices
A method and system for use in providing enhanced security for wireless telecommunications devices is disclosed. In at least one embodiment, the method and...
US-8,792,780 Reproduction and recording apparatus and method for playing back and recording data encoded according to a...
The present invention relates to a recoding device, a recording method, a playback device, a playback method, a program, and a recording medium, whereby...
US-8,792,677 Large venue security method
A method for reducing violence within crowded venues includes reading license plates of vehicles passing into entry ports of a parking area, and capturing...
US-8,792,645 Authentication and data security for wireless networks
A method and apparatus of providing a security system. The method includes the steps of a registering sensor having a secret key and an IEEE or MAC address...
US-8,792,640 Systems and methods for securing a digital communications link
A digital data signal, such as a digital video signal, is intentionally pre-distorted before being sent over a network. In one embodiment, this pre-distortion...
US-8,792,637 Downloading of data to secure devices
An encryption key may be generated based on personalized unit data associated with a software download recipient, for example, a secure processor. In some...
US-8,792,626 Transmission of utility data
Certain embodiments are directed at methods and systems for transmitting utility usage data using a public switched telephone network ("PSTN"). The methods and...
US-8,792,115 System and control method for securing information between image processing device and image forming device
A system includes an image processing device configured to output image data to an image forming device and the image forming device is configured to form an...
US-8,792,114 System, method and recordable medium for previewing a document over the network
The invention generally relates to sending data (e.g. print data or a document), in a network environment, to a port monitor, and to upload the data to an...
US-8,791,984 Digital security camera
The systems and methods described herein provide imaging systems for imaging a scene. The imaging system includes an optical head, a processor, and an analog...
US-8,791,791 Sea-based security arch for identifying shipping contraband
The invention discloses devices and methods for analyzing inbound and outbound ships for illegal or dangerous cargo or persons. An arch is generally placed...
US-8,791,665 Energy storage device security
Exemplary embodiments are directed to energy storage device security. An energy storage device may include at least one energy storage cell and a controller....
US-8,789,201 Secure personal content server
A local content server system (LCS) for creating a secure environment for digital content is disclosed, which system comprises: a communications port in...
US-8,789,195 Method and system for access control and data protection in digital memories, related digital memory and...
A digital memory such as a memory card for mobile communication equipment, is adapted to be accessed by a plurality of users and have protected data stored...
US-8,789,181 Flow data for security data loss prevention
There are techniques for detecting and preventing possible security violations in a computer network. The security violation detection may be based on data...
US-8,789,166 Verification method and system thereof
The invention discloses an authenticating method and a system thereof, which relates to information security field and solves the problem that the user...
US-8,789,161 Device and method for authenticating a transaction with a data processing apparatus
A device or "dongle" (30) is provided for controlling communications between a Subscriber Identity Module (for SIM) (12), such as of the type used in a GSM...
US-8,789,160 Function-based authorization to access electronic devices
Systems and methods to secure authorized access are disclosed. A method includes receiving, an electronic device, a request to generate function-authorization...
US-8,789,149 Method and apparatus for communicating between a user device and a user device locating module to allow a...
A system and method for communicating between a user device locator module and a user receiving device includes forming a secure connection with the user device...
US-8,789,148 Systems and methods for deployment of secure shell devices
A shell device with minimal software and/or hardware resources can download from a server configuration information and/or user data in order to allow the shell...
US-8,789,140 System and method for interfacing with heterogeneous network data gathering tools
A prevention-based network auditing system includes a plurality of heterogeneous information sources gathering information about the network. An audit server...
US-8,789,136 Securing a device based on atypical user behavior
A system and method for securing the mobile device applies the rules to determine if an event associated with an application is a secure event. If the event is...
US-8,789,027 Software analysis framework
Presently described is a decompilation method of operation and system for parsing executable code, identifying and recursively modeling data flows, identifying...
US-8,788,971 Methods and arrangements for composing information-carrying artwork
Data defining several different information-carrying patterns can be stored on mass storage of a computer workstation and serve as a library of design elements...
US-8,788,850 Systems and methods for using a security circuit to monitor a voltage of an integrated circuit to counter...
One embodiment, having a corresponding method, features an integrated circuit comprising: a power supply terminal configured to receive electrical power; a core...
US-8,788,847 Secure data processing method and associated device
A secure data processing method includes the following steps: padding (E206) a memory area (MAC') with a pad value (A); writing (E208) a first datum in the...
US-8,788,845 Data access security
An execution environment of a computer computes an initial effective permissions set for managed code based on user identity evidence, code evidence and/or a...
US-8,788,840 Secure processor
A secure hardware comprises a secure pipe, a secure DMA, a secure assist and a secure bus, which connects between those blocks. The secure pipe stores a common...
US-8,788,819 System and method for a cloud-based electronic communication vault
Disclosed is a system and method for securely, conveniently and effectively storing information in a secure data repository or database, and securely delivering...
US-8,788,814 Secure data transfer using an embedded system
A method and device for securing data transmission via an embedded system that is operationally coupled to a local device and a remote computing system using a...
US-8,788,805 Application-level service access to encrypted data streams
Techniques for securely providing cryptographic keys to trusted intermediate nodes or monitoring devices are described so that SSL, TLS, or IPSec communications...
US-8,788,786 Storage system creating cache and logical volume areas in flash memory
The temporary area capacity required to be secured with respect to the whole permanent area is calculated in accordance with the capacity and access frequency...
US-8,788,705 Methods and apparatus for secure routing of data packets
Methods and arrangements for supporting a forwarding process in routers when routing data packets through a packet-switched network, by employing hierarchical...
US-8,788,532 Firewalls for securing customer data in a multi-tenant environment
Network security is enhanced in a multi-tenant database network environment using a query plan detection module to continually poll the database system to...
US-8,788,428 Multimode retail system
Embodiments of a multimode system for use in, for example, a fuel dispenser, are configured for receiving data in a retail environment. The multimode system can...
US-8,788,427 Limiting data exposure in authenticated multi-system transactions
The limiting of data exposure in authenticated multi-system transactions is disclosed. A client system authenticates and requests secured data and unsecured...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.