Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,907,793 Transportation security system and associated methods
A security system for monitoring a shipping container being transported on a cargo transport vehicle and methods for making and using same. A mounting device...
US-8,907,770 System and method of controlling vehicle functions
A method of controlling vehicle functions is provided that includes receiving at a service provider, security data from a vehicle function system. The security...
US-8,907,768 Access using a mobile device with an accelerometer
Embodiments of the present invention are directed to systems, apparatuses and methods for using a mobile device with an accelerometer to gain access into a...
US-8,907,221 Reinforced intelligent cables
Provided are cables for transmitting media data between media transmitters and receivers. A cable includes an integrated circuit for performing this data...
US-8,905,855 System and method for utilizing motion capture data
System and method for utilizing motion capture data for healthcare compliance, sporting, gaming, military, virtual reality, industrial, retail loss tracking,...
US-8,905,068 Cartridge
The invention relates to a cartridge (1) for insertion into a receptacle of a motor vehicle handling facility having an interior chamber (2) which receives a...
US-8,904,555 Computer implemented system for facilitating configuration, data tracking and reporting for data centric...
A computer implemented system for facilitating configuration, data tracking and reporting for data centric applications and a method for performing the same...
US-8,904,549 Server system, control method, and storage medium for securely executing access to data of a tenant
In a multitenant service, security of the entire service is guaranteed by logically separating data for each tenant, and performing control to prevent access to...
US-8,904,544 Restrictions to data transmission
Data received at, or created on, a device may be tagged as corporate dependent upon a service over which the data is received or an application in which the...
US-8,904,541 Performing security assessments in an online services system
A system and method for performing security assessments in an online services system. In one embodiment, a method includes receiving an accepted security...
US-8,904,527 Centralized security management system
A centralized security management system (CSMS) is provided to monitor a network to detect and mitigate attacks in or to the network. The CSMS includes a...
US-8,904,512 Distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the...
US-8,904,495 Secure transaction systems and methods
A user transaction request is received at a client device. A web browser plug-in communicates the user transaction request to a server that determines whether...
US-8,904,480 Social authentication of users
User authentication is provided. A social network associated with a user of a client device is monitored to determine whether a set of designated users are...
US-8,904,477 Configuring and providing profiles that manage execution of mobile applications
Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user...
US-8,904,473 Secure display system for prevention of information copying from any display screen system
Devices, methods, and computer programs are presented for displaying information output of a host. One apparatus includes a housing that includes a panel, a...
US-8,904,194 Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-8,904,190 Method and apparatus including architecture for protecting sensitive code and data
A secure execution environment for execution of sensitive code and data including a secure asset management unit (SAMU) is described. The SAMU provides a secure...
US-8,904,188 Trusted storage systems and methods
Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of...
US-8,904,187 Secure biometric verification of identity
A high security identification card includes an on-board memory for stored biometric data and an on-board sensor for capturing live biometric data. An on-board...
US-8,904,181 System and method for secure three-party communications
A system and method for communicating information between a first party and a second party, comprising the steps of receiving, by an intermediary, an identifier...
US-8,904,180 Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and...
A key management system includes secured data stored on a first system secured by a control key stored securely on a key server. The secured data is secured...
US-8,904,175 System and method for secure distribution and/or storage of data files with long term file integrity verification
Systems and methods for securely uploading, distributing, managing and/or storing any type of data file within a subscriber-based system maintained by a third...
US-8,904,173 System and method for securely moving content
A domain controller is provided for use with a content source and a media device. The content source can provide encrypted content and rights data corresponding...
US-8,904,166 Secure client-side communication between multiple domains
Methods and systems for secure client-side communication between multiple domains is provided. Such methods and systems can provide for decreased communication...
US-8,904,162 Methods and apparatus for performing secure BIOS upgrade
A data processing system may comprise a primary basic input/output system (BIOS) image in a primary BIOS region and a rollback BIOS image in a rollback BIOS...
US-8,904,080 Tape backup method
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-8,903,836 System and method for parsing, summarizing and reporting log data
A system and method is disclosed which enables network administrators and the like to quickly analyze the data produced by log-producing devices such as network...
US-8,903,744 System and method for controlling access to personal identification information contained in documents
A system and method for creating a document containing secured personal identification information includes a database containing personal identification...
US-8,903,743 Cryptographic prescription system
A method, computer program product, and data processing system for secure automated dispensing of prescription medications are disclosed. A preferred embodiment...
US-8,903,521 Motion capture element
Motion capture element for low power and accurate data capture for use in healthcare compliance, sporting, gaming, military, virtual reality, industrial, retail...
US-8,903,361 Network locking method and apparatus for terminal
Embodiments of the present disclosure provide a network locking method and apparatus for a terminal. The method mainly includes: utilizing an IMSI number...
US-8,903,315 Secure context-based computing
An embodiment of the invention includes an article with instructions that enable a first unit to: (a) sense the first unit's local surroundings to determine...
US-8,903,128 Object recognition for security screening and long range video surveillance
A method of detecting an object in image data that is deemed to be a threat includes annotating sections of at least one training image to indicate whether each...
US-8,903,093 Mobile device, method of processing an input in a mobile device and electronic payment method using a mobile device
Handheld wireless communications devices include a data input device, which is configured to receive first input data provided by a user, a main processor and a...
US-8,903,091 Optical system with imparted secure codes
A secure optical communication system and method are disclosed. Short optical pulses are first modulated with data, then dispersed in time so that they spread...
US-8,903,090 Securely classifying data
Techniques are disclosed for securely classifying or decoding data. By way of example, a method of determining a most likely sequence for a given data set...
US-8,903,086 Enabling/disabling display data channel access to enable/disable high-bandwidth digital content protection
A switcher device comprises a multiplexer coupled in-between at least one input and output cards. The multiplexer detects the presence of an event signal from...
US-8,903,084 Efficient key derivation for end-to-end network security with traffic visibility
Both end-to-end security and traffic visibility may be achieved by a system using a controller that derives a cryptographic key that is different for each...
US-8,902,825 Wireless network system and method of configuring the same
Provided are a wireless network system and a method of configuring the same, more particularly, a wireless network system and a method of configuring the same,...
US-8,902,311 Building security system
A security system that can be used in a home, office, or other building in order to generate alarms or take other actions depending on conditions within the...
US-8,902,064 Security system
A security system comprises a plurality of alarm points distributed at a plurality of positions in a building; signal processing module for receiving alarm...
US-8,901,954 Active shield with electrically configurable interconnections
Introduced is an active shield method providing security to a security critical integrated circuit against some physical attacks like probing, manipulation and...
US-8,899,488 RFID tag system
An RFID tag system includes a housing that includes an enclosed sidewall and forms a recess with a housing base surface, where the housing is configured and...
US-8,898,807 Data protecting method, mobile communication device, and memory storage device
A data protecting method for a mobile communication device is provided. The data protecting method includes storing first authentication information into a...
US-8,898,801 Method for protecting a digital rights file description
The invention relates to a method of protecting a file containing a plurality of rights descriptions D.sub.i (i=1 . . . N), each right D.sub.i defining use by a...
US-8,898,794 Efficient and secure data structure synchronization
One embodiment of a computer-implemented data structure synchronization mechanism comprises an interface for accessing a data structure and storing ownership...
US-8,898,792 Search mechanism for content based information security repositories
A secure search mechanism (or search engine) for use with content based information security repositories. The present invention may be embodied in an...
US-8,898,787 Software vulnerability exploitation shield
This paper describes a mechanism for minimizing the exploitation of vulnerabilities on software installed on a computing system. At a transport layer (e.g.,...
US-8,898,768 Computer or microchip with a secure control bus connecting a central controller to volatile RAM and the...
A computer or microchip comprising a central controller that connected by a secure control bus with the other parts of the computer or microchip, including a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.