Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,935,533 Method and apparatus for a scalable and secure transport protocol for sensor data collection
A new approach for a transport protocol for sensor data collection, such as a smart grid is described. In one embodiment of the invention, each server avoids...
US-8,935,528 Techniques for ensuring authentication and integrity of communications
Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a...
US-8,935,527 Secure transmission with error correcting code
The invention concerns a method and a system for encoding digital data (DATA) represented by source symbols, with an error correcting code generating parity...
US-8,935,520 Control word obfuscation in secure TV receiver
A device for descrambling encrypted data includes a descrambler, a secure link, and a secure element that securely transmits a control word to the descrambler...
US-8,935,427 Providing virtual networks using multi-tenant relays
Embodiments are directed to providing a multi-tenant relay service that securely relays data between computer systems. A computer system receives a portion of...
US-8,935,317 Dynamic partitioning of applications between clients and servers
Optimization mechanism that dynamically splits the computation in an application (e.g., cloud), that is, which parts run on a client (e.g., mobile) and which...
US-8,935,181 Municipal bond tracking and evaluation system
The present invention relates to a web-application that gathers raw data and meta data, matches debt related data with corresponding meta data, marks the debt...
US-8,935,095 Safety system and device and methods of operating
Various embodiments of a device, system and methods that promote safety and security within an organization. Sensor data from one or more installation sensors...
US-8,935,019 Apparatus and method for power production, control, and/or telematics, suitable for use with locomotives
A power system housed in modules or containers may be located as a unitary structure for example secured to a locomotive platform, allowing easy retrofits. A...
US-8,934,940 Providing enhanced security for wireless telecommunications devices
A method and system for use in providing enhanced security for wireless telecommunications devices is disclosed. In at least one embodiment, the method and...
US-8,934,864 Cellular device security apparatus and method
A cellular communication device has one or more access modes which allow reading and writing of data, for example to change its settings, for example passwords...
US-8,934,633 Encrypted communication system, transmitter and receiver using same
High-security communications against information leakage as well as high-speed communications are realized using present optical fiber networks. The methods are...
US-8,934,609 Method and apparatus for identifying and monitoring VoIP media plane security keys for service provider lawful...
A mechanism is described that enables encrypted end-point communications in a VoIP network to be accessed by a service provider. The mechanism includes a...
US-8,934,435 Method and system for managing information among personalized and shared resources with a personalized portable...
A user's request via a portable or handheld wireless communication device (HWCD) to process data may result in discovery of one or more networked resources...
US-8,932,409 Supercritical fluid cleaning of banknotes and secure documents
A method and apparatus for cleaning a stack of secure instruments is disclosed. Each secure instrument includes a substrate, visual data and a security feature....
US-8,932,137 System and method for secure automated data collection
The invention provides for an automated data collection having an endpoint coupled to at least one gaming machine to collect data from the at least one gaming...
US-8,931,695 Secure voting via multimedia processing resources
A voting server receives votes from a multimedia processing resource (MPR) and executes instructions for determining whether a user location is an approved...
US-8,931,195 Secure smartphone-operated gun lock with means for overriding release of the lock
A gun locking and unlocking device, which may be configured to be disposed adjacent the trigger of a gun to alternatively prevent or enable firing, includes a...
US-8,931,109 Context-based security screening for accessing data
A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with...
US-8,931,108 Hardware enforced content protection for graphics processing units
A graphics processing unit (GPU) is configured to access a first memory unit according to one of an unsecure mode and a secure mode. The GPU may include a...
US-8,931,080 Method and system for controlling the execution of a function protected by authentification of a user, in...
A method and system for controlling the execution of a function protected by authentication of a user and which is provided for example for the access to a...
US-8,931,069 Authentication with massively pre-generated one-time passwords
Embodiments of the invention provide systems and methods for the storage of One-Time Passwords (OTPs) on a device (principal) that needs to authenticate from...
US-8,931,063 Methods and apparatuses for securely operating shared host computers with portable apparatuses
The present invention provides methods and apparatuses that utilize a portable apparatus to securely operate a host electronic device. Typically, each portable...
US-8,931,053 Method and apparatus for wireless security enhancement using multiple attributes monitoring, continuous and...
The present invention is an adaptive secure wireless communications system and method. Generally, the present invention may be operable to address challenges...
US-8,931,048 Data system forensics system and method
A system and method for creates, maintains and monitors individuals, organizations and artifacts relating to the same over time with respect to pedigree and...
US-8,931,043 System and method for determining and using local reputations of users and hosts to protect information in a...
A method in an example embodiment includes correlating a first set of event data from a private network and determining a local reputation score of a host in...
US-8,931,042 Dividing a data processing device into separate security domains
This invention creates separation between personal applications and corporate applications on a data processing device, so that both types of applications can...
US-8,931,033 Integrating policies from a plurality of disparate management agents
Described herein are embodiments for managing policies of a mobile device. In embodiments, a mobile device receives policy containers from a plurality of...
US-8,930,711 Critical security parameter generation and exchange system and method for smart-card memory modules
A storage device contains a smart-card device and a memory device, which is connected to a controller. The storage device may be used in the same manner as a...
US-8,930,709 Method and apparatus for sequential authentication using one or more error rates characterizing each security...
Methods and apparatus are provided for sequential authentication of a user that employ one or more error rates characterizing each security challenge. According...
US-8,930,707 Near field communication (NFC) device and method for selectively securing records in a near field communication...
A method and apparatus for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message in a Near Field Communication (NFC)...
US-8,930,702 Strong authentication token with acoustic data input
Strong authentication tokens for generating dynamic security values having an acoustical input interface for acoustically receiving input data are disclosed....
US-8,930,700 Remote device secure data file storage system and method
A remote device secure data file storage system and method of securely storing data files at a remote device, includes a host system having a database and a...
US-8,930,699 Short-range secure data communication method based on sound wave or audio, and apparatus thereof
The present invention discloses an apparatus, a system and a method for short-range sound wave communication. The system realizes non-contact secure...
US-8,930,697 Securing digital content system and method
A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or...
US-8,930,689 Securing email conversations
At least a portion of a transmission of an outgoing first email from a first email account to at least a second email account is encrypted. Second email address...
US-8,930,688 Apparatus and method for providing security service of user interface
An apparatus and method for providing a security service for UI applications in a network system. In a network supporting a user interface, encryption-unneeded...
US-8,930,687 Secure distributed deduplication in encrypted data storage
In an encrypted storage system employing data deduplication, encrypted data units are stored with the respective keyed data digests. A secure equivalence...
US-8,930,655 Transient storage device configuration silo
A device configuration silo is arranged to be accessed as an IEEE 1667-compatible silo which exposes interfaces to a host application to make changes to the...
US-8,930,623 Method of securing data in storage device and storage device thereof
After a file is stored in a storage device, the file is segmented into a first segment and a second segment, the latter of which is relocated to a removable...
US-8,930,573 Computer networks with unique identification
A computer network is described in which the data-link layer address, e.g., MAC address, of the network cards of client nodes are used to uniquely identify the...
US-8,930,550 Selectable non-interactive entity application proxy method and system
A selectable security method and system. The method includes retrieving first configuration data associated with a non interactive entity (NIE) software...
US-8,930,494 Secure method of synchronizing cache contents of a mobile browser with a server
A method of securely synchronizing cache contents of a mobile browser with a server includes initiating a session between the browser and server, including...
US-8,930,382 High performance secure data access in a parallel processing system
A mechanism is provided for secure data access in a parallel processing system. A database having two tables is provided. A subset of the tables' primary key...
US-8,930,327 Method and system for scrubbing information from heap dumps
In production applications that process and transfer secure and sensitive customer data, the heap dump files of these applications, which may be useful for...
US-8,930,313 System and method for managing replication in an object storage system
An object storage system, such as a content addressed storage system, manages replication of objects across network locations to balance storage space and data...
US-8,930,232 Claim and progression management
The present invention is a computer implemented method and system for gathering information from a user related to, filing for, and obtaining government...
US-8,930,041 Methods of operation for plug-in wireless safety device
An aftermarket plug-in safety device that allows a vehicle to communicate with other vehicles or infrastructures in a V2X communications system. The device...
US-8,929,552 Electronic information and cryptographic key management system
Systems and methods of electronic information securement. The invention provides for the securement of electrical information and cryptographic keys through...
US-8,929,544 Scalable and secure key management for cryptographic data processing
A method and system for secure and scalable key management for cryptographic processing of data is described herein. In the method, a General Purpose...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.