Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,561,154 Method for providing network perimeter security assessment
A method for providing network perimeter security assessment that involves a combination of perimeter security assessment disciplines is disclosed. A security...
US-8,561,144 Enforcing security based on a security state assessment of a mobile device
Security data generated by an application running on a mobile communications device is stored in a database. The security data is processed to assess a current...
US-8,561,143 Proxy registration and authentication for personal electronic devices
Communication systems, media, and methods for authenticating and registering unauthenticated electronic devices are provided. The communication systems include...
US-8,561,139 Method and appartus for network security using a router based authentication
A router based authentication system provides packet level authentication of incoming data packets and eliminates the risk of having data packets come in to the...
US-8,561,138 System and method to provide added security to a platform using locality-based data
In some embodiments, the invention involves protecting a platform using locality-based data and, more specifically, to using the locality-based data to ensure...
US-8,561,078 Task switching and inter-task communications for multi-core processors
The invention provides hardware based techniques for switching processing tasks of software programs for execution on a multi-core processor. Invented...
US-8,560,864 Firewall for removable mass storage devices
A firewall device comprising a first connection device for connecting with a data device supporting transfer data with a removable mass storage device; second...
US-8,560,863 Systems and techniques for datapath security in a system-on-a-chip device
Various embodiments for providing datapath security in a system-on-a-chip (SOC) device are described. In one embodiment, an apparatus may comprise a security...
US-8,560,858 Secure session identifiers
An apparatus and a method for an authentication protocol. In one embodiment, a server generates a sequence number, and a server message authentication code...
US-8,560,839 Tamper proof location services
A secure location system is described herein that leverages location-based services and hardware to make access decisions. Many mobile computers have location...
US-8,560,835 Method and apparatus for machine-to-machine communication
According to a first aspect of the present invention there is provided a method of at least partly delegating processing of data in a machine-to-machine system...
US-8,560,826 Secure virtualization environment bootable from an external media device
Methods and systems for creating a secure virtualization environment on a host device, without modifying the host device, the secure virtualization environment...
US-8,560,823 Trusted modular firmware update using digital certificate
An over-the-air firmware update is accomplished in a secure manner using a two-step process. The first step uses an initial boot using a fixed boot program and...
US-8,560,785 Techniques for providing multiple levels of security for a backup medium
Techniques for providing multiple levels of security for backups are disclosed. In one particular exemplary embodiment, the techniques may be realized as a...
US-8,560,734 Secure communication port redirector
A method and system that allows a host system application to securely communicate with a legacy device is provided. A redirector software module receives data...
US-8,560,648 Location control service
In embodiments of a location control service, location data that identifies the location of a device is stored in a memory module, such as secured non-volatile...
US-8,560,557 Method and system of progress monitoring
It is possible to enable the secure, efficient, and synchronized transmittal of data between users, eliminate the need for a body-worn transmitting device, and...
US-8,560,541 Generating reports in an online services system
A system and method for performing security assessments in an online services system. In one embodiment, the method includes receiving a list of target data for...
US-8,560,456 System and method for an anonymous exchange of private data
Facilitating the purchase and sale of private data between anonymous entities based on the use of encryption and a centralized on-line entity to exchange the...
US-8,560,453 Method and apparatus for dynamic, real-time ad insertion based on meta-data within a hardware based root of trust
A client computing system inserts selected advertising into digital content. Ads may be inserted into content based on a dynamic advertising matching process...
US-8,560,378 System and method of reviewing and producing documents
A system and method of providing comprehensive document review, production and reporting is described. The system and method provide a total quality management...
US-8,560,100 Combination multimedia, brain wave and subliminal affirmation media player and recorder
System, method, and application to integrate a web browser and/or search engine with multiple media players-recorders into an Internet web virtual application,...
US-8,559,987 Wireless bidirectional communications between a mobile device and associated secure element
In some embodiments, a system includes a mobile communication device and a secure element physically coupled to the mobile communication device. The mobile...
US-8,559,639 Method and apparatus for secure cryptographic key generation, certification and use
A confidential datum, such as a private key used in public key signature systems, is secured in a digital wallet using a "generation camouflaging" technique....
US-8,559,637 Securing information exchanged via a network
A privacy key is provided over a network. An information page is provided over the network. A submission of data that is to be transmitted over the network in...
US-8,558,889 Method and system for security system tampering detection
A method and system for detecting tampering of a security system component is provided. An analytic alarm indicative of potential tampering with a security...
US-8,558,694 Asset management for information technology resources
A method to identify information technology resources whereby a locator device is inserted into a communication port of each information technology resource,...
US-8,558,685 Remote display tamper detection using data integrity operations
Methods and systems for detecting tampering of a remote display. According to one method, a first data integrity result is generated by performing a first data...
US-8,558,414 Voltage regulator for merchandise display security device
A voltage regulator for a merchandise display security device provides an appropriate operating voltage through a power cable electrically connected between an...
US-8,556,991 Approaches for ensuring data security
Techniques for protecting resources of a client from theft or unauthorized access. A BIOS agent stores policy data within a BIOS of the client. The BIOS agent...
US-8,556,709 Virtual player tracking and related services
Various gaming-related services are provided, including but not limited to security services, harm minimization services, player identification services,...
US-8,556,388 Printhead assembly with multiple printhead modules and printed circuit boards in single casing
A printhead assembly that has a casing with a series of module mounting sites, printed circuit board mounting sites and busbar support formations. A printhead...
US-8,556,219 Mounting apparatus for data storage device
A mounting apparatus for a data storage device comprises a bracket and a locking member attached to the bracket. A plurality of fixing holes is defined in one...
US-D691,457 Lock
US-8,555,397 Consumer-controlled data access to shared RFID data
An electronic product code information service (EPCIS) interface is provided, where the EPCIS interface allows accessing applications residing on a variety of...
US-8,555,393 Automated testing for security vulnerabilities of devices
A method includes selecting an attack signature from an attack signature database; generating a fingerprint that includes parameters indicative of the attack...
US-8,555,381 Cloud computing as a security layer
A system includes a computing cloud comprising at least one data storage unit and at least one processing unit. The computing cloud is configured to connect to...
US-8,555,373 Network security module for Ethernet-receiving industrial control devices
A high-speed security device for network connected industrial controls provides hybrid processing in tandem hardware and software security components. The...
US-8,555,371 Systems and methods for management of nodes across disparate networks
The present invention is directed generally to systems and methods for management of nodes, such as multimedia communication endpoints and/or intermediary...
US-8,555,367 Method and system for securely streaming content
A system and method for securely streaming media. The system includes a gateway server that receives requests for access to a secured data resource from an end...
US-8,555,342 Providing secure access to a set of credentials within a data security mechanism of a data storage system
A technique provides secure access to a set of credentials within a data storage system. The technique involves obtaining a unique identifier (e.g., a hostname...
US-8,555,335 Securing distributed application information delivery
In an example implementation, a data structure comports with a secure application instruction protocol. The data structure includes a first application-level...
US-8,555,088 Method and apparatus for implementing secure and selectively deniable file storage
The invention concerns a method for writing data to a memory device arrangement comprising a first and a second memory device in which the first memory device...
US-8,555,085 Enhancing useability of mobile devices that securely store data
Methods, computer-readable media, and systems for enhancing useability of mobile devices that securely store data. An input to transfer a computer software...
US-8,555,082 Securing external memory data
The present disclosure includes apparatus, systems, digital logic circuitry and techniques relating to data encoding. A method performed by a system on a chip...
US-8,555,080 Methods and systems for protect agents using distributed lightweight fingerprints
The present invention provides methods and systems to protect an organization's secure information from unauthorized disclosure. The present system uses protect...
US-8,555,069 Fast-reconnection of negotiable authentication network clients
Modern network communications often require a client application requesting data to authenticate itself to an application providing the data. Such...
US-8,555,067 Methods and apparatus for delivering electronic identification components over a wireless network
Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or...
US-8,555,062 Protocol to prevent replay attacks on secured wireless transactions
A system and method for preventing replay attacks on secure data transactions are provided. The method aspect of the invention comprises establishing a...
US-8,555,057 System and method for securing a network
A secure network is disclosed. The secure network includes a residential gateway to communicate with a remote network and a local network. At least one trusted...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.