Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,545,928 Double layer UV variable data text
A method and system for including a double layer security mark in digital document data defining an image of a document to be printed and in the printed...
US-D690,580 Lock
US-8,544,110 Sensitive data aliasing
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed...
US-8,544,105 Method and apparatus for managing policies for time-based licenses on mobile devices
Methods and devices provide for creating, managing, modifying, and/or enforcing flexible digital rights management license policies for protecting games, media,...
US-8,544,098 Security vulnerability information aggregation
Security vulnerability information aggregation techniques are disclosed. Vulnerability information associated with one or more security vulnerabilities is...
US-8,544,085 Image processing apparatus, image processing method, and image forming apparatus
Provided is an image forming apparatus that improves operability while securing security of image data stored in an apparatus. In the image forming apparatus...
US-8,544,084 System and method for secure control of resources of wireless mobile communication devices
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
US-8,544,080 Mobile virtual private networks
An apparatus for establishing a virtual private network with an internet protocol multimedia subsystem (IMS) device that includes a key derivation module, a...
US-8,544,075 Extending a customer relationship management eventing framework to a cloud computing environment in a secure manner
A customer relationship management (CRM) eventing framework may be extended to a cloud computing environment. A listening channel may be opened between a...
US-8,544,071 Systems and methods for software application security management
Systems ands methods for managing service account security are described. The apparatus may include a security record data store that contains information...
US-8,544,065 Dataspace protection utilizing virtual private networks on a multi-node computer system
A method and apparatus provide data security on a parallel computer system using virtual private networks. An access setup mechanism sets up access control data...
US-8,544,062 Method and system for improving computer network security
Computers connected to a private network are monitored and controlled through the use of a client agent that operates in association with the computer and a...
US-8,543,997 Secure dynamic loading
A method for loading, installing and running software, called loading units, having different levels of confidence by a data processing unit (1). The method...
US-8,543,830 Method and apparatus for connecting to a security token without restarting an application
A method and apparatus for reconnecting a security token without restarting an application that supports use of the security token. In some embodiments, the...
US-8,543,827 Methods and systems for providing access control to secured data
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all...
US-8,543,826 MACSec implementation
A media access control (MAC) security apparatus for a local area network interface includes multiple independently controlled power domains, each of which...
US-8,543,819 Secure authenticated distance measurement
The invention relates to a method for a first communication device to performing authenticated distance measurement between said first communication device and...
US-8,543,809 Method for misbehaviour detection in secure wireless mesh networks
In a method for secure data transmission in a wireless mesh network, a sending node sends at least one packet to at least one forwarding node which receives the...
US-8,543,808 Trusted intermediary for network data processing
A networked computer system in which a trusted intermediary device is allowed access to packets transmitted through a secured connection. An endpoint to a...
US-8,543,805 Systems and methods for split proxying of SSL via WAN appliances
The present invention is directed towards systems and methods for split proxying Secure Socket Layer (SSL) communications via intermediaries deployed between a...
US-8,543,804 Adaptive security policy based scalable video service apparatus and method
An adaptive security policy based scalable video service apparatus includes a video streaming server, an adaptive security policy server and a terminal. The...
US-8,543,623 Secure distribution of media data
A technique for playing a media file by a data processing system. A degraded initial version of the media file is received from a sending data processing...
US-8,543,488 High performance trading data interface and trading data distribution protocol
A network enables monitors, trading platforms and libraries to share information about customers' trading activities and locally recalculate customer trading...
US-8,543,421 Methods and systems for managing distributed digital medical data
A network for mediating the peer-to-peer transfer of digital patient medical data includes a plurality of distributed agents each associated with a health care...
US-8,543,410 Method and system providing advice and services to consumers
The present invention provides a method and system for providing advice and/or services to a consumer including the secure electronic storage of rich private...
US-8,543,344 Power meter arrangement
An electric power meter arrangement, includes a metrology unit configured to be coupled to a power line and to determine power consumption and provide...
US-8,543,098 Apparatus and method for securely providing communications between devices and networks
An apparatus, method, and computer-readable medium for securely providing communications between devices and networks are provided. According to one aspect of...
US-8,543,091 Secure short message service (SMS) communications
Embodiments of the present disclosure provide systems and methods for secure Short Message Service (SMS) communications. According to an embodiment, a method of...
US-8,542,833 Systems and methods to secure laptops or portable computing devices
A security system includes an appliance to be secured, including a processor and a first wireless transceiver for accessing a data network with a first power...
US-8,540,192 Method and apparatus for operation of railroad protection installation
A method and a device operate a railroad security system having trackside devices for specific functions. In order to reduce the number of cable connections,...
US-8,540,158 Document verification using dynamic document identification framework
Techniques are described for identifying and validating security documents according to a dynamic document identification framework. For example, a security...
US-8,540,146 Automated banking machine that operates responsive to data bearing records
An automated banking machine operates to cause financial transfers responsive at least in part to data read from data bearing records. The automated banking...
US-8,540,144 Automated banking machine operated responsive to data bearing records with improved security
An automated banking machine is operative to cause financial transfers responsive to data read from data bearing records, such as user cards. The machine...
US-8,539,606 Data protection method and data protection system
Present invention provides a data protection method, used by a data owner to share data with a data sharer securely through a data distribution system. The data...
US-8,539,603 System and method for secure communication
A system for secure communication comprises a secure electronic messaging server which is accessible by the public and a database for storing data of messaging...
US-8,539,602 Microcontroller with secure feature for multiple party code development
Multiple secure environments are established within a system on a chip (SoC) by defining a first secure region within a non-volatile memory in the SoC with a...
US-8,539,601 Secure data storage and retrieval
A system for secure data processing can include an electronic data storage device and a field programmable gate array coupled to the electronic data storage...
US-8,539,597 Securing sensitive data for cloud computing
A system and associated method for securing sensitive data in a cloud computing environment. A customer system has proprietary data as a record stored in a...
US-8,539,593 Extraction of code level security specification
A method comprising, receiving a source code, identifying a data structure access in the source code, determining whether the data structure access is...
US-8,539,592 Method and apparatus of encrypting content delivery
A method for delivering a data stream to a plurality of clients in a network. The method involves receiving the data stream from a media server, where the data...
US-8,539,589 Adaptive configuration management system
An automated configuration management system (ACMS) oversees resources of a virtualized ecosystem by establishing a baseline configuration (including, e.g.,...
US-8,539,582 Malware containment and security analysis on connection
Systems and methods for malware containment and security analysis on connection are provided. Digital devices are quarantined for a predetermined period of time...
US-8,539,564 IP multimedia security
A method of establishing keys for at least partially securing media plane data exchanged between first and second end users via respective first and second...
US-8,539,254 Method and integrated circuit for protecting against differential power analysis attacks
In one embodiment of the invention, a method is provided for protecting against attacks on security of a programmable integrated circuit (IC). At least a...
US-8,539,253 System and method for securing information by obscuring contents of a persistent image
Files or directories in a persistent image such as a file system backup structure are hidden from general access by establishing a data set used by the file...
US-8,539,250 Secure, two-stage storage system
A two-stage storage security system comprising an address translator and a cryptographic engine for a mobile computing platform is provided. In response to a...
US-8,539,238 Authenticated nonvolatile memory signing operations
A wireless device includes a nonvolatile memory that handles the task of securely performing integrity checks that do not expose the authentication private key...
US-8,539,234 Secure client-side communication between multiple domains
Methods and systems for secure client-side communication between multiple domains is provided. Such methods and systems can provide for decreased communication...
US-8,539,229 Techniques for secure data management in a distributed environment
Techniques for secure data management in a distributed environment are provided. A secure server includes a modified operating system that just allows a kernel...
US-8,539,222 System for securing virtual machine disks on a remote shared storage subsystem
Embodiments of the present invention provide a method, data processing system and computer program product for secure distribution of virtualized storage. In an...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.