Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,560,826 Secure virtualization environment bootable from an external media device
Methods and systems for creating a secure virtualization environment on a host device, without modifying the host device, the secure virtualization environment...
US-8,560,823 Trusted modular firmware update using digital certificate
An over-the-air firmware update is accomplished in a secure manner using a two-step process. The first step uses an initial boot using a fixed boot program and...
US-8,560,785 Techniques for providing multiple levels of security for a backup medium
Techniques for providing multiple levels of security for backups are disclosed. In one particular exemplary embodiment, the techniques may be realized as a...
US-8,560,734 Secure communication port redirector
A method and system that allows a host system application to securely communicate with a legacy device is provided. A redirector software module receives data...
US-8,560,648 Location control service
In embodiments of a location control service, location data that identifies the location of a device is stored in a memory module, such as secured non-volatile...
US-8,560,557 Method and system of progress monitoring
It is possible to enable the secure, efficient, and synchronized transmittal of data between users, eliminate the need for a body-worn transmitting device, and...
US-8,560,541 Generating reports in an online services system
A system and method for performing security assessments in an online services system. In one embodiment, the method includes receiving a list of target data for...
US-8,560,456 System and method for an anonymous exchange of private data
Facilitating the purchase and sale of private data between anonymous entities based on the use of encryption and a centralized on-line entity to exchange the...
US-8,560,453 Method and apparatus for dynamic, real-time ad insertion based on meta-data within a hardware based root of trust
A client computing system inserts selected advertising into digital content. Ads may be inserted into content based on a dynamic advertising matching process...
US-8,560,378 System and method of reviewing and producing documents
A system and method of providing comprehensive document review, production and reporting is described. The system and method provide a total quality management...
US-8,560,100 Combination multimedia, brain wave and subliminal affirmation media player and recorder
System, method, and application to integrate a web browser and/or search engine with multiple media players-recorders into an Internet web virtual application,...
US-8,559,987 Wireless bidirectional communications between a mobile device and associated secure element
In some embodiments, a system includes a mobile communication device and a secure element physically coupled to the mobile communication device. The mobile...
US-8,559,639 Method and apparatus for secure cryptographic key generation, certification and use
A confidential datum, such as a private key used in public key signature systems, is secured in a digital wallet using a "generation camouflaging" technique....
US-8,559,637 Securing information exchanged via a network
A privacy key is provided over a network. An information page is provided over the network. A submission of data that is to be transmitted over the network in...
US-8,558,889 Method and system for security system tampering detection
A method and system for detecting tampering of a security system component is provided. An analytic alarm indicative of potential tampering with a security...
US-8,558,694 Asset management for information technology resources
A method to identify information technology resources whereby a locator device is inserted into a communication port of each information technology resource,...
US-8,558,685 Remote display tamper detection using data integrity operations
Methods and systems for detecting tampering of a remote display. According to one method, a first data integrity result is generated by performing a first data...
US-8,558,414 Voltage regulator for merchandise display security device
A voltage regulator for a merchandise display security device provides an appropriate operating voltage through a power cable electrically connected between an...
US-8,556,991 Approaches for ensuring data security
Techniques for protecting resources of a client from theft or unauthorized access. A BIOS agent stores policy data within a BIOS of the client. The BIOS agent...
US-8,556,709 Virtual player tracking and related services
Various gaming-related services are provided, including but not limited to security services, harm minimization services, player identification services,...
US-8,556,388 Printhead assembly with multiple printhead modules and printed circuit boards in single casing
A printhead assembly that has a casing with a series of module mounting sites, printed circuit board mounting sites and busbar support formations. A printhead...
US-8,556,219 Mounting apparatus for data storage device
A mounting apparatus for a data storage device comprises a bracket and a locking member attached to the bracket. A plurality of fixing holes is defined in one...
US-D691,457 Lock
US-8,555,397 Consumer-controlled data access to shared RFID data
An electronic product code information service (EPCIS) interface is provided, where the EPCIS interface allows accessing applications residing on a variety of...
US-8,555,393 Automated testing for security vulnerabilities of devices
A method includes selecting an attack signature from an attack signature database; generating a fingerprint that includes parameters indicative of the attack...
US-8,555,381 Cloud computing as a security layer
A system includes a computing cloud comprising at least one data storage unit and at least one processing unit. The computing cloud is configured to connect to...
US-8,555,373 Network security module for Ethernet-receiving industrial control devices
A high-speed security device for network connected industrial controls provides hybrid processing in tandem hardware and software security components. The...
US-8,555,371 Systems and methods for management of nodes across disparate networks
The present invention is directed generally to systems and methods for management of nodes, such as multimedia communication endpoints and/or intermediary...
US-8,555,367 Method and system for securely streaming content
A system and method for securely streaming media. The system includes a gateway server that receives requests for access to a secured data resource from an end...
US-8,555,342 Providing secure access to a set of credentials within a data security mechanism of a data storage system
A technique provides secure access to a set of credentials within a data storage system. The technique involves obtaining a unique identifier (e.g., a hostname...
US-8,555,335 Securing distributed application information delivery
In an example implementation, a data structure comports with a secure application instruction protocol. The data structure includes a first application-level...
US-8,555,088 Method and apparatus for implementing secure and selectively deniable file storage
The invention concerns a method for writing data to a memory device arrangement comprising a first and a second memory device in which the first memory device...
US-8,555,085 Enhancing useability of mobile devices that securely store data
Methods, computer-readable media, and systems for enhancing useability of mobile devices that securely store data. An input to transfer a computer software...
US-8,555,082 Securing external memory data
The present disclosure includes apparatus, systems, digital logic circuitry and techniques relating to data encoding. A method performed by a system on a chip...
US-8,555,080 Methods and systems for protect agents using distributed lightweight fingerprints
The present invention provides methods and systems to protect an organization's secure information from unauthorized disclosure. The present system uses protect...
US-8,555,069 Fast-reconnection of negotiable authentication network clients
Modern network communications often require a client application requesting data to authenticate itself to an application providing the data. Such...
US-8,555,067 Methods and apparatus for delivering electronic identification components over a wireless network
Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or...
US-8,555,062 Protocol to prevent replay attacks on secured wireless transactions
A system and method for preventing replay attacks on secure data transactions are provided. The method aspect of the invention comprises establishing a...
US-8,555,057 System and method for securing a network
A secure network is disclosed. The secure network includes a residential gateway to communicate with a remote network and a local network. At least one trusted...
US-8,555,015 Multi-layer content protecting microcontroller
The present invention relates to a microcontroller designed for protection of intellectual digital content. The microcontroller includes a secure CPU, a...
US-8,555,004 Storage system having function of performing formatting or shredding
It is desired to reduce the danger of leakage of data stored in a logical storage device. A storage system has a detection unit and a security processing unit....
US-8,554,689 Biometric authentication of mobile financial transactions by trusted service managers
A method for authenticating a financial transaction at a point of sale (POS) includes storing an application program in a first secure element of a mobile...
US-8,554,688 Fuel dispenser management
Systems and processes may provide for managing a fuel dispenser. In particular implementations, a system and process for a fuel dispenser may include the...
US-8,554,680 Method and system for secure distribution of subscription-based game software
Methods and systems for securely distributing software in a subscription-based environment are provided. A Game Security Facility ("GSF") associated with a game...
US-8,554,642 RFID methods in the manufacture of reclosable packages
The present disclosure relates to the implanting of RFID (radio frequency identification) chips into the slider of a zipper of a reclosable package. This allows...
US-8,554,607 Method and system for securing network-based electronic voting
A method and system for securely voting over a network, such as a global computer network, involves a system which delivers an electronic ballot from a server...
US-8,554,386 System and method for self-powered communications networks
Techniques for providing localized power infrastructure and data infrastructure are disclosed. A transportable system for providing localized power...
US-8,554,176 Method and apparatus for creating a remotely activated secure backup service for mobile handsets
Method and systems for protecting data on a mobile handset when remotely activated by a user involve encrypting the data using an encryption key, storing the...
US-8,553,888 Generation of communication device signatures for use in securing nomadic electronic transactions
A method for execution in a communication device, which comprises accessing an identifier stored in a memory; receiving a first data set and a second data set...
US-8,553,878 Data transformation system using cyclic groups
An asymmetric (dual key) data obfuscation process, based on the well known ElGamal cryptosystem algorithm, and which uses multiplicative cyclic groups to...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.