Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,495,382 In-circuit security system and methods for controlling access to and use of sensitive data
The invention disclosed herein is an in-circuit security system for electronic devices. The in-circuit security system incorporates identity credential...
US-8,495,371 Network device authentication
In general, this disclosure relates to maintaining security between an optical network terminal (ONT) and an optical network aggregation device in an Active...
US-8,495,367 Nondestructive interception of secure data in transit
In a data level security environment, the data level security mechanism operates on plaintext data. Data level security operations identify a point in the...
US-8,495,358 Software based multi-channel polymorphic data obfuscation
A method and system for providing secure communication between a server and a remote client utilizing a polymorphic software platform. In various embodiments,...
US-8,495,357 Data security policy enforcement
A method for data security policy enforcement including inspecting incoming and outgoing data packets from a server computing device for attributes in...
US-8,495,356 System for securing virtual machine disks on a remote shared storage subsystem
Embodiments of the present invention provide a method, data processing system and computer program product for secure distribution of virtualized storage. In an...
US-8,495,323 Method and system of providing exclusive and secure access to virtual storage objects in a virtual machine cluster
A system, method, and medium for implementing I/O fencing in a virtual machine cluster sharing virtual storage objects. A volume manager driver receives access...
US-8,495,296 System and method for optimizing data remanence over hubrid disk clusters using various storage technologies
A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming...
US-8,495,064 Management of metadata for life cycle assessment data
Management of metadata applied to life cycle inventory (LCI) and life cycle assessment (LCA) data is provided. Life cycle inventory data may be provided through...
US-8,495,016 Image processing apparatus, image processing system, and control method therefor
This invention uses a storage device more effectively than ever before to store image data in a predetermined storage device for future security chasing. A...
US-8,494,963 Remote image capture with centralized processing and storage
A system for remote data acquisition and centralized processing and storage provides comprehensive support for processing documents and electronic data...
US-8,494,958 Method and system to process payment using URL shortening and/or QR codes
Provided is a method and system for payment processing, including emailing a billing statement to a payer by a biller, the billing statement including an online...
US-8,494,709 On-vehicle communication device
An on-vehicle communication device capable of suppressing a delay in providing information, avoiding congestion, and sufficiently securing transmission power,...
US-8,494,620 Electrocardiograph for magnetic resonance imaging and electrode patch for same
An electrode patch (40, 40') enables securing five electrodes (E', A', S', I', N') or six electrodes (V.sub.1', V.sub.6', LA', RA', LL', RL') in a predefined...
US-8,494,591 Disabling operation of features on a handheld mobile communication device based upon location
Methods and devices for implementing subsystem or functional aspect restrictions on a wireless handheld communication device. Data defining geographical...
US-8,494,576 Near field communication authentication and validation to access corporate data
A system for near field communication authentication (NFC) and validation to access corporate data is provided. The system comprises a mobile phone, an...
US-8,494,560 System, method and program product for location based services, asset management and tracking
A system for location based services utilizing a mobile device includes a software module configured to operate in a background mode on the mobile device. The...
US-8,494,502 Provisioning of wireless connectivity for devices using NFC
The claimed subject matter provides a system and/or a method that facilitates connecting a wireless device to a secure network. A device can establish a near...
US-8,494,486 System and method for securely managing data stored on mobile devices, such as enterprise mobility data
A system and method for managing data stored on mobile devices is described. In some cases, the system stores data, such as data under enterprise mobility...
US-8,494,210 User interface for use in security screening providing image enhancement capabilities and apparatus for...
An apparatus, method and system for facilitating visual identification of a prohibited object in an image during security screening are provided. Data derived...
US-8,494,162 Hardcopy document security
A method for securing data in hardcopy documents. The method includes obtaining a page image having a private data item; generating an encrypted version of the...
US-8,493,191 Vehicle security notification device and related methods
A vehicle security device to be installed in a vehicle of a type including a vehicle audio entertainment system being configurable via a vehicle data...
US-8,491,793 Software program that provides a structured format and verification of date entered via a touch screen tablet...
A method of recording and monitoring the operation and status of devices operating to purify water employed in the operation of a dialysis clinic, by providing...
US-8,490,879 Security element
The present invention relates to a security element for securing data carriers, having a three-layer thin-film element (20) composed of a reflection layer (22),...
US-8,490,870 Apparatus and method for POS processing
An apparatus and method for configuring, altering, controlling, securing, and extending the processing capability and functionality of PCs and POS devices using...
US-8,490,290 Vehicle service system optical target assembly calibration
A machine vision vehicle wheel alignment system for acquiring measurements associated with a vehicle. The system includes at least one imaging sensor having a...
US-8,490,189 Using chipset-based protected firmware for host software tamper detection and protection
A method, system, and computer program product for a host software tamper detection and protection service. A secure partition that is isolated from a host...
US-8,490,172 Methods, systems, and computer readable media for adaptive assignment of an active security association...
According to one aspect, the subject matter described herein includes a method for communicating an encrypted data packet. The method includes steps occurring...
US-8,490,167 Preventing password presentation by a computer system
A method, system or computer usable program product for preventing a password from being presented in a data entry field on a computer display including,...
US-8,490,165 Restoring secure sessions
The different illustrative embodiments provide a method, a computer program product, and an apparatus for restoring secure sessions. A determination is made...
US-8,490,149 Secure session handling in a device after a policy update
A device may update at least one old policy to a new policy, obtain data exchanged between endpoints of an ongoing communication session, apply the new policy...
US-8,490,148 Systems and methods for managing application security profiles
Systems and methods for configuring and evaluating policies that direct processing of one or more data streams are described. A configuration interface is...
US-8,489,901 Methods and systems for secure encryption of data
Provided is a data acquisition module. The data acquisition module includes a memory and a controller. The controller includes an encryption module configured...
US-8,489,898 Method and apparatus for including architecture for protecting multi-user sensitive code and data
A secure execution environment for execution of sensitive code and data including a secure asset management unit (SAMU) is described. The SAMU provides a secure...
US-8,489,877 System, method and computer product for sending encrypted messages to recipients where the sender does not...
A system for encrypting and decrypting messages using a browser in either a web or wireless device or secure message client software for transmission to or from...
US-8,489,874 Encryption STE communications through private branch exchange (PBX)
A reach back secure communications terminal includes a digital PBX adapter that offers immediate and secure voice, data and video connectivity over any of...
US-8,489,872 Apparatuses, methods and systems for a real-time desktop configurer utilizing a user identifier or an...
The APPARATUSES, METHODS AND SYSTEMS FOR A REAL-TIME DESKTOP CONFIGURER (hereinafter "RTDC") implement efficient and scalable monitoring, regulation, and...
US-8,489,860 Mobile electronic device having a host processor system capable of dynamically canging tasks performed by a...
A wireless data platform comprises a plurality of processors. Channels of communication are set up between processors such that they may communicate information...
US-8,489,836 Secure memory management system and method
The present invention describes a system and a method for securely loading digital information from a storage device into a memory module in a data processing...
US-8,489,496 Financial data processing system
To process financial articles of trade and manage risk, data messages originating from a plurality of sources arranged to trade at least one of securities,...
US-8,489,491 Method of managing financial instruments, equipment lease derivatives and other collateral instruments, data...
A computer-implemented process ad methodology that selects collateral instruments such as equipment leases, using mathematical models, based on selection...
US-8,489,344 Home network system augmentation with remote guidance and local set up and monitoring
This application relates to a network including powerline adapters ("PLAs") of the HomePlug Alliance variety or similar implementations such as the European in...
US-8,489,065 Mobile device controller application for any security system
A method for using any mobile device to manage a security system in retail environments is disclosed in which an application or applet is installed on the...
US-8,488,967 System and method for OCDMA-based photonic layer security robustness to archival attack
A system and method for transporting encrypted data having a transmitter and a receiver is provided. The transmitter generates a sequence of optical pulses,...
US-8,488,834 Method for making an assured image
A method for producing an assured image acquires image data and segments the image data into one or more spatial regions. One or more quality measures is...
US-8,488,786 Security method and device for managing access to multimedia contents
A method of managing the sending of multimedia contents to a mobile terminal (2) equipped with a security module (3), the multimedia contents being sent in...
US-8,488,458 Secure unauthenticated virtual local area network
An apparatus having a corresponding method and computer program comprises a control circuit to determine a number N of network devices belonging to a virtual...
US-8,488,428 Enhanced security of optical article
An optical article comprising a first file encoded on the optical article comprising data structure information; a second file encoded on the optical article...
US-8,488,311 Container data center
A container data center includes a mobile container and a number of servers. The mobile container includes a main room receiving the servers, and an air shower...
US-8,488,310 Thin data storage device
The present invention is to provide a thin data storage device with a support pad's length positioned at a USB port's height in a way for a supporting segment...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.