Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,494,620 Electrocardiograph for magnetic resonance imaging and electrode patch for same
An electrode patch (40, 40') enables securing five electrodes (E', A', S', I', N') or six electrodes (V.sub.1', V.sub.6', LA', RA', LL', RL') in a predefined...
US-8,494,591 Disabling operation of features on a handheld mobile communication device based upon location
Methods and devices for implementing subsystem or functional aspect restrictions on a wireless handheld communication device. Data defining geographical...
US-8,494,576 Near field communication authentication and validation to access corporate data
A system for near field communication authentication (NFC) and validation to access corporate data is provided. The system comprises a mobile phone, an...
US-8,494,560 System, method and program product for location based services, asset management and tracking
A system for location based services utilizing a mobile device includes a software module configured to operate in a background mode on the mobile device. The...
US-8,494,502 Provisioning of wireless connectivity for devices using NFC
The claimed subject matter provides a system and/or a method that facilitates connecting a wireless device to a secure network. A device can establish a near...
US-8,494,486 System and method for securely managing data stored on mobile devices, such as enterprise mobility data
A system and method for managing data stored on mobile devices is described. In some cases, the system stores data, such as data under enterprise mobility...
US-8,494,210 User interface for use in security screening providing image enhancement capabilities and apparatus for...
An apparatus, method and system for facilitating visual identification of a prohibited object in an image during security screening are provided. Data derived...
US-8,494,162 Hardcopy document security
A method for securing data in hardcopy documents. The method includes obtaining a page image having a private data item; generating an encrypted version of the...
US-8,493,191 Vehicle security notification device and related methods
A vehicle security device to be installed in a vehicle of a type including a vehicle audio entertainment system being configurable via a vehicle data...
US-8,491,793 Software program that provides a structured format and verification of date entered via a touch screen tablet...
A method of recording and monitoring the operation and status of devices operating to purify water employed in the operation of a dialysis clinic, by providing...
US-8,490,879 Security element
The present invention relates to a security element for securing data carriers, having a three-layer thin-film element (20) composed of a reflection layer (22),...
US-8,490,870 Apparatus and method for POS processing
An apparatus and method for configuring, altering, controlling, securing, and extending the processing capability and functionality of PCs and POS devices using...
US-8,490,290 Vehicle service system optical target assembly calibration
A machine vision vehicle wheel alignment system for acquiring measurements associated with a vehicle. The system includes at least one imaging sensor having a...
US-8,490,189 Using chipset-based protected firmware for host software tamper detection and protection
A method, system, and computer program product for a host software tamper detection and protection service. A secure partition that is isolated from a host...
US-8,490,172 Methods, systems, and computer readable media for adaptive assignment of an active security association...
According to one aspect, the subject matter described herein includes a method for communicating an encrypted data packet. The method includes steps occurring...
US-8,490,167 Preventing password presentation by a computer system
A method, system or computer usable program product for preventing a password from being presented in a data entry field on a computer display including,...
US-8,490,165 Restoring secure sessions
The different illustrative embodiments provide a method, a computer program product, and an apparatus for restoring secure sessions. A determination is made...
US-8,490,149 Secure session handling in a device after a policy update
A device may update at least one old policy to a new policy, obtain data exchanged between endpoints of an ongoing communication session, apply the new policy...
US-8,490,148 Systems and methods for managing application security profiles
Systems and methods for configuring and evaluating policies that direct processing of one or more data streams are described. A configuration interface is...
US-8,489,901 Methods and systems for secure encryption of data
Provided is a data acquisition module. The data acquisition module includes a memory and a controller. The controller includes an encryption module configured...
US-8,489,898 Method and apparatus for including architecture for protecting multi-user sensitive code and data
A secure execution environment for execution of sensitive code and data including a secure asset management unit (SAMU) is described. The SAMU provides a secure...
US-8,489,877 System, method and computer product for sending encrypted messages to recipients where the sender does not...
A system for encrypting and decrypting messages using a browser in either a web or wireless device or secure message client software for transmission to or from...
US-8,489,874 Encryption STE communications through private branch exchange (PBX)
A reach back secure communications terminal includes a digital PBX adapter that offers immediate and secure voice, data and video connectivity over any of...
US-8,489,872 Apparatuses, methods and systems for a real-time desktop configurer utilizing a user identifier or an...
The APPARATUSES, METHODS AND SYSTEMS FOR A REAL-TIME DESKTOP CONFIGURER (hereinafter "RTDC") implement efficient and scalable monitoring, regulation, and...
US-8,489,860 Mobile electronic device having a host processor system capable of dynamically canging tasks performed by a...
A wireless data platform comprises a plurality of processors. Channels of communication are set up between processors such that they may communicate information...
US-8,489,836 Secure memory management system and method
The present invention describes a system and a method for securely loading digital information from a storage device into a memory module in a data processing...
US-8,489,496 Financial data processing system
To process financial articles of trade and manage risk, data messages originating from a plurality of sources arranged to trade at least one of securities,...
US-8,489,491 Method of managing financial instruments, equipment lease derivatives and other collateral instruments, data...
A computer-implemented process ad methodology that selects collateral instruments such as equipment leases, using mathematical models, based on selection...
US-8,489,344 Home network system augmentation with remote guidance and local set up and monitoring
This application relates to a network including powerline adapters ("PLAs") of the HomePlug Alliance variety or similar implementations such as the European in...
US-8,489,065 Mobile device controller application for any security system
A method for using any mobile device to manage a security system in retail environments is disclosed in which an application or applet is installed on the...
US-8,488,967 System and method for OCDMA-based photonic layer security robustness to archival attack
A system and method for transporting encrypted data having a transmitter and a receiver is provided. The transmitter generates a sequence of optical pulses,...
US-8,488,834 Method for making an assured image
A method for producing an assured image acquires image data and segments the image data into one or more spatial regions. One or more quality measures is...
US-8,488,786 Security method and device for managing access to multimedia contents
A method of managing the sending of multimedia contents to a mobile terminal (2) equipped with a security module (3), the multimedia contents being sent in...
US-8,488,458 Secure unauthenticated virtual local area network
An apparatus having a corresponding method and computer program comprises a control circuit to determine a number N of network devices belonging to a virtual...
US-8,488,428 Enhanced security of optical article
An optical article comprising a first file encoded on the optical article comprising data structure information; a second file encoded on the optical article...
US-8,488,311 Container data center
A container data center includes a mobile container and a number of servers. The mobile container includes a main room receiving the servers, and an air shower...
US-8,488,310 Thin data storage device
The present invention is to provide a thin data storage device with a support pad's length positioned at a USB port's height in a way for a supporting segment...
US-8,488,175 Method for transforming and transporting printer data over the internet in a secure and reliable manner
A method for managing a plurality of printers connected to a network, the method comprising the following steps: scanning the network to obtain printer usage...
US-8,488,013 System for remote control of a medical imaging system
A system enables secure, safe remote access and control of stand-alone medical imaging systems whilst maintaining physical separation and independence from the...
US-8,487,762 Using abnormal mobile station gathering to trigger security measures
A server may detect a threshold number of mobile stations (e.g., total mobile stations or mobile stations belonging to a predefined group) currently located at...
US-8,487,757 Method and system for providing tracking services to locate an asset
The present invention is directed to a method of asset location. Location data is received from a cellular transmitter associated with a selected asset, which...
US-8,484,748 Method and device for classifying and processing data in instant messaging system
The embodiment of this invention provides a method for classifying and processing data in an instant messaging system, which includes: classifying the data of...
US-8,484,733 Messaging security device
In one embodiment, a system can comprise an interface that receives data related to a communication session and a messaging security device component that...
US-8,484,726 Key security indicators
Systems, methods and apparatus for a distributed security system that provides security processing for security customers external to network edges of external...
US-8,484,698 Multichannel device utilizing a centralized out-of-band authentication system (COBAS)
A multichannel security system is disclosed, which system is for granting and denying access to a host computer in response to a demand from an access-seeking...
US-8,484,483 Method for protecting computer programs and data from hostile code
A method that protects computer data from untrusted programs. Each computer's object and process is assigned with trust attributes, which define the way it can...
US-8,484,481 Chip lockout protection scheme for integrated circuit devices and insertion thereof
A system for implementing a chip lockout protection scheme for an IC device includes an on-chip password register that stores a password externally input by a...
US-8,484,464 Method and devices for providing secure data backup from a mobile communication device to an external computing...
A method and devices for providing secure data backup from a mobile communication device to an external computing device is described. In accordance with one...
US-8,484,268 Random wave envelope derived random numbers and their use in generating transient keys in communication...
A random wave envelope is created from a set of bounded random numbers by additively combining a triangle, a square and a sine wave. The random wave envelope is...
US-8,484,263 Method for keyless protection of data using a local array of disks
A method secures data in a network. The data includes a data message that has a first bit length. A random number is generated and transformed to create a first...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.