Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,482,540 Configuring a user interface for use with an overlay
An overlay secured to a mobile device and positioned over a portion of a touch-activated user interface on the mobile device functions as a guide and includes...
US-8,480,761 Security enclosure for a router
A router comprises a local network interface and routing services. The router also includes a data exchanger interface that can be configured to connect to a...
US-8,480,144 Holding aid for a personal, hand-held, tablet-shaped device and methods of use
A securement device to make it much easier for a user to securely hold onto a personal, hand-held, tablet-shaped device such as an electronic reader, a tablet...
US-8,479,983 Automated banking machine operation authorization based on user location verified by data read from data...
An automated banking machine transaction request is authorized based on the determined location of an authorized user relative to the machine. Identification of...
US-8,479,978 Banking system controlled responsive to data bearing records
An automated banking machine is part of a banking system that operates to cause financial transfers responsive to data read from data bearing records. The...
US-RE44,362 Using accounting data based indexing to create a portfolio of financial objects
A system, method and computer program product creates an index based on accounting based data, as well as a portfolio of financial objects based on the index...
US-8,479,304 Selectively protecting against chosen plaintext attacks in untrusted storage environments that support data...
Various methods and systems for selectively protecting against chosen plaintext attacks when encrypting data for storage on an untrusted storage system are...
US-8,479,278 Virtualized secure networking
The invention provides a data processing system for the support of secure networking on a single, virtualized hardware platform. The data processing system...
US-8,479,276 Malware detection using risk analysis based on file system and network activity
A virtual machine computing platform uses a security virtual machine (SVM) in operational communications with a risk engine which has access to a database...
US-8,479,275 Secure high-throughput data-center network employing routed firewalls
A reliable and secure data-center. The data center includes a first data-center tier that is adapted to connect to an external network and an internal portion...
US-8,479,264 Architecture for virtual security module
A device supports the processing of multiple active applications in a processor through a mapping system that securely identifies and differentiates commands...
US-8,479,259 Secure customer interface for web based data management
An integrated series of security protocols is disclosed that protect remote user communications with remote enterprise services, and simultaneously protect the...
US-8,479,258 Garage management system
A garage management and monitoring system defines and manages each operational event in a parking facility. Access events, management events, equipment...
US-8,479,022 Secure mode indicator for smart phone or PDA
A digital system is provided with a secure mode (3.sup.rd level of privilege) built in a non-invasive way on a processor system that includes a processor core,...
US-8,479,020 Method and apparatus for providing an asymmetric encrypted cookie for product data storage
A process may be utilized by a device to implement public key asymmetric encryption. The process encrypts a data set with a symmetric encryption key to form an...
US-8,479,013 Secure portable data transport and storage system
A portable data transport device that provides security to data stored therein, and is configured to communicate data with a host computer for securing and...
US-8,479,008 Providing security services on the cloud
Embodiments are directed to the providing a cloud keying and signing service and to securing software package distribution on the cloud. In an embodiment, a...
US-8,479,003 Electronic signature validation systems and methods for asynchronous environments
A system and method for non-real-time validation of an electronically signed message transmitted via an asynchronous communications link is provided. The method...
US-8,478,997 Multi-level security software architecture
A multi-level security software architecture includes various components configured to provide full data separation across multiple processors while limiting...
US-8,478,995 Method of encrypting and transferring data between a sender and a receiver using a network
A method of encrypting and transferring data between a sender and a receiver using a network thereby transferring data in a secure manner includes the steps of...
US-8,478,982 Media access control security management in physical layer
A media access control (MAC) security (MACsec) function block may implement MACsec protocols on a network. A physical layer device (PHY) may connect to the...
US-8,478,894 Web application response cloaking
Method and system for centralized control of data transfers between a Web client and a Web application by receiving a response from the Web application. After...
US-8,478,788 Centralized information technology resources analysis system
SecureFusion is a knowledge management system that integrates asset and risk management of Information technology resources for enterprises and provides metrics...
US-8,478,673 Using commercial share of wallet in private equity investments
Commercial size of spending wallet ("CSoSW") is the total business spend of a business including cash but excluding bartered items. Commercial share of wallet...
US-8,478,104 Copy secure multimedia RFID with analog transmitter
A portable RFID device includes an analog modulation radio frequency transmitter and a data storage holding audio data files. In response to user entered...
US-8,477,941 Maintaining secure communication while transitioning networks
A method and medium are provided for maintaining a secure communication of a media stream as a mobile device transitions from a first network a second network....
US-8,477,936 Management system including display apparatus and data management apparatus for displaying data on the display...
In order to restrict a destination of data for security and facilitate acquisition of the data at the destination, a conference system includes an MFP and a...
US-8,477,792 System and method for managing dynamic network sessions
For an Internet Access Gateway operative between an area network and a public network, managing dynamic network sessions therebetween whereby a primary server...
US-8,477,783 Wireless communication method and apparatus thereof
A wireless communication apparatus includes a header recognition section that recognizes a header included in a packet. The apparatus also includes a packet...
US-8,477,613 Method and architecture for a scalable application and security switch using multi-level load balancing
A switch architecture and method provides scaling through multi-level load balancing of flows across data and application processing planes. An input/output...
US-8,476,707 Method for manufacturing semiconductor device
A method for manufacturing a semiconductor device comprises including a insulating pattern and a silicon film over a SOI substrate, thereby increasing a reduced...
US-8,474,943 Secure access to fluid cartridge memory
An integrated fluid cartridge (100) for securing onboard memory (150, 215) includes an electrically actuated dispensing mechanism (120, 205) with a number of...
US-8,474,698 Banking system controlled responsive to data bearing records
An automated banking machine operates to cause financial transfers responsive to data read from data bearing records. The automated banking machine includes a...
US-RE44,336 Teleradiology systems for rendering and visualizing remotely-located volume data sets
A teleradiology system provides the capability of rendering and studying of a remotely located volume data without requiring transmission of the entire data to...
US-8,474,053 Data security in a multi-nodal environment
A data security manager in a multi-nodal environment enforces processing constraints stored as security relationships that control how different pieces of a...
US-8,474,046 Systems and methods for identifying the spreading of sensitive data by a suspicious application
A computer-implemented method to identify the spreading of sensitive data from a suspicious application is described. At least one security attribute for an...
US-8,474,032 Firewall+ storage apparatus, method and system
A storage firewall architecture, method and system that works in parallel with existing security technologies and, inter alia, provides application software...
US-8,474,031 Access control method and apparatus
A method of controlling access to computing resources, comprising providing a first computing device with access to a database containing data indicative of...
US-8,474,021 Security system and method for computers
A computer security device comprising a processor that is independent of the host CPU for controlling access between the host CPU and the storage device. A...
US-8,474,004 System for implementing security on telecommunications terminals
A system includes at least one telecommunications terminal having data processing capabilities, the telecommunications terminal being susceptible of having...
US-8,473,810 Memory chip having a security function and for which reading and writing of data is controlled by an...
According to one embodiment, a memory chip, which is connected to a controller that controls reading and writing of data in response to a request from an...
US-8,473,756 Systems and methods for securing data using multi-factor or keyed dispersal
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-8,473,754 Hardware-facilitated secure software execution environment
A hardware-facilitated secure software execution environment provides protection of both program instructions and data against unauthorized access and/or...
US-8,473,752 Apparatus, system, and method for auditing access to secure data
An apparatus, system, and method are disclosed for auditing access to secure data. A detection module detects an access to the secure data. A record module...
US-8,473,736 Method for making security mechanisms available in wireless mesh networks
A method for making safety mechanisms available in wireless mesh networks which have a plurality of nodes that are interconnected by multi-hop communication in...
US-8,473,732 Method and system for secure block acknowledgment (block ACK) with protected MAC sequence number
Aspects of a method and system for protected MAC sequence numbers, as well as secure block acknowledgment (block ACK) with protected MAC sequence number are...
US-8,473,701 Storage media to storage drive centric security
A secure data system employs a storage media and a storage drive. A storage media identification key is embedded in a non-user modifiable area of the storage...
US-8,473,675 Memory system and information processing device
A memory system includes a first memory that is used as a main memory of a target device, a second memory that has an access speed lower than that of the first...
US-8,473,569 Apparatus and method for consumer-oriented distribution of information processing capability
In order to provide a home user with cost-effective PC processing capability, the home user is provided with a terminal which has only sufficient processing...
US-8,473,516 Computer storage apparatus for multi-tiered data security
A computer storage apparatus. In one embodiment, the apparatus includes: (1) primary file storage, (2) a controller coupled to said primary file storage and...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.