Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,566,195 Obtaining consent for electronic delivery of compliance information
A method and related system obtains consent from an individual for computer-aided delivery of compliance information. Initially, a computer-readable data...
US-8,566,168 Electronic payment using a proxy account number stored in a secure element
A near field communication payment method using a proxy account number. The method comprises transmitting a proxy account number from a secure element of a...
US-8,565,725 Secure control system for opening locking devices by encrypted acoustic accreditations
The invention relates to a system implements a mobile phone (20) available to a user (18) authorized to open a lock (22). A remote management site (10) includes...
US-8,565,436 Secure self managed data (SSMD)
A system, according to one embodiment, includes a master key for encryption of data; an encryption key site accessible by computer and storing a first piece of...
US-8,565,427 Enforcing software independent content protection in an electronic device
A Set Top Box (STB) or client computer includes a communication interface operable to receive digital messages and digital content, memory operable, and...
US-8,565,422 Method and system for enryption key versioning and key rotation in a multi-tenant environment
Various techniques and procedures related to encryption key versioning and rotation in a multi-tenant environment are presented here. One approach employs a...
US-8,565,336 Data transmission apparatus and method, and data reconstitution apparatus and method
Disclosed are data transmission/reception apparatus and method that may be applied to a case where additional data is to be transmitted in a CE-OFDM...
US-8,565,227 Mobile IP data communication system comprising a mobile router that detects a change in connection status
The present invention provides a data communication technology which is capable of securing flexibly a bandwidth for a traffic that is generated and which...
US-8,565,093 Packet classification in a network security device
Methods and apparatuses are described for inspecting data packets in a computer network. One or more data packets through the network have associated header...
US-8,565,035 Data retention kill function
Various data protection techniques are provided. In one embodiment, a memory device is provided. The memory device may initiate a security measure upon...
US-8,564,809 Printing system for maintaining confidentiality of print jobs
A printing apparatus to process a print job is provided. The printing apparatus includes a printing unit to form an image according to print data, a displaying...
US-8,562,431 Gaming device and secure interface
An improved gaming device with a secure interface has been developed. The invention includes an electronic gaming device with internal components, software and...
US-8,562,025 Secure data protection optically variable labels and foils
An optical security label for security and anti-counterfeit applications comprises a first layer having an optically variable portion (diffractive, holographic...
US-8,561,307 Method and apparatus for vehicle service system optical target assembly
A method and apparatus for determining the alignment of a vehicle wheel using an optical target assembly secured to the vehicle wheel in a non-determined...
US-D691,871 Lock
US-8,561,208 Secure user interface content
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for handling secure user interface content. In one aspect, a...
US-8,561,189 Method and apparatus for distributed intrusion protection system for ultra high bandwidth networks
A method for providing security to a network having a data stream with a plurality of portions of data, each having differing levels of sensitivity. The data...
US-8,561,183 Native code module security for arm instruction set architectures
Some embodiments provide a system that executes a native code module. During operation, the system obtains the native code module. Next, the system loads the...
US-8,561,169 Data processing apparatus and method for managing access to a display buffer
A data processing apparatus and method are provided for managing access to a display buffer. The data processing apparatus has a display buffer for storing an...
US-8,561,168 Access point, terminal, encryption key configuration system, encryption key configuration method, and program
Configuration tasks needed to form a wireless LAN are performed using a simple method while increasing security during configuration. In a wireless network...
US-8,561,154 Method for providing network perimeter security assessment
A method for providing network perimeter security assessment that involves a combination of perimeter security assessment disciplines is disclosed. A security...
US-8,561,144 Enforcing security based on a security state assessment of a mobile device
Security data generated by an application running on a mobile communications device is stored in a database. The security data is processed to assess a current...
US-8,561,143 Proxy registration and authentication for personal electronic devices
Communication systems, media, and methods for authenticating and registering unauthenticated electronic devices are provided. The communication systems include...
US-8,561,139 Method and appartus for network security using a router based authentication
A router based authentication system provides packet level authentication of incoming data packets and eliminates the risk of having data packets come in to the...
US-8,561,138 System and method to provide added security to a platform using locality-based data
In some embodiments, the invention involves protecting a platform using locality-based data and, more specifically, to using the locality-based data to ensure...
US-8,561,078 Task switching and inter-task communications for multi-core processors
The invention provides hardware based techniques for switching processing tasks of software programs for execution on a multi-core processor. Invented...
US-8,560,864 Firewall for removable mass storage devices
A firewall device comprising a first connection device for connecting with a data device supporting transfer data with a removable mass storage device; second...
US-8,560,863 Systems and techniques for datapath security in a system-on-a-chip device
Various embodiments for providing datapath security in a system-on-a-chip (SOC) device are described. In one embodiment, an apparatus may comprise a security...
US-8,560,858 Secure session identifiers
An apparatus and a method for an authentication protocol. In one embodiment, a server generates a sequence number, and a server message authentication code...
US-8,560,839 Tamper proof location services
A secure location system is described herein that leverages location-based services and hardware to make access decisions. Many mobile computers have location...
US-8,560,835 Method and apparatus for machine-to-machine communication
According to a first aspect of the present invention there is provided a method of at least partly delegating processing of data in a machine-to-machine system...
US-8,560,826 Secure virtualization environment bootable from an external media device
Methods and systems for creating a secure virtualization environment on a host device, without modifying the host device, the secure virtualization environment...
US-8,560,823 Trusted modular firmware update using digital certificate
An over-the-air firmware update is accomplished in a secure manner using a two-step process. The first step uses an initial boot using a fixed boot program and...
US-8,560,785 Techniques for providing multiple levels of security for a backup medium
Techniques for providing multiple levels of security for backups are disclosed. In one particular exemplary embodiment, the techniques may be realized as a...
US-8,560,734 Secure communication port redirector
A method and system that allows a host system application to securely communicate with a legacy device is provided. A redirector software module receives data...
US-8,560,648 Location control service
In embodiments of a location control service, location data that identifies the location of a device is stored in a memory module, such as secured non-volatile...
US-8,560,557 Method and system of progress monitoring
It is possible to enable the secure, efficient, and synchronized transmittal of data between users, eliminate the need for a body-worn transmitting device, and...
US-8,560,541 Generating reports in an online services system
A system and method for performing security assessments in an online services system. In one embodiment, the method includes receiving a list of target data for...
US-8,560,456 System and method for an anonymous exchange of private data
Facilitating the purchase and sale of private data between anonymous entities based on the use of encryption and a centralized on-line entity to exchange the...
US-8,560,453 Method and apparatus for dynamic, real-time ad insertion based on meta-data within a hardware based root of trust
A client computing system inserts selected advertising into digital content. Ads may be inserted into content based on a dynamic advertising matching process...
US-8,560,378 System and method of reviewing and producing documents
A system and method of providing comprehensive document review, production and reporting is described. The system and method provide a total quality management...
US-8,560,100 Combination multimedia, brain wave and subliminal affirmation media player and recorder
System, method, and application to integrate a web browser and/or search engine with multiple media players-recorders into an Internet web virtual application,...
US-8,559,987 Wireless bidirectional communications between a mobile device and associated secure element
In some embodiments, a system includes a mobile communication device and a secure element physically coupled to the mobile communication device. The mobile...
US-8,559,639 Method and apparatus for secure cryptographic key generation, certification and use
A confidential datum, such as a private key used in public key signature systems, is secured in a digital wallet using a "generation camouflaging" technique....
US-8,559,637 Securing information exchanged via a network
A privacy key is provided over a network. An information page is provided over the network. A submission of data that is to be transmitted over the network in...
US-8,558,889 Method and system for security system tampering detection
A method and system for detecting tampering of a security system component is provided. An analytic alarm indicative of potential tampering with a security...
US-8,558,694 Asset management for information technology resources
A method to identify information technology resources whereby a locator device is inserted into a communication port of each information technology resource,...
US-8,558,685 Remote display tamper detection using data integrity operations
Methods and systems for detecting tampering of a remote display. According to one method, a first data integrity result is generated by performing a first data...
US-8,558,414 Voltage regulator for merchandise display security device
A voltage regulator for a merchandise display security device provides an appropriate operating voltage through a power cable electrically connected between an...
US-8,556,991 Approaches for ensuring data security
Techniques for protecting resources of a client from theft or unauthorized access. A BIOS agent stores policy data within a BIOS of the client. The BIOS agent...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.