Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,085,743 Method and system for enabling rendering of electronic media content via a secure ad hoc network configuration...
An ad hoc network enabled to handle secure data may be created for a specified user via a handheld wireless communication device (HWCD) such that rightful...
US-8,085,342 Highly miniaturized, battery operated, digital wireless camera using programmable single chip active pixel...
A miniaturized camera which is programmable and provides low power consumption. An active pixel image sensor used in the highly miniaturized camera provides...
US-8,085,195 Method and apparatus for providing a global secure user plane location (SUPL) service
A method and apparatus for providing assistance data for satellite positioning system receivers utilizing a secure user plane location (SUPL) service. In one...
US-8,085,168 Electronic flight data display instrument
An electronic display instrument configured to secure in a desired position over multiple pre-existing instrument holes in a dashboard of an aircraft in place...
US-8,085,126 Identification with RFID asset locator for entry authorization
A system for controlling access at secure facilities to locations and assets contained in those locations, comprising a biometric identification device, an RFID...
US-8,083,808 Container security
A container security device includes a housing, electronic circuitry, and cabling. The electronic circuitry is disposed within the housing, and includes first...
US-8,083,589 Capture and utilization of real-world data for use in gaming systems such as video games
A portable sensor unit for capturing motion and/or other data may be securely mounted on objects such as a user's limb, a vehicle, or other items. The sensor...
US-8,082,589 Diagnostic data capture control for multi-domain processors
There is provided a processor operable in a first domain and a second domain, the processor comprising: monitoring logic operable to monitor the processor and...
US-8,082,588 Secured storage method of encrypted data on a personal digital recorder
The objective of the present invention is a storage method in a decoder of an event encrypted by control words that guarantees the access to this event at...
US-8,082,577 Systems and methods for deployment of secure shell devices
A shell device with minimal software and/or hardware resources can download from a server configuration information and/or user data in order to allow the shell...
US-8,082,574 Enforcing security groups in network of data processors
A technique for securing message traffic in a data network using various methods for distributing security policies and keys, where policy definition is...
US-8,082,442 Securely sharing applications installed by unprivileged users
In one embodiment of this invention, a computer system performs a method for securely sharing applications installed by unprivileged users. The method involves...
US-8,082,204 Systems and methods for trading a trade list in financial markets
Systems and methods are provided for maintaining neutrality while trading a list of securities using an algorithmic trading facility coupled with at least one...
US-8,081,952 Mobile communications device with security features
A mobile communications device for communicating with a wireless network is described. The device includes a processor, a communications sub-system connected to...
US-8,081,760 Offline message security via selective data replication
A method, system and apparatus for the offline securing of messages through selective security data replication. A method for selectively replicating security...
US-8,081,442 Removable data-storage device
A removable data-storage device. The removable data-storage device includes a main data-storage unit, an exterior housing for containing the main data-storage...
US-8,081,422 Power distribution system
A back-wiring board that connects to a main circuit board of a power distribution system. The back-wiring board includes a plurality of connectors configured to...
US-8,081,348 Image processing device, method and program product processing barcodes with link information corresponding to...
In a copy generation management on paper, the present invention aims to detect a falsification in embedded information and increase the capacity of embedded...
US-8,081,073 Integrated motion-image monitoring device with solar capacity
Security systems and methods are implemented using a variety of devices and methods. According to one such implementation, a security system uses a controller...
US-8,079,512 Automated banking machine operated responsive to data bearing records
An automated banking machine is operative to carry out transactions using data read from user cards through operation of a card reader. The automated banking...
US-8,079,118 Method for vehicle internetworks
Vehicle internetworks provide for communications among diverse electronic devices within a vehicle, and for communications among these devices and networks...
US-8,079,083 Method and system for recording network traffic and predicting potential security events
Recording network traffic is disclosed. Data associated with a network flow are monitored. If it is determined that the data associated with the network flow...
US-8,079,078 Encryption apparatus, program for use therewith, and method for use therewith
An encryption apparatus capable of effectively preventing encryption data from being illegally generated is provided. Based on apparatus identification data of...
US-8,079,077 System and method for distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the...
US-8,079,067 Streaming content in guest mode
The present application relates to systems, apparatus and methods for transmitting image data from a content source to an image display in a dual mode system...
US-8,079,059 Method and system for providing terminal view access of a client device in a secure network
Methods, computer products, and systems are described for providing terminal view access of a client device in a secure enterprise network. One method includes...
US-8,078,990 Secure device sharing
A device and method for placing the device in a locked state having an associated set of permitted tasks so as to permit the device owner to share the device...
US-8,078,886 Method for protecting computer programs and data from hostile code
A method that protects computer data from untrusted programs. Each computer's object and process is assigned with trust attributes, which define the way it can...
US-8,078,885 Identity authentication and secured access systems, components, and methods
Security tokens contain data that is each uniquely encrypted based on a unique biometric identifier of an authorized user of that token. Decoders receive the...
US-8,078,879 Data certification method and apparatus
Apparatus for certifying electronic data supplied by a user receives data to be signed, supplied by the user from a source device, at a certifying apparatus...
US-8,078,817 Method and system for secured drive level access for storage arrays
The present disclosure provides a methodology by which disk level access for storage drives of a storage array may be highly secured based on permission...
US-8,078,739 Solution for handling URL-substitution for data access in a private network architecture
Disclosed are methods and apparatus for handling requests for data from a private network. In general terms, a client who wishes access to secure data, such as...
US-8,078,725 Method and system for secure distribution and utilization of data over a network
A method for distributing data over a network includes the steps of establishing a secure connection between a client and a server; issuing a certificate and a...
US-8,078,595 Secure normal forms
Techniques for implementing secure normal forms are provided. In one embodiment, in response to a request for data from a client, a database server is operable...
US-8,078,481 Benefits administration system and methods of use and doing business
An automated benefit administration system and methods of use and doing business. The full system includes a wide range of features including application of...
US-8,078,420 Raman spectrometry authentication
A method and apparatus for authenticating items having a security mark containing a DNA fragment to prevent fraud uses a Raman spectrometer to generate a...
US-8,077,870 Cryptographic key split binder for use with tagged data elements
A process of cryptographically securing a data object including one or more respectively tagged data elements includes selecting a tagged data element from...
US-8,077,866 Protecting against security attack
A communication device having a private key and configured to implement an elliptic curve security mechanism for successful operation of which it: (a) receives...
US-8,077,861 Permutation data transform to enhance security
A data input is divided into two segments; the second segment is also divided into groups. Bits in the first segment are used to control the application of...
US-8,077,682 Secure roaming between wireless access points
A system, method, and computer readable medium for enabling roaming of wireless client stations among wireless access points, wherein a gateway programmed to...
US-8,077,631 Method and terminal for transmitting uplink data
Embodiments of the present invention disclose a method for transmitting uplink Ethernet data in a coaxial network, a Coaxial Network Unit (CNU) and a Coaxial...
US-8,077,453 Modular protective housing with peripherals for a handheld communications device
A peripherals device for coupling with a handheld communication device includes an interface to the handheld communication device and a processor for performing...
US-8,077,033 Disaster vulnerability assessment in buildings
The number and identities of people in a building along with personal data that is useful in disaster response planning are determined from a database receiving...
US-8,077,027 System and method for analyzing faulty event transmissions
A system and method are disclosed for recording and evaluating faults in event transmissions between security system components. A panel in a monitored building...
US-8,074,879 System and method for securing a credit account
A system and method is disclosed for verifying a commercial transaction between a card-holder, a merchant, and a credit card company. The card-holder makes a...
US-8,074,874 Secure payment system
A system for the authentication by a card-issuing financial institution of identifying information of a card-holding user of a public data network. The system...
US-8,074,807 Screening system for objects in transit
The present invention relates to the screening of objects in-transit and materials, for security purposes (i.e. explosives detection). The invention provides an...
US-8,074,481 Radio frequency identification (RFID) system for manufacturing, distribution and retailing of keys
A key assembly having an identification member secured to the key. In one embodiment, the identification member includes a programmable device that contains...
US-8,074,286 Secure media path system and method
Many media playback devices have a secure environment, with media decrypter and decoder components, and an insecure environment, with intermediate media...
US-8,074,283 Method and system for securely protecting data during software application usage
Techniques for use in enterprise and similar computing systems securely protect data during software application use by generating private table seeds as a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.