Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,059,818 Accessing protected data on network storage from multiple devices
The present invention relates to a method and a system of securely storing data on a network (100) for access by an authorized domain (101, 102, 103), which...
US-8,059,817 Method and apparatus for encrypted communications using IPsec keys
Disclosed is a method for encrypted communications. A first IPsec endpoint selects a security association (SA) from a security association database (SAD) by...
US-8,059,003 Methods for providing secure and transparent cached ignition interlock data
Generally, in accordance with various exemplary embodiments of the present invention, the present method comprises collecting data from breath alcohol ignition...
US-8,058,984 Systems and methods for managing site security through a communication device
A computing system for managing site security through a communication device includes a mobile communication device, a notification, and the communication...
US-8,058,867 System for determining the position of a movable member
A first magnet is secured to the movable member at a first axial position and is associated with a first magnetic field. A secondary magnet is secured to the...
US-8,057,298 Virtual player tracking and related services
Various gaming-related services are provided, including but not limited to security services, harm minimization services, player identification services,...
US-8,056,821 Security marks simulating natural defects for embedding information in documents
A system for generating a security mark includes a data reception component that receives information. A security mark generation component in communication...
US-8,056,818 Integrated circuits with persistent data storage
The circuitry introduced in this invention selectively slows down the functioning of an electronic circuit maintaining a particular state for a prolonged period...
US-8,056,143 Selectively wiping a remote device
A system and method for selectively securing data from unauthorized access on a client device storing a plurality of data types with reference to an...
US-8,056,140 Multifunction peripheral and method for controlling the same
A job processing apparatus that can communicate with a security server configured to manage an access right to data, executes a job for inputting data, stores...
US-8,056,056 Methods and apparatus for configuring a process control system with a configuration editor executing on a...
Methods and apparatus for configuring process, environmental, industrial and other control systems generate and/or utilize models representing configurations of...
US-8,055,983 Data writing method for flash memory and error correction encoding/decoding method thereof
A data writing method for flash memory and an error correction encoding/decoding method thereof are disclosed. In an embodiment of the data writing method, a...
US-8,055,943 Synchronous and asynchronous continuous data protection
A method, system, and computer program product for providing continuous data protection for write data supplied from a host incorporating a processor device to...
US-8,055,912 Method and system for bootstrapping a trusted server having redundant trusted platform modules
Multiple trusted platform modules within a data processing system are used in a redundant manner that provides a reliable mechanism for securely storing secret...
US-8,055,910 Reprogrammable security for controlling piracy and enabling interactive content
Technologies to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content....
US-8,055,904 Systems and methods for software application security management
Apparatus and method for managing password information associated with a service account are disclosed. In some embodiments, a service account management system...
US-8,055,895 Data path security processing
Methods and associated systems provide secured data transmission over a data network. A security device provides security processing in the data path of a...
US-8,055,894 Process and streaming server for encrypting a data stream with bandwidth based variation
There is disclosed a process for encrypting a data stream to secure the data stream for single viewing and to protect copyrights of the data stream....
US-8,055,799 Method and apparatus for providing an interface for a messaging mailbox
A method and apparatus for accessing messages from a message server. Messages are stored on the message server in their current format without transcoding. When...
US-8,055,769 Method and system for secure distribution and utilization of data over a network
A method of securely utilizing downloaded data includes the steps of opening a media player; opening a data file; requesting a portable token from and used by a...
US-8,055,767 Proxy communication string data
Systems, methods and apparatus for a distributed security that detects proxied resource requests. The system can identify proxy strings, each of the proxy...
US-8,055,574 Securities market and market maker activity tracking system and method
A method, system and computer program to monitor securities market activity to seek out imbalances in market activity that could lead to a price change in a...
US-8,055,536 Automated real-time secure user data sourcing
Profiling data for a consumer can be generated from one or more of the consumer's own financial records. The profiling data can be provided by the consumer him...
US-8,055,221 Method of providing video call service in mobile station in a weak signal environment
Improving the audio QoS of a video call service in a weak signal environment is accomplished. To do this, even if data is damaged in a weak signal environment...
US-8,052,539 Swing performance analysis device
A swing performance analysis device (10) is described. The device (10) includes a sole single axis accelerometer securable to an entity (60, 70) to be swung to...
US-8,052,047 Automated banking machine that operates responsive to data bearing records
An automated banking machine operates responsive to data read from data bearing records to cause financial transfers. The machine includes a card reader that...
US-8,052,043 Banking system controlled responsive to data bearing records
An automated banking machine is controlled responsive to data bearing records. The machine operates using data read from user cards by a card reader. The...
US-8,051,480 System and method for monitoring and analyzing multiple interfaces and multiple protocols
The present invention is a system and method for providing security for a mobile device by analyzing data being transmitted or received by multiple types of...
US-8,051,477 Security state vector for mobile network platform
State of security in a mobile communications network is communicated. Data regarding nature and severity of security events onboard at least one mobile platform...
US-8,051,476 Method and system for accessing a secure area
A system for accessing a secure area. In response to reading a plurality of security device orientations, the plurality of security device orientations are...
US-8,051,470 Consolidation of user directories
A method for automatic user authentication is described. In response to a coupling of a separate hardware security device to a data processing system,...
US-8,051,464 Method for provisioning policy on user devices in wired and wireless networks
A method for provisioning client devices securely and automatically by means of a network provisioning system is disclosed. Provisioning occurs before the...
US-8,051,303 Secure read and write access to configuration registers in computer devices
The disclosed embodiments relate to a secure configuration space for a computing device. Each of the configuration resisters in a configuration space are...
US-8,051,301 Memory management system and method providing linear address based memory access security
A memory management unit (MMU) is disclosed for managing a memory storing data arranged within a plurality of memory pages. The MMU includes a security check...
US-8,051,296 System and method for initializing secure communications with lightweight devices
System and methods for initializing secure communications with lightweight devices are described herein. In one embodiment, the method includes enabling a...
US-8,051,293 Data processing systems and methods
Various improvements to data processing systems involve enhancements to BIOS functionality, use of identifiers associated with specific instances of hardware,...
US-8,051,222 Concatenating secure digital input output (SDIO) interface
An apparatus and a process for transferring packet data includes receiving packets from a first interface such as a network interface and transferring data to a...
US-8,051,181 Method for establishing secure communication link between computers of virtual private network
A technique is disclosed for establishing a secure communication link between a first computer and a second computer over a computer network. Initially, a...
US-8,050,992 Secure card with stored biometric data and method for using the secure card
A secure card comprising biometric data of an individual for identifying or confirming authority of the individual. Prior to issuing the secure card a...
US-8,050,402 Method and related device for hardware-oriented conversion between arithmetic and boolean random masking
A method for secure conversion between two different random markings used for cryptographic functions, converts a first binary data word, masked by a binary...
US-8,049,627 Container with removable data storage mechanism
A container may be formed with a pocket to securely receive a tag, such as a radio-frequency identification tag. The tag is secured within the pocket such that...
US-8,049,617 Method and system for providing tracking services to locate an asset
The present invention is directed to a method of asset location. Location data is received from a cellular transmitter associated with a selected asset, which...
US-8,049,613 Building security system
A security system that can be used in a home, office, or other building in order to generate alarms or take other actions depending on conditions within the...
US-8,047,435 System and method for secured voting transactions
A secured electronic system and method for taking and counting votes. A database of unique ballot security codes, each ballot security code consisting of a...
US-8,047,427 Currency recycler reconcilement activity
A currency handling system, for example, a currency recycler or depository machine, may be configured to process currency transactions, including receiving one...
US-8,046,835 Distributed computer network security activity model SDI-SCAM
A distributed multi-agent system and method is implemented and employed across at least one intranet for purposes of real time collection, monitoring,...
US-8,046,831 Automating software security restrictions on system resources
Security components of managed computers are configured using inoculation data. Inoculation data can be retrieved from an inoculation data provider. The...
US-8,046,592 Method and apparatus for securing the privacy of sensitive information in a data-handling system
A data-handling system (20) is arranged to scan through data it holds for instances of sensitive information as identified by reference (35) to a set of...
US-8,046,580 Data processing apparatus and method for generation of protection compression encoded data
An encoding data processing apparatus is described which is operable to generate protected compression encoded data representative of protected media signals....
US-8,046,577 Secure IP access protocol framework and supporting network architecture
A protocol framework for a Secure IP Access (SIA) method, and supporting components deployed on IP hosts and IP networks. Using this method, an IP host can...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.