Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,938,565 Synchronous or asynchronous multi layer data link communication between a multi-functional data bus interface...
A multi layer data link communication system for a vehicle having a remote starter/alarm system, a vehicle computer and an OEM security interface. The system...
US-8,938,547 Method and system for data usage accounting in a computing device
A method and system for data usage accounting are described herein. As an example, the method can be practiced in a setting that includes both secure...
US-8,938,508 Correlating web and email attributes to detect spam
A computer correlates web and email attributes to detect spam. A security module on a client collects attributes of a web site to which an email address was...
US-8,938,474 Securing application information in system-wide search engines
A system for securing application information in a shared, system-wide search service. Each application can register a security filtering module that is to be...
US-8,938,060 Technique for effectively providing personalized communications and information assistance services
A user may utilize a communication device, e.g., a wireless phone, mobile device or personal digital assistant (PDA), to contact an information/call center...
US-8,937,847 System for acquiring seismic data in a marine environment, using seismic streamers coupled to means for...
Disclosed herein is a system of acquiring seismic date in a marine environment, which includes: seismic streamers towed by a vessel; and means for detecting...
US-8,937,658 Methods, systems, and products for security services
Methods, systems, and products are disclosed for notification of alarms in security systems. An alarm is detected in a security system. An alarm code is...
US-8,936,477 Apparatus to interconnect orthogonal circuit boards for high data rate use
An apparatus includes a chassis securing a midplane and forming a bay orthogonally aligned with the midplane. A module secures a circuit board with connectors...
US-8,936,201 Integrated circuits with persistent data storage
The circuitry introduced in this invention selectively slows down the functioning of an electronic circuit maintaining a particular state for a prolonged period...
US-8,935,954 Method and apparatus for testing piston seals
A seal testing apparatus includes a clamp assembly which receives, secures and rotates a piston and seal assembly, a mandrel which extends into the seal...
US-8,935,810 Cloud key directory for federating data exchanges
Embodiments are directed to providing attribute-based data access. In an embodiment, a data request specifies one or more search data attributes describing...
US-8,935,807 Visual securement of sensitive data
Various embodiments of systems and methods for visual securement of sensitive data are described herein. In one aspect, the method includes receiving a request...
US-8,935,795 Weighted security analysis
A method, computer program product, and system for transforming unit tests is described. A unit test associated with one or more software units is identified. A...
US-8,935,781 Native code module security for arm 64-bit instruction set architectures
Methods, systems, and apparatuses, including computer programs, for safely executing a native code module for an ARM 64-bit instruction set. The native code...
US-8,935,778 Maintaining data integrity
Aspects of the present invention maintain data integrity of a monitored data object in a monitored storage repository. A first security value for the monitored...
US-8,935,772 Secure server architecture for web based data management
A double firewalled system is disclosed for protecting remote enterprise servers that provide communication services to telecommunication network customers from...
US-8,935,743 Web service security cockpit
A first configuration object identifies attributes of a configuration of a first web service. Security setting data is identified defining a security setting...
US-8,935,538 Enhancing useability of mobile devices that securely store data
Methods, computer-readable media, and systems for enhancing useability of mobile devices that securely store data. An input to transfer a computer software...
US-8,935,534 MACSec implementation
A media access control (MAC) security apparatus for a local area network interface includes a parser, an encryption engine, an authentication engine, and a...
US-8,935,533 Method and apparatus for a scalable and secure transport protocol for sensor data collection
A new approach for a transport protocol for sensor data collection, such as a smart grid is described. In one embodiment of the invention, each server avoids...
US-8,935,528 Techniques for ensuring authentication and integrity of communications
Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a...
US-8,935,527 Secure transmission with error correcting code
The invention concerns a method and a system for encoding digital data (DATA) represented by source symbols, with an error correcting code generating parity...
US-8,935,520 Control word obfuscation in secure TV receiver
A device for descrambling encrypted data includes a descrambler, a secure link, and a secure element that securely transmits a control word to the descrambler...
US-8,935,427 Providing virtual networks using multi-tenant relays
Embodiments are directed to providing a multi-tenant relay service that securely relays data between computer systems. A computer system receives a portion of...
US-8,935,317 Dynamic partitioning of applications between clients and servers
Optimization mechanism that dynamically splits the computation in an application (e.g., cloud), that is, which parts run on a client (e.g., mobile) and which...
US-8,935,181 Municipal bond tracking and evaluation system
The present invention relates to a web-application that gathers raw data and meta data, matches debt related data with corresponding meta data, marks the debt...
US-8,935,095 Safety system and device and methods of operating
Various embodiments of a device, system and methods that promote safety and security within an organization. Sensor data from one or more installation sensors...
US-8,935,019 Apparatus and method for power production, control, and/or telematics, suitable for use with locomotives
A power system housed in modules or containers may be located as a unitary structure for example secured to a locomotive platform, allowing easy retrofits. A...
US-8,934,940 Providing enhanced security for wireless telecommunications devices
A method and system for use in providing enhanced security for wireless telecommunications devices is disclosed. In at least one embodiment, the method and...
US-8,934,864 Cellular device security apparatus and method
A cellular communication device has one or more access modes which allow reading and writing of data, for example to change its settings, for example passwords...
US-8,934,633 Encrypted communication system, transmitter and receiver using same
High-security communications against information leakage as well as high-speed communications are realized using present optical fiber networks. The methods are...
US-8,934,609 Method and apparatus for identifying and monitoring VoIP media plane security keys for service provider lawful...
A mechanism is described that enables encrypted end-point communications in a VoIP network to be accessed by a service provider. The mechanism includes a...
US-8,934,435 Method and system for managing information among personalized and shared resources with a personalized portable...
A user's request via a portable or handheld wireless communication device (HWCD) to process data may result in discovery of one or more networked resources...
US-8,932,409 Supercritical fluid cleaning of banknotes and secure documents
A method and apparatus for cleaning a stack of secure instruments is disclosed. Each secure instrument includes a substrate, visual data and a security feature....
US-8,932,137 System and method for secure automated data collection
The invention provides for an automated data collection having an endpoint coupled to at least one gaming machine to collect data from the at least one gaming...
US-8,931,695 Secure voting via multimedia processing resources
A voting server receives votes from a multimedia processing resource (MPR) and executes instructions for determining whether a user location is an approved...
US-8,931,195 Secure smartphone-operated gun lock with means for overriding release of the lock
A gun locking and unlocking device, which may be configured to be disposed adjacent the trigger of a gun to alternatively prevent or enable firing, includes a...
US-8,931,109 Context-based security screening for accessing data
A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with...
US-8,931,108 Hardware enforced content protection for graphics processing units
A graphics processing unit (GPU) is configured to access a first memory unit according to one of an unsecure mode and a secure mode. The GPU may include a...
US-8,931,080 Method and system for controlling the execution of a function protected by authentification of a user, in...
A method and system for controlling the execution of a function protected by authentication of a user and which is provided for example for the access to a...
US-8,931,069 Authentication with massively pre-generated one-time passwords
Embodiments of the invention provide systems and methods for the storage of One-Time Passwords (OTPs) on a device (principal) that needs to authenticate from...
US-8,931,063 Methods and apparatuses for securely operating shared host computers with portable apparatuses
The present invention provides methods and apparatuses that utilize a portable apparatus to securely operate a host electronic device. Typically, each portable...
US-8,931,053 Method and apparatus for wireless security enhancement using multiple attributes monitoring, continuous and...
The present invention is an adaptive secure wireless communications system and method. Generally, the present invention may be operable to address challenges...
US-8,931,048 Data system forensics system and method
A system and method for creates, maintains and monitors individuals, organizations and artifacts relating to the same over time with respect to pedigree and...
US-8,931,043 System and method for determining and using local reputations of users and hosts to protect information in a...
A method in an example embodiment includes correlating a first set of event data from a private network and determining a local reputation score of a host in...
US-8,931,042 Dividing a data processing device into separate security domains
This invention creates separation between personal applications and corporate applications on a data processing device, so that both types of applications can...
US-8,931,033 Integrating policies from a plurality of disparate management agents
Described herein are embodiments for managing policies of a mobile device. In embodiments, a mobile device receives policy containers from a plurality of...
US-8,930,711 Critical security parameter generation and exchange system and method for smart-card memory modules
A storage device contains a smart-card device and a memory device, which is connected to a controller. The storage device may be used in the same manner as a...
US-8,930,709 Method and apparatus for sequential authentication using one or more error rates characterizing each security...
Methods and apparatus are provided for sequential authentication of a user that employ one or more error rates characterizing each security challenge. According...
US-8,930,707 Near field communication (NFC) device and method for selectively securing records in a near field communication...
A method and apparatus for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message in a Near Field Communication (NFC)...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.