Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,914,884 System and methods for protecting data from input devices
Disclosed are system, methods and computer program product for secure transfer of data from an input device. An example method includes receiving first data by...
US-8,914,874 Communication channel claim dependent security precautions
A set of security claims for a communication channel are obtained, the set of security claims including one or more security claims each identifying a security...
US-8,914,871 Distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the...
US-8,914,865 Data storage and access facilitating techniques
An apparatus and method for securely accessing and storing private data files and programs on a personal computing device with network access is provided. A...
US-8,914,860 System and method for associating message addresses with certificates
A system and method for associating message addresses with certificates, in which one or more message addresses are identified and associated with a...
US-8,914,848 Social authentication of users
User authentication is provided. A social network associated with a user of a client device is monitored to determine whether a set of designated users are...
US-8,914,841 Method and system for mapping between connectivity requests and a security rule set
A system capable of automated mapping between a connectivity request and an ordered security rule-set and a method of operating thereof. The system includes an...
US-8,914,669 Secure rebuilding of an encoded data slice in a dispersed storage network
A method begins by a processing module identifying an encoded data slice to be rebuilt, selecting a decode threshold number of dispersed storage (DS) units of a...
US-8,914,644 System and method of facilitating the identification of a computer on a network
A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may...
US-8,914,642 Person oneself authenticating system and person oneself authenticating method
There is provided person oneself authenticating means for authentication of a user, which is highly secure and realizable by functions ordinarily provided by a...
US-8,914,631 Performing secure and non-secure communication over the same socket
A packet processing type determiner includes a non-secure packet processing module configured to process packets received over a single socket using a...
US-8,914,510 Methods, systems, and computer program products for enhancing internet security for network subscribers
A network communication system includes a connection server that assigns a network address within a data communication network to a subscriber terminal. The...
US-8,914,489 Method of personalizing an application embedded in a secured electronic token
The invention is a method of personalizing an application embedded in a secured electronic token which is able to manage first and second channels that allow to...
US-8,914,406 Scalable network security with fast response protocol
This disclosure provides a network security architecture that permits installation of different software security products as virtual machines (VMs). By relying...
US-8,914,323 Policy-based data-centric access control in a sorted, distributed key-value data store
A method, apparatus and computer program product for policy-based access control in association with a sorted, distributed key-value data store in which keys...
US-8,913,992 Methods and apparatus for access data recovery from a malfunctioning device
Methods and apparatus for recovering access data from a malfunctioning device. In one embodiment, trained service personnel are provided a specialized apparatus...
US-8,913,989 Secure transmission over satellite phone network
A reach back secure communications terminal includes a modem to satellite interconnect board that captures DTMF tones, demodulates encrypted modem information,...
US-8,913,898 Fiber optic telecommunications card with security detection
A transceiver card for a telecommunications box for transmitting data over a first optical fiber and receiving data over a second optical fiber. The card has...
US-8,913,802 Enrollment using synthetic fingerprint image and fingerprint sensing systems
A fingerprint sensing system. The fingerprint sensing system includes: at least one sensor; at least one display device; at least one application processor; and...
US-8,913,801 Enrollment using synthetic fingerprint image and fingerprint sensing systems
A fingerprint sensing system. The fingerprint sensing system includes: at least one sensor; at least one display device; at least one application processor; and...
US-8,913,721 Systems and methods for preventing sensitive information from being communicated into a non-secure environment
A telecommunication system is arranged between a trusted automated interactive system and a non-secure agent. The trusted automated interactive portion is...
US-8,913,267 Printing system and program
A printing system and a program ensuring an improved security. A printing system (1) has printers (20A, 20B, 20C) for printing according to printing data...
US-8,912,118 Colour laser marking of articles and security document precursors
A method of color laser marking an article having a polymeric foil with at least one colorless layer containing an infrared absorber, a polymeric binder and a...
US-8,911,507 Systems and methods for mitigating mobile device loss
A computer-implemented method for mitigating mobile device loss may include (1) identifying historical data specifying a plurality of past locations of a mobile...
US-8,910,865 Ballot level security features for optical scan voting machine capable of ballot image processing, secure...
A ballot authentication system uses a plurality of security features embedded in and/or printed on the paper stock used to print a ballot on which...
US-8,910,297 Securing user data in cloud computing environments
Systems and methods for obfuscating user data in a remote web-based application are disclosed. According to one method, user inputs to a displayed web page of...
US-8,910,278 Managing services in a cloud computing environment
What is provided are a system and method which enables an organization or user to manage computational services in a cloud computing network for security,...
US-8,910,271 System and method for handover between interworking WLAN and EUTRAN access systems
This invention relates to the area of Mobility and Handover between heterogeneous wireless networks. The scope of the invention also covers the case when the UE...
US-8,910,257 Representing security identities using claims
The claims based identity model provides a model which associates security identities with claims. The model represents information contained in the claims, as...
US-8,910,249 Interface device for an intelligent electronic device and method of operating an interface device
The present invention relates to a system comprising an interface device (100) for an intelligent electronic device (200), an intelligent electronic device...
US-8,910,238 Hypervisor-based enterprise endpoint protection
Described systems and methods allow the detection and prevention of malware and/or malicious activity within a network comprising multiple client computer...
US-8,910,139 Method for processing firmware based on firmware over the air technology, apparatus, and system
Embodiments of the present invention provide a method for processing firmware based on a firmware over the air technology, an apparatus, and a system. The...
US-8,909,974 Data processing apparatus, data processing method and recording medium
A data processing apparatus comprising: a gate unit connected to an input or an output of a processing unit and configured to cut off the data input and output;...
US-8,909,942 MRAM-based security for data storage systems
A secure data storage system includes a mechanism that can be activated to inhibit access to stored data. In one embodiment, access to stored data can be...
US-8,909,938 System and method for providing secure access to an electronic device using facial biometrics
A facial biometric recognition system and method (100) for providing security for an electronic device (101) includes a digital camera (105) having a field of...
US-8,909,933 Decoupled cryptographic schemes using a visual channel
A visual data transfer channel is established between a mobile device and a computing entity to facilitate a decoupled cryptographic scheme. The mobile device...
US-8,909,932 Method and apparatus for security over multiple interfaces
A secure digital system including a number of ICs that exchange data among each other. Each of the ICs includes a key generator for generating a cipher key; a...
US-8,909,928 Securing customer virtual machines in a multi-tenant cloud
A trusted virtualization platform protects sensitive customer data during operation of virtual machines in a multi-tenant cloud computing center. The trusted...
US-8,909,916 Using a PKCS module for opening multiple databases
A security initialization system obtains load data that identifies a first database storing security data to be opened. The initialization system determines...
US-8,909,888 Secure erasure of data from a non-volatile memory
Method and apparatus for securely erasing data from a non-volatile memory, such as but not limited to a flash memory array. In accordance with various...
US-8,909,775 Method and apparatus for including a security feature within a document
Disclosed are methods and apparatus for providing extended functionality to a networked device, the networked device connected in a network, as well as...
US-8,909,754 Personal inter-home media exchange network
A system and method support the exchange of media between friends, family members, and 3rd party media providers over a closed and secure media exchange...
US-8,909,660 System and method for secured health record account registration
A computer-implemented system is used for implementing an improved personal health record enrollment process. The system includes an electronic medical record...
US-8,909,191 Automatic emergency call activation and notification system and method using supporting emergency notification...
An Automatic Emergency Call Initiator (AECI) initiates an automatic emergency call protocol on a mobile communication system, which can be done using signaling...
US-8,909,144 Communications devices comprising NFC communicators
A communications device configured to couple with a near field RF communicator, in near field range, to enable communication of data by modulation of a magnetic...
US-8,909,141 Secure inductively-coupled communications systems
Security in inductively coupled communications systems, such as near field communications (NFC), may be improved by restricting signals carrying user data to an...
US-8,908,865 Session key generation and distribution with multiple security associations per protocol instance
A single instance of a session key generation protocol is executed in a manner that generates a plurality of security associations between user equipment and a...
US-8,908,673 Local area network of serial intelligent cells
A serial intelligent cell (SIC) and a connection topology for local area networks using Electrically-conducting media. A local area network can be configured...
US-8,908,641 Method, system, network element, and gateway for processing access point name restriction information
A method, a system, a network element, and a gateway for processing access point name restriction information are disclosed. The method includes: a second...
US-8,908,453 Data retention kill function
Various data protection techniques are provided. In one embodiment, a memory device is provided. The memory device may initiate a security measure upon...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.