Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,930,494 Secure method of synchronizing cache contents of a mobile browser with a server
A method of securely synchronizing cache contents of a mobile browser with a server includes initiating a session between the browser and server, including...
US-8,930,382 High performance secure data access in a parallel processing system
A mechanism is provided for secure data access in a parallel processing system. A database having two tables is provided. A subset of the tables' primary key...
US-8,930,327 Method and system for scrubbing information from heap dumps
In production applications that process and transfer secure and sensitive customer data, the heap dump files of these applications, which may be useful for...
US-8,930,313 System and method for managing replication in an object storage system
An object storage system, such as a content addressed storage system, manages replication of objects across network locations to balance storage space and data...
US-8,930,232 Claim and progression management
The present invention is a computer implemented method and system for gathering information from a user related to, filing for, and obtaining government...
US-8,930,041 Methods of operation for plug-in wireless safety device
An aftermarket plug-in safety device that allows a vehicle to communicate with other vehicles or infrastructures in a V2X communications system. The device...
US-8,929,552 Electronic information and cryptographic key management system
Systems and methods of electronic information securement. The invention provides for the securement of electrical information and cryptographic keys through...
US-8,929,544 Scalable and secure key management for cryptographic data processing
A method and system for secure and scalable key management for cryptographic processing of data is described herein. In the method, a General Purpose...
US-8,929,188 Content transmitting apparatus for transmitting content with copy control information, content identification...
A content transmitting apparatus and the like which execute copy control of content more securely than conventional, and can count copy number correctly...
US-8,928,948 Method of creating non-patterned security elements
Described herein is a method to encode infrared (IR) security watermarks using a named color dictionary within a PDL in a device independent manner. A set of...
US-8,928,623 Auxiliary user input device
Systems and methods for providing an auxiliary user input device (101, 501, 601) for use with a mobile electronic device (181, 681). The methods involve:...
US-8,928,453 Mechatronic locking apparatus
The mechatronic locking apparatus comprises a control circuit (4), from which information signals can be transmitted to a control circuit (6) of the lock...
US-8,925,882 Mount for telemetry receiver
A mount for a telemetry receiver having a data connector and used in conjunction with a cage for housing animals and having at least one wall. The mount...
US-8,925,801 Securing communications with a pin pad
Described in an example embodiment herein is an apparatus comprising an input device and a processor communicatively coupled with the input device. The...
US-8,925,098 Data security and access tracking in memory
A memory device includes but is not limited to a substrate, a non-volatile memory array integrated on the substrate, and data security logic integrated with the...
US-8,925,095 System and method for a distributed application of a network security system (SDI-SCAM)
A widely distributed security system (SDI-SCAM) that protects computers at individual client locations, but which constantly pools and analyzes information...
US-8,925,094 Automatic synthesis of unit tests for security testing
Performing security analysis on a computer program under test (CPUT). The CPUT can be analyzed to identify data pertinent to potential security vulnerabilities...
US-8,925,093 System and method for performing remote security assessment of firewalled computer
Methods and systems for scanning an endpoint terminal across an open computer network are disclosed. An exemplary method includes providing a scanner engine in...
US-8,925,083 Cyber security in an automotive network
Preventing spoofing in an automotive network includes monitoring, by electronic control unit, data packets on a bus in the automotive network. Upon determining,...
US-8,925,082 Cooperative intrusion detection ecosystem for IP reputation-based security
An intrusion detection system (IDS) is enhanced to operate in a cluster of such systems, and IDSs organized into a cluster cooperate to exchange IP reputation...
US-8,925,077 Mobile devices with inhibited application debugging and methods of operation
Applications that have the ability to be debugged also provide an access to violate the security of the application. The present invention provides a means to...
US-8,925,048 Security method of mobile internet protocol based server
A security method in a server-based mobile IP system is provided. Specifically, in the security method, general data is securely exchanged in addition to a...
US-8,925,039 System and method of selectively applying security measures to data services
Systems and methods of applying security measures to data services are disclosed. In one embodiment, a processor determines when more than one data service is...
US-8,924,743 Securing data caches through encryption
Encryption techniques for securing data in a data cache are generally disclosed. Example methods may include one or more of reading the cache to identify data,...
US-8,924,742 Multi-level data storage
Rather than storing all data in the same manner, e.g., an encrypted manner, a security level with which to associate received data of a given type may be...
US-8,924,741 Instruction and logic to provide SIMD secure hashing round slice functionality
Instructions and logic provide SIMD secure hashing round slice functionality. Some embodiments include a processor comprising: a decode stage to decode an...
US-8,924,740 Encryption key transmission with power analysis attack resistance
Methods and mechanisms for transmitting secure data. An apparatus includes a storage device configured to store data intended to be kept secure. Circuitry is...
US-8,924,730 Digital watermarking for secure transmission between a source component and a node device
A system and method for embedding a watermark into a data file and communicating the data file to a particular node from a source component is described. The...
US-8,924,724 Document encryption and decryption
A document encryption and decryption system for selectively encrypting and decrypting files and any other items and method for same to protect or secure its...
US-8,924,720 Method and system to securely migrate and provision virtual machine images and content
A method, device, and system for securely migrating and provisioning a virtual machine image to a host device of a cloud service provider environment (CSPE) is...
US-8,924,713 Method and system for state machine security device
A security device may be utilized to provide security measures to an electronic device that may incorporate the security device or be coupled to it. The...
US-8,924,706 Systems and methods using one time pads during the exchange of cryptographic material
A solution that enables the exchange of information in a secure manner over an insecure text messaging infrastructure provides part of the exchange as...
US-8,924,703 Secure virtualization environment bootable from an external media device
Methods and systems for creating a secure virtualization environment on a host device, without modifying the host device, the secure virtualization environment...
US-8,924,670 System and method for protecting content
A method, computer program product, and computing system for storing an unsecure data portion within a temporary storage device. An indication of a power...
US-8,924,475 Emergency response center
The present invention is an Emergency Response Center (ERC) which provides a variety of emergency and information functions in public environments. The ERC...
US-8,924,433 Methods for geotemporal fingerprinting
Records of geotemporal data for a plurality of users from a database associated with on-line and/or mobile cellular activities are used to generate a...
US-8,924,296 Dynamic pairing system for securing a trusted communication channel
A system for securing a trusted communications channel for a mobile financial transaction is provided by receiving, from a user via an external terminal, a...
US-8,924,033 Generalized grid security framework
The subject specification comprises a generalized grid security platform (GGSP) that can control power distribution and operations in a power transmission and...
US-8,923,883 Anticipatory location-based mobile communication media transfer
Methods and systems for anticipatory location-based mobile communication media transfer are disclosed and may include pre-planning communication of information...
US-8,923,820 Modified messaging server call flow for secured mobile-to-mobile messaging
Systems and techniques are provided for transmitting a secured message from an originating device to a recipient mobile device through a mobile communication...
US-8,923,817 Mobility device security
The present disclosure provides a system to establish a stable ownership relationship between an online identity and a mobile device. This relationship is...
US-8,923,815 Method for detecting changes in security level in mobile networks
A system and method for detecting changes in security level of mobile networks. The system can be used with any mobile devices having a network module or a...
US-8,923,763 Methods and apparatuses for reducing the nonvolatile memory used to support application identifier routing in...
The present application presents example data routing methods and apparatuses for reducing the amount of nonvolatile memory required to store secure element...
US-8,923,294 Dynamically provisioning middleboxes
Hybrid security architecture (HSA) provides a platform for middlebox traversal in the network. The HSA decouples the middlebox control from network forwarding....
US-8,923,272 Method and apparatus for multiplexing a host identity protocol security channel
Embodiments of the present invention relate to the field of security channel multiplexing, and disclose a method and an apparatus for multiplexing a HIP...
US-8,922,807 Print control apparatus, print control method, and program therefor
Conventionally, during a copy operation, certain advanced mode settings make the extraction of additional security information impossible. In order to solve...
US-8,922,562 Meteorology and oceanography geospatial analysis toolset
System and method for providing access to ArcMap netCDF utilities and adding support for observational data to ArcMap including, but not limited to, comparing...
US-8,922,361 System and method for home automation and security
A home automation and security system is provided in which a home automation and security controller in a customer premises is coupled with a remotely located...
US-8,919,024 Secure smartphone-operated gun trigger lock
A gun trigger-looking device which is configured to be manually installed on a gun with a trigger-blocking member disposed behind the trigger to prevent the gun...
US-8,918,911 Connection device authentication
A method and apparatus are provided for a secure interconnect between data modules, including a security apparatus within a secured data interconnect apparatus...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.