Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,992,238 Mounting system having a mounting plate with mounting studs and electrical contacts
A modular equipment mount to enable quick relocation of the piece of equipment. The piece of equipment is secured to a mount. A track system is secured to...
US-8,991,706 Security element for document of value
A security element is provided for a document of value. The security element includes an array of apertures through at least a portion of the document of value,...
US-8,990,960 Method for near field communication operation, a device and a system thereto
A method, a user terminal and a system for performing a NFC operation by a NFC equipped user terminal. According to a method a common application residing in a...
US-8,990,958 Systems and methods for content management in an on demand environment
The technology disclosed relates to hosting legacy data sources in a cloud environment. In particular, it relates to providing users with flyweight access to...
US-8,990,948 Systems and methods for orchestrating runtime operational integrity
Instrumented networks and platforms having target subjects (devices, transactions, services, users, organizations) are disclosed. A security orchestration...
US-8,990,947 Analytics engine
Aspects of the subject matter described herein relate to a mechanism for assessing security. In aspects, an analytics engine is provided that manages execution,...
US-8,990,935 Activity signatures and activity replay detection
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for generating activity signatures and detecting activity...
US-8,990,921 Apparatus for processing with a secure system manager
Method and apparatus for secure processing. The method includes detecting communication among secure and non-secure data entities, prohibiting execution of...
US-8,990,920 Creating a virtual private network (VPN) for a single app on an internet-enabled device or system
An Internet-enabled device, such as a smartphone, tablet, PC, wearable sensor, or household appliance, executes an application (or "app") has its own VPN...
US-8,990,912 Authentication of data communications
Methods and apparatus are provided for authenticating communications between a user computer and a server via a data communications network. A security device...
US-8,990,906 Methods and systems for replacing shared secrets over networks
A method for replacing a shared secret over a network is provided that includes determining that a security breach could have occurred, determining that a...
US-8,990,904 Web-based security proxy for computing system environment scanning
Mechanisms are provided for collecting configuration data from components of a managed computing system environment. A portion of code is obtained, in a data...
US-8,990,896 Extensible mechanism for securing objects using claims
An extensible mechanism for providing access control for logical objects in a network environment. A security broker is able to dynamically register one or more...
US-8,990,891 Provisioning layer two network access for mobile devices
In general, techniques are described for provisioning layer two access in computer networks. A network device located in a public network comprising an...
US-8,990,887 Secure mechanisms to enable mobile device communication with a security panel
A method of arming or disarming a building security system includes transferring an electronic security credential file from an authorizing environment to a...
US-8,990,885 Zone-based firewall policy model for a virtualized data center
Techniques are provided for implementing a zone-based firewall policy. At a virtual network device, information is defined and stored that represents a security...
US-8,990,884 Quantifying risk based on relationships and applying protections based on business rules
An embodiment of the invention provides a method for controlling access to a system, wherein a request to access the system and metadata of the request are...
US-8,990,877 Interface for use with a video compression system and method using differencing and clustering
The disclosure relates to a system and method having a common interface to manage and integrate secure information traversing a network with disparate domains....
US-8,990,587 Method and apparatus for secure transport and storage of surveillance video
Security information such as fixed or dynamically received camera location information, laser signature information, timestamp information, and network...
US-8,990,586 Method for selectively exposing subscriber data
Methods, systems, and apparatuses for selectively exposing subscriber data include maintaining subscriber data at a digital data storage, wherein the digital...
US-8,990,563 Sending protected data in a communication network
A method and apparatus for sending protected data from a sender unit to a receiver unit via an intermediate unit. A Transfer Init message that contains a ticket...
US-8,990,558 Securing information in a cloud computing system
The method and system for secure data (information) inside a cloud computing system, allow data to be encrypted everywhere in the cloud on storage devices and...
US-8,990,552 Method and apparatus for integrating precise time protocol and media access control security in network elements
A transmit portion of a network device including a medium access control (MAC) module configured to receive a frame of data to be transmitted from the network...
US-8,990,195 Systems and methods for searching media content based on an editing file
Various embodiments described herein provide users with a fast and efficient way for identifying scenes for editing purposes. At least one embodiment is a...
US-8,990,091 Parsimonious protection of sensitive data in enterprise dialog systems
In one embodiment, a method comprises classifying a representation of audio data of a dialog turn in a dialog system to a classification. The method may further...
US-8,989,704 Invisible mode for mobile phones to facilitate privacy without breaching trust
Systems and methods for providing information security in an unobtrusive manner are presented herein. An authentication component can enable a primary user of a...
US-8,989,382 Method for detecting security error in mobile telecommunications system and device of mobile telecommunications
According to one embodiment, a method of performing a re-establishment procedure in a mobile communication system includes: receiving at least one packet data...
US-8,989,381 Method, apparatus, and system for data protection on interface in communications system
A method and an apparatus for protecting data carried on an Un interface between a eNB and a relay node are disclosed. Three types of radio bearers (RBs) are...
US-8,989,053 Association management in a wireless node network
Methods and systems for association management within a wireless node network of nodes and a server are described. A method may identify a first node as a...
US-8,989,031 System and method providing resilient data transmission via spectral fragments
Systems, methods and apparatus for securely transmitting a data stream by dividing a data stream into a plurality of sub-streams; associating each substream...
US-8,988,401 Display device and method of driving the same
A display device is disclosed. According to some aspects, the display device includes a display panel for displaying an image, data drivers for supplying data...
US-8,988,233 Point of sale terminal having enhanced security
A data entry device including a housing formed of at least two portions, data entry circuitry located within the housing, at least one case-open switch assembly...
US-8,988,185 Security document, security systems and methods of controlling access to a region
A security document is provided comprising a first RFID tag readable only within a first range, and a second RFID tag readable within a second range, the first...
US-8,985,471 Optically readable identification security tag or stamp
The invention relates to a security tag made unique by randomly distributing a mixture of large numbers of multicolored small objects, such as two colored glass...
US-8,985,447 Secure payment card interface
The invention relates to a smartcard reader, and more particularly, to systems, devices and methods of creating a card input/output interface that allows the...
US-8,985,074 Sensing and control of a variable valve actuation system
A system for controlling variable valve actuation in an automobile engine is disclosed. A first cam has a first lift profile and a second cam has a second lift...
US-8,984,656 Sensitive data aliasing
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed...
US-8,984,651 Integrated physical security control system for computing resources
A computing data center that contains a set of physically isolatable units of computing resources for which a physical security exception action plan is to be...
US-8,984,647 Systems, methods, and computer readable media for security in profile utilizing systems
Security and distributed storage is described for systems using electronic profile information. Embodiments may be utilized for ID, data, and access analysis....
US-8,984,633 Automated security analytics platform with visualization agnostic selection linked portlets
Visualization agnostic selection linked portlets provide a tree from a parent to one or more children that present each portlet with its own visualization and...
US-8,984,619 Methods, systems, and computer readable media for adaptive assignment of an active security association...
According to one aspect, the subject matter described herein includes a method for communicating an encrypted data packet. The method includes steps occurring...
US-8,984,611 System, apparatus and method for securing electronic data independent of their location
The present disclosure relates to a system, apparatus and method for securing electronic files and folders independent of their location. A computer network...
US-8,984,603 Communication device, method for providing a data service, communication terminal, and method for requesting a...
A communication device is described comprising a receiver configured to receive a message from a communication terminal indicating that the communication...
US-8,984,601 Enterprise security system
A platform of Trust Management software which is a single, customizable, complete distributed computing security solution designed to be integrated into an...
US-8,984,598 Web-based security proxy for computing system environment scanning
Mechanisms are provided for collecting configuration data from components of a managed computing system environment. A portion of code is obtained, in a data...
US-8,984,592 Enablement of a trusted security zone authentication for remote mobile device management systems and methods
A method of accessing secure data on a mobile device is disclosed. The method comprises receiving a request to access a data package stored on the mobile...
US-8,984,582 System and method for secure synchronization of data across multiple computing devices
A computer implemented method and apparatus comprises detecting a file content update on a first client computer system, the file to be synchronized on a...
US-8,984,509 Virtual machine display device, virtual machine display method, recording medium, and integrated circuit
A dummy layer generating/finishing section 1301 generates a dummy layer, in the case where a screen layer of a secure virtual machine 101 is generated. In the...
US-8,984,316 Fast platform hibernation and resumption of computing systems providing secure storage of context data
Secure fast platform hibernation and resumption for computing systems. An embodiment of an apparatus includes a processor to operate according to an operating...
US-8,984,274 Secure data updates
In one implementation, actions may include generating a first key for encryption of data and a second key for encryption of connection parameters. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.