Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,924,703 Secure virtualization environment bootable from an external media device
Methods and systems for creating a secure virtualization environment on a host device, without modifying the host device, the secure virtualization environment...
US-8,924,670 System and method for protecting content
A method, computer program product, and computing system for storing an unsecure data portion within a temporary storage device. An indication of a power...
US-8,924,475 Emergency response center
The present invention is an Emergency Response Center (ERC) which provides a variety of emergency and information functions in public environments. The ERC...
US-8,924,433 Methods for geotemporal fingerprinting
Records of geotemporal data for a plurality of users from a database associated with on-line and/or mobile cellular activities are used to generate a...
US-8,924,296 Dynamic pairing system for securing a trusted communication channel
A system for securing a trusted communications channel for a mobile financial transaction is provided by receiving, from a user via an external terminal, a...
US-8,924,033 Generalized grid security framework
The subject specification comprises a generalized grid security platform (GGSP) that can control power distribution and operations in a power transmission and...
US-8,923,883 Anticipatory location-based mobile communication media transfer
Methods and systems for anticipatory location-based mobile communication media transfer are disclosed and may include pre-planning communication of information...
US-8,923,820 Modified messaging server call flow for secured mobile-to-mobile messaging
Systems and techniques are provided for transmitting a secured message from an originating device to a recipient mobile device through a mobile communication...
US-8,923,817 Mobility device security
The present disclosure provides a system to establish a stable ownership relationship between an online identity and a mobile device. This relationship is...
US-8,923,815 Method for detecting changes in security level in mobile networks
A system and method for detecting changes in security level of mobile networks. The system can be used with any mobile devices having a network module or a...
US-8,923,763 Methods and apparatuses for reducing the nonvolatile memory used to support application identifier routing in...
The present application presents example data routing methods and apparatuses for reducing the amount of nonvolatile memory required to store secure element...
US-8,923,294 Dynamically provisioning middleboxes
Hybrid security architecture (HSA) provides a platform for middlebox traversal in the network. The HSA decouples the middlebox control from network forwarding....
US-8,923,272 Method and apparatus for multiplexing a host identity protocol security channel
Embodiments of the present invention relate to the field of security channel multiplexing, and disclose a method and an apparatus for multiplexing a HIP...
US-8,922,807 Print control apparatus, print control method, and program therefor
Conventionally, during a copy operation, certain advanced mode settings make the extraction of additional security information impossible. In order to solve...
US-8,922,562 Meteorology and oceanography geospatial analysis toolset
System and method for providing access to ArcMap netCDF utilities and adding support for observational data to ArcMap including, but not limited to, comparing...
US-8,922,361 System and method for home automation and security
A home automation and security system is provided in which a home automation and security controller in a customer premises is coupled with a remotely located...
US-8,919,024 Secure smartphone-operated gun trigger lock
A gun trigger-looking device which is configured to be manually installed on a gun with a trigger-blocking member disposed behind the trigger to prevent the gun...
US-8,918,911 Connection device authentication
A method and apparatus are provided for a secure interconnect between data modules, including a security apparatus within a secured data interconnect apparatus...
US-8,918,905 Method and system to provide secure exchange of data between mobile phone and computer system
Systems and methods of providing a secure access layer in a mobile phone and a computer system coupled to the mobile phone to provide authentication for...
US-8,918,875 System and method for ARP anti-spoofing security
A system and method that provides for copying ARP replies, and generating data packets which include the ARP reply, and other information such as an...
US-8,918,867 Information security implementations with extended capabilities
Systems, devices or methods provide for control of sensitive data in a computer system that includes at least one central server communicatively-coupled to a...
US-8,918,865 System and method for protecting data accessed through a network connection
Systems (100) and methods (400) for protecting data accessed through a network connection. The methods involve transferring security software (150) from an...
US-8,918,860 Systems and methods for application-policing a VPN
A computer-implemented method for establishing secure mobile communications is described. A virtual private network (VPN) between a mobile device and a server...
US-8,918,857 Distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the...
US-8,918,855 Transaction provisioning for mobile wireless communications devices and related methods
A mobile communications device may include a memory, a transceiver, and a controller coupled with the memory and the transceiver. The controller may be capable...
US-8,918,854 Proximity-based system for automatic application initialization
A system and method provide automatic access to applications or data. A portable physical device, referred to herein as a Personal Digital Key or "PDK", stores...
US-8,918,846 Method and system for secure mobile messaging
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and...
US-8,918,761 Elastic application framework for deploying software
Software is deployed to, and executed at, one or more computing devices in a computing system based on current conditions in the computing system and the...
US-8,918,654 Information processing device, program verification method, and recording medium
A first storage unit stores a plurality of security functions each defining a first protection attribute requiring a storage of a value of an argument for...
US-8,918,650 Secure data processing for unaligned data
A method for data cryptography includes accepting input data, which contains a section that is to undergo a cryptographic operation and starts at an offset with...
US-8,918,642 Protection of secret value using hardware instability
A method for data security, comprising providing an electronic circuit, which has a first, stable operating mode under a first operating condition and a second,...
US-8,918,639 Smarter leveraging of the power grid to substantially improve security of distributed systems via a control...
A secure communications and location authorization system using a power line or a portion thereof as a side-channel that mitigates man-in-the-middle attacks on...
US-8,918,634 Network node with network-attached stateless security offload device employing out-of-band processing
A network node for communicating data packets secured with a security protocol over a communications network includes a host information handling system (IHS)...
US-8,918,633 Information processing device, information processing system, and program
The present invention provides an information processing device, an information processing system, and a program capable of improving security and convenience....
US-8,918,612 Method and apparatus for verifying memory contents
A system and method of verifying a content of a non-volatile reprogrammable memory communicatively coupled to a microprocessor is disclosed. The method...
US-8,918,611 Semiconductor device and data processing method
A semiconductor device has: as security states to which the nonvolatile memory device can transition, an unprotected state in which, when secret information is...
US-8,918,575 Method and system for securely programming OTP memory
A semiconductor chip may be operable to receive and copy an OTP programming vector presented by the semiconductor chip programming device into its memory after...
US-8,918,466 System for email processing and analysis
Various features are provided for analyzing and processing email messages including determining if an email message is unwanted, and blocking unwanted messages....
US-8,918,426 Role engineering scoping and management
Mechanisms are provided for performing a role engineering project for applying security roles to access operations targeting resources. A plurality of data...
US-8,918,425 Role engineering scoping and management
Mechanisms are provided for performing a role engineering project for applying security roles to access operations targeting resources. A plurality of data...
US-8,918,359 System and method for data mining and security policy management
A method is provided in one example and includes generating a query for a database for information stored in the database. The information relates to data...
US-8,918,078 Security for mobile communications device
A mobile communications device for communicating with a wireless network, including an electronic storage having data stored thereon, a processor connected to...
US-8,917,684 Method and apparatus for supporting multiple frequency bands efficiently in mobile communication system
A method and an apparatus for transmitting a small size data packet efficiently while reducing signaling overhead in a mobile communication system are provided....
US-8,917,671 Multi-tier wireless home mesh network with a secure network discovery protocol
An apparatus and method for a multi-tier wireless home mesh network is described. The method may include formation of an infrastructure-less wireless home mesh...
US-8,915,971 Security device for electronics
A lock and modular system for securing an electronic device. The system includes a device security module that couples to an electronic device and secures the...
US-8,915,744 System and method for automated competency assessment
The present invention relates to a system used for competency assessment of candidates. More particularly the present invention relates to an automated system...
US-8,914,901 Trusted storage and display
A storage token has a display and a keyboard, or other input device, that allows a user to view a request to access a memory location and enter a response to...
US-8,914,896 Secure data storage and retrieval
A system for secure data processing can include an electronic data storage device and a field programmable gate array coupled to the electronic data storage...
US-8,914,884 System and methods for protecting data from input devices
Disclosed are system, methods and computer program product for secure transfer of data from an input device. An example method includes receiving first data by...
US-8,914,874 Communication channel claim dependent security precautions
A set of security claims for a communication channel are obtained, the set of security claims including one or more security claims each identifying a security...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.