Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,954,486 Secured identities collaboration system and method
An identities collaboration system that comprises a Personal Service Provider (PSP) system for supplying specific user related personal service(s); means for...
US-8,954,459 Systems and methods for providing an integrated identifier
Embodiments described herein provide systems and methods to streamline the mechanism by which data users access differently regulated data through the use of...
US-8,954,352 Method and apparatus for provisioning financial data
A method and apparatus for storing financial data utilizing a communications network is described. In one embodiment, provisioning access is provided to a...
US-8,954,189 Security and tracking system and process for agricultural product distribution
Sonic embodiments provide an agricultural commodity distribution system that provides secure distribution of an agricultural commodity to an authorized person....
US-8,954,187 Social network and safety features for process control systems
A system for improving process awareness, safety, security, efficiency, and other aspects of industrial and non-industrial processes for participants associated...
US-8,954,135 Portable biometric monitoring devices and methods of operating same
The present inventions, in one aspect, are directed to portable biometric monitoring device including a housing having a physical size and shape that is adapted...
US-8,954,113 Service provider activation with subscriber identity module policy
Systems and methods for activating a mobile device for use with a service provider are described. In one exemplary method, a mobile device having a currently...
US-8,954,006 Computer to vehicle wireless link
A wireless data link system between a vehicle having a vehicle controller and a computing device having a computing processor is provided. The wireless data...
US-8,953,808 System and method for effectively performing data restore/migration procedures
A system and method for effectively supporting data transfer procedures includes a source device that registers with an account server to participate in a data...
US-8,953,804 Method for establishing a secure communication channel
In a method for establishing a secure communication channel between a portable data carrier (10) and a terminal on the basis of an asymmetric cryptosystem, a...
US-8,953,802 Signal security in a satellite signal distribution environment
Certain embodiments provide a set top box, comprising: a processing entity configured to obtain data for a channel stacking switch, to obtain a security data...
US-8,953,788 Encrypting a data transmission using multiple channels
A method, system, and media are provided for securely communicating data. One embodiment of the method includes encrypting a data stream by way of a first...
US-8,953,786 User input based data encryption
Systems and methods for securing data by a user input based data encryption are described. In one aspect of the invention, the method may include receiving an...
US-8,953,235 Method for producing a security mark on an optical data carrier
A device for producing a security mark on an optical data carrier includes directing means for directing a first and a second light beam onto a hologram area of...
US-8,953,222 Image forming apparatus, image forming method, and computer program product
An image forming apparatus includes a printer engine, a storage unit, a print data interpreting unit, and a print control unit. The print data interpreting unit...
US-8,952,781 Method and apparatus for access control using dual biometric authentication
A biometrically authenticated access control in which a wireless authentication signal is provided from a primary instrumentality of access, only after a...
US-8,949,997 Method and apparatus for providing security to devices
Systems, methods, and apparatus are provided for generating verification data that may be used for validation of a wireless transmit-receive unit (WTRU). The...
US-8,949,994 Detecting persistent vulnerabilities in web applications
A method, including storing a test payload to a persistent state of an application and performing a static analysis to identify a first code location in the...
US-8,949,992 Detecting persistent vulnerabilities in web applications
A method, including storing a test payload to a persistent state of an application and performing a static analysis to identify a first code location in the...
US-8,949,975 Secure data access in hybrid disk drive
Data are accessed securely in a data storage device that includes a non-volatile solid-state storage device integrated with a magnetic storage device. An...
US-8,949,969 Payment card industry (PCI) compliant architecture and associated methodology of managing a service infrastructure
A system to ensure compliance with data security standards. The system including a security appliance to perform multiple security functions, the security...
US-8,949,966 Method and system for protecting a service access link
A method and a system for securing access to data stored in a remote content server (41), and corresponding to personal multimedia data of a user (A) for...
US-8,949,957 Method and system for creating a mobile internet protocol version 4 connection
A method for creating a unique and secure mobile internet protocol version 4 connection for a packet data network is provided. The method includes generating an...
US-8,949,939 Methods and systems for provisioning access to customer organization data in a multi-tenant system
Methods and systems are described for providing support representative access to applications deployed in an enterprise network environment. An access...
US-8,949,935 Secure account creation
In one embodiment, non-transitory computer-readable medium stores instructions for establishing a trusted two-way communications session for account creation...
US-8,949,930 Template representation of security resources
Systems and methods are described for enabling users to model security resources and user access keys as resources in a template language. The template can be...
US-8,949,929 Method and apparatus for providing a secure virtual environment on a mobile device
Methods and devices provide a secure virtual environment within a mobile device for processing documents and conducting secure activities. The methods and...
US-8,949,877 Method and system for determining subscriber demand for multimedia content
A method of determining demand for multimedia content in a multimedia provider network includes receiving a content demand statistics (CDS) request from a...
US-8,949,797 Optimizing performance of integrity monitoring
A system, method and computer program product for verifying integrity of a running application program on a computing device. The method comprises: determining...
US-8,949,626 Protection of security parameters in storage devices
Security parameters used to encrypt data stored on a storage device may be protected using embodiments of systems and methods described herein. During a resize...
US-8,949,624 Method and system for secure access to non-volatile memory
Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic...
US-8,949,622 Secure removable drive system
A data storage system comprises a removable drive with memory for storing data, and an identifier for identifying the removable data cartridge. A host computer...
US-8,949,618 Display device and method for controlling the same
A display device includes a display unit configured to display an image and to sense a touch input; a sensor unit configured to sense a fingerprint from the...
US-8,949,611 Methods, apparatus and computer program products for authenticating and determining integrity of a software...
Methods, apparatus and computer program products are provided to authenticate and determine the integrity a software part. In this regard, a software part is...
US-8,949,608 Field programmable smart card terminal and token device
The invention defines a digital programmable smart card terminal device and token collectively known as the token device. The token device comprises a field...
US-8,949,603 Database management system and encryption method performed in database
A database management system (DBMS) performs encryption in a DB. The system receives authentication authorization regarding a security policy of the DB from an...
US-8,949,591 Systems and methods for split proxying of SSL via WAN appliances
The present invention is directed towards systems and methods for split proxying Secure Socket Layer (SSL) communications via intermediaries deployed between a...
US-8,949,565 Virtual and hidden service partition and dynamic enhanced third party data store
A system reserves and manages a hidden service partition through components of the hardware platform of a computing device. The hidden partition is not...
US-8,949,548 System and method of sharing memory by arbitrating through an internal data bus
One or more methods and systems of sharing an external memory between functional modules of an integrated circuit chip are presented. The invention provides a...
US-8,949,260 Method and apparatus for secure and oblivious document matching
A method and apparatus for secure and oblivious document matching are described. In one embodiment, the method comprises transmitting initial secure dot product...
US-8,949,195 Method and system for multi-dimensional logging for enterprise applications
Multi-dimensional logging for enterprise applications is described. A computer executes a logging mechanism. The logging mechanism receives, via a user...
US-8,949,147 Methods and systems for tracking a product or service within a supply
Methods and systems for the efficient tracking of a product or service within the product or service's life cycle within a supply chain. Implementations of the...
US-8,948,683 Multi-mode phy-level wireless security
A method for communication includes, in a transmitter that transmits one or more data streams to respective target receivers and one or more jamming streams for...
US-8,948,387 Security key generator
A communication system has a first and a second communicating device operable to send and receive data units through a communication channel. Some of the data...
US-8,948,386 Authentication of a mobile device by a network and key generation
There are disclosed systems and methods for authenticating a mobile device by a network and/or for generating one or more keys that can be used for securely...
US-8,948,379 Architecture of an open local area network for audio service support between users of partitioned domains
The invention relates to a system for data exchange between at least two communication networks using the IP Internet protocol, a first network having a...
US-8,947,360 Set of handheld adjustable panels of ergonomic keys and mouse
A set of handheld, adjustable panels including a plurality of ergonomic keys which function as a keyboard and mouse to allow a user to easily input data to an...
US-8,947,214 Anti-identity theft and information security system
The anti-identity theft and information security system process includes storing secure information in association with an electronic device having a...
US-8,947,211 Communication data protection method based on symmetric key encryption in RFID system, and apparatus for...
A communication data protection method based on symmetric key encryption, and an apparatus for enabling the method are provided. A communication data protection...
US-8,944,832 Apparatus to interconnect orthogonal circuit boards for high data rate use
A method includes securing a midplane in a chassis, wherein the midplane has one or more connectors, and securing a circuit board in a module, wherein the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.