Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,897,704 Method and apparatus to enable use of motion to associate devices
A method and apparatus to provide easier pairing based on motion data is described. The method of associating two devices comprises receiving a signal to enter...
US-8,897,451 Storing secure information using hash techniques
Sensitive information is hashed using a hash key, salting key and additional logic. Upon receiving a credit card authorization request with a credit card number...
US-8,897,433 Security system with two-way communication and video
A security system has a camera; a sensor generating a signal in response to a triggering event, and a management module. The triggering event is one of an...
US-8,897,157 Method and apparatus for providing conditional access based on channel characteristics
A first network device may discover one or more values of one or more parameters corresponding to a plurality of links and/or devices of the network. The first...
US-8,896,559 Wire-array pressure and movement sensor
A multilayer wire array having an upper layer having a series wires arranged in an equally spaced, parallel relationship and a series of internal layers located...
US-8,896,482 Object detection method
A dummy target is set in a direction which is the same direction as that of a detected target and at the position whose distance is double that of the detected...
US-8,896,446 Device and system for electronic access control and surveillance
Described is a device for electronic access control (EAC) and surveillance. The device includes an EAC module and an imager integrated in a single unit. The EAC...
US-8,896,346 Self-modifying FPGA for anti-tamper applications
A self-modifying FPGA system includes an FPGA and a configuration memory coupled to the FPGA for providing the FPGA with configuration data including SAFE...
US-8,893,964 Secure point of sale presentation of a barcode at an information handling system display
Unauthorized copying of a transaction barcode is prevented by including a sensed condition or other publicly-accessible data with the transaction barcode for...
US-8,893,960 Banking system controlled responsive to data bearing records
An automated banking machine operates using data read from user cards. The machine is operative to transfer funds in accounts. The machine includes a user...
US-8,893,420 Secure smartphone-operated gun trigger lock
A battery-powered trigger-locking device, which is configured to be disposed on a gun with a trigger for firing, includes a data receiver, a data memory and a...
US-8,893,306 Resource management and security system
A system to address resource management and security in a computer system may include an operating system kernel executing on a computer processor. The system...
US-8,893,300 Security systems and methods to reduce data leaks in enterprise networks
Disclosed are embodiments of a security system for reducing data leaks by checking information flows between resources of a network. When an information flow is...
US-8,893,291 Security through metadata orchestrators
A method of obtaining a service from a second cloud domain, the method being performed by a first cloud domain, includes identifying the second cloud domain...
US-8,893,285 Securing data using integrated host-based data loss agent with encryption detection
A method and system for securing data in a computer system provides the capability to secure information even when it leaves the boundaries of the organization...
US-8,893,282 System for detecting vulnerabilities in applications using client-side application interfaces
An improved method and apparatus for client-side application analysis is provided. Client-side application analysis involves determining and testing, using...
US-8,893,281 Method and apparatus for predicting the impact of security incidents in computer systems
Systems or methods gathers information within a network of computers regarding the distribution of documents to calculate the impact of a cyber security...
US-8,893,274 Cross-VM network filtering
A security virtual machine inspects all data traffic between other virtual machines on a virtualization platform in order to prevent an inter-VM attack. Data...
US-8,893,266 System and method for secure control of resources of wireless mobile communication devices
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
US-8,893,263 Apparatus and method for securing data on a portable storage device
A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of...
US-8,893,260 Secure remote access public communication environment
A method and system provide a user device with secure access to an enterprise application in an enterprise network through VPN. The enterprise application is...
US-8,893,254 Dynamic insertion of service specific privacy proxy elements
A method for providing security for mobile device users, comprising a data service node receiving from a first device a first message directed to a web...
US-8,893,242 System and method for pool-based identity generation and use for service access
A computer-implemented system and method for pool-based identity generation and use for service access is disclosed. The method in an example embodiment...
US-8,893,238 Method for accessing a plurality of services by a mobile terminal user, and related secure device
A method for enabling the user of at least one mobile terminal to access a plurality of services, includes: creating (E1) a user account containing user...
US-8,893,234 Method of securing access to a proximity communication module in a mobile terminal
A method of securing access to a near-field communication module (30) included in a terminal (10) comprising a security device (20) adapted to be blocked...
US-8,892,895 Integrated system for electronic tracking and control of documents
Systems and methods are provided for electronic tracking and control of secure test documents. One aspect of the present subject matter is a method for...
US-8,892,883 Render service for remote access to applications
The present disclosure relates to providing remote access to applications with an increased level of security. A server for providing access to applications is...
US-8,892,882 Content transmission security protection device system and method
The invention relates to information security technologies, provides a content security transmission device and a content security transmission system which...
US-8,892,881 Split key secure access system
The present invention is a secure access system whereby the key that facilitates entrance to electronic data is split into at least two segments. Electronic...
US-8,892,879 System and method for securing and tracking files
A method, system and computer program product for securing and tracking restricted files stored in a data processing system is provided. The data processing...
US-8,892,877 Method and device for accessing files of a secure file server
A method and a device are provided for accessing data files of a secure file server, wherein a user or a process is authenticated; wherein access to the data...
US-8,892,872 Secure redacted document access
Described are computer-based methods and apparatuses, including computer program products, for secure redacted document access. A viewing application for...
US-8,892,868 Hardening tokenization security and key rotation
A method of using a hardware security module and an adjunct application programming interface to harden tokenization security and encryption key rotation is...
US-8,892,867 Techniques for protecting data in cloud computing environments
A client computer runs a communicator employed to connect to a server computer in a cloud. The communicator is updated on a regular basis to update its...
US-8,892,862 Secure boot method for executing a software component including updating a current integrity measurement based...
A method for executing a predetermined software component which is verifiable against integrity measurements, the method including (i) providing a first mapping...
US-8,892,860 Clearing secure system resources in a computing device
Systems and methods of clearing system resources are disclosed. One example method includes the step of detecting a failure to clear a secure portion of a...
US-8,892,855 Encryption keys distribution for conditional access software in TV receiver SOC
A method for securely generating and distributing encryption keys includes generating, by a secured server, a pair of keys including a first key and a second...
US-8,892,778 Method and systems for securing remote access to private networks
A method for securing remote access to private networks includes a receiver intercepting from a data link layer a packet in a first plurality of packets...
US-8,892,687 Client/server security by an intermediary rendering modified in-memory objects
In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define one or more objects and one or more...
US-8,892,513 Method, process and system to atomically structure varied data and transform into context associated data
A novel method, system and process for the enterprise software are described. The data is created, captured, ingested, stored, atomized, monitored, separated,...
US-8,892,454 Configuration of web services
Methods and apparatus, including computer program products, for configuration of web services. In general, data is received characterizing web service calls for...
US-8,892,069 Method for automatically configuring addresses and/or security data between evolved node Bs (eNBs) of a long...
A method is intended for automatically configuring address(es) between eNBs (NBi) of an LTE access network. This method comprises i) transmitting a chosen...
US-8,891,770 Pair-wise keying for tunneled virtual private networks
In an embodiment, a method for generating and distributing keys retains the scalability of a group VPN, but also provides true pair-wise keying such that an...
US-8,891,768 Increasing data security in enterprise applications by obfuscating encryption keys
A method, system, and computer program product for using hidden buffer formatting and passing obfuscated encryption key values to detect tampering with and/or...
US-8,891,107 Image forming apparatus, control method thereof and computer-readable storage medium
This invention provides an image forming apparatus capable of reliably printing security information even when image data of an original document that is...
US-8,890,976 Imaging apparatus and image capturing method for increasing security of a captured image file
An imaging apparatus that includes an image capturing unit that captures image data, a memory that stores the image data and a password for accessing the stored...
US-8,890,893 Data processing and display system
A data processing and display system includes processing and display means adapted for displaying, from a more secured domain and on a same screen of a display...
US-8,888,762 Flexible shaft extender and method of using same
An extender for use in an electro-mechanical surgical system that includes a surgical attachment that may be detachably coupled to an electro-mechanical driver...
US-8,888,744 Infusion and sensing device with battery charging and data transferring mechanisms
Disclosed is a portable ambulatory fluid delivery device. The device includes a dispensing unit to dispense therapeutic fluid, the dispensing unit including one...
US-8,888,585 Game console system, method and computer program product with anti-malware/spyware and parental control...
A system, method and computer program product are provided for securing a game console capable of processing game-related data. In use, the game-related data is...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.