Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,943,600 Weighted security analysis
A method, computer program product, and system for transforming unit tests is described. A unit test associated with one or more software units is identified. A...
US-8,943,593 Dynamic provisioning of protection software in a host instrusion prevention system
Methods and apparatus for optimizing security configurations of a set of computers are disclosed. A set of local servers, each functioning as a deep-security...
US-8,943,577 Distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the...
US-8,943,562 Secure Wiegand communications
The present invention is directed toward secure access systems. Specifically, a method and system is provided that enhances the security of unidirectional...
US-8,943,558 System and method for monitoring a threat
A method and a system for monitoring a threat are described. The system has a gateway, a web server, and a client device. The gateway detects, identifies, and...
US-8,943,556 Secure information release
An embodiment of the invention provides a responder such as a health care professional with quick and secure access to select information about a user. An...
US-8,943,555 Asset streaming
A device streams assets to network-based storage in cooperation with servers administering the network-based storage. The servers manage and secure access to...
US-8,943,506 Client-side virtualization architecture using differential bi-directional synchronization and closed computing
The invention discloses the architecture of client-side virtualization, utilizing the techniques of differential bi-directional synchronization of layered data...
US-8,943,349 Browsing terminal, charging terminal, and communication system as well as transmitting/receiving system using...
To provide a browsing terminal and the like with high security, which can effectively prevent contents data stored in a terminal from being stolen unlawfully by...
US-8,943,330 Apparatus and method for hardware-based secure data processing using buffer memory address range rules
A processor is utilized for processing data from a buffer memory. The processor, implemented in hardware, may allow writing of output data, processed based on...
US-8,943,326 Systems and methods for accessing a tamperproof storage device in a wireless communication device using...
A novel system and method for accessing data stored in a secure or tamperproof storage device in a wireless communication device is provided. The wireless...
US-8,943,316 Document security system that permits external users to gain access to secured files
A system includes a server with an access manager configured to restrict access to files of an organization and maintain at least encryption keys for internal...
US-8,943,313 Fine-grained security in federated data sets
A data processing system, a server such as a federated server, a computer system, and like devices, and associated operating methods can be configured to...
US-8,943,309 Cookie security system with interloper detection and remedial actions to protest personal data
A server receives a request from the client. The request includes a cryptographically protected object that includes a respective user identifier and validation...
US-8,943,306 Methods, systems, and computer readable media for designating a security level for a communications link...
A content issuer entity designates a transport security level for each of a plurality of electronic certificates and provides the electronic certificates to a...
US-8,943,201 Method for establishing encrypted channel
A technique is disclosed for establishing a secure communication link between a first computer and a second computer over a computer network. Initially, a...
US-8,943,168 Remote monitoring systems for monitoring medical devices via wireless communication networks
A remote monitoring system for monitoring a plurality of medical devices at a patient care or home care facility. The system includes a device integration...
US-8,942,998 System and method for enabling channel community ratings in an IP marketplace
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
US-8,942,874 Self initiated prone progressive crawler
A self initiated prone progressive crawler facilitates crawling in infants by sensing the infant's intent and assisting movement. The device is designed as a...
US-8,942,865 Methods and systems for aircraft data communications over heterogeneous connectivity
Methods and systems for communicating data between an aircraft and an off-board network are provided. The method includes pre-loading data for the aircraft onto...
US-8,942,373 Data encryption and decryption method and apparatus
This present application relates to data encryption and decryption technology, and especially relates to a data encryption and decryption method and apparatus....
US-8,942,224 Method and system for handling security synchronization for prolonged periods of no-reception of voice frames
A method and system for handling security synchronization for prolonged periods of no-reception of voice frames. The method includes receiving one or more...
US-8,942,178 Collection of subscriber information for data breakout in a mobile data network
A method and system supports subscriber based IP data breakout at the edge of a mobile data network without monitoring the use of security keys or breaking into...
US-8,941,901 Electrophotographic image output device
An electrophotographic image output device includes an image processor to receive input image data, and a line screen to represent halftone images and have...
US-8,941,789 Liquid crystal display
A liquid crystal display apparatus includes a plurality of pixels having first and second subpixels, a plurality of gate lines connected to the first and second...
US-8,941,567 Pixel and organic light emitting display device using the same
An organic light emitting display device is capable of securing sufficient compensation period such that a threshold voltage of a driving transistor may be...
US-8,941,484 System and method of anomaly detection
A method and apparatus wherein the method includes detecting a plurality of events within a security system, evaluating the events using one of a first...
US-8,939,354 System and method for secure card packaging and activation
A secure card package including features such that an activable card disposed in the secure card package is activable only upon separation of a first portion...
US-8,938,983 Data center container with cooling system
A data center container includes a chassis, a cover, a cooling system, a water outlet, a water tray, and a connecting pipe. The cover is secured to the chassis....
US-8,938,796 Case secure computer architecture
Two computing subsystems are disclosed, one a control subsystem, the other a user subsystem, each using engines with augmented conventional instruction sets,...
US-8,938,795 System for real-time cross-domain system packet filtering
A system for filtering a digital signal transmitted in a protocol featuring multi-level packetization from a first server to a second server. The first server...
US-8,938,784 Authorization of server operations
An authorization device for authorizing operations of a remote server requested from user computers via a data communications network includes a computer...
US-8,938,781 Systems and methods for managing user permissions
Multi-tiered systems and methods for identifying and monitoring user permissions in a computer network are described. A data structure, such as an index, for...
US-8,938,779 Secure digital communications
Policies are used when performing a transaction between a first and a second device, the first device having an established trusted communication relation with...
US-8,938,778 System and method for controlling user access to encrypted data
Disclosed are systems, methods and computer program products for providing user access to encrypted data. In one example, a system is configured to receive a...
US-8,938,775 Dynamic data loss prevention in a multi-tenant environment
The usage of data in a multi-tenant environment can be controlled by utilizing functionality at the hypervisor level of various resources in the environment....
US-8,938,626 Single command functionality for providing data security and preventing data access within a decommissioned...
A computer-implemented method comprises a service processor: establishing a kill switch encryption key (KSEK) to provide data security for data within storage...
US-8,938,625 Systems and methods for securing cryptographic data using timestamps
Systems and methods for authenticating playback devices using timestamp validation in accordance with embodiments of the invention are disclosed. One embodiment...
US-8,938,624 Encryption key destruction for secure data erasure
Techniques for encryption key destruction for secure data erasure via an external interface or physical key removal are described. Electrical destruction of key...
US-8,938,622 Encryption in the cloud with customer controlled keys
A system and method for encryption in a cloud computing platform with customer controlled keys is disclosed. A cloud-based encryption key is uploaded from a...
US-8,938,611 Enterprise cloud security gateway
A security virtual machine is provided in a network including a resource shared among two or more virtual machines. All data traffic from each virtual machine...
US-8,938,565 Synchronous or asynchronous multi layer data link communication between a multi-functional data bus interface...
A multi layer data link communication system for a vehicle having a remote starter/alarm system, a vehicle computer and an OEM security interface. The system...
US-8,938,547 Method and system for data usage accounting in a computing device
A method and system for data usage accounting are described herein. As an example, the method can be practiced in a setting that includes both secure...
US-8,938,508 Correlating web and email attributes to detect spam
A computer correlates web and email attributes to detect spam. A security module on a client collects attributes of a web site to which an email address was...
US-8,938,474 Securing application information in system-wide search engines
A system for securing application information in a shared, system-wide search service. Each application can register a security filtering module that is to be...
US-8,938,060 Technique for effectively providing personalized communications and information assistance services
A user may utilize a communication device, e.g., a wireless phone, mobile device or personal digital assistant (PDA), to contact an information/call center...
US-8,937,847 System for acquiring seismic data in a marine environment, using seismic streamers coupled to means for...
Disclosed herein is a system of acquiring seismic date in a marine environment, which includes: seismic streamers towed by a vessel; and means for detecting...
US-8,937,658 Methods, systems, and products for security services
Methods, systems, and products are disclosed for notification of alarms in security systems. An alarm is detected in a security system. An alarm code is...
US-8,936,477 Apparatus to interconnect orthogonal circuit boards for high data rate use
An apparatus includes a chassis securing a midplane and forming a bay orthogonally aligned with the midplane. A module secures a circuit board with connectors...
US-8,936,201 Integrated circuits with persistent data storage
The circuitry introduced in this invention selectively slows down the functioning of an electronic circuit maintaining a particular state for a prolonged period...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.