Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,919,024 Secure smartphone-operated gun trigger lock
A gun trigger-looking device which is configured to be manually installed on a gun with a trigger-blocking member disposed behind the trigger to prevent the gun...
US-8,918,911 Connection device authentication
A method and apparatus are provided for a secure interconnect between data modules, including a security apparatus within a secured data interconnect apparatus...
US-8,918,905 Method and system to provide secure exchange of data between mobile phone and computer system
Systems and methods of providing a secure access layer in a mobile phone and a computer system coupled to the mobile phone to provide authentication for...
US-8,918,875 System and method for ARP anti-spoofing security
A system and method that provides for copying ARP replies, and generating data packets which include the ARP reply, and other information such as an...
US-8,918,867 Information security implementations with extended capabilities
Systems, devices or methods provide for control of sensitive data in a computer system that includes at least one central server communicatively-coupled to a...
US-8,918,865 System and method for protecting data accessed through a network connection
Systems (100) and methods (400) for protecting data accessed through a network connection. The methods involve transferring security software (150) from an...
US-8,918,860 Systems and methods for application-policing a VPN
A computer-implemented method for establishing secure mobile communications is described. A virtual private network (VPN) between a mobile device and a server...
US-8,918,857 Distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the...
US-8,918,855 Transaction provisioning for mobile wireless communications devices and related methods
A mobile communications device may include a memory, a transceiver, and a controller coupled with the memory and the transceiver. The controller may be capable...
US-8,918,854 Proximity-based system for automatic application initialization
A system and method provide automatic access to applications or data. A portable physical device, referred to herein as a Personal Digital Key or "PDK", stores...
US-8,918,846 Method and system for secure mobile messaging
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and...
US-8,918,761 Elastic application framework for deploying software
Software is deployed to, and executed at, one or more computing devices in a computing system based on current conditions in the computing system and the...
US-8,918,654 Information processing device, program verification method, and recording medium
A first storage unit stores a plurality of security functions each defining a first protection attribute requiring a storage of a value of an argument for...
US-8,918,650 Secure data processing for unaligned data
A method for data cryptography includes accepting input data, which contains a section that is to undergo a cryptographic operation and starts at an offset with...
US-8,918,642 Protection of secret value using hardware instability
A method for data security, comprising providing an electronic circuit, which has a first, stable operating mode under a first operating condition and a second,...
US-8,918,639 Smarter leveraging of the power grid to substantially improve security of distributed systems via a control...
A secure communications and location authorization system using a power line or a portion thereof as a side-channel that mitigates man-in-the-middle attacks on...
US-8,918,634 Network node with network-attached stateless security offload device employing out-of-band processing
A network node for communicating data packets secured with a security protocol over a communications network includes a host information handling system (IHS)...
US-8,918,633 Information processing device, information processing system, and program
The present invention provides an information processing device, an information processing system, and a program capable of improving security and convenience....
US-8,918,612 Method and apparatus for verifying memory contents
A system and method of verifying a content of a non-volatile reprogrammable memory communicatively coupled to a microprocessor is disclosed. The method...
US-8,918,611 Semiconductor device and data processing method
A semiconductor device has: as security states to which the nonvolatile memory device can transition, an unprotected state in which, when secret information is...
US-8,918,575 Method and system for securely programming OTP memory
A semiconductor chip may be operable to receive and copy an OTP programming vector presented by the semiconductor chip programming device into its memory after...
US-8,918,466 System for email processing and analysis
Various features are provided for analyzing and processing email messages including determining if an email message is unwanted, and blocking unwanted messages....
US-8,918,426 Role engineering scoping and management
Mechanisms are provided for performing a role engineering project for applying security roles to access operations targeting resources. A plurality of data...
US-8,918,425 Role engineering scoping and management
Mechanisms are provided for performing a role engineering project for applying security roles to access operations targeting resources. A plurality of data...
US-8,918,359 System and method for data mining and security policy management
A method is provided in one example and includes generating a query for a database for information stored in the database. The information relates to data...
US-8,918,078 Security for mobile communications device
A mobile communications device for communicating with a wireless network, including an electronic storage having data stored thereon, a processor connected to...
US-8,917,684 Method and apparatus for supporting multiple frequency bands efficiently in mobile communication system
A method and an apparatus for transmitting a small size data packet efficiently while reducing signaling overhead in a mobile communication system are provided....
US-8,917,671 Multi-tier wireless home mesh network with a secure network discovery protocol
An apparatus and method for a multi-tier wireless home mesh network is described. The method may include formation of an infrastructure-less wireless home mesh...
US-8,915,971 Security device for electronics
A lock and modular system for securing an electronic device. The system includes a device security module that couples to an electronic device and secures the...
US-8,915,744 System and method for automated competency assessment
The present invention relates to a system used for competency assessment of candidates. More particularly the present invention relates to an automated system...
US-8,914,901 Trusted storage and display
A storage token has a display and a keyboard, or other input device, that allows a user to view a request to access a memory location and enter a response to...
US-8,914,896 Secure data storage and retrieval
A system for secure data processing can include an electronic data storage device and a field programmable gate array coupled to the electronic data storage...
US-8,914,884 System and methods for protecting data from input devices
Disclosed are system, methods and computer program product for secure transfer of data from an input device. An example method includes receiving first data by...
US-8,914,874 Communication channel claim dependent security precautions
A set of security claims for a communication channel are obtained, the set of security claims including one or more security claims each identifying a security...
US-8,914,871 Distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the...
US-8,914,865 Data storage and access facilitating techniques
An apparatus and method for securely accessing and storing private data files and programs on a personal computing device with network access is provided. A...
US-8,914,860 System and method for associating message addresses with certificates
A system and method for associating message addresses with certificates, in which one or more message addresses are identified and associated with a...
US-8,914,848 Social authentication of users
User authentication is provided. A social network associated with a user of a client device is monitored to determine whether a set of designated users are...
US-8,914,841 Method and system for mapping between connectivity requests and a security rule set
A system capable of automated mapping between a connectivity request and an ordered security rule-set and a method of operating thereof. The system includes an...
US-8,914,669 Secure rebuilding of an encoded data slice in a dispersed storage network
A method begins by a processing module identifying an encoded data slice to be rebuilt, selecting a decode threshold number of dispersed storage (DS) units of a...
US-8,914,644 System and method of facilitating the identification of a computer on a network
A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may...
US-8,914,642 Person oneself authenticating system and person oneself authenticating method
There is provided person oneself authenticating means for authentication of a user, which is highly secure and realizable by functions ordinarily provided by a...
US-8,914,631 Performing secure and non-secure communication over the same socket
A packet processing type determiner includes a non-secure packet processing module configured to process packets received over a single socket using a...
US-8,914,510 Methods, systems, and computer program products for enhancing internet security for network subscribers
A network communication system includes a connection server that assigns a network address within a data communication network to a subscriber terminal. The...
US-8,914,489 Method of personalizing an application embedded in a secured electronic token
The invention is a method of personalizing an application embedded in a secured electronic token which is able to manage first and second channels that allow to...
US-8,914,406 Scalable network security with fast response protocol
This disclosure provides a network security architecture that permits installation of different software security products as virtual machines (VMs). By relying...
US-8,914,323 Policy-based data-centric access control in a sorted, distributed key-value data store
A method, apparatus and computer program product for policy-based access control in association with a sorted, distributed key-value data store in which keys...
US-8,913,992 Methods and apparatus for access data recovery from a malfunctioning device
Methods and apparatus for recovering access data from a malfunctioning device. In one embodiment, trained service personnel are provided a specialized apparatus...
US-8,913,989 Secure transmission over satellite phone network
A reach back secure communications terminal includes a modem to satellite interconnect board that captures DTMF tones, demodulates encrypted modem information,...
US-8,913,898 Fiber optic telecommunications card with security detection
A transceiver card for a telecommunications box for transmitting data over a first optical fiber and receiving data over a second optical fiber. The card has...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.