Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,820,637 Time-varying security code for enabling authorizations and other uses of financial accounts
A portable device is provided that carries account data. The account data may include a security code having a value that is time-varying. The value of the...
US-8,819,858 Hardware access and monitoring control
Various embodiments described and illustrated here include one or more of systems, methods, software, and data structures that may be used to implement policies...
US-8,819,850 Management of application access
Concepts and technologies are disclosed herein for management of application access. A security management application can be configured to set access controls...
US-8,819,842 Implementing conductive microcapsule rupture to generate a tamper event for data theft prevention
A method and circuit for implementing conductive microcapsule rupture to generate a tamper event for data theft prevention, and a design structure on which the...
US-8,819,839 Microprocessor having a secure execution mode with provisions for monitoring, indicating, and managing security...
An apparatus including a microprocessor and a secure non-volatile memory. The microprocessor executes non-secure application programs and a secure application...
US-8,819,833 Assured pipeline threat detection
Devices, methods, and systems for assured pipeline threat detection are described herein. One method for assured pipeline threat detection includes receiving a...
US-8,819,822 Security method for detecting intrusions that exploit misinterpretation of supplied data
Mechanisms have been developed for securing computational systems against certain forms of attack. In particular, it has been discovered that, by scanning an...
US-8,819,820 Security capability reference model for goal-based gap analysis
Gap analysis is performed on security capabilities of a computer system compared to a desired or targeted security model according to one or more security...
US-8,819,793 Systems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository
A method includes receiving data related to an individual, the data comprising a plurality of elements of personally-identifying information (PII). The method...
US-8,819,788 Method and system for providing security data to security stations
There is provided a system and method of selectively directing collected security data that may be displayed concurrently at a first security station and at a...
US-8,819,783 Efficient data structures for multi-dimensional security
Efficient data structures are generated to enforce permissions on a multi-dimensional representation in a performance management application. A model site is...
US-8,819,767 Method for securing data and/or applications in a cloud computing architecture
A method for securing data and/or applications within a cloud computing architecture is provided. According to the invention, a security module is provided, the...
US-8,819,764 Network security monitor apparatus and network security monitor system
A network security monitoring apparatus and a network security monitoring system manages "permitted" or "not permitted" communication between nodes based on an...
US-8,819,637 Fixing security vulnerability in a source code
A computer implemented method for automatically fixing a security vulnerability in a source code. The method includes obtaining identification of a code block...
US-8,819,447 Secure storage of protected data in a wireless communication device
A wireless communication device comprises first processing circuitry configured to execute an RF operating system and second processing circuitry configured to...
US-8,819,446 Support for secure objects in a computer system
A method and structure in a computer system, including a mechanism supporting a Secure Object that includes code and data that is cryptographically protected...
US-8,819,442 Assessing risk associated with a computer technology
Systems and methods of assessing vulnerability or risk associated with a computer technology are presented. The system and method may include receiving a...
US-8,819,436 Protection method, decryption method, recording medium and terminal for said protection method
Protecting data transmission, either multimedia or a control word, between a security processor and a terminal includes, at the security processor, building a...
US-8,819,434 Method and processing unit for secure processing of access controlled audio/video data
A method based on access conditions verification performed by two conditional access devices consecutively on a control message before releasing a control word...
US-8,819,429 Near field registration of home system audio-video device
A near field communication (NFC) sticker which stores a key is attached to a new client device. A remote commander in a home network reads the key using a NFC...
US-8,819,428 Point of sale (POS) personal identification number (PIN) security
A key is securely injected into a POS PIN pad processor in its usual operating environment. In response to entry of a personal identification number (PIN) into...
US-8,819,409 Distribution system and method for distributing digital information
A distribution system and method for distributing digital information is provided, which has high recoverability from a security breach. The distribution system...
US-8,819,405 Remote access to a mass memory and a security memory in a portable communicating object
The invention relates to a system for remotely accessing a mass storage unit and a security storage unit in a portable communicating object. According to the...
US-8,819,257 Method and device for performing communication on a bus structured network
The invention refers to a method for performing communication on a bus structured network between master device and slave devices using a bi-directional data...
US-8,819,255 Relevancy improvement through targeting of information based on data gathered from a networked device...
A method, apparatus, and system related to relevancy improvement through targeting of information based on data gathered from a networked device associated with...
US-8,819,253 Network message generation for automated authentication
A message generation mechanism for a network interface is provided. The message generation mechanism is operable to generate a message which includes data for...
US-8,819,248 Secure messaging facility system
A secure message facility transfers authentication data between various applications, operating systems, and authentication devices and software in the form of...
US-8,819,234 Supplying data storage services
A method is used in supplying data storage services. For a set of applications running on an electronic system, an application service is provided to each...
US-8,819,213 System, method and apparatus for traffic mirror setup, service and security in communication networks
The present invention provides method and systems for dynamically mirroring network traffic. The mirroring of network traffic may comprise data that may be...
US-8,819,178 Controlling data routing in integrated security systems
An integrated security system integrates broadband and mobile access and control with conventional security systems and premise devices to provide a tri-mode...
US-8,818,906 Systems and methods for performing authentication of a customer interacting with a banking platform
The invention provides systems and methods of authenticating a customer device, in conjunction with a requested interaction, the customer device associated with...
US-8,818,757 Modular object and host matching
An object can be used in an industrial control configuration in relation to performing a function or task. Matching can occur such that an object with...
US-8,818,614 Personal event data recorder
A personal event data recorder (PEDR) is provided. The PEDR may be integrated within a mobile communications device or may be provided as a separate add-on...
US-8,818,369 Method for a secure detach procedure in a radio telecommunications network
The present invention proposes a method for performing a detach of a terminal registered to a telecommunication network by associating an identification for...
US-8,818,351 Method and apparatus for tracking a transported item while accommodating communication gaps
A method and apparatus is provided for minimizing potential security problems and battery power usage in a tracking device used in tracking an associated...
US-8,818,334 Secure data exchange with identity information exchange
Systems and methods for authenticating authorized users of electronic communication devices, such mobile communication devices, for a secure data exchange...
US-8,818,202 Wavelength sensing lighting system and associated methods for national security application
A wavelength sensing lighting system may include a light source, a sensor and a controller. One or more light sources and sensors may be included in an array....
US-8,818,020 Method of providing security for transmitting a digital medical image
A method of preparing a digital medical image for secure transmission, the method comprising embedding data into the digital medical image using a reversible...
US-8,817,984 Cryptographic security functions based on anticipated changes in dynamic minutiae
Dynamic key cryptography validates mobile device users to cloud services by uniquely identifying the user's electronic device using a very wide range of...
US-8,817,983 Streaming video to cellular phones
A method, system, and computer program product for deploying data to a web server for streaming video to a mobile device. The method can include receiving a...
US-8,817,668 Distributable, scalable, pluggable conferencing architecture
Architecture for a scalable, pluggable multi-party, and distributed multimedia conferencing. A centralized policy and control conferencing component allows the...
US-8,816,819 Dynamic information radio-frequency identification (RFID) card with biometric capabilities
Embodiments of the present invention implement dynamic elements within a RFID card. Specifically, the embodiments update card information dynamically, using a...
US-8,816,816 Methods and apparatus for securing a portable device
An apparatus for securing a portable device is described. The portable device includes a housing having a mating feature adapted to mate with a corresponding...
US-8,814,052 Secure smart card system
A smart card usable in magnetic stripe swipe transactions with a transaction terminal configured to read transaction information encoded on a magnetic stripe of...
US-8,813,255 Security classification applying social norming
An embodiment of the invention provides a method for security classification applying social norming. More specifically, content is received from a user via an...
US-8,813,253 Method for the authentication of applications
Authentication method of at least one application using resources stored in a security module associated to an equipment connected to a control server via a...
US-8,813,247 Providing cryptographic security for objective-oriented programming files
An apparatus and method for providing an Internet Web services for securing the transmission of data between object oriented software infrastructure and...
US-8,813,243 Reducing a size of a security-related data object stored on a token
Embodiments of the present invention provide a method and system, including a client and security token, for reducing a size of a security-related object stored...
US-8,813,220 Methods and systems for internet protocol (IP) packet header collection and storage
A computer-based method for providing information about a potential security incident ascertained from received internet protocol (IP) packets is described. The...
US-8,813,218 Security-enhanced computer systems and methods
In general, the invention provides a computer architecture designed for enhanced data security. In embodiments, the architecture comprises two sub-systems, each...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.