Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,910,297 Securing user data in cloud computing environments
Systems and methods for obfuscating user data in a remote web-based application are disclosed. According to one method, user inputs to a displayed web page of...
US-8,910,278 Managing services in a cloud computing environment
What is provided are a system and method which enables an organization or user to manage computational services in a cloud computing network for security,...
US-8,910,271 System and method for handover between interworking WLAN and EUTRAN access systems
This invention relates to the area of Mobility and Handover between heterogeneous wireless networks. The scope of the invention also covers the case when the UE...
US-8,910,257 Representing security identities using claims
The claims based identity model provides a model which associates security identities with claims. The model represents information contained in the claims, as...
US-8,910,249 Interface device for an intelligent electronic device and method of operating an interface device
The present invention relates to a system comprising an interface device (100) for an intelligent electronic device (200), an intelligent electronic device...
US-8,910,238 Hypervisor-based enterprise endpoint protection
Described systems and methods allow the detection and prevention of malware and/or malicious activity within a network comprising multiple client computer...
US-8,910,139 Method for processing firmware based on firmware over the air technology, apparatus, and system
Embodiments of the present invention provide a method for processing firmware based on a firmware over the air technology, an apparatus, and a system. The...
US-8,909,974 Data processing apparatus, data processing method and recording medium
A data processing apparatus comprising: a gate unit connected to an input or an output of a processing unit and configured to cut off the data input and output;...
US-8,909,942 MRAM-based security for data storage systems
A secure data storage system includes a mechanism that can be activated to inhibit access to stored data. In one embodiment, access to stored data can be...
US-8,909,938 System and method for providing secure access to an electronic device using facial biometrics
A facial biometric recognition system and method (100) for providing security for an electronic device (101) includes a digital camera (105) having a field of...
US-8,909,933 Decoupled cryptographic schemes using a visual channel
A visual data transfer channel is established between a mobile device and a computing entity to facilitate a decoupled cryptographic scheme. The mobile device...
US-8,909,932 Method and apparatus for security over multiple interfaces
A secure digital system including a number of ICs that exchange data among each other. Each of the ICs includes a key generator for generating a cipher key; a...
US-8,909,928 Securing customer virtual machines in a multi-tenant cloud
A trusted virtualization platform protects sensitive customer data during operation of virtual machines in a multi-tenant cloud computing center. The trusted...
US-8,909,916 Using a PKCS module for opening multiple databases
A security initialization system obtains load data that identifies a first database storing security data to be opened. The initialization system determines...
US-8,909,888 Secure erasure of data from a non-volatile memory
Method and apparatus for securely erasing data from a non-volatile memory, such as but not limited to a flash memory array. In accordance with various...
US-8,909,775 Method and apparatus for including a security feature within a document
Disclosed are methods and apparatus for providing extended functionality to a networked device, the networked device connected in a network, as well as...
US-8,909,754 Personal inter-home media exchange network
A system and method support the exchange of media between friends, family members, and 3rd party media providers over a closed and secure media exchange...
US-8,909,660 System and method for secured health record account registration
A computer-implemented system is used for implementing an improved personal health record enrollment process. The system includes an electronic medical record...
US-8,909,191 Automatic emergency call activation and notification system and method using supporting emergency notification...
An Automatic Emergency Call Initiator (AECI) initiates an automatic emergency call protocol on a mobile communication system, which can be done using signaling...
US-8,909,144 Communications devices comprising NFC communicators
A communications device configured to couple with a near field RF communicator, in near field range, to enable communication of data by modulation of a magnetic...
US-8,909,141 Secure inductively-coupled communications systems
Security in inductively coupled communications systems, such as near field communications (NFC), may be improved by restricting signals carrying user data to an...
US-8,908,865 Session key generation and distribution with multiple security associations per protocol instance
A single instance of a session key generation protocol is executed in a manner that generates a plurality of security associations between user equipment and a...
US-8,908,673 Local area network of serial intelligent cells
A serial intelligent cell (SIC) and a connection topology for local area networks using Electrically-conducting media. A local area network can be configured...
US-8,908,641 Method, system, network element, and gateway for processing access point name restriction information
A method, a system, a network element, and a gateway for processing access point name restriction information are disclosed. The method includes: a second...
US-8,908,453 Data retention kill function
Various data protection techniques are provided. In one embodiment, a memory device is provided. The memory device may initiate a security measure upon...
US-8,907,793 Transportation security system and associated methods
A security system for monitoring a shipping container being transported on a cargo transport vehicle and methods for making and using same. A mounting device...
US-8,907,770 System and method of controlling vehicle functions
A method of controlling vehicle functions is provided that includes receiving at a service provider, security data from a vehicle function system. The security...
US-8,907,768 Access using a mobile device with an accelerometer
Embodiments of the present invention are directed to systems, apparatuses and methods for using a mobile device with an accelerometer to gain access into a...
US-8,907,221 Reinforced intelligent cables
Provided are cables for transmitting media data between media transmitters and receivers. A cable includes an integrated circuit for performing this data...
US-8,905,855 System and method for utilizing motion capture data
System and method for utilizing motion capture data for healthcare compliance, sporting, gaming, military, virtual reality, industrial, retail loss tracking,...
US-8,905,068 Cartridge
The invention relates to a cartridge (1) for insertion into a receptacle of a motor vehicle handling facility having an interior chamber (2) which receives a...
US-8,904,555 Computer implemented system for facilitating configuration, data tracking and reporting for data centric...
A computer implemented system for facilitating configuration, data tracking and reporting for data centric applications and a method for performing the same...
US-8,904,549 Server system, control method, and storage medium for securely executing access to data of a tenant
In a multitenant service, security of the entire service is guaranteed by logically separating data for each tenant, and performing control to prevent access to...
US-8,904,544 Restrictions to data transmission
Data received at, or created on, a device may be tagged as corporate dependent upon a service over which the data is received or an application in which the...
US-8,904,541 Performing security assessments in an online services system
A system and method for performing security assessments in an online services system. In one embodiment, a method includes receiving an accepted security...
US-8,904,527 Centralized security management system
A centralized security management system (CSMS) is provided to monitor a network to detect and mitigate attacks in or to the network. The CSMS includes a...
US-8,904,512 Distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the...
US-8,904,495 Secure transaction systems and methods
A user transaction request is received at a client device. A web browser plug-in communicates the user transaction request to a server that determines whether...
US-8,904,480 Social authentication of users
User authentication is provided. A social network associated with a user of a client device is monitored to determine whether a set of designated users are...
US-8,904,477 Configuring and providing profiles that manage execution of mobile applications
Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user...
US-8,904,473 Secure display system for prevention of information copying from any display screen system
Devices, methods, and computer programs are presented for displaying information output of a host. One apparatus includes a housing that includes a panel, a...
US-8,904,194 Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-8,904,190 Method and apparatus including architecture for protecting sensitive code and data
A secure execution environment for execution of sensitive code and data including a secure asset management unit (SAMU) is described. The SAMU provides a secure...
US-8,904,188 Trusted storage systems and methods
Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of...
US-8,904,187 Secure biometric verification of identity
A high security identification card includes an on-board memory for stored biometric data and an on-board sensor for capturing live biometric data. An on-board...
US-8,904,181 System and method for secure three-party communications
A system and method for communicating information between a first party and a second party, comprising the steps of receiving, by an intermediary, an identifier...
US-8,904,180 Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and...
A key management system includes secured data stored on a first system secured by a control key stored securely on a key server. The secured data is secured...
US-8,904,175 System and method for secure distribution and/or storage of data files with long term file integrity verification
Systems and methods for securely uploading, distributing, managing and/or storing any type of data file within a subscriber-based system maintained by a third...
US-8,904,173 System and method for securely moving content
A domain controller is provided for use with a content source and a media device. The content source can provide encrypted content and rights data corresponding...
US-8,904,166 Secure client-side communication between multiple domains
Methods and systems for secure client-side communication between multiple domains is provided. Such methods and systems can provide for decreased communication...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.