Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,942,178 Collection of subscriber information for data breakout in a mobile data network
A method and system supports subscriber based IP data breakout at the edge of a mobile data network without monitoring the use of security keys or breaking into...
US-8,941,901 Electrophotographic image output device
An electrophotographic image output device includes an image processor to receive input image data, and a line screen to represent halftone images and have...
US-8,941,789 Liquid crystal display
A liquid crystal display apparatus includes a plurality of pixels having first and second subpixels, a plurality of gate lines connected to the first and second...
US-8,941,567 Pixel and organic light emitting display device using the same
An organic light emitting display device is capable of securing sufficient compensation period such that a threshold voltage of a driving transistor may be...
US-8,941,484 System and method of anomaly detection
A method and apparatus wherein the method includes detecting a plurality of events within a security system, evaluating the events using one of a first...
US-8,939,354 System and method for secure card packaging and activation
A secure card package including features such that an activable card disposed in the secure card package is activable only upon separation of a first portion...
US-8,938,983 Data center container with cooling system
A data center container includes a chassis, a cover, a cooling system, a water outlet, a water tray, and a connecting pipe. The cover is secured to the chassis....
US-8,938,796 Case secure computer architecture
Two computing subsystems are disclosed, one a control subsystem, the other a user subsystem, each using engines with augmented conventional instruction sets,...
US-8,938,795 System for real-time cross-domain system packet filtering
A system for filtering a digital signal transmitted in a protocol featuring multi-level packetization from a first server to a second server. The first server...
US-8,938,784 Authorization of server operations
An authorization device for authorizing operations of a remote server requested from user computers via a data communications network includes a computer...
US-8,938,781 Systems and methods for managing user permissions
Multi-tiered systems and methods for identifying and monitoring user permissions in a computer network are described. A data structure, such as an index, for...
US-8,938,779 Secure digital communications
Policies are used when performing a transaction between a first and a second device, the first device having an established trusted communication relation with...
US-8,938,778 System and method for controlling user access to encrypted data
Disclosed are systems, methods and computer program products for providing user access to encrypted data. In one example, a system is configured to receive a...
US-8,938,775 Dynamic data loss prevention in a multi-tenant environment
The usage of data in a multi-tenant environment can be controlled by utilizing functionality at the hypervisor level of various resources in the environment....
US-8,938,626 Single command functionality for providing data security and preventing data access within a decommissioned...
A computer-implemented method comprises a service processor: establishing a kill switch encryption key (KSEK) to provide data security for data within storage...
US-8,938,625 Systems and methods for securing cryptographic data using timestamps
Systems and methods for authenticating playback devices using timestamp validation in accordance with embodiments of the invention are disclosed. One embodiment...
US-8,938,624 Encryption key destruction for secure data erasure
Techniques for encryption key destruction for secure data erasure via an external interface or physical key removal are described. Electrical destruction of key...
US-8,938,622 Encryption in the cloud with customer controlled keys
A system and method for encryption in a cloud computing platform with customer controlled keys is disclosed. A cloud-based encryption key is uploaded from a...
US-8,938,611 Enterprise cloud security gateway
A security virtual machine is provided in a network including a resource shared among two or more virtual machines. All data traffic from each virtual machine...
US-8,938,565 Synchronous or asynchronous multi layer data link communication between a multi-functional data bus interface...
A multi layer data link communication system for a vehicle having a remote starter/alarm system, a vehicle computer and an OEM security interface. The system...
US-8,938,547 Method and system for data usage accounting in a computing device
A method and system for data usage accounting are described herein. As an example, the method can be practiced in a setting that includes both secure...
US-8,938,508 Correlating web and email attributes to detect spam
A computer correlates web and email attributes to detect spam. A security module on a client collects attributes of a web site to which an email address was...
US-8,938,474 Securing application information in system-wide search engines
A system for securing application information in a shared, system-wide search service. Each application can register a security filtering module that is to be...
US-8,938,060 Technique for effectively providing personalized communications and information assistance services
A user may utilize a communication device, e.g., a wireless phone, mobile device or personal digital assistant (PDA), to contact an information/call center...
US-8,937,847 System for acquiring seismic data in a marine environment, using seismic streamers coupled to means for...
Disclosed herein is a system of acquiring seismic date in a marine environment, which includes: seismic streamers towed by a vessel; and means for detecting...
US-8,937,658 Methods, systems, and products for security services
Methods, systems, and products are disclosed for notification of alarms in security systems. An alarm is detected in a security system. An alarm code is...
US-8,936,477 Apparatus to interconnect orthogonal circuit boards for high data rate use
An apparatus includes a chassis securing a midplane and forming a bay orthogonally aligned with the midplane. A module secures a circuit board with connectors...
US-8,936,201 Integrated circuits with persistent data storage
The circuitry introduced in this invention selectively slows down the functioning of an electronic circuit maintaining a particular state for a prolonged period...
US-8,935,954 Method and apparatus for testing piston seals
A seal testing apparatus includes a clamp assembly which receives, secures and rotates a piston and seal assembly, a mandrel which extends into the seal...
US-8,935,810 Cloud key directory for federating data exchanges
Embodiments are directed to providing attribute-based data access. In an embodiment, a data request specifies one or more search data attributes describing...
US-8,935,807 Visual securement of sensitive data
Various embodiments of systems and methods for visual securement of sensitive data are described herein. In one aspect, the method includes receiving a request...
US-8,935,795 Weighted security analysis
A method, computer program product, and system for transforming unit tests is described. A unit test associated with one or more software units is identified. A...
US-8,935,781 Native code module security for arm 64-bit instruction set architectures
Methods, systems, and apparatuses, including computer programs, for safely executing a native code module for an ARM 64-bit instruction set. The native code...
US-8,935,778 Maintaining data integrity
Aspects of the present invention maintain data integrity of a monitored data object in a monitored storage repository. A first security value for the monitored...
US-8,935,772 Secure server architecture for web based data management
A double firewalled system is disclosed for protecting remote enterprise servers that provide communication services to telecommunication network customers from...
US-8,935,743 Web service security cockpit
A first configuration object identifies attributes of a configuration of a first web service. Security setting data is identified defining a security setting...
US-8,935,538 Enhancing useability of mobile devices that securely store data
Methods, computer-readable media, and systems for enhancing useability of mobile devices that securely store data. An input to transfer a computer software...
US-8,935,534 MACSec implementation
A media access control (MAC) security apparatus for a local area network interface includes a parser, an encryption engine, an authentication engine, and a...
US-8,935,533 Method and apparatus for a scalable and secure transport protocol for sensor data collection
A new approach for a transport protocol for sensor data collection, such as a smart grid is described. In one embodiment of the invention, each server avoids...
US-8,935,528 Techniques for ensuring authentication and integrity of communications
Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a...
US-8,935,527 Secure transmission with error correcting code
The invention concerns a method and a system for encoding digital data (DATA) represented by source symbols, with an error correcting code generating parity...
US-8,935,520 Control word obfuscation in secure TV receiver
A device for descrambling encrypted data includes a descrambler, a secure link, and a secure element that securely transmits a control word to the descrambler...
US-8,935,427 Providing virtual networks using multi-tenant relays
Embodiments are directed to providing a multi-tenant relay service that securely relays data between computer systems. A computer system receives a portion of...
US-8,935,317 Dynamic partitioning of applications between clients and servers
Optimization mechanism that dynamically splits the computation in an application (e.g., cloud), that is, which parts run on a client (e.g., mobile) and which...
US-8,935,181 Municipal bond tracking and evaluation system
The present invention relates to a web-application that gathers raw data and meta data, matches debt related data with corresponding meta data, marks the debt...
US-8,935,095 Safety system and device and methods of operating
Various embodiments of a device, system and methods that promote safety and security within an organization. Sensor data from one or more installation sensors...
US-8,935,019 Apparatus and method for power production, control, and/or telematics, suitable for use with locomotives
A power system housed in modules or containers may be located as a unitary structure for example secured to a locomotive platform, allowing easy retrofits. A...
US-8,934,940 Providing enhanced security for wireless telecommunications devices
A method and system for use in providing enhanced security for wireless telecommunications devices is disclosed. In at least one embodiment, the method and...
US-8,934,864 Cellular device security apparatus and method
A cellular communication device has one or more access modes which allow reading and writing of data, for example to change its settings, for example passwords...
US-8,934,633 Encrypted communication system, transmitter and receiver using same
High-security communications against information leakage as well as high-speed communications are realized using present optical fiber networks. The methods are...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.