Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,909,775 Method and apparatus for including a security feature within a document
Disclosed are methods and apparatus for providing extended functionality to a networked device, the networked device connected in a network, as well as...
US-8,909,754 Personal inter-home media exchange network
A system and method support the exchange of media between friends, family members, and 3rd party media providers over a closed and secure media exchange...
US-8,909,660 System and method for secured health record account registration
A computer-implemented system is used for implementing an improved personal health record enrollment process. The system includes an electronic medical record...
US-8,909,191 Automatic emergency call activation and notification system and method using supporting emergency notification...
An Automatic Emergency Call Initiator (AECI) initiates an automatic emergency call protocol on a mobile communication system, which can be done using signaling...
US-8,909,144 Communications devices comprising NFC communicators
A communications device configured to couple with a near field RF communicator, in near field range, to enable communication of data by modulation of a magnetic...
US-8,909,141 Secure inductively-coupled communications systems
Security in inductively coupled communications systems, such as near field communications (NFC), may be improved by restricting signals carrying user data to an...
US-8,908,865 Session key generation and distribution with multiple security associations per protocol instance
A single instance of a session key generation protocol is executed in a manner that generates a plurality of security associations between user equipment and a...
US-8,908,673 Local area network of serial intelligent cells
A serial intelligent cell (SIC) and a connection topology for local area networks using Electrically-conducting media. A local area network can be configured...
US-8,908,641 Method, system, network element, and gateway for processing access point name restriction information
A method, a system, a network element, and a gateway for processing access point name restriction information are disclosed. The method includes: a second...
US-8,908,453 Data retention kill function
Various data protection techniques are provided. In one embodiment, a memory device is provided. The memory device may initiate a security measure upon...
US-8,907,793 Transportation security system and associated methods
A security system for monitoring a shipping container being transported on a cargo transport vehicle and methods for making and using same. A mounting device...
US-8,907,770 System and method of controlling vehicle functions
A method of controlling vehicle functions is provided that includes receiving at a service provider, security data from a vehicle function system. The security...
US-8,907,768 Access using a mobile device with an accelerometer
Embodiments of the present invention are directed to systems, apparatuses and methods for using a mobile device with an accelerometer to gain access into a...
US-8,907,221 Reinforced intelligent cables
Provided are cables for transmitting media data between media transmitters and receivers. A cable includes an integrated circuit for performing this data...
US-8,905,855 System and method for utilizing motion capture data
System and method for utilizing motion capture data for healthcare compliance, sporting, gaming, military, virtual reality, industrial, retail loss tracking,...
US-8,905,068 Cartridge
The invention relates to a cartridge (1) for insertion into a receptacle of a motor vehicle handling facility having an interior chamber (2) which receives a...
US-8,904,555 Computer implemented system for facilitating configuration, data tracking and reporting for data centric...
A computer implemented system for facilitating configuration, data tracking and reporting for data centric applications and a method for performing the same...
US-8,904,549 Server system, control method, and storage medium for securely executing access to data of a tenant
In a multitenant service, security of the entire service is guaranteed by logically separating data for each tenant, and performing control to prevent access to...
US-8,904,544 Restrictions to data transmission
Data received at, or created on, a device may be tagged as corporate dependent upon a service over which the data is received or an application in which the...
US-8,904,541 Performing security assessments in an online services system
A system and method for performing security assessments in an online services system. In one embodiment, a method includes receiving an accepted security...
US-8,904,527 Centralized security management system
A centralized security management system (CSMS) is provided to monitor a network to detect and mitigate attacks in or to the network. The CSMS includes a...
US-8,904,512 Distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the...
US-8,904,495 Secure transaction systems and methods
A user transaction request is received at a client device. A web browser plug-in communicates the user transaction request to a server that determines whether...
US-8,904,480 Social authentication of users
User authentication is provided. A social network associated with a user of a client device is monitored to determine whether a set of designated users are...
US-8,904,477 Configuring and providing profiles that manage execution of mobile applications
Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user...
US-8,904,473 Secure display system for prevention of information copying from any display screen system
Devices, methods, and computer programs are presented for displaying information output of a host. One apparatus includes a housing that includes a panel, a...
US-8,904,194 Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-8,904,190 Method and apparatus including architecture for protecting sensitive code and data
A secure execution environment for execution of sensitive code and data including a secure asset management unit (SAMU) is described. The SAMU provides a secure...
US-8,904,188 Trusted storage systems and methods
Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of...
US-8,904,187 Secure biometric verification of identity
A high security identification card includes an on-board memory for stored biometric data and an on-board sensor for capturing live biometric data. An on-board...
US-8,904,181 System and method for secure three-party communications
A system and method for communicating information between a first party and a second party, comprising the steps of receiving, by an intermediary, an identifier...
US-8,904,180 Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and...
A key management system includes secured data stored on a first system secured by a control key stored securely on a key server. The secured data is secured...
US-8,904,175 System and method for secure distribution and/or storage of data files with long term file integrity verification
Systems and methods for securely uploading, distributing, managing and/or storing any type of data file within a subscriber-based system maintained by a third...
US-8,904,173 System and method for securely moving content
A domain controller is provided for use with a content source and a media device. The content source can provide encrypted content and rights data corresponding...
US-8,904,166 Secure client-side communication between multiple domains
Methods and systems for secure client-side communication between multiple domains is provided. Such methods and systems can provide for decreased communication...
US-8,904,162 Methods and apparatus for performing secure BIOS upgrade
A data processing system may comprise a primary basic input/output system (BIOS) image in a primary BIOS region and a rollback BIOS image in a rollback BIOS...
US-8,904,080 Tape backup method
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-8,903,836 System and method for parsing, summarizing and reporting log data
A system and method is disclosed which enables network administrators and the like to quickly analyze the data produced by log-producing devices such as network...
US-8,903,744 System and method for controlling access to personal identification information contained in documents
A system and method for creating a document containing secured personal identification information includes a database containing personal identification...
US-8,903,743 Cryptographic prescription system
A method, computer program product, and data processing system for secure automated dispensing of prescription medications are disclosed. A preferred embodiment...
US-8,903,521 Motion capture element
Motion capture element for low power and accurate data capture for use in healthcare compliance, sporting, gaming, military, virtual reality, industrial, retail...
US-8,903,361 Network locking method and apparatus for terminal
Embodiments of the present disclosure provide a network locking method and apparatus for a terminal. The method mainly includes: utilizing an IMSI number...
US-8,903,315 Secure context-based computing
An embodiment of the invention includes an article with instructions that enable a first unit to: (a) sense the first unit's local surroundings to determine...
US-8,903,128 Object recognition for security screening and long range video surveillance
A method of detecting an object in image data that is deemed to be a threat includes annotating sections of at least one training image to indicate whether each...
US-8,903,093 Mobile device, method of processing an input in a mobile device and electronic payment method using a mobile device
Handheld wireless communications devices include a data input device, which is configured to receive first input data provided by a user, a main processor and a...
US-8,903,091 Optical system with imparted secure codes
A secure optical communication system and method are disclosed. Short optical pulses are first modulated with data, then dispersed in time so that they spread...
US-8,903,090 Securely classifying data
Techniques are disclosed for securely classifying or decoding data. By way of example, a method of determining a most likely sequence for a given data set...
US-8,903,086 Enabling/disabling display data channel access to enable/disable high-bandwidth digital content protection
A switcher device comprises a multiplexer coupled in-between at least one input and output cards. The multiplexer detects the presence of an event signal from...
US-8,903,084 Efficient key derivation for end-to-end network security with traffic visibility
Both end-to-end security and traffic visibility may be achieved by a system using a controller that derives a cryptographic key that is different for each...
US-8,902,825 Wireless network system and method of configuring the same
Provided are a wireless network system and a method of configuring the same, more particularly, a wireless network system and a method of configuring the same,...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.