Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,874,668 Directing messages based on domain names
A communication system has a plurality of collections. Each collection comprises a security boundary within which private data is accessible. Each collection is...
US-8,874,657 Method for securely distributing meeting data from interactive whiteboard projector
Distributing meeting data from an interactive whiteboard projector to at least one computer of a meeting member, comprises: in the interactive whiteboard...
US-8,874,550 Method and apparatus for security information visualization
Visualization for presenting event information indicative of a computer security threat is automatically selected from available visualizations. Event...
US-8,874,500 Rule based processing system and method for identifying events
The present invention generally relates to a computerized system and method for creating, optimizing, and using a rules processing system that evaluates...
US-8,874,453 Methods and systems for managing distributed digital medical data
A network for mediating the peer-to-peer transfer of digital patient medical data includes a plurality of distributed agents each associated with a health care...
US-8,874,038 Secure communications via NFC device
A system, method, and apparatus for negotiating a communication link between first and second near field communication (NFC) devices is disclosed. A third NFC...
US-8,874,035 Apparatus, system and method for monitoring and maintaining critical medical equipment
An apparatus, system and method for maintaining critical medical equipment for stockpile applications are provided. The apparatus, system and method of the...
US-8,874,025 Time-varying PHY-level wireless security
A method for communication includes generating a data transmission including multiple successive parts in respective time intervals, for transmission to a...
US-8,873,814 System and method for using fingerprint sequences for secured identity verification
According to one embodiment of the present disclosure, a method includes receiving session information including first fingerprint data corresponding to each of...
US-8,873,813 Application of Z-webs and Z-factors to analytics, search engine, learning, recognition, natural language, and...
Here, we introduce Z-webs, including Z-factors and Z-nodes, for the understanding of relationships between objects, subjects, abstract ideas, concepts, or the...
US-8,873,746 Establishing, at least in part, secure communication channel between nodes so as to permit inspection, at least...
An embodiment may include circuitry to establish, at least in part, a secure communication channel between, at least in part, a client in a first domain and a...
US-8,873,095 Delegate access in a distributed scan system
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on...
US-8,872,917 Tamper-resistant video surveillance network
A network of surveillance digital video cameras is provided. Each camera records video data and provides the video recordings to other networked cameras as well...
US-8,869,309 Dynamically reconfigurable 2D topology communication and verification scheme
Systems and methods for securing devices and encoding information in hardware and hardware arrangements are provided. Variations include switched networks...
US-8,869,308 Computer motherboard having peripheral security functions
A secure motherboard for a computer, wherein each user accessible peripheral port is protected by hardware based peripheral protection circuitry soldered to the...
US-8,869,295 Automated privacy enforcement
A system and method of protecting the privacy of data is presented. The system and method may include receiving data from a data warehouse and determining an...
US-8,869,291 Generating and storing document data
A markup language document is generated and stored within a network, the network including a client, and one or more storage locations. A markup language...
US-8,869,286 Systems and methods for analyzing client-side storage security for internet applications
A computer-implemented method for analyzing client-side storage security for Internet applications may include 1) identifying an interactive Internet resource,...
US-8,869,273 Apparatus and method for enhancing security of data on a host computing device and a peripheral device
A method of enhancing security of at least one of a host computing device and a peripheral device coupled to the host computing device through a communication...
US-8,869,270 System and method for implementing content and network security inside a chip
Systems and methods for implementing content, streaming, and network security inside a chip or inside a computing device are disclosed. In exemplary...
US-8,869,255 Method and system for abstracted and randomized one-time use passwords for transactional authentication
A security system and method for authenticating a user's access to a system is disclosed. The security system receives an authentication request from the user...
US-8,869,250 Providing secure dynamic role selection and managing privileged user access from a client device
An approach is provided that receives a first role selection from a client device. Each of the roles includes various user accounts provisioned to access...
US-8,869,240 Soft method for local secure connection to a device
A system for pairing two devices includes a monitoring system and a server. The monitoring system receives a request made by a local submitter, such as...
US-8,869,235 Secure mobile browser for protecting enterprise data
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application...
US-8,869,142 Secure content publishing and distribution
Sending installation information. A method may be performed, for example, in a network computing environment including one or more servers connected to one or...
US-8,868,931 System and method of security function activation for a mobile electronic device
A system and a method are provided for activating one or more security functions of a mobile electronic device. The system and method provide for the activation...
US-8,868,927 Method and apparatus for secure data input and output
A method and apparatus for secure information input and output is described. The method may include initiating a secure data input mode at a user input device...
US-8,868,920 Method, system and device for securing a digital storage device
Method of securing a digital storage device, wherein a host is connected to the storage device, the host digitally locks the storage device so that unauthorized...
US-8,868,911 Method for key generation, member authentication, and communication security in dynamic group
The present invention provides a method for keys generation, member authentication and communication security in a dynamic group, which comprises steps:...
US-8,868,786 Apparatus, systems and methods for transformation services
A web services hub receives a request from a data source system, transforms the request, and transmits the transformed request to an external system. A secure...
US-8,868,768 Secure medical data transmission
A system may include a first network in which user device(s) and a HIP server are communicably coupled. The first network may include a secure data...
US-8,868,767 System and method for enabling IP marketplace APIs
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
US-8,868,683 Method and system for multi-factor remote data access
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and...
US-8,868,641 System, method and computer program product for gathering and delivering personalized user information
A system, method and computer program product for providing a secure data channel between a user and associates. The method may receive pushed information from...
US-8,868,636 Apparatus for secured distributed computing
An apparatus for distributed computing is disclosed. The apparatus includes a semiconductor memory, a biometric device for receiving biometric data, a connector...
US-8,868,521 Method for improving security in distribution of electronic documents
In the distribution of electronic documents within an organization or across the perimeter of the organization, security is an important issue as the documents...
US-8,868,467 Method for performing transactional communication using a universal transaction account identifier assigned to...
Methods, systems, computer data signals, recordable media and methods of doing business for wireless or wired network communication between network resources...
US-8,868,437 Methods and systems for managing distributed digital medical data
A network for mediating the peer-to-peer transfer of digital patient medical data includes a plurality of distributed agents each associated with a health care...
US-8,868,102 Method and apparatus for tracking a transported item while accommodating communication gaps
A method and apparatus is provided for minimizing potential security problems and battery power usage in a tracking device used in tracking an associated...
US-8,868,085 Communications base station with decision function for distributing traffic across multiple backhauls
A communication station, such as a base station or access point, has multiple backhaul options and distributes backhaul data between the available backhaul...
US-8,868,057 Staging a mobile device to an enterprise network securely using voice channel of a wireless wide area network...
Wireless networking systems and methods are provided for "staging" a wireless communication device (WCD). The WCD is designed to communicate over the air with a...
US-8,867,745 Efficient transmission of cryptographic information in secure real time protocol
Efficient transmission of cryptographic information in secure real time protocol. A transmitting terminal may be used to encrypt data with a session key derived...
US-8,867,743 Encryption of large amounts of data using secure encryption methods
Information is encrypted using randomly generated information, a multiple step process, and additional secured logic. Upon receiving a credit card authorization...
US-8,867,742 Optical transmission device and reception device for Yuen encryption, optical transmission method and reception...
A configuration method of an optical signal, an encryption device, and an encryption system makes it possible for a legitimate communicating party to ensure...
US-8,867,523 Local area network of serial intelligent cells
A serial intelligent cell (SIC) and a connection topology for local area networks using Electrically-conducting media. A local area network can be configured...
US-8,867,516 Binary CDMA image-transceiving system directly connected to an image capture device
A binary CDMA image transmission and receiving system directed connected to an image capturing device includes an image transmission unit including: an image...
US-8,867,490 Secure and seamless handover between IP-based cellular networks and Wi-Fi networks
A method of offloading data from an IP-based cellular network to a Wi-Fi network is disclosed. A request from a user equipment (UE) to connect to a Wi-Fi...
US-8,867,428 Split-cell relay application protocol
Systems and methodologies are described that facilitate packet routing among relay eNBs in a wireless network. Packet data convergence protocol (PDCP) layer...
US-8,867,080 Metadata support in a distributed scan system
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on...
US-8,867,060 Information processing apparatus that prevents unauthorized access, method of controlling the same, and storage...
An information processing apparatus which is capable of preventing unauthorized access from an external apparatus, such as a PC, and improving...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.