Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,775,246 System and method for enabling channel registration in an IP marketplace
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
US-8,775,212 Electronic health records in clinical trials
A method for collecting self-reported data from an individual for use in a clinical trial is provided. The method includes providing a web site allowing the...
US-8,775,204 System and method for enabling group channels in an IP marketplace
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
US-8,775,189 Control center for a voice controlled wireless communication device system
A wireless communication device is disclosed that accepts recorded audio data from an end-user. The audio data can be in the form of a command requesting user...
US-8,774,411 Session key generation and distribution with multiple security associations per protocol instance
A single instance of a session key generation protocol is executed in a manner that generates a plurality of security associations between user equipment and a...
US-8,774,382 Online reporting tool for conferencing customers
Embodiments consistent with the present invention provide an integrated system for conferencing services reporting to support customer billing needs. Systems...
US-8,773,705 Data transmitting method of image forming apparatus and image forming apparatus for performing data...
A method of transmitting data from an image forming apparatus, the method including: receiving identification information of a destination of the data;...
US-8,773,279 Apparatus for visually and remotely determining an angular position of a relative rotation of parts
A visually and remotely readable apparatus is provided which comprises a plurality of sensing units, a control unit and a flexible printed cable (FPC) to...
US-8,773,241 Device for the secure contactless data exchange between a reader and a card
A transponder of a contactless data exchange system includes a unit to receive and transmit data provided with at least one first antenna loop and at least one...
US-8,770,486 Arrangement, apparatus, and associated method, for providing stored data in secured form for purposes of...
Card member apparatus, and an associated method, for storing and permitting selectable use of informational data associated with a subject. Identifying indicia...
US-RE45,009 Dynamic network link acceleration
A method and apparatus for dynamic network link acceleration provides a managed communication link for accelerated and reliable network communication between a...
US-8,769,699 Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-8,769,680 Alert passwords for detecting password attacks on systems
Detecting attacks on secured computer resources, including gathering user security data for a user having a user password protecting resources on a computer...
US-8,769,678 Cloud-based gateway security scanning
Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway...
US-8,769,666 Image processing device and image processing system
An image processing device includes a plurality of printers (Pr1, Pr2, Pr3, Pr4, . . . ) and a plurality of client machines (PC1, PC2, PC3, PC4, PC5, . . . )....
US-8,769,646 System and method for associating a universal user identification and a domain specific user identification
There is presented a system and method for associating a domain transcendent identification (ID) of a user and a domain specific ID of the user, the system...
US-8,769,639 History-based downgraded network identification
Some embodiments of the invention are directed to increasing security and lowering risk of attack in connecting automatically to networks by enabling client...
US-8,769,622 Authentication and authorization methods for cloud computing security
An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information...
US-8,769,613 Data security in a cloud computing environment
Methods and apparatus for providing data security, in particular for cloud computing environments, are described. In an embodiment, a software component...
US-8,769,608 Airport security system
A method, apparatus, and system for managing network security at an airport. A threat level for the airport is identified. A number of policies for a network...
US-8,769,607 Systems and methods for evaluating a password policy
Systems, methods and articles of manufacture for evaluating a password policy are disclosed. The password evaluation system receives password policy data...
US-8,769,355 Using built-in self test for preventing side channel security attacks on multi-processor systems
A data processing system having a first processor, a second processor, a local memory of the second processor, and a built-in self-test (BIST) controller of the...
US-8,769,309 Flash memory storage system, and controller and method for anti-falsifying data thereof
A flash memory storage system is provided. The flash memory storage system includes a controller having a rewritable non-volatile memory and a flash memory...
US-8,769,307 Secure operation indicator
A data processing apparatus and a method of indicating operation of a data processor within a secure domain. The apparatus comprising a display for displaying...
US-8,769,305 Secure execution of unsecured apps on a device
An app is secured on a mobile device by being deconstructed or unbundled into multiple modules, where a module is a segment of app code that performs a...
US-8,769,303 Infrastructure independent recovery key release
Aspects of the subject matter described herein relate to recovering locked data. In aspects, stakeholders of locked volume(s) are identified. Security data of...
US-8,769,286 Methods and systems for increasing the security of electronic messages
A method for generating e-mail messages with increased security includes receiving an e-mail message at a control system. The e-mail message has recipients, a...
US-8,769,279 System and method for variable length encryption
Systems and methods for performing a secure transaction provided. In one embodiment, the method includes: reading data on a command token, reading data on a...
US-8,769,278 Apparatus and method for efficiently and securely exchanging connection data
An apparatus, method, and machine-readable medium are described for securely and efficiently exchanging connection data for a peer-to-peer ("P2P") session on a...
US-8,769,270 Systems and methods for secure data sharing
Systems and methods are provided for creating and using a sharable file-level key to secure data files. The sharable file-level key is generated based on a...
US-8,769,267 Geothentication based on new network packet structure
A system and method for verifying and/or geolocating network nodes in a network in attenuated environments for cyber and network security applications are...
US-8,769,172 Secure KVM device ensuring isolation of host computers
The present invention presents apparatuses and systems for operating multiple computers from a single console using a secured KVM device, while preventing...
US-8,769,127 Cross-domain solution (CDS) collaborate-access-browse (CAB) and assured file transfer (AFT)
Systems and methods for providing a cross-domain, remote terminal secure browse capability are disclosed. The Collaborate-Access-Browse (CAB) Cross-Domain...
US-8,769,077 Parameterized recursive network architecture with topological addressing
A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the...
US-8,768,921 Computer-implemented information reuse
Embodiments of the present invention relate to an approach for reusing information/knowledge. Specifically, embodiments of the present invention provide an...
US-8,768,838 Financial transactions using a rule-module nexus and a user account registry
A method and a system for processing an online financial transaction executed at least partially by a computing device coupled to a communications network,...
US-8,768,837 Method and system for controlling risk in a payment transaction
Example embodiments of the presently described subject matter are described that require a customer to use a secure payment token if, during a payment...
US-8,768,821 Computer-implemented system and method for providing summarization of spread and volume for securities order books
A computer-implemented system and method for computing summaries of securities order book information from trading venues is provided. Messages, which include...
US-8,768,256 Computing device to wirelessly transmit and receive data with at least one proximally located electronic device
A wireless media player and a related system and methodology are disclosed. One aspect of the wireless media player system pertains to a virtual connector...
US-8,767,964 Secure communications in computer cluster systems
A system to improve communication security in cluster machine processing may include interconnected computers that can jointly process data. The system may also...
US-8,767,962 System and methods for permitting open access to data objects and for securing data within the data objects
A system and methods for permitting open access to data objects and for securing data within the data objects is disclosed. According to one embodiment of the...
US-8,767,958 Secure open-air communication system utilizing multichannel decoyed transmission
A secure, open-air communication system utilizes a plurality of "decoy" data signals to hide one or more true data signals. The true data signal(s) are channel...
US-8,767,957 Communication encryption method and device
An encryption method and device employing a modified low-resource AES algorithm. The algorithm in one embodiment has a 128-bit key and a 16-bit data type, along...
US-8,767,954 Methods and systems for deriving a cryptographic framework
A cryptographic framework embodies modular methods for securing data, both at rest and in motion, via an extensible encryption method. Key derivation and...
US-8,767,758 Apparatus, system and method of prioritizing a management frame of a wireless network
A method and apparatus to enable configuring of a management frame priority and security type. The method and the apparatus may set a priority level and a...
US-8,767,517 Library device with reads and writes data from and to a housed recording media
Disclosed is a library device in which the space to enlarge the magazine can be secured to the rear side of the library device. The library device includes...
US-8,767,331 Erase drive system and methods of erasure for tape data cartridge
The present disclosure relates generally to writing and reading data from a magnetic tape storage media and, more particularly, to a secure erasure system for...
US-8,766,802 Base data management system
A base data management system is provided which can grasp specific data recorded in a plate-like or sheet-like object having high property values, such as a...
US-8,763,147 Data security in a multi-nodal environment
A data security manager in a multi-nodal environment enforces processing constraints stored as security relationships that control how different pieces of a...
US-8,763,140 Secure workflow and data management facility
Disclosed is a computer program that provides a secure workflow environment through a cloud computing facility, wherein the secure workflow environment may be...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.