Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,788,814 Secure data transfer using an embedded system
A method and device for securing data transmission via an embedded system that is operationally coupled to a local device and a remote computing system using a...
US-8,788,805 Application-level service access to encrypted data streams
Techniques for securely providing cryptographic keys to trusted intermediate nodes or monitoring devices are described so that SSL, TLS, or IPSec communications...
US-8,788,786 Storage system creating cache and logical volume areas in flash memory
The temporary area capacity required to be secured with respect to the whole permanent area is calculated in accordance with the capacity and access frequency...
US-8,788,705 Methods and apparatus for secure routing of data packets
Methods and arrangements for supporting a forwarding process in routers when routing data packets through a packet-switched network, by employing hierarchical...
US-8,788,532 Firewalls for securing customer data in a multi-tenant environment
Network security is enhanced in a multi-tenant database network environment using a query plan detection module to continually poll the database system to...
US-8,788,428 Multimode retail system
Embodiments of a multimode system for use in, for example, a fuel dispenser, are configured for receiving data in a retail environment. The multimode system can...
US-8,788,427 Limiting data exposure in authenticated multi-system transactions
The limiting of data exposure in authenticated multi-system transactions is disclosed. A client system authenticates and requests secured data and unsecured...
US-8,788,399 Systems and methods for trading a trade list in financial markets
Systems and methods are provided for maintaining neutrality while trading a list of securities using an algorithmic trading facility coupled with at least one...
US-8,788,398 Method and apparatus for automated trading of equity securities using a real time data analysis
A system and method for buying and selling securities based on volatility and liquidity rather than other fundamentals is demonstrated. The method involves:...
US-8,788,071 Security for objects in a process plant configuration system
A configuration system uses process plant items that may represent, or be capable of representing, entities in a process plant to assist in configuring,...
US-8,787,973 Device and method for controlling usage of a memory card
A memory card includes a memory for storing data and a controller that is operative to control access to storage of at least a portion of storage conditional...
US-8,787,626 OMNIGENE software system
A software system which employs a special set of simulated electrical circuits to generate user-specific textured and signature color images based on DNA,...
US-8,787,583 Systems and methods for distributing and securing data
A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A...
US-8,787,581 Teired key communication system and method in support of controlled vendor message processing
A computer-implemented system processes secure electronic documents from one or more content providers in accordance with subscriber instructions has a...
US-8,787,571 Wired communications systems with improved capacity and security
Provided are methods and systems of using division-free duplexing (DFD) in a cable communication network. Techniques for applying DFD in a cable communication...
US-8,787,569 System and method for secure communication of components inside self-service automats
Method to secure the communication of components within self-service automats that are linked to each other by a bus system, having a transmitter and a...
US-8,787,568 Data transformation apparatus, data transformation method, and computer program
A non-linear transformation processing structure having a high implementation efficiency and a high security is realized. Data transformation is performed using...
US-8,786,521 Representation system
The present invention relates to a depiction arrangement for security papers, value documents, electronic display devices or other data carriers, having a...
US-8,784,310 Vascular pressure sensor with electrocardiogram electrodes
Devices, systems, and methods for sensing cardiac electrical activity and blood pressure within a blood vessel are disclosed. A vascular sensor includes a...
US-8,782,874 Railway tie automated preplating apparatus
The invention is an apparatus for pre-plating railway ties, including switch ties of varying lengths. An infeed deck and singulator feeds individual ties, each...
US-8,782,869 Unlocking tool for male connector
A connector of a cable (e.g., a 30-pin connector) can be used to facilitate various security-related and other functionalities. For example, a connector can...
US-8,782,796 Data exfiltration attack simulation technology
Novel systems and methods for testing network security are disclosed. In one example, at least one specified data message and at least one specified access...
US-8,782,790 Signature creation for malicious network traffic
An endpoint on a network uses detection data to detect a malicious software attack. The endpoint identifies content associated with the attack, such as a...
US-8,782,785 System, method and computer program product for rendering data of an on-demand database service safe
In accordance with embodiments, there are provided mechanisms and methods for rendering data of an on-demand database service safe. These mechanisms and methods...
US-8,782,780 Hierarchical organization of data associated with events
Methods, data structures, systems and computer program products are provided for organizing security data. A triggering security event is hierarchically related...
US-8,782,777 Use of synthetic context-based objects to secure data stores
A processor-implemented method, system, and/or computer program product secures data stores. A non-contextual data object is associated with a context object to...
US-8,782,772 Multi-session secure tunnel
A method of communicating data over a network is provided. A secure tunnel may be implemented through the network between two computers. Performance limitations...
US-8,782,762 Building data security in a networked computing environment
In general, embodiments of the present invention provide an approach for providing a multi-tenant/customer partition group separator and securer in a shared...
US-8,782,757 Session sharing in secure web service conversations
Techniques are disclosed for sharing communication session information sharing in web service applications. The techniques include management of concurrent...
US-8,782,751 Systems and methods for user access authentication based on network access point
Systems and methods of authenticating user access based on an access point to a secure data network include a secure data network having a plurality of a...
US-8,782,750 Collaborative gateway
A method and a system for monitoring and controlling remote devices are described. The system has a gateway, a web server, and a client device. The gateway is...
US-8,782,746 System and method for supporting multiple identities for a secure identity device
A multiple-identity secure device (MISD) persistently stores a single identification code (a "seed identity"). The seed identity need not be a network address,...
US-8,782,439 Securing a data segment for storage
A method begins by a dispersed storage (DS) processing module encrypting a data segment utilizing an encryption key to produce an encrypted data segment and...
US-8,782,438 Secure storage and replay of media programs using a hard-paired receiver and storage device
A method and apparatus for storing and retrieving program material for subsequent replay is disclosed. The method comprises the steps of receiving a data stream...
US-8,782,433 Data security
This document discloses data security systems and methods of securing data. A cache memory can be connected between a decryption engine and a central processing...
US-8,782,431 Digital data authentication and security system
The present invention includes a system and process for generating secured, marked digital files. A cryptographic token is inertly embedded in markup language...
US-8,782,430 Secure external buffer for hard disk drive system on a chip
A system securely buffers hard disk drive data using a host side eXlusive OR (XOR) encryption engine. A host communicates with an encryption interface...
US-8,782,427 System and method for sequentially processing a biometric sample
This invention provides for progressive processing of biometric samples to facilitate user verification. A security token performs initial processing. Due to...
US-8,782,423 Network based management of protected data sets
A system that includes an account management module configured to maintain protected accounts. For instance, a particular protected account includes a protected...
US-8,782,419 Device and method for a backup of rights objects
A common backup format of a backup rights object according to embodiments of the present invention has the following features: License information that is not...
US-8,782,417 Method and processing unit for secure processing of access controlled audio/video data
A method for verifying access conditions performed by two conditional access devices consecutively on a control message before releasing a control word to a...
US-8,782,403 Method and apparatus for securing confidential data for a user in a computer
Method and apparatus for securing confidential data related to a user in a computer is described. In one example, rules are obtained that provide a...
US-8,782,401 Enhanced privacy ID based platform attestation
As opposed to utilizing a manufacturer provisioned EK Certificate for AIK processes, embodiments of the invention utilize EPID based data. EPID mitigates the...
US-8,782,388 Information processing apparatus, method, and computer-readable storage medium that encrypt data in a blob...
An information processing apparatus includes a main memory unit storing while on-power; an auxiliary storage unit functionable even off-power; a control unit...
US-8,782,387 Secure boot of a data breakout appliance with multiple subsystems at the edge of a mobile data network
A secure boot is provided for a breakout system having multiple subsystems at the edge of a mobile data network. The secure boot utilizes two trusted platform...
US-8,782,343 System and method for optimizing data remanence over hybrid disk clusters using various storage technologies
A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming...
US-8,782,174 Uploading and downloading unsecured files via a virtual machine environment
Methods, computer program products, and apparatuses are provided for securely exchanging a data file between a client machine and a remote application server...
US-8,782,086 Updating dispersed storage network access control information
In a dispersed storage network where slices of secure user data are stored on geographically separated storage units, a managing unit connected to the network...
US-8,781,978 Support vector machines processing system
An implementation of SVM functionality improves efficiency, time consumption, and data security, reduces the parameter tuning challenges presented to the...
US-8,781,974 System and method for a private and secure financial transaction system using a central system
A financial transaction system between a customer and a financial institution has a central system that facilitates private and secure payment transactions from...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.