Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,736,454 Microprocessor controlled security tag
A microprocessor controlled security tag and accompanying security system is described. The tag generally includes a housing having external contacts to...
US-8,736,299 Setting security features of programmable logic devices
Systems and methods are disclosed for allowing security features to be selectively enabled during device configuration. For example, a programmable integrated...
US-8,733,857 Electronic device with bezel assembly
A bezel assembly includes a panel, a shielding member, and a securing member. The panel includes a main body. The main body defines a through hole and a first...
US-8,733,642 System, method and computer program product for facilitating secure commercial transactions
A secure financial transactions system generally includes a card that can be used a credit card, ATM card or debit card having a personal identification number...
US-8,733,640 Secure card
Systems and methods for monetary cards are described. The cards are free from personally identifiable data, e.g., no name or embossment. In an example, the card...
US-8,733,635 Banking system controlled responsive to data bearing records and user input of a phone received security code
A banking system operates to cause financial transfers responsive to card data read from data bearing records by a card reader. The system includes at least one...
US-8,732,860 System and method for securing data to be protected of a piece of equipment
A system and method for securing data to be protected of a piece of equipment are provided. The equipment comprises: a space; at least one device for processing...
US-8,732,856 Cross-domain security for data vault
A secure database appliance leverages database security in a consistent framework provides consistent, flexible, and adaptable security using mandatory access...
US-8,732,829 System and method for monitoring and securing a baseboard management controller
In certain embodiments, a method for monitoring and securing a baseboard management processor is provided. The method includes coupling to a baseboard...
US-8,732,827 Smartphone security system
System for protecting a mobile device against malware or harmful communications via calls and SMSs. A security module for a personal mobile device protects the...
US-8,732,816 Method and apparatus for exchanging data between a user equipment and a core network via a security gateway
The present invention concern a methods and an apparatus for exchanging data between a user equipment and a core network via a security gateway. The invention...
US-8,732,813 Method and system for securing data from an external network to a non point of sale device
A data control system allows non-point of sale devices (135, 155) on the LAN to receive data from an external network (160) when established conditions are met....
US-8,732,812 Method of operating an item of on-board equipment, associated equipment and aircraft comprising such equipment
Equipment items installed on board vehicles and more particularly to a method for operating such an on-board equipment item, the method including an on-board...
US-8,732,805 Re-authentication in secure web service conversations
Techniques are disclosed for sharing communication session information, such as encryption keys for data protection, among multiple communication operations...
US-8,732,793 Method and system for improving security of the key device
The present invention provides a method and a system for improving security of a key device in the information security filed. In order to solve the problem...
US-8,732,570 Non-symbolic data system for the automated completion of forms
A system and method for paper-based, automated completion of forms allows a user charged with filling out multiple forms containing some common information to...
US-8,732,523 Data processing apparatus and method for analysing transient faults occurring within storage elements of the...
A data processing apparatus has a plurality of storage elements residing at different physical locations within the apparatus, and fault history circuitry for...
US-8,732,471 Data communication method, computer and information storing medium
A computer including at least two processors is used to preferably perform a secure data communication. Data containing a processor ID identifying one of the at...
US-8,732,462 Methods and apparatus for secure data sharing
This disclosure relates to methods and apparatus for securely and easily sharing data over a communications network. As communications services on a...
US-8,732,459 Security system for handheld wireless devices using time-variable encryption keys
In one embodiment, the invention provides a portable wireless personal communication system for cooperating with a remote certification authority to employ time...
US-8,732,453 Secure acknowledgment device for one-way data transfer system
An apparatus for relaying a hashed message from a first node to a second node, comprising an inlet interface for receiving a message from the first node, a hash...
US-8,732,445 Information processing device, information processing method, information processing program, and integrated...
An information processing terminal includes first sealed data respectively having usability conditions of matching with predetermined terminal environment...
US-8,732,442 Method and system for hardware-based security of object references
A method for managing data, including obtaining a first instruction for moving a first data item from a first source to a first destination, determining a data...
US-8,732,122 Bonding contents on separate storage media
Local storage on player instruments provides the ability for adding further amendments and most recent supplements to the optical disc content. A problem...
US-8,732,091 Security in a geo-spatial environment
A method, apparatus, and system of security in a geo-spatial environment are disclosed. In one embodiment a privacy server verifies that each user of the...
US-8,732,071 Systems and methods regarding targeted dissemination
One exemplary aspect comprises a computer-implemented method comprising: (a) electronically receiving, from a first securities market participant, data...
US-8,731,984 Global concierge
A method for receiving, processing and managing service requests from a user is disclosed. The method includes receiving the service request from a user at a...
US-8,731,769 Inertial sensor calibration method for vehicles and device therefor
An inertial sensor calibration method has steps of mounting an observer device and an inertial sensor of a vehicle carrying on an inertial move, acquiring...
US-8,731,233 System of automated document processing
A system is proposed for automated document processing, comprising a document, consisting of two sections--a main section, containing data in printed character...
US-8,730,871 System and method for providing voice communications over a multi-level secure network
According to one embodiment, a communication network includes an analog voice bridge coupled to two secure network domains that each have a differing security...
US-8,730,040 Systems, methods, and apparatus for monitoring and alerting on large sensory data sets for improved safety,...
The present invention is a process monitoring method, comprising the steps of capturing sensory data from one or more sensors; storing the sensory data from the...
US-8,727,228 Structure for railroad ties having data acquisition, processing and transmission means
An encapsulated railroad tie structure and its method of manufacture. A core of laminated wood slats is inserted into an extruded sleeve of scrap tire rubber...
US-8,727,213 Varnish printing document securing system and method
A paper and document securing system that includes an indicator is used to for validating the paper. The indicator may be printed on a surface of the paper by a...
US-8,726,405 Techniques for providing security using a mobile wireless communications device having data loss prevention...
A technique provides wireless communications security. The technique involves providing a mobile wireless communications apparatus (e.g., a smart phone) having...
US-8,726,393 Cyber security analyzer
An overall cyber security risk diagram is generated from a hierarchy of determined KPI's by combining a Procedures and Protocol KPI determined from values...
US-8,726,383 Flow data for security intrusion detection
Disclosed herein are techniques for detecting possible security intrusions in a computer network. The security intrusion detection may be based on analyzing...
US-8,726,380 Methods, devices, systems, and computer program products for edge driven communications network security monitoring
An edge monitoring approach can be utilized to detect an attack which includes a plurality of relatively low bandwidth attacks, which are aggregated at a victim...
US-8,726,379 Systems and methods for dynamic protection from electronic attacks
Systems and methods for gathering, classifying, and evaluating real time security intelligence data concerning security threats presented by an IP address, and...
US-8,726,376 Methods, systems and devices for the detection and prevention of malware within a network
Methods, systems and devices examine data flows in a communication system control network for known malware threats and suspicious properties typically...
US-8,726,369 Trusted path, authentication and data security
In some embodiments, techniques for computer security comprise presenting a data field in a spoof-resistant manner, receiving field data, and securing field...
US-8,726,353 Secure computer use system
Methods and apparatus for ensuring the computer security of users of a computer system are described. A user is allocated a security grading relating to how...
US-8,726,338 Dynamic threat protection in mobile networks
In general, techniques are described for dynamic threat protection in mobile networks. A network system comprising a network security device and a management...
US-8,726,305 Methods and systems for application rendering and management on internet television enabled displays
Computer implemented methods for managing communication between a display device and a remote server or services is provided. A remote server provides access to...
US-8,726,043 Securing backing storage data passed through a network
Techniques described herein generally relate to methods, data processing devices and computer readable media to ensure that data stored in a remote backing...
US-8,726,042 Tamper resistant memory protection
Various mechanisms are disclosed for protecting the security of memory in a computing environment. A security layer can have an encryption layer and a hashing...
US-8,726,035 Method and system for a recursive security protocol for digital copyright control
Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with...
US-8,726,025 Secured critical information storage and transaction
An enterprise system includes a storage having stored thereon a private key and a processor that is configured to receive a data object including an encrypted...
US-8,726,022 Method for the access of the mobile terminal to the WLAN and for the data communication via the wireless link...
The present invention relates to a method for the secure access of mobile terminal to the Wireless Local Area Network (WLAN) and for secure data communication...
US-8,726,018 Electronic authorization system and method
An electronic authorization system comprising a data source system configured to transmit transaction data. A secure data system is coupled to the data source...
US-8,726,016 Intelligent integrated network security device
Methods, computer program products and apparatus for processing data packets are described. Methods include receiving the data packet, examining the data...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.