Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,819,255 Relevancy improvement through targeting of information based on data gathered from a networked device...
A method, apparatus, and system related to relevancy improvement through targeting of information based on data gathered from a networked device associated with...
US-8,819,253 Network message generation for automated authentication
A message generation mechanism for a network interface is provided. The message generation mechanism is operable to generate a message which includes data for...
US-8,819,248 Secure messaging facility system
A secure message facility transfers authentication data between various applications, operating systems, and authentication devices and software in the form of...
US-8,819,234 Supplying data storage services
A method is used in supplying data storage services. For a set of applications running on an electronic system, an application service is provided to each...
US-8,819,213 System, method and apparatus for traffic mirror setup, service and security in communication networks
The present invention provides method and systems for dynamically mirroring network traffic. The mirroring of network traffic may comprise data that may be...
US-8,819,178 Controlling data routing in integrated security systems
An integrated security system integrates broadband and mobile access and control with conventional security systems and premise devices to provide a tri-mode...
US-8,818,906 Systems and methods for performing authentication of a customer interacting with a banking platform
The invention provides systems and methods of authenticating a customer device, in conjunction with a requested interaction, the customer device associated with...
US-8,818,757 Modular object and host matching
An object can be used in an industrial control configuration in relation to performing a function or task. Matching can occur such that an object with...
US-8,818,614 Personal event data recorder
A personal event data recorder (PEDR) is provided. The PEDR may be integrated within a mobile communications device or may be provided as a separate add-on...
US-8,818,369 Method for a secure detach procedure in a radio telecommunications network
The present invention proposes a method for performing a detach of a terminal registered to a telecommunication network by associating an identification for...
US-8,818,351 Method and apparatus for tracking a transported item while accommodating communication gaps
A method and apparatus is provided for minimizing potential security problems and battery power usage in a tracking device used in tracking an associated...
US-8,818,334 Secure data exchange with identity information exchange
Systems and methods for authenticating authorized users of electronic communication devices, such mobile communication devices, for a secure data exchange...
US-8,818,202 Wavelength sensing lighting system and associated methods for national security application
A wavelength sensing lighting system may include a light source, a sensor and a controller. One or more light sources and sensors may be included in an array....
US-8,818,020 Method of providing security for transmitting a digital medical image
A method of preparing a digital medical image for secure transmission, the method comprising embedding data into the digital medical image using a reversible...
US-8,817,984 Cryptographic security functions based on anticipated changes in dynamic minutiae
Dynamic key cryptography validates mobile device users to cloud services by uniquely identifying the user's electronic device using a very wide range of...
US-8,817,983 Streaming video to cellular phones
A method, system, and computer program product for deploying data to a web server for streaming video to a mobile device. The method can include receiving a...
US-8,817,668 Distributable, scalable, pluggable conferencing architecture
Architecture for a scalable, pluggable multi-party, and distributed multimedia conferencing. A centralized policy and control conferencing component allows the...
US-8,816,819 Dynamic information radio-frequency identification (RFID) card with biometric capabilities
Embodiments of the present invention implement dynamic elements within a RFID card. Specifically, the embodiments update card information dynamically, using a...
US-8,816,816 Methods and apparatus for securing a portable device
An apparatus for securing a portable device is described. The portable device includes a housing having a mating feature adapted to mate with a corresponding...
US-8,814,052 Secure smart card system
A smart card usable in magnetic stripe swipe transactions with a transaction terminal configured to read transaction information encoded on a magnetic stripe of...
US-8,813,255 Security classification applying social norming
An embodiment of the invention provides a method for security classification applying social norming. More specifically, content is received from a user via an...
US-8,813,253 Method for the authentication of applications
Authentication method of at least one application using resources stored in a security module associated to an equipment connected to a control server via a...
US-8,813,247 Providing cryptographic security for objective-oriented programming files
An apparatus and method for providing an Internet Web services for securing the transmission of data between object oriented software infrastructure and...
US-8,813,243 Reducing a size of a security-related data object stored on a token
Embodiments of the present invention provide a method and system, including a client and security token, for reducing a size of a security-related object stored...
US-8,813,220 Methods and systems for internet protocol (IP) packet header collection and storage
A computer-based method for providing information about a potential security incident ascertained from received internet protocol (IP) packets is described. The...
US-8,813,218 Security-enhanced computer systems and methods
In general, the invention provides a computer architecture designed for enhanced data security. In embodiments, the architecture comprises two sub-systems, each...
US-8,813,216 Network security protection
A method and system for providing security to a Network Job Entry (NJE) network. A first NJE node and a third NJE node are connected by a second NJE node. The...
US-8,813,214 Method and system for providing secure peer-to-peer file transfers
A method and system for providing secure peer-to-peer file transfers whereby request/negotiation message mechanisms used to negotiate file transfers between...
US-8,813,201 Generating security material
An apparatus and method establish a secure, direct, station-to-station communication between a first station and a second station in a topology (e.g., PBSS)...
US-8,813,178 Systems and methods for preparing and submitting documents to comply with securities regulations
Systems and methods for preparing and submitting documents to a regulatory agency in an on-line environment are provided, which are used for the purpose of...
US-8,813,176 Method and apparatus for creating an information security policy based on a pre-configured template
A method and apparatus for creating a policy based on a pre-configured template is described. In one embodiment, source data having a tabular structure is...
US-8,813,173 Mobile communication device surveillance system
A mobile communication device surveillance system is described. The system includes a gateway, a web server, a wireless mobile communication device, and a...
US-8,813,162 Information receiving apparatus, data downloading method, and information receiving system
An information receiving apparatus includes: a communication unit; a storage unit that stores data; a data acquisition unit that acquires distribution data that...
US-8,813,159 Data transmission device and data transmission control device
Disclosed is a technique for effectively transmitting a plurality of contents under the situation securing minimum QoS. According to the technique, among a...
US-8,813,115 Service access method, device, and system
The present invention provides a service access method, device, and system, and relates to the field of television services, to guarantee multicast security of...
US-8,813,113 Method and system for adding a conditional access system
A method for adding a conditional access system to a digital audio/video transmission system that delivers content from a source to a security device associated...
US-8,812,877 Database encryption system, method, and program
A user apparatus connected to database apparatus via network comprises: unit that manages key information in order to encrypt and decrypt; storage unit that...
US-8,812,868 Secure execution of unsecured apps on a device
Given the volume of apps being developed and downloaded, performing operations to enable security for mobile devices, such as locating relevant classes and...
US-8,812,865 Secured client-server computer system for interactive applications
A client-server type computer system for graphical applications is provided, that is to say, for displaying data in the form of software units called "widgets"...
US-8,812,860 Systems and methods for protecting data stored on removable storage devices by requiring external user...
A computer-implemented method for protecting data stored on removable storage devices may include (1) identifying an attempt by a computing device to access...
US-8,812,850 Secure multimedia transfer system
A method and apparatus for secure multimedia transfer provides an encrypted data transfer system that makes transferring multimedia content from a client to any...
US-8,812,844 Luhn validation and data security across multiple active domains
Systems and methods for maintaining data security using Luhn validation in a multiple domain computing environment are presented. Each domain includes a token...
US-8,812,841 Communications hub for use in life critical network
Secured communications between patient portable communicators (PPC) and a central authority (CA) via an unsecured network are implemented using software...
US-8,812,702 System and method for globally and securely accessing unified information in a computer network
A client stores a first set of workspace data, and is coupled via a computer network to a global server. The client may be configured to synchronize portions of...
US-8,812,611 Method and system for secure mobile file sharing
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and...
US-8,812,607 Private mobile messaging and data communications apparatus and method of managing organizational messaging
A private mobile data communications apparatus and methods of managing organizational data flow and coordinate a secure messaging infrastructure allow...
US-8,812,462 User-driven menu generation system with dynamic generation of target files with placeholders for persistent...
Dynamic generation of target files is described. A user can select a template file. The template file includes: at least first and second changeable fields...
US-8,812,384 Systems and methods for underlying asset risk monitoring for investment securities
Systems and methods are provided for evaluating asset risks using categories of primary loan underwriting factors associated with a pre-selected number of...
US-8,812,325 Use of multiple speech recognition software instances
A wireless communication device is disclosed that accepts recorded audio data from an end-user. The audio data can be in the form of a command requesting user...
US-8,811,965 System and method for automatic data security back-up and control for mobile devices
Systems and methods for providing security and control of mobile communications device activity including at least one mobile communication device with software...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.