Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,776,145 In-transit electronic media with location-based content
Exemplary methods, systems and components are implemented on a multipassenger transit vehicle to provide passenger access to a pre-assigned interactive...
US-8,775,824 Protecting the security of secure data sent from a central processor for processing by a further processing device
A data processing apparatus comprising: a data processor for processing data in a secure and a non-secure mode, said data processor processing data in said...
US-8,775,819 Flexible method of user authentication
A method of authorising a user in communication with a workstation is disclosed. According to the method, a system automatically determines a plurality of...
US-8,775,816 Method and apparatus to enhance security and/or surveillance information in a communication network
Existing video surveillance security approaches enhanced with suitable functionality of the telecommunications wireless network are provided. Security personnel...
US-8,775,805 System and method for variable length encryption
Systems and methods for performing a secure transaction provided. In one embodiment, the method for encrypting data is provided, comprising: selecting clear...
US-8,775,803 High security display of private data
A device, method, and computer-readable medium are disclosed. In one embodiment, the device includes an inbound port to receive information from an information...
US-8,775,799 Apparatus and method of securely moving security data
Provided is an apparatus and method of securely moving security data. An apparatus for securely moving security stored in a first apparatus to a second...
US-8,775,792 Method of and system for encryption and authentication
The invention provides a method of and system for networked security, involving multiple clients and servers. Rather than relying on single server based...
US-8,775,791 System and method for secure messaging between wireless device and application gateway
A method and system for secure messaging between a wireless device and an application gateway provides for connecting a device to an application mapping layer...
US-8,775,790 System and method for providing secure network communications
A method includes receiving a data message, from a first embedded node, in a first end point device. The first data message is addressed to a second embedded...
US-8,775,773 Object storage system
The storage system exports logical storage volumes that are provisioned as storage objects. These storage objects are accessed on demand by connected computer...
US-8,775,715 Protection of data from virtual machine clones via paravirtualization
A system and method for protecting secure data from virtual machine clones are disclosed. In accordance with one embodiment, a hypervisor receives a message...
US-8,775,710 Mobile information handling apparatus
A mobile information handling apparatus and system is configured for convenient mobile data entry, communication, and computation. A mobile computing device is...
US-8,775,619 Web hosted security system communication
A distributed proxy server system is operable to receive a request for Internet data from a user, obtain the user's identity, store at least one cookie on the...
US-8,775,604 Distributed frequency data collection via indicator embedded with DNS request
Domain Name Service (DNS) requests are used as the reporting vehicle for ensuring that security-related information can be transferred from a network. As one...
US-8,775,402 Trusted query network systems and methods
Systems and methods for enabling organizations to anonymously share aggregated security assessment results while keeping the raw or private data locally within...
US-8,775,369 Computer system architecture and method having isolated file system management for secure and reliable data...
System, method, computer, and computer program for secure data processing of potentially malicious code and documents or other data that may contain malicious...
US-8,775,364 Model-theoretic approach to data anonymity and inference control
A system and method for secure data management is presented. The method comprises receiving a query, performing the query and obtaining answers to it, creating...
US-8,775,305 Card-present on-line transactions
Embodiments of the invention can provide systems and methods for on-line credit card transactions. According to one example embodiment of the invention, a...
US-8,775,291 Systems and methods for enrichment of data relating to consumer credit collateralized debt and real property...
Systems and methods for enrichment of data associated with risk prediction. Data may be enriched by incorporating one or more aspects of consumer credit,...
US-8,775,272 System and method for enabling marketing channels in an IP marketplace
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
US-8,775,246 System and method for enabling channel registration in an IP marketplace
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
US-8,775,212 Electronic health records in clinical trials
A method for collecting self-reported data from an individual for use in a clinical trial is provided. The method includes providing a web site allowing the...
US-8,775,204 System and method for enabling group channels in an IP marketplace
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
US-8,775,189 Control center for a voice controlled wireless communication device system
A wireless communication device is disclosed that accepts recorded audio data from an end-user. The audio data can be in the form of a command requesting user...
US-8,774,411 Session key generation and distribution with multiple security associations per protocol instance
A single instance of a session key generation protocol is executed in a manner that generates a plurality of security associations between user equipment and a...
US-8,774,382 Online reporting tool for conferencing customers
Embodiments consistent with the present invention provide an integrated system for conferencing services reporting to support customer billing needs. Systems...
US-8,773,705 Data transmitting method of image forming apparatus and image forming apparatus for performing data...
A method of transmitting data from an image forming apparatus, the method including: receiving identification information of a destination of the data;...
US-8,773,279 Apparatus for visually and remotely determining an angular position of a relative rotation of parts
A visually and remotely readable apparatus is provided which comprises a plurality of sensing units, a control unit and a flexible printed cable (FPC) to...
US-8,773,241 Device for the secure contactless data exchange between a reader and a card
A transponder of a contactless data exchange system includes a unit to receive and transmit data provided with at least one first antenna loop and at least one...
US-8,770,486 Arrangement, apparatus, and associated method, for providing stored data in secured form for purposes of...
Card member apparatus, and an associated method, for storing and permitting selectable use of informational data associated with a subject. Identifying indicia...
US-RE45,009 Dynamic network link acceleration
A method and apparatus for dynamic network link acceleration provides a managed communication link for accelerated and reliable network communication between a...
US-8,769,699 Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-8,769,680 Alert passwords for detecting password attacks on systems
Detecting attacks on secured computer resources, including gathering user security data for a user having a user password protecting resources on a computer...
US-8,769,678 Cloud-based gateway security scanning
Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway...
US-8,769,666 Image processing device and image processing system
An image processing device includes a plurality of printers (Pr1, Pr2, Pr3, Pr4, . . . ) and a plurality of client machines (PC1, PC2, PC3, PC4, PC5, . . . )....
US-8,769,646 System and method for associating a universal user identification and a domain specific user identification
There is presented a system and method for associating a domain transcendent identification (ID) of a user and a domain specific ID of the user, the system...
US-8,769,639 History-based downgraded network identification
Some embodiments of the invention are directed to increasing security and lowering risk of attack in connecting automatically to networks by enabling client...
US-8,769,622 Authentication and authorization methods for cloud computing security
An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information...
US-8,769,613 Data security in a cloud computing environment
Methods and apparatus for providing data security, in particular for cloud computing environments, are described. In an embodiment, a software component...
US-8,769,608 Airport security system
A method, apparatus, and system for managing network security at an airport. A threat level for the airport is identified. A number of policies for a network...
US-8,769,607 Systems and methods for evaluating a password policy
Systems, methods and articles of manufacture for evaluating a password policy are disclosed. The password evaluation system receives password policy data...
US-8,769,355 Using built-in self test for preventing side channel security attacks on multi-processor systems
A data processing system having a first processor, a second processor, a local memory of the second processor, and a built-in self-test (BIST) controller of the...
US-8,769,309 Flash memory storage system, and controller and method for anti-falsifying data thereof
A flash memory storage system is provided. The flash memory storage system includes a controller having a rewritable non-volatile memory and a flash memory...
US-8,769,307 Secure operation indicator
A data processing apparatus and a method of indicating operation of a data processor within a secure domain. The apparatus comprising a display for displaying...
US-8,769,305 Secure execution of unsecured apps on a device
An app is secured on a mobile device by being deconstructed or unbundled into multiple modules, where a module is a segment of app code that performs a...
US-8,769,303 Infrastructure independent recovery key release
Aspects of the subject matter described herein relate to recovering locked data. In aspects, stakeholders of locked volume(s) are identified. Security data of...
US-8,769,286 Methods and systems for increasing the security of electronic messages
A method for generating e-mail messages with increased security includes receiving an e-mail message at a control system. The e-mail message has recipients, a...
US-8,769,279 System and method for variable length encryption
Systems and methods for performing a secure transaction provided. In one embodiment, the method includes: reading data on a command token, reading data on a...
US-8,769,278 Apparatus and method for efficiently and securely exchanging connection data
An apparatus, method, and machine-readable medium are described for securely and efficiently exchanging connection data for a peer-to-peer ("P2P") session on a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.