Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,726,015 Methods and apparatus for secure content routing
Systems and methods are described which provide handling and secure routing of an article of content in accordance with a code or instruction set identifier...
US-8,726,008 Network security smart load balancing
A system and method for protecting data communications in a system including a load-balancer connected to a cluster of security network components, e.g....
US-8,726,006 System and method for establishing a virtual private network
A system and method for establishing a virtual private network (VPN) between a client and a private data communication network. An encrypted data communication...
US-8,725,943 Method and system for secure data storage
A method and system for secure data storage and retrieval is provided. A sequence of data units is divided into multiple subsets of data units corresponding to...
US-8,725,644 Secure online transaction processing
Various methods for securely processing an online transaction between a customer and a merchant are disclosed. In one method, an authentication credentials...
US-8,725,619 Fair value model based system, method, and computer program product for valuing foreign-based securities in a...
A system for determining fair value prices of financial securities of international markets includes selecting a universe of securities of a particular...
US-8,725,610 System and method for managing privacy for offerings
Methods, systems, and articles of manufacture consistent with the present invention provide for managing privacy in a data processing system having an offering...
US-8,725,438 Linear actuator
A linear actuator comprises a reversible electric motor (2) which, via a transmission, is capable of driving a spindle (4) having a spindle nut (5) secured...
US-8,725,138 Methods for network selection and discovery of service information in public wireless hotspots
A roaming information code which can be wirelessly or otherwise transmitted as a SSID or other data field(s) of a wireless technology or standard. Further, a...
US-8,725,123 Communications device with secure data path processing agents
A communications device comprising one or more communication input/output (I/O) ports, at least one of the one or more communication I/O ports being a wide area...
US-8,724,998 Carrier and subcarrier hopping for optical OFDM security
Methods and systems for secure communication include assigning data streams to respective orthogonal sub-carriers according to random number information at a...
US-8,724,819 Credential provisioning
Disclosed is a method in a provisioning apparatus. The method comprises obtaining a family key, a family key defining a family; submitting the family key to a...
US-8,724,816 Security service control method and wireless local area network terminal
A security service control method and a WLAN terminal are provided, and the method includes: stopping a WPI service between a WLAN terminal and an AP when the...
US-8,724,814 System and method of security function activation for a mobile electronic device
A system and a method are provided for activating one or more security functions of a mobile electronic device. The system and method provide for the activation...
US-8,724,811 Broadcast encryption based security system
Provided are techniques for providing a home or business security system that relies upon data encryption for both communication and the storage of content. The...
US-8,724,808 Method for secure distribution of digital data representing a multimedia content
A content server maintains a database of different content files, these files being scrambled by control words that are stored in a database. The control words...
US-8,724,807 Method for etching and secure distribution of digital data, access device and writer
The invention relates to a method of receiving and securely recording digital data comprising a step for recording said digital data on a secured disk by a...
US-8,724,778 Systems and methods for secure recording in a customer center environment
Systems and methods for secure recording in a customer center environment are provided. The system receives data related to a communication at a media...
US-8,724,639 Smart home hub
The present invention provides a method and device for an integrated smart hub. The method and device for an integrated smart hub provides for a simultaneously...
US-8,724,312 Mobile computer stand with integrated keyboard
A device for use with a portable computer includes a base, a stand having an upper portion and an adjustable linkage, and a connection mechanism. The base is...
US-8,724,137 Information processing apparatus and memory management technique for secure print data
State information about whether a printing apparatus can store print data for confidential printing is acquired. When the print data can be stored, secure...
US-8,723,952 Tamper-resistant video surveillance network
A network of surveillance digital video cameras is provided. Each camera records video data and provides the video recordings to other networked cameras as well...
US-8,723,831 Graphical authentication for a portable device and methods for use therewith
A portable device includes a touch screen that includes a display screen and that generates touch screen data in response to a user's interaction with the touch...
US-8,723,701 Methods for encoding and decoding data
The transmission of broadcast data, such as financial data and news feeds, is accelerated over a communication channel using data compression and decompression...
US-8,723,692 Secure terminal data loader apparatus and method for a mobile platform
A terminal data loading device on a mobile platform includes a media unit for receiving a transportable media element containing media data and outputting a...
US-8,723,675 Smartcard connector
A smartcard connector for connecting a smartcard within a card holder to an electronic device. The smartcard connector includes a card holder having a card...
US-8,723,671 Alarm monitoring telecommunications line condition detection and automatic calibration
A method at an alarm monitoring station and security system arrangement for detecting alarm signals originating at security systems on incoming calls carried by...
US-8,723,574 Semiconductor integrated circuit
According to one embodiment, a semiconductor integrated circuit is provided, which has mounted thereto a flip-flop circuit including a latch portion that takes...
US-8,721,738 System and method for ensuring security of data stored on data storage devices
Systems and methods for limiting access to data in a portable data storage device. An exemplary method may use an electronic computing device to prevent access...
US-8,721,346 Signal transmission module
A signal transmission module is provided. The signal transmission module includes an electrical connector, a linked unit, a data connector, a sliding block, a...
US-8,720,786 Card security activation label and method
Card security apparatus and methods are provided. An obstruction layer (e.g., a hot-stamped scratch off foil label) may be provided in at least partially...
US-8,719,954 Method and system for secure distribution of selected content to be protected on an appliance-specific basis...
The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related...
US-8,719,947 Protection of audio or video data in a playback device
Method and apparatus to prevent hacking of encrypted audio or video content during playback. Hackers, using a debugging attachment or other tools, can illicitly...
US-8,719,925 Content-addressable memory based enforcement of configurable policies
A monitoring device for monitoring transactions on a bus includes content-addressable memory ("CAM") and a response policy unit. The CAM includes an input...
US-8,719,923 Method and system for managing security operations of a storage server using an authenticated storage module
The present invention provides a technique, in a network storage system, for a key management module (KMM) managing security operations within the storage...
US-8,719,918 Method and device for distributed security control in communication network system
With migration of network technology and more and more requirements of user equipment for accessing to Internet, the network security faces more and more severe...
US-8,719,914 Virtual computing infrastructure
A system has a virtual overlay infrastructure mapped onto physical resources for processing, storage and network communications, the virtual infrastructure...
US-8,719,901 Secure consultation system
A secure consultation system is disclosed that enables an owner entity to securely store its most secure and private data such that designated entities of the...
US-8,719,898 Configuring and providing profiles that manage execution of mobile applications
Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user...
US-8,719,897 Access control method for tri-element peer authentication credible network connection structure
An access control method for a TePA-based TNC architecture is provided, including: 1) performing encapsulation of user authentication protocol data and platform...
US-8,719,595 Semiconductor device including encryption section, semiconductor device including external interface, and...
A secure LSI device 1 includes an encryption section 2 for encrypting a program, and an external I/F 50 for inputting/outputting a program or data from/to an...
US-8,719,594 Storage availability using cryptographic splitting
Methods and systems for maintaining data connectivity in a secure data storage network are disclosed. In one aspect, a method includes assigning a volume to a...
US-8,719,593 Secure processing device with keystream cache and related methods
A secure processing device may include an external memory storing encrypted data, and a processor cooperating with the external memory. The processor is...
US-8,719,591 Secure data entry
In some embodiments, techniques for secure data entry comprise presenting a data field in a spoof-resistant manner, receiving field data, and securing field data.
US-8,719,584 Mobile, wireless hand-held biometric capture, processing and communication system and method for biometric...
A mobile, wireless biometric identification system includes a biometric capture device, associated software and processes which enable a commercially available...
US-8,719,575 Method of secure broadcasting of digital data to an authorized third party
The invention relates to a method of secure broadcasting of encrypted digital data of a proprietary entity, these data being stored in a storage module (6) of a...
US-8,719,568 Secure delivery of sensitive information from a non-communicative actor
An electronic storage in a network accessible server securely stores sensitive user data. Technologies disclosed enable secure user access to the sensitive data...
US-8,719,445 System and method for load balancing multiple file transfer protocol (FTP) servers to service FTP connections...
System and method for load balancing multiple file transfer protocol (FTP) servers to service secure FTP sessions having encrypted signals are disclosed. In one...
US-8,719,436 Tunneling non-HTTP traffic through a reverse proxy
A method, system and apparatus for tunneling non-hypertext transfer protocol (HTTP) data streams through a reverse proxy. The method can include soliciting a...
US-8,719,414 Multi-source broadband aggregation router
A router has one or more wired connections to a remote computer network and one or more wireless connections to the remote computer network for managing a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.