Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,732,805 Re-authentication in secure web service conversations
Techniques are disclosed for sharing communication session information, such as encryption keys for data protection, among multiple communication operations...
US-8,732,793 Method and system for improving security of the key device
The present invention provides a method and a system for improving security of a key device in the information security filed. In order to solve the problem...
US-8,732,570 Non-symbolic data system for the automated completion of forms
A system and method for paper-based, automated completion of forms allows a user charged with filling out multiple forms containing some common information to...
US-8,732,523 Data processing apparatus and method for analysing transient faults occurring within storage elements of the...
A data processing apparatus has a plurality of storage elements residing at different physical locations within the apparatus, and fault history circuitry for...
US-8,732,471 Data communication method, computer and information storing medium
A computer including at least two processors is used to preferably perform a secure data communication. Data containing a processor ID identifying one of the at...
US-8,732,462 Methods and apparatus for secure data sharing
This disclosure relates to methods and apparatus for securely and easily sharing data over a communications network. As communications services on a...
US-8,732,459 Security system for handheld wireless devices using time-variable encryption keys
In one embodiment, the invention provides a portable wireless personal communication system for cooperating with a remote certification authority to employ time...
US-8,732,453 Secure acknowledgment device for one-way data transfer system
An apparatus for relaying a hashed message from a first node to a second node, comprising an inlet interface for receiving a message from the first node, a hash...
US-8,732,445 Information processing device, information processing method, information processing program, and integrated...
An information processing terminal includes first sealed data respectively having usability conditions of matching with predetermined terminal environment...
US-8,732,442 Method and system for hardware-based security of object references
A method for managing data, including obtaining a first instruction for moving a first data item from a first source to a first destination, determining a data...
US-8,732,122 Bonding contents on separate storage media
Local storage on player instruments provides the ability for adding further amendments and most recent supplements to the optical disc content. A problem...
US-8,732,091 Security in a geo-spatial environment
A method, apparatus, and system of security in a geo-spatial environment are disclosed. In one embodiment a privacy server verifies that each user of the...
US-8,732,071 Systems and methods regarding targeted dissemination
One exemplary aspect comprises a computer-implemented method comprising: (a) electronically receiving, from a first securities market participant, data...
US-8,731,984 Global concierge
A method for receiving, processing and managing service requests from a user is disclosed. The method includes receiving the service request from a user at a...
US-8,731,769 Inertial sensor calibration method for vehicles and device therefor
An inertial sensor calibration method has steps of mounting an observer device and an inertial sensor of a vehicle carrying on an inertial move, acquiring...
US-8,731,233 System of automated document processing
A system is proposed for automated document processing, comprising a document, consisting of two sections--a main section, containing data in printed character...
US-8,730,871 System and method for providing voice communications over a multi-level secure network
According to one embodiment, a communication network includes an analog voice bridge coupled to two secure network domains that each have a differing security...
US-8,730,040 Systems, methods, and apparatus for monitoring and alerting on large sensory data sets for improved safety,...
The present invention is a process monitoring method, comprising the steps of capturing sensory data from one or more sensors; storing the sensory data from the...
US-8,727,228 Structure for railroad ties having data acquisition, processing and transmission means
An encapsulated railroad tie structure and its method of manufacture. A core of laminated wood slats is inserted into an extruded sleeve of scrap tire rubber...
US-8,727,213 Varnish printing document securing system and method
A paper and document securing system that includes an indicator is used to for validating the paper. The indicator may be printed on a surface of the paper by a...
US-8,726,405 Techniques for providing security using a mobile wireless communications device having data loss prevention...
A technique provides wireless communications security. The technique involves providing a mobile wireless communications apparatus (e.g., a smart phone) having...
US-8,726,393 Cyber security analyzer
An overall cyber security risk diagram is generated from a hierarchy of determined KPI's by combining a Procedures and Protocol KPI determined from values...
US-8,726,383 Flow data for security intrusion detection
Disclosed herein are techniques for detecting possible security intrusions in a computer network. The security intrusion detection may be based on analyzing...
US-8,726,380 Methods, devices, systems, and computer program products for edge driven communications network security monitoring
An edge monitoring approach can be utilized to detect an attack which includes a plurality of relatively low bandwidth attacks, which are aggregated at a victim...
US-8,726,379 Systems and methods for dynamic protection from electronic attacks
Systems and methods for gathering, classifying, and evaluating real time security intelligence data concerning security threats presented by an IP address, and...
US-8,726,376 Methods, systems and devices for the detection and prevention of malware within a network
Methods, systems and devices examine data flows in a communication system control network for known malware threats and suspicious properties typically...
US-8,726,369 Trusted path, authentication and data security
In some embodiments, techniques for computer security comprise presenting a data field in a spoof-resistant manner, receiving field data, and securing field...
US-8,726,353 Secure computer use system
Methods and apparatus for ensuring the computer security of users of a computer system are described. A user is allocated a security grading relating to how...
US-8,726,338 Dynamic threat protection in mobile networks
In general, techniques are described for dynamic threat protection in mobile networks. A network system comprising a network security device and a management...
US-8,726,305 Methods and systems for application rendering and management on internet television enabled displays
Computer implemented methods for managing communication between a display device and a remote server or services is provided. A remote server provides access to...
US-8,726,043 Securing backing storage data passed through a network
Techniques described herein generally relate to methods, data processing devices and computer readable media to ensure that data stored in a remote backing...
US-8,726,042 Tamper resistant memory protection
Various mechanisms are disclosed for protecting the security of memory in a computing environment. A security layer can have an encryption layer and a hashing...
US-8,726,035 Method and system for a recursive security protocol for digital copyright control
Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with...
US-8,726,025 Secured critical information storage and transaction
An enterprise system includes a storage having stored thereon a private key and a processor that is configured to receive a data object including an encrypted...
US-8,726,022 Method for the access of the mobile terminal to the WLAN and for the data communication via the wireless link...
The present invention relates to a method for the secure access of mobile terminal to the Wireless Local Area Network (WLAN) and for secure data communication...
US-8,726,018 Electronic authorization system and method
An electronic authorization system comprising a data source system configured to transmit transaction data. A secure data system is coupled to the data source...
US-8,726,016 Intelligent integrated network security device
Methods, computer program products and apparatus for processing data packets are described. Methods include receiving the data packet, examining the data...
US-8,726,015 Methods and apparatus for secure content routing
Systems and methods are described which provide handling and secure routing of an article of content in accordance with a code or instruction set identifier...
US-8,726,008 Network security smart load balancing
A system and method for protecting data communications in a system including a load-balancer connected to a cluster of security network components, e.g....
US-8,726,006 System and method for establishing a virtual private network
A system and method for establishing a virtual private network (VPN) between a client and a private data communication network. An encrypted data communication...
US-8,725,943 Method and system for secure data storage
A method and system for secure data storage and retrieval is provided. A sequence of data units is divided into multiple subsets of data units corresponding to...
US-8,725,644 Secure online transaction processing
Various methods for securely processing an online transaction between a customer and a merchant are disclosed. In one method, an authentication credentials...
US-8,725,619 Fair value model based system, method, and computer program product for valuing foreign-based securities in a...
A system for determining fair value prices of financial securities of international markets includes selecting a universe of securities of a particular...
US-8,725,610 System and method for managing privacy for offerings
Methods, systems, and articles of manufacture consistent with the present invention provide for managing privacy in a data processing system having an offering...
US-8,725,438 Linear actuator
A linear actuator comprises a reversible electric motor (2) which, via a transmission, is capable of driving a spindle (4) having a spindle nut (5) secured...
US-8,725,138 Methods for network selection and discovery of service information in public wireless hotspots
A roaming information code which can be wirelessly or otherwise transmitted as a SSID or other data field(s) of a wireless technology or standard. Further, a...
US-8,725,123 Communications device with secure data path processing agents
A communications device comprising one or more communication input/output (I/O) ports, at least one of the one or more communication I/O ports being a wide area...
US-8,724,998 Carrier and subcarrier hopping for optical OFDM security
Methods and systems for secure communication include assigning data streams to respective orthogonal sub-carriers according to random number information at a...
US-8,724,819 Credential provisioning
Disclosed is a method in a provisioning apparatus. The method comprises obtaining a family key, a family key defining a family; submitting the family key to a...
US-8,724,816 Security service control method and wireless local area network terminal
A security service control method and a WLAN terminal are provided, and the method includes: stopping a WPI service between a WLAN terminal and an AP when the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.