Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,701,170 System for secure enrollment and secure verification of network users by a centralized identification service
A system and method for providing, as a service over a computer network (especially a packet-switched computer network) to a body of merchants connected to the...
US-8,701,167 Method and system for fast access to advanced visualization of medical scans using a dedicated web portal
A system for viewing at a client device a series of three-dimensional virtual views over the Internet of a volume visualization dataset contained on centralized...
US-8,701,166 Secure authentication
Apparatus, systems, and methods provide a mechanism to enhance the security of operating client devices with systems controlling secure data. Various...
US-8,701,161 Systems and methods for detecting network intrusion devices
An optical communication system has a transmitter that generates an optical signal containing payload data and security data. The transmitter double modulates...
US-8,700,920 System and method for content protection on a computing device
Systems and methods for handling user interface field data. A system and method can be configured to receive input which indicates that the mobile device is to...
US-8,700,917 Information processing apparatus, information recording medium manufacturing apparatus, and information...
A configuration is provided for a process in which appropriate content code corresponding to apparatuses and applications of various model types and versions is...
US-8,700,908 System and method for managing secure information within a hybrid portable computing device
A method and system for managing secure information within a portable computing device are disclosed. The portable computing device includes a program module...
US-8,700,906 Secure computing in multi-tenant data centers
This document describes techniques and apparatuses for secure computing in multi-tenant data centers. These techniques permit a client to delegate computation...
US-8,700,901 Facilitating secure online transactions
A method and system for mutually authenticating an identity and a server is provided in accordance with an aspect of the present invention. The method commences...
US-8,700,898 System and method for multi-layered sensitive data protection in a virtual computing environment
Systems and methods for providing sensitive data protection in a virtual computing environment. The systems and methods utilize a sensitive data control monitor...
US-8,700,891 Preserving security association in MACsec protected network through VLAN mapping
According to one general aspect, a method of using a network device may include receiving, via an ingress port, a data packet that includes a payload portion, a...
US-8,700,890 Secure storage and accelerated transmission of information over communication networks
A system and method for securely storing and transmitting digital information includes a computing device connected to at least one of a network device or a...
US-8,700,866 Data transfer apparatus, data transfer device, and data transfer method in a data transfer device
A data transfer apparatus includes: a first port and a second port that communicate data; a memory unit that stores the data; and a securing unit that secures,...
US-8,700,788 Method and system for automatic login initiated upon a single action with encryption
A method and system for secure automatic user login to a destination website in a single action, without the use of a file manager, cookies, or without storing...
US-8,700,769 System and method for providing configurable security monitoring utilizing an integrated information system
A system and method for implementing an integrated information system are provided. A premises server is in communication with a variety of information sources...
US-8,700,751 Optimizing fibre channel zoneset configuration and activation
In an example embodiment, a new qualifier is added to members in a Fiber Channel zone to specify whether each member is a target or initiator and in another...
US-8,700,739 Device for automatically receiving new digital content from a network
A portable wireless communications subscriber audio and/or video player apparatus and system and method for selecting, requesting, downloading, and playing...
US-8,700,515 Security-to-entity crosswalk
A security-to-entity crosswalk system and method link business entity information to financial security information to provide risk insight about the business...
US-8,700,484 Electronic quantity purchasing system
Disclosed is an electronic quantity purchasing system which is a host computer that a user may access to purchase quantities of goods or services at a locked-in...
US-8,700,429 System and method for managing pedigree information
Methods and systems are provided for managing and transmitting pedigree information. The methods and systems allow a user to access a pedigree information...
US-8,700,202 System for positioning a tool in a work space
A system for assisting in the use by an operator of the operating element of a tool at desired locations at a worksite, includes a stationary control and a...
US-8,700,095 Management method and apparatuses
After a successful authentication in a femto system, a home base station management system is used to send configuration data to a home base station and manage...
US-8,700,010 Communications device with secure data path processing agents
A communications device comprising one or more communication input/output (I/O) ports, at least one of the one or more communication I/O ports being a wide area...
US-8,699,798 Information input output method using a dot pattern
In exemplary embodiments, a dot pattern technique is provided with flexible length of data to be registered and with enhanced security by arranging a dot...
US-8,699,712 Randomization of plain text for GSM SACCH
The present document relates to the transmission of data in a digital cellular telecommunications network. In particular, the present document relates to the...
US-8,699,466 Apparatus and method of controlling seamless handover between heterogeneous networks based on IPv6 over IPv4...
The invention relates to a method and an apparatus for controlling seamless handover between heterogeneous networks based on IPv6 over IPv4 tunneling. When IPv6...
US-8,699,377 System and method for implementing mesh network communications using a mesh network protocol
The following describes data structures, communication protocol formats and process flows for controlling and facilitating secure communications between the...
US-8,699,263 DRAM security erase
In a method of erasing data, a wordline of the DRAM array is set active, and signals develop on bitlines according to flows of charge between memory cells...
US-8,699,087 Image generating apparatus, image processing apparatus, image forming apparatus, and recording medium
Additional image data of an additional image, which is based on first data and second data concerning security of obtained data, is added to image data that is...
US-8,698,630 RFID remote antenna security system
An RFID remote antenna security system for preventing unauthorized reading of RFID cards. The RFID remote antenna security system generally includes a remote...
US-8,698,625 Systems and methods for providing security at a vehicle yard
Systems and methods for providing security at a vehicle yard are provided. A communicator may collect data associated with a plurality of vehicles or trailers...
US-8,698,594 System, device and method for securing a user device component by authenticating the user of a biometric sensor...
A novel system, device and method of validation is provided for sensing a biometric such as a fingerprint, where biometric data corresponding to the biometric...
US-8,695,066 System and method for secure communication between domains
A method for secure communications between first and second domains where a first logical unit calculates timestamps and hashes and transmits web forms to a...
US-8,695,059 Method and system for providing network security services in a multi-tenancy format
An approach is provided for performing cloud based computer network security services. Security policies are established for each of a number of subscribers....
US-8,695,056 Method for information tracking in multiple interdependent dimensions
A method for information flow tracking is provided using, for example, a functional programming language based on lambda calculus, .lamda..sub.I. The method...
US-8,694,801 Method and computer program for securely storing data
A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving...
US-8,694,800 Apparatus and method for securing data on a portable storage device
A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of...
US-8,694,796 Secure data deletion in a database
A data storage application encrypts one or more data pages using a first initialization vector and one or more encryption keys. In addition, the data storage...
US-8,694,788 Security system
A security system includes an interface, a main computer, and an application server. The interface enables a user to access a remote document related to a...
US-8,694,787 Apparatus and method for securing digital data with a security token
A security token includes a wireless interface to communicate with a secured device. A cryptographic module generates cryptographic information, encrypts...
US-8,694,767 Method and system for NAND flash support in an autonomously loaded secure reprogrammable system
A system and method that enables secure system boot up with a restricted central processing unit (CPU). The system includes a memory, a segmenting device, and a...
US-8,694,600 Remote monitoring systems for monitoring medical devices via wireless communication networks
A remote monitoring system for monitoring a plurality of medical devices at a patient care or home care facility. The system includes a device integration...
US-8,694,467 Random number based data integrity verification method and system for distributed cloud storage
A data integrity verification method and system based on a root random number to ensure secure distributed data storage on a public cloud. A new root random...
US-8,694,437 Smartcard-based value transfer
In a value transfer scheme, users are provided with programmable devices, for example, smart cards, capable of carrying data representing at least one available...
US-8,694,418 Integrated trading information processing and transmission system for exempt securities
The present invention provides a system for processing and transmitting trading information incorporating (a) a risk analytic module using the latest market...
US-8,694,408 Methods, systems and securities for assuring a company an opportunity to sell stock after a specified time
Various embodiments of the present invention relate to methods, systems and securities for assuring a company an opportunity to sell stock after a specified...
US-8,694,402 Using accounting data based indexing to create a low volatility portfolio of financial objects
A system, method and computer program product creates an index based on accounting data, or a portfolio of financial objects based on the index where the...
US-8,694,352 System and method for providing handheld field force data gathering automation in a big box retail environment
The present invention provides systems and methods for tracking service representative activity and data. Service representatives are equipped with handheld...
US-8,694,339 System and method for determining loss data based on industry indices
Systems and methods for evaluating basis risk associated with index based security instruments. The systems and methods calculating an element factor for each...
US-8,694,136 Performance monitoring devices and methods
We have disclosed devices and methods for monitoring an individual's performance during a physical activity. The devices may include multiple elements such as a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.