Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,692,884 Apparatus and method for assessing visual acuity
Disclosed is an apparatus and associated method an apparatus and method for assessing visual acuity of an image captured by a digital security camera. The user...
US-8,692,695 Methods for encoding and decoding data
The transmission of broadcast data, such as financial data and news feeds, is accelerated over a communication channel using data compression and decompression...
US-8,692,675 Vibratory feedback systems and methods
Vibratory feedback systems and methods are disclosed. A vibratory feedback system includes a shoe adapted to be secured to a user's foot, a plurality of force...
US-8,692,669 Constant optical output illumination system
The present invention is an illuminator for CCTV surveillance and security applications that maintains constant optical output from an array of LEDs by...
US-8,692,665 Methods, systems, and products for security services
Methods, systems, and products notify of alarms in security systems. Sensor data is received from an alarm sensor, and an alarm condition is determined by an...
US-8,690,773 Security enabled medical screening device
Embodiments of the invention pertain to networked kiosks capable of providing enhanced health and/or entertainment and/or advertising information. In an...
US-8,690,211 Holding aid for a personal, hand-held, tablet-shaped device and methods of use
A securement device to make it much easier for a user to securely hold onto a personal, hand-held, tablet-shaped device such as an electronic reader, a tablet...
US-8,690,056 Secure payment card transactions
Payment card transactions at a point of sale (POS) are secured in certain embodiments by intercepting, with a POS security layer installed on a POS terminal,...
US-8,690,054 System and method for chip-enabled card transaction processing and alert communication
A system, method and computer program product is capable of proactive assessment of transactions and communication of alerts based on pre-set rules to increase...
US-8,689,354 Method and apparatus for accessing secure data in a dispersed storage system
A method begins by a processing module receiving, from a user device, a request to access secure data, wherein the request includes a user identification code...
US-8,689,343 System and method for securely transmitting video data
Exemplary embodiments provide a system and method for securely transmitting video data to an electronic display. The video data may be transmitted using a wired...
US-8,689,338 Secure terminal, a routine and a method of protecting a secret key
The method of protecting a secret key from being read by a non-secure software application, comprises a step (94) of recording the secret key as a routine...
US-8,689,336 Tiered exposure model for event correlation
A method for real-time threat monitoring includes identifying two or more real time vulnerabilities, each associated with one or more objects of an enterprise,...
US-8,689,320 Image forming apparatus with hard disk drive securely formatted
If the validity of authorization information read from a USB key is verified (S1 to S4), use-information that indicates "used" is written in both of the...
US-8,689,319 Network security system
A method and system for preventing an unacceptable data packet directed at a computing device on a first network and sent from a client device. The method...
US-8,689,318 Trusted computing entities
The present invention relates to trust in computing platforms and the like. In particular, embodiments of the invention provide a trusted computing entity (64),...
US-8,689,313 Real time streaming data communications through a security device
An exemplary method of the invention is for connecting a plurality of clients to one another over a computer network for communication of real-time streaming...
US-8,689,304 Multiple independent authentications for enhanced security
A system and associated method for providing enhanced site access security by use of multiple authentications from independent sources. A security enhanced user...
US-8,689,285 Rule-based derived-group security data management
Methods for rule-based group security data management and corresponding systems and computer-readable mediums. A method includes receiving a complex rule set...
US-8,689,283 Security access control method and system for wired local area network
The present invention relates to a security access control method and system for wired local area network, the method includes the following steps: 1) a...
US-8,689,278 Web service provision system, server device, and method
A web application server includes a user information management unit that manages user IDs and attributes such that each of the user IDs is associated with...
US-8,689,213 Methods and systems for communicating between trusted and non-trusted virtual machines
The methods and systems described herein provide for establishing a secure communication channel between a non-trusted virtual machine and a trusted virtual...
US-8,689,015 Portable secure data files
A portable secure data file includes an encrypted data portion and a metadata portion. When a request associated with a current user of a device to access a...
US-8,689,009 Authentication-secured access to a data carrier comprising a mass storage device and chip
The invention provides a method for accessing the mass memory of a data carrier with a mass memory and a chip. The data carrier has been or is personalized by...
US-8,688,989 Receiver non-repudiation via a secure device
Techniques for assuring a receiver's non repudiation of a communication are provided via cooperation with a secure device. A secure device operates within a...
US-8,688,988 Transaction auditing for data security devices
Data security devices are provided which store user data and interact with terminal devices to provide information about the stored user data. Security device...
US-8,688,987 Secure key distribution with general purpose mobile device
One embodiment is directed to a method for managing cryptographic information. The method includes initiating cryptographic information loading application on a...
US-8,688,985 Data security method and apparatus using a characteristic preserving encryption
Provided is a data security method and apparatus using a characteristic preserving encryption. The data security apparatus includes an interface communicating...
US-8,688,802 System, method and computer program product for serving an application from a custom subdomain
In accordance with embodiments, there are provided mechanisms and methods for serving an application from a custom subdomain. These mechanisms and methods for...
US-8,688,797 Managed peer-to-peer applications, systems and methods for distributed data access and storage
Applications, systems and methods for efficiently accessing and controlling data of devices among multiple computers over a network. Communication of data over...
US-8,688,590 System and method to strengthen advertiser and consumer affinity
A system and method is provided for an on-demand advertising information vault so that advertisers may establish accounts for distributing advertisements...
US-8,688,558 System and method for analyzing data associated with statistical arbitrage
Providing computer-based systems and methods for analyzing historical performance of financial securities and identifying trades in those securities based on...
US-8,688,209 Device for ambulatory monitoring of brain activity
A device for ambulatory monitoring of brain activity includes a patch secured to a head of a monitoring subject and an electrode secured to the head of the...
US-8,688,080 Visual voicemail client authentication
Visual voicemail enables a user to view a list of voicemail messages and caller information, and select which messages to hear. Currently, a handset accesses...
US-8,688,041 Methods and apparatus for secure, portable, wireless and multi-hop data networking
A mobile network solution provides secure and portable wireless networking service to mobile users with devices equipped with wireless network interfaces. The...
US-8,687,944 Frame indexing technique to improve personal video recording functionality and security of transmitted video
Systems and methods of efficiently indexing a digitized video stream are presented. In one embodiment, the method comprises receiving a coded video stream...
US-8,687,810 Chaotic cipher system and method for secure communication
The present invention provides a method for a data encryption device to perform network communications, the method comprising obtaining an indexed array of...
US-8,687,805 Context-aware based cryptography
A method, of providing a key pair for secure transmission of data between at least two applications, includes receiving context information relating to the...
US-8,687,804 Separating control and data operations to support secured data transfers
For a data transfer, security is negotiated via a control channel operating in accordance with a first protocol. The data is transmitted responsive to the...
US-8,687,802 Method and system for accelerating the deterministic enciphering of data in a small domain
Conventional block ciphers that traffic in 128-bit block sizes are ill-suited for operating in small domains like credit card numbers. Some embodiments relate...
US-8,687,799 Data processing circuit and control method therefor
When an encryption processing circuit encrypts data, a current flows in the encryption processing circuit. A noise current generated by a noise generation...
US-8,687,553 Multi-tier wireless home mesh network with a secure network discovery protocol
An apparatus and method for a multi-tier wireless home mesh network is described. The method may include formation of an infrastructure-less wireless home mesh...
US-8,687,536 Method and apparatus to create multicast groups based on proximity
Devices and methods use close range communication links, such as near field communication (NFC) protocol links, to enable users to authenticate mobile devices...
US-8,687,475 Optical pickup device, optical pickup unit and data streamer apparatus
In one embodiment, an optical pickup device includes a fixed portion 100, a movable portion 11, first and second elastic supporting members 12a and 12b, one and...
US-8,687,242 Image processing apparatus for obtaining image data comprising a code generation section, an encryption...
In a digital multi-function peripheral, a QR code generation section generates image data of a QR code on the basis of first data for security of obtained image...
US-8,685,759 E-chuck with automated clamped force adjustment and calibration
The present disclosure describes a semiconductor manufacturing apparatus. The apparatus includes a processing chamber designed to perform a process to a wafer;...
US-8,685,110 System and method for securing a computer system
A secured computer system includes a communication interface and an intrusion detection module. The computer system may be portable and configured for wireless...
US-8,684,159 Method and apparatus for varying coin-processing machine receptacle limits
In one aspect, a method for optimizing a usable volume of a coin receptacle associated with a coin-processing device includes receiving a plurality of coins in...
US-8,683,602 System and method for multilevel secure object management
A system and method for secure transport of data, the method comprising: sharing of key information with a key distributor, wherein the key information is for...
US-8,683,600 Print policy commands
Embodiments of converting or translating electronic data from a first format to a second format with an applied electronic data security policy in mechanisms...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.