Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,707,406 Always-on virtual private network access
An application processor is electrically and logically decoupled from a wireless data network module so that it may go to sleep independently. A security...
US-8,707,392 Systems and methods for disease management
A computer-implemented diabetes management system is provided that supports enhanced security between a diabetes care manager in data communication with a...
US-8,707,387 Secure network computing
A host based security system for a computer network includes in communication with the network a credential host that is operative in concert with a local...
US-8,707,383 Computer workload management with security policy enforcement
A computer implemented method, data processing system, and computer program product for managing computer workloads with security policy enforcement. When a...
US-8,707,090 Storage system
In a storage system which supports a redundant disk configuration, while securing fault tolerance, a longer drive access time as well as a drop in I/O...
US-8,707,056 Security provision for a subject image displayed in a non-secure domain
A data processing device is provided with a processor core 8 that can operate in either a secure domain or a non-secure domain. Data stored within a secure...
US-8,707,054 Establishing a secure memory path in a unitary memory architecture
A functional unit of a device is associated with a secret. Data stored in a memory location of the device is encrypted using the secret. The memory location of...
US-8,707,052 Cryptographic device with resistance to differential power analysis and other external monitoring attacks
Techniques usable by devices to encrypt and decrypt sensitive data to in a manner that provides security from external monitoring attacks. The encrypting device...
US-8,707,051 Method and system for embedded high performance reconfigurable firmware cipher
A firmware cipher component is provided which can be configured and programmed to efficiently implement a broad range of cryptographic ciphers while...
US-8,707,040 Establishing secure communication between an implantable medical device and an external device
Establishing secure communication between an implantable medical device and an external device includes: accessing, at the implantable medical device,...
US-8,707,023 Secure transfer of business data to a hosted system
A system and method for uploading data from a customer system to a hosted system is disclosed. A stub is integrated with a firewall between the customer system...
US-8,706,893 Multimedia communication control unit as a secure device for multimedia communication between LAN users and...
A system and method for providing multimedia communication between a firewall protected, LAN based endpoint and an endpoint that is external to the LAN. A...
US-8,706,817 Sender managed message privacy
Embodiments of the present invention address deficiencies of the art in respect to securing the privacy of messages and provide a method, system and computer...
US-8,706,800 Client device systems and methods for providing secure access to application services and associated client...
An extensible servicing hosting platform is provided that supports the design, build and concurrent deployment of multiple web accessible services on a services...
US-8,706,630 System and method for securely authorizing and distributing stored-value card data
A computerized system and method for securely authorizing and distributing stored-value card data over a communications network is provided. The method allows...
US-8,706,610 Systems and methods for electronically initiating and executing securities lending transactions
Systems and methods are provided for conducting securities lending transactions using an electronic trading platform. In accordance with an implementation, the...
US-8,706,608 Dynamic aggressive/passive pegged trading
A computer-implemented system and method for executing trades of financial securities according to a combination passive/aggressive trading strategy that...
US-8,706,593 System for access to and exchange of market data
A system and method for real-time access to information and for information exchange regarding securities markets. The system allows access to securities data...
US-8,706,251 Secure long-range telemetry for implantable medical device
A method and system for enabling secure communications between an implantable medical device (IMD) and an external device (ED) over a telemetry channel. A...
US-8,705,873 Secure item identification and authentication system and method based on unclonable features
The present invention is a method and apparatus for protection of various items against counterfeiting using physical unclonable features of item microstructure...
US-8,705,823 Software product for breast examination result mapping, recording, comparing, and/or tracking
A breast examination system is disclosed that facilitates normalized quantitative comparison of results from multiple examinations performed under differing...
US-8,705,805 Secure portable token and systems and methods for identification and authentication of the same
A portable token and systems and methods for identification and authentication of the same are disclosed. The portable token may be utilized for a variety of...
US-8,705,791 Method and system for utilizing GPS information to secure digital media
A device such as a set-top-box, digital TV, DVD player, multi-media player, cellular telephone or digital cinema player that may handle data such as multimedia...
US-8,705,746 Data security in an off-premise environment
A system that enables a cloud-based data repository to function as a secure `drop-box` for data that corresponds to a user is provided. The `drop box` can be...
US-8,705,743 Communication security
The current IMS security architecture only protects data transmitted in the IMS control plane. Embodiments are described which provide end-to-end encryption of...
US-8,705,741 Subchannel security at the optical layer
The present invention includes various novel techniques, apparatus, and systems for optical WDM communications that involve dynamically modifying certain...
US-8,705,738 Selective security termination in next generation mobile networks
Systems and/or methods of selectively terminating security in mobile networks are presented. User equipment (UE) can specify cipher termination location...
US-8,705,735 Implicit certificate scheme
A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. The trusted...
US-8,705,733 Unique identifier per chip for digital audio/video data encryption/decryption in personal video recorders
The invention provides techniques to implement unique identifier for an integrated chip and how this ID can be employed to enhance the security of content in...
US-8,705,732 Generating a session key for authentication and secure data transfer
A device for generating a session key which is known to a first communication partner and a second communication partner, for the first communication partner,...
US-8,705,348 Use of metadata for time based anti-replay
A system and method for facilitating anti-replay protection with multi-sender traffic is disclosed. The system employs time-based anti-replay protection wherein...
US-8,705,200 Magazine latch for a storage library
Embodiments include systems and methods for securing a magazine in a housing using a latching system. Embodiments operate in context of a storage library having...
US-8,705,075 Image processing device having erase control
An image processing device comprises an image data input means 2, an image data storage means 12 for storing the image data being input, an image data...
US-8,705,064 Broadcast secure printing system
A secure printing method includes providing a user terminal with a user interface. The user terminal and interface enable a user to select a secure printing...
US-8,704,873 Receiving stream data which may be used to implement both two-dimensional display and three-dimensional display
There is provided a stream receiving device including an information receiving unit for receiving stream control information for a 3D stream to be distributed...
US-8,704,821 System and method for managing virtual world environments based upon existing physical environments
In general, the present invention provides a system and method for creating, managing and utilizing virtual worlds for enhanced management of an Information...
US-8,702,812 Remote disablement of a computer system
Methods and arrangements for ensuring that, when a computer system is stolen or otherwise misplaced, the system is rendered unusable (i.e., locked down)....
US-8,702,033 Pilotless aircraft for commercial and military use
An aircraft control system is described having an Automatic Monitoring System ("AMS"), an Aircraft Parameter Management Computer ("APC"), and a Flight...
US-8,702,007 On card display of data from secured chip
A retrofitted credit card including a certified smart card chip, a display and retrofitted emulation circuitry operative to enable the certified smart card chip...
US-8,701,205 Validation and/or authentication of a device for communication with network
A device may include a trusted component. The trusted component may be verified by a trusted third party and may have a certificate of verification stored...
US-8,701,173 System and method for providing silent sign on across distributed applications
A system and method is provided for a distributed computing system where a user can login to a client computer and access a number of different applications...
US-8,701,170 System for secure enrollment and secure verification of network users by a centralized identification service
A system and method for providing, as a service over a computer network (especially a packet-switched computer network) to a body of merchants connected to the...
US-8,701,167 Method and system for fast access to advanced visualization of medical scans using a dedicated web portal
A system for viewing at a client device a series of three-dimensional virtual views over the Internet of a volume visualization dataset contained on centralized...
US-8,701,166 Secure authentication
Apparatus, systems, and methods provide a mechanism to enhance the security of operating client devices with systems controlling secure data. Various...
US-8,701,161 Systems and methods for detecting network intrusion devices
An optical communication system has a transmitter that generates an optical signal containing payload data and security data. The transmitter double modulates...
US-8,700,920 System and method for content protection on a computing device
Systems and methods for handling user interface field data. A system and method can be configured to receive input which indicates that the mobile device is to...
US-8,700,917 Information processing apparatus, information recording medium manufacturing apparatus, and information...
A configuration is provided for a process in which appropriate content code corresponding to apparatuses and applications of various model types and versions is...
US-8,700,908 System and method for managing secure information within a hybrid portable computing device
A method and system for managing secure information within a portable computing device are disclosed. The portable computing device includes a program module...
US-8,700,906 Secure computing in multi-tenant data centers
This document describes techniques and apparatuses for secure computing in multi-tenant data centers. These techniques permit a client to delegate computation...
US-8,700,901 Facilitating secure online transactions
A method and system for mutually authenticating an identity and a server is provided in accordance with an aspect of the present invention. The method commences...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.