Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,666,902 System and method for accessing read only ANSI tables in an electricity meter
A utility meter implementing the ANSI C12.19 standard is able to bypass security processing using Decade4 security tables for a single data access operation....
US-8,666,893 Electronic funds transfer authentication system
Embodiments of the present invention are directed to an electronic funds transfer authentication system and method to facilitate the verification and...
US-8,666,395 System and method for speeding call originations to a variety of devices using intelligent predictive...
A mobile application gateway configured to interconnect mobile communication devices on a cellular network with an enterprise network is provided. The mobile...
US-8,666,074 Optical fiber secure communication apparatus and data encryption method therefor
An optical fiber secure communication apparatus and a data encryption method therefor are provided. The apparatus comprises a transmitter and a receiver being...
US-8,665,868 Apparatus and method for enhancing forwarding and classification of network traffic with prioritized matching...
An apparatus is described that performs prioritized matching through processing of network traffic in accordance with provisioned rules and policies. The...
US-8,665,848 Systems and methods of combined Bluetooth and WLAN signaling
Disclosed herein are systems and methods of combined Bluetooth and WLAN signaling. Such systems and methods may use a Bluetooth connection to signal WLAN...
US-8,665,330 Event-triggered security surveillance and control system, event-triggered security surveillance and control...
The present invention discloses a security surveillance system and a method thereof, a computer readable storage media and a computer program product. The...
US-8,665,084 Security system and method
A security control apparatus, system and method are provided. The security control apparatus includes a wireless communication element that supports a plurality...
US-8,665,083 System and method for providing communications for container security
A system for providing communications for container security is provided. The system includes a sensing system for monitoring the contents of the container; a...
US-8,665,064 Wireless security control system
A security control system includes a remote access control system to receive wireless information from a central access control system. The remote access...
US-8,661,554 Controlling program, image forming apparatus and print controlling method
There is described an image forming apparatus, which makes it possible to securely prevent the secret information from leaking out to unauthorized personnel....
US-8,661,540 Method and apparatus for secure credential entry without physical entry
A method and apparatus are disclosed wherein a portable memory storage device is provided for interfacing with a communications port of the computer system....
US-8,661,536 Side channel attack analysis
A method described herein includes acts of executing a cryptographic function over input data utilizing a processor on a computing device and generating a data...
US-8,661,535 Method for making secure the execution of an intermediate language software code in a portable device
A method for executing an application compiled in intermediate code on a portable digital appliance equipped with a virtual executing machine for interpreting...
US-8,661,531 System and method for secure control of resources of wireless mobile communication devices
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
US-8,661,520 Systems and methods for identification and authentication of a user
The present invention generally relates to a computer security system for use in the identification and authentication of a user prior to an on-line...
US-8,661,507 Managed peer-to-peer applications, systems and methods for distributed data access and storage
Applications, systems and methods for securely and remotely operating a remote computer from a local computer over a network while providing seamless,...
US-8,661,504 Secure social web orchestration via a security model
A method includes receiving, by a first computer, input from a first user. The method further includes creating, by the first computer, a hierarchical class...
US-8,661,498 Secure and scalable detection of preselected data embedded in electronically transmitted messages
A method and apparatus for detecting preselected data embedded in electronically transmitted messages is described. In one embodiment, the method comprises...
US-8,661,265 Processor modifications to increase computer system security
A method, an x86 processor and a computer system for processing more securely. More specifically, embodiments provide an effective and efficient mechanism for...
US-8,661,263 Meta-complete data storage
The invention described herein generally relates to systems and methods of securely storing data so that the data contains information about the data and/or the...
US-8,661,259 Deduplicated and encrypted backups
A system and method for efficiently creating deduplicated and encrypted data across a plurality of computers allows local encryption and remote storage of...
US-8,661,251 Method and device for creating a group signature and related method and device for verifying a group signature
A method for creating a group signature of a message to be implemented by a member of a group in a system, the system including a trust authority, the group...
US-8,661,249 Health keyset management
Systems and methodologies that facilitate delegation of keyset management to a platform presenting a centralized health-related data repository are provided....
US-8,661,248 Method, apparatus, and system for sending and receiving security policy of multicast sessions
A method, apparatus, and system for sending and receiving a security policy of multicast sessions are provided. The method for sending the security policy of...
US-8,661,195 Reallocation of tape drive resources associated with a secure data erase process
A method according to one embodiment includes determining whether to reallocate one or more of a plurality of tape drives that are presently allocated for a...
US-8,661,148 System and method for enabling industry based channels in an IP marketplace
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
US-8,661,062 Managing analysis of activity data
A method is used in managing analysis of activity data. Activity data is analyzed for a security investigation by using a content bundle. The content bundle...
US-8,660,269 Method and system for securing data utilizing redundant secure key storage
A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations,...
US-8,660,266 Method of delivering direct proof private keys to devices using an on-line service
Delivering a Direct Proof private key to a device installed in a client computer system in the field may be accomplished in a secure manner without requiring...
US-8,660,078 Data radio bearer (DRB) enhancements for small data transmissions apparatus, systems, and methods
A method of transmitting data packets with a wireless communication device includes requesting a preconfigured data radio bearer (DRB) from a base station...
US-8,659,890 eUSB duplication system
An eUSB duplication system allows for digital data copy from a master eUSB storage device to target eUSB storage devices and includes a duplicator chassis with...
US-8,659,650 Portable apparatus for biometric and biographic data collection, storage and delivery, and method therefor
The present disclosure relates to a method and apparatus for biometric and biographic data capture. The apparatus includes a main unit, a display monitor having...
US-8,659,433 Locking mechanism based on unnatural movement of head-mounted display
A wearable computer determines unnatural movements of a head-mounted display (HMD) and triggers a locking mechanism. In one embodiment, the wearable computer...
US-8,659,389 Secure inventory control systems and methods for high-value goods
Embodiments of the present invention include methods and systems for tracking and monitoring high-value goods by scanning RFID tags associated with the goods. A...
US-8,657,196 Systems and methods of capturing security images in an automated data reader
The present disclosure is directed to systems and methods for detecting and handling exception situations in an automated data reading system. In one...
US-8,656,488 Method and apparatus for securing a computer network by multi-layer protocol scanning
In one embodiment, a network security appliance includes a logic circuit, a network processing unit, and a general purpose processor to protect a computer...
US-8,656,484 System and method for mutually authenticated cryptographic key exchange using matrices
Two parties can establish a cryptographic key using a matrix based key exchange protocol, for secure communications without any prior distribution of secret...
US-8,656,482 Secure communication using a trusted virtual machine
A client system, such as a computer or a smartphone, securely exchanges sensitive information with a remote service provider computer system such as a bank or...
US-8,656,478 String based detection of proxy communications
Systems, methods and apparatus for a distributed security system that detects proxied resource requests. The system can search data communications, such as HTTP...
US-8,656,450 Security policy switching device, security policy management system, and storage medium
A security policy switching device includes a policy information storage that stores policy setting information and identification information of a policy in...
US-8,656,446 System and method for internet access to a personal television service
A communication system and a family of methods for remote access to personal television service are disclosed. According to this invention, a remote personal TV...
US-8,656,191 Secure system-on-chip
A secure system-on-chip for processing data, the system-on-chip comprising at least a central processing unit (CPU), an input and an output channel, an...
US-8,656,189 Systems and methods for secure multi-tenant data storage
Systems and methods are provided for transmitting data for secure storage. For each of two or more data sets, a plurality of shares are generated containing a...
US-8,656,187 Dispersed storage secure data decoding
A method operating on a computer begins by generating a read command to read at least some of a plurality of data slices from a dispersed storage network. The...
US-8,656,167 Systems and methods for secure workgroup management and communication
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser may split...
US-8,656,162 Aeronautical security management over broadband air/ground network
A method to facilitate securing of air-to-ground communications for an aircraft is provided. The method includes receiving security management information at...
US-8,656,152 Image forming apparatus, host apparatus and encryption method of job object document thereof
An image forming apparatus, a host apparatus, and an encryption method for print data, the method of encrypting the print data of the host apparatus connected...
US-8,656,095 Digital forensic acquisition kit and methods of use thereof
Disclosed are compositions, methods, and kits, for issuing and conducting automated imaging and preservation for obtaining digital forensic data from active...
US-8,656,035 System and method for enabling user requested channels in an IP marketplace
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.