Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,677,498 Apparatus and method of managing security data
An apparatus and method are provided for securely managing security data between a host device and a secure multimedia card. A host device includes an access...
US-8,677,490 Method for inferring maliciousness of email and detecting a virus pattern
Provided is a method of distinguishing an abnormal e-mail and determining whether an e-mail is affected with a virus. The method includes the steps of: decoding...
US-8,677,476 Providing remotely defined security data to a local application extension
Systems and methods, including computer software adapted to perform certain operations, can be implemented for providing remotely defined security data to an...
US-8,677,475 Security in networks
A communication system may be configured to provide multiple levels of security for a communication link between a first node and a second node of a network....
US-8,677,472 Multi-point collection of behavioral data relating to a virtualized browsing session with a secure server
A method of operating a VM server (VMS) is described, including (a) executing a VM instance (VMI) at the VMS, the VMI having a remote display within a terminal...
US-8,677,461 Method to provide chip based security for I/O packets in an array using dynamic topology
An apparatus comprising a controller circuit and an array. The controller circuit may be configured to read/write data in response to one or more input/output...
US-8,677,459 Secure zero-touch provisioning of remote management controller
Embodiments enable secure zero-touch remote provisioning/management of a computer system. A computer system is shipped to end customers with its remote...
US-8,677,148 Systems and methods for securing data
Systems and methods are provided for securing data. A processing device receives a data set and identifies a first subset of data from a first dimension of a...
US-8,677,141 Enhanced security and performance of web applications
A client-side enforcement mechanism may allow application security policies to be specified at a server in a programmatic manner. Servers may specify security...
US-8,677,131 Method of securing data in 2D bar codes using SSL
Methods and apparatus authenticate a printed document associated with a source entity. The printed document includes a two-dimensional code (2-D code) that...
US-8,677,127 Method and apparatus for secure setup of an encrypted connection between two communication devices
An electronic device includes a first connection interface and a second connection interface. The first connection interface is operable to exchange security...
US-8,677,124 Method and device for securing data transfers
The method of securing data transfer comprises: a step of attempting to transmit a document from a document sender to at least one document recipient, by...
US-8,677,123 Method for accelerating security and management operations on data segments
A method for improving the performance of data storage and transmission systems involves applying a transformation to one or a plurality of aligned data...
US-8,677,122 Method for processing a secure system manager
Method and apparatus for secure processing. The method includes detecting communication among secure and non-secure data entities, prohibiting execution of...
US-8,677,119 Remote data viewer
A medical image and data application service provider system provides a way of remotely viewing and manipulating medical images and data for diagnostic and...
US-8,677,092 Secure memory devices and methods of managing secure memory devices
A computing device and method for managing security of a memory or storage device without the need for administer privileges. To access the secure memory, a...
US-8,677,001 Streaming transmission method system, data processing apparatus and computer readable storage medium for making...
A data processing apparatus edits an actual data portion excluding a header from data transmitted by streaming transmission from a first information processing...
US-8,676,992 Systems and methods for cooperative data exchange
Various systems and methods for financial analysis are provided. A system is provided comprising a first node comprising a public facing data store in...
US-8,676,988 Systems and methods for secure data exchange in a distributed collaborative application
A collaborative communication system that includes a plurality of endpoints and interconnecting nodes configured to communicate via messages over...
US-8,676,916 Method and apparatus for connection to virtual private networks for secure transactions
A system and method are provided for use in establishing secure end-to-end communication links over a VPN gateway via a network interface unit. Illustrative...
US-8,676,884 Security configuration
An example embodiment of the present invention provides an apparatus including at least one processor; and at least one memory including executable...
US-8,676,694 Secure and efficient payment processing system
A method of processing commercial transactions carried out over the Internet (50) between account holders (30) and participating merchants (20) includes...
US-8,676,689 Financial status measurement and management tool
A system, method and software tool to measure and manage financial status. The tool produces a spreadsheet that summarizes the position of an individual or...
US-8,676,603 System and method for documenting patient procedures
The local surveillance sub-system recognizes that a patient medical procedure has or will soon commence by sensing the presence of a healthcare professional in...
US-8,676,402 Sentry system with wireless interface for a docked boat
An electric sentry system provides utilities for the welfare of a docked boat. The sentry system serves as boat and lift control, and security, system that has...
US-8,676,122 Secure satellite modem for personal digital assistant method and apparatus
A system for enabling communication utilizing a satellite communications network includes a mobile communication device and a satellite modem apparatus. A text...
US-8,676,046 Fingerprint scanning systems and methods
Embodiments relate to methods and systems for gathering, archiving, transmitting, and processing forensic and latent fingerprints. An integrated forensic...
US-8,675,956 Method and system for verifying making time of a file by computer
The present invention is providing a method and a system for verifying making time of a file by computer. The method comprises: calling TWAIN protocol...
US-8,675,873 Method of making secure a link between a data terminal and a data processing local area network, and a data...
This method makes secure a link, for example a radio link, between a data terminal (PDA2) and a data processing local area network (WLAN2) that is coupled to a...
US-8,675,863 Passive system for recovering cryptography keys
Modern cellular wireless communications providers strive to keep their network and subscribers secure through various means. The identity of the subscriber may...
US-8,675,837 Method and apparatus for the secure storage of audio signals
In one embodiment, a method, system and apparatus for recording audio is provided so that the recording can be authenticated. The system may be implemented as a...
US-8,675,825 Systems and methods for secure recording in a customer center environment
Systems and methods for secure recording in a customer center environment are provided. The system receives data related to a communication at a media...
US-8,675,824 Systems and methods for secure recording in a customer center environment
Systems and methods for secure recording in a customer center environment are provided. The system receives data related to a communication at a media...
US-8,674,835 Identification band
Updateable, customizable identification bands. The identification band may include a band having an opening therein and at least one transparent surface. An...
US-8,674,831 Security systems with adaptive subsystems networked through barrier modules and armored building modules
Security systems may include sensing, networked communications, stealth, alarms, and countermeasures, any or all of which may adapt to threats. These systems...
US-8,672,709 High density jack
The present disclosure provides for electrical connectors or jack assemblies/housings for use in voice/data communication systems. More particularly, the...
US-8,672,221 System and method of securely delivering and verifying a mobile boarding pass
A system and method of securely delivering and verifying a mobile boarding pass which validates the mobile boarding pass. An example method includes receiving...
US-8,671,455 Systems and methods for detecting unintentional information disclosure
A method for detecting unintentional information disclosure. The method may include: 1) identifying at least one data access Application Programming Interface...
US-8,671,282 Digital data authentication and security system
The present invention includes a system and process for monitoring the transmission of secured, marked digital files. A cryptographic token inertly embedded in...
US-8,671,279 Incremental secure backup and restore of user settings and data
Methods and apparatuses for performing secure incremental backup and restore operations are disclosed.
US-8,671,275 Mechanism to handle events in a machine with isolated execution
A platform and method for secure handling of events in an isolated environment. A processor executing in isolated execution "IsoX" mode may leak data when an...
US-8,670,772 Communications base station with decision function for distributing traffic across multiple backhauls
A communication station, such as a base station or access point, has multiple backhaul options and distributes backhaul data between the available backhaul...
US-8,670,600 Methods and systems for image fingerprinting
The present invention provides methods and systems to protect an organization's secure image information from unauthorized disclosure. In one embodiment,...
US-8,670,599 Fingerprint authentication apparatus having a plurality of fingerprint sensors and method for same
A fingerprint authentication apparatus and method which processes fingerprint data input through a plurality of fingerprint sensors and uses the processed...
US-8,670,566 System and method for exchanging encryption keys between a mobile device and a peripheral output device
Systems and methods for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless...
US-8,670,558 Cryptographic processing apparatus, cryptographic processing method, and computer program
To realize a common-key block cipher process configuration with increased difficulty of key analysis and improved security. In a configuration for storing in a...
US-8,670,557 Cryptographic system with modular randomization of exponentiation
Systems and/or methods that facilitate secure electronic communication of data are presented. A cryptographic component facilitates securing data associated...
US-8,670,493 Systems and/or methods of increased privacy wireless communications
Systems, methods and/or mobile devices are provided that enable a level of privacy/security in wireless communications to be increased responsive to a content...
US-8,670,019 System and method for providing enhanced eye gaze in a video conferencing environment
An apparatus is provided in one example and includes first and second cameras configured to capture image data associated with an end user involved in a video...
US-8,667,610 Portable computer and charging method thereof
A portable computer and a charging method thereof are provided. The portable computer includes a charge integrated circuit (IC), a basic input/output system...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.