Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,594,081 Systems and methods for resetting a network device
A network device includes a data store with first and second parameters, the first parameter affecting a communication operation of the network device and the...
US-8,594,039 Reference signal multiplexing and resource allocation
A reference signal of a user equipment to which a resource (LB#1) is allocated for a L1/L2 control signal, is allocated a resource (SB#1) that is closer on the...
US-8,593,688 Method for enhancing security printing
A method for enhancing security printing includes determining fields associated with print job variability. Physical security information is entered, and a...
US-8,593,296 System and method for turbine bucket tip shroud deflection measurement
A measurement system measures a gap between a plurality of rotating bucket tips and a stationary shroud surface. The system includes a sensor secured to the...
US-8,593,250 Access control device
The invention relates to an access control device (1) having at least one access barrier element, to which at least one read unit and/or sensor unit for...
US-8,593,172 Secure reconfiguration of programmable logic
An integrated circuit having secure configuration includes configuration memory, programmable logic resources coupled to the configuration memory, programmable...
US-8,590,940 Ubiquitous imaging device based check image capture
A method or corresponding apparatus for remote transmission of a negotiable instrument. In an example embodiment, the process provides a carrier that secures a...
US-8,590,799 Systems, methods, apparatus of a secure RFID record
Systems, methods and apparatus of a secure RFID record are described herein. In one aspect, an apparatus of a RFID wristband comprises three layers: the top...
US-8,590,798 Secure authentication feature
A security tag comprising at least one overt data carrier (10), and at least one covert data carrier (25), the covert data carrier comprising a ring (25) that...
US-8,590,050 Security compliant data storage management
An embodiment of the invention is a program for dynamically managing files to comply with security requirements. In one embodiment, changing security...
US-8,590,035 Network firewall host application identification and authentication
Systems for providing information on network firewall host application identification and authentication include an identifying and transmitting agent on a host...
US-8,590,033 One button security lockdown of a process control network
Proper function and security of a complex network for communicating data within a process control system may be manually or automatically "locked-down" with a...
US-8,590,025 Techniques for accessing a backup system
A technique accesses a backup system. The technique involves receiving a logon command to logon a user to a website of the backup system. The backup system...
US-8,590,011 Variable domain resource data security for data processing systems
The variable domain data access control system and method described herein use the same variable domain to describe a data security model and a variable domain...
US-8,590,004 Method and system for dynamic security using authentication server
Disclosed is a method and system for network access control, including an authentication proxy that authenticates different access-points, retrieves data from...
US-8,589,703 Tamper respondent covering
Disclosed is a tamper respondent covering. The tamper respondent covering has a cover-shaped structure to cover an electronic part which is exposed. This...
US-8,589,671 Security implementation within a browser
Techniques for implementing security within a browser of a data processing system are described herein. According to one embodiment, first data representing a...
US-8,589,667 Booting and configuring a subsystem securely from non-local storage
According to one aspect, a multifunctional computing device having a wireless communications processor (e.g., cellular processor) and an application processor...
US-8,589,544 System and method for providing a script-based collection for devices in a network environment
A method is provided in one example and includes verifying a storage capacity of a network element coupled to an end device over a network connection. The...
US-8,589,333 System and method for information sharing across security boundaries
A system and method for sharing information across security boundaries including a server for sharing information between networks. The method for includes...
US-8,589,307 Ecommerce system with payment data division
In at least one embodiment of an ecommerce system, payment data is divided into proper subsets and distributed among multiple data processing systems, and each...
US-8,589,276 Using accounting data based indexing to create a portfolio of financial objects
A system, method and computer program product creates an index based on accounting based data, as well as a portfolio of financial objects based on the index...
US-8,589,260 System and method for monitoring securities holdings for related entities
Systems, methods, and computer-executable instruction mechanisms such as programming structures for generating signals representing holdings of securities held...
US-8,589,093 Home network system augmentation with remote guidance and local set up and monitoring
A network including powerline adapters ("PLAs") of the HomePlug Alliance variety or similar implementations such as the European in Opera standard provides for...
US-8,589,032 Security system
A security system having an inner door handle of a door for a vehicle. The door is brought into a locked and unlocked state with a locking system. The security...
US-8,588,966 Cabinet system
A cabinet system for securely storing items includes a cabinet housing, a controller, and at least one drawer unit. The cabinet housing has a locking mechanism,...
US-8,588,957 Cutting tool data verification system and method
A method of operating a machining system includes comparing one or more features of a cutting tool to information stored on a data chip secured to a tool holder...
US-8,588,745 Communications system
A cellular communications system is provided in which a user device sends a Service Request to a Mobility Management Entity together with parameter data that...
US-8,588,506 Image algorithms to reject undesired image features
A method for detecting authorized security markers includes capturing an image of a region of interest on a product with a camera; storing image data in a...
US-8,588,424 Communication apparatus and communication method
A communication apparatus includes an encryption key generation unit that generates encryption key information at constant encryption key generation intervals,...
US-8,588,422 Key management to protect encrypted data of an endpoint computing device
Methods and apparatus involve protecting encrypted data of endpoint computing assets by managing decryption keys. The endpoint has both a traditional operating...
US-8,588,418 User level security for an emulated removable mass storage device
A communication session is established, via a wireless communication link, with a mobile communication device that is connected to a computer system. The mobile...
US-8,588,417 Systems and methods for multicast retransmission over a secure wireless LAN
Systems and methods for broadcast and multicast retransmissions within a protected wireless communications system are described. Retransmitted broadcast or...
US-8,588,415 Method for securing a telecommunications terminal which is connected to a terminal user identification module
A method of securing a telecommunication terminal that is connected to a module used to identify a user of the terminal is described. The method includes a step...
US-8,588,410 Simplified secure symmetrical key management
Nodes of a network are each provided with a seed value and a seed identifier. Each seed value has a corresponding unique seed identifier which is maintained...
US-8,588,226 Integrated security switch
An integrated security switch and related method for managing connectivity and security among networks. The integrated security switch includes a security...
US-8,588,189 Wireless internet terminal and packet transmission method for improving quality of service
Disclosed are a terminal of an OFDMA-TDMA wireless Internet system capable of reducing transmission delay time while securing QoS for uplink data and a packet...
US-8,585,556 Exercising apparatus
An apparatus is disclosed for enabling an operator to exercise comprising a frame having a body, a base and a top. A load is positioned on the frame for...
US-8,584,999 Retaining mechanism for data storage device
This invention relates to a retaining mechanism adapted for securing a data storage device having sides formed with a plurality of mounting holes. The retaining...
US-D693,984 Drive-up financial transaction machine
US-8,584,254 Data access reporting platform for secure active monitoring
Technologies pertaining to detecting accesses to monitored regions of memory and transmitting data to a protection system responsive to the detecting are...
US-8,584,250 Methods and apparatus for information assurance in a multiple level security (MLS) combat system
Methods and apparatus are provided for information assurance in a multiple level security (MLS) combat system. A plurality of tasks are executed, where at least...
US-8,584,246 Eliminating false reports of security vulnerabilities when testing computer software
A system for eliminating false reports of security vulnerabilities when testing computer software, including a taint analysis engine configured to identify a...
US-8,584,226 Method and apparatus for geographically regulating inbound and outbound network communications
A system and method for regulating and analyzing inbound and outbound communications in and between computer networks on the basis of geographic security...
US-8,584,215 System and method for securing distributed exporting models in a network environment
A method is provided in one example implementation and includes identifying a plurality of exporters that are authorized to communicate data to a collector on...
US-8,584,199 System and method to apply a packet routing policy to an application session
A security gateway includes packet routing policies, each including a host network address, an application network address, and a forwarding interface. In...
US-8,583,943 Method and system for providing data field encryption and storage
An approach is provided for securely storing and managing sensitive data. A system and method are provided that include a central device that receives an actual...
US-8,583,928 Portable security transaction protocol
A technique for providing message authenticity includes accepting transaction information, accepting a first data item used for authenticating an originating...
US-8,583,914 Reducing processing load in proxies for secure communications
In one embodiment, a method for providing secure communications using a proxy is provided. The proxy negotiates with a client and a server to determine a...
US-8,583,880 Method for secure data reading and data handling system
A method for secure data reading and a data handling system is provided. The method protects the data reading from fault attacks by repeating read request in an...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.