Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,590,050 Security compliant data storage management
An embodiment of the invention is a program for dynamically managing files to comply with security requirements. In one embodiment, changing security...
US-8,590,035 Network firewall host application identification and authentication
Systems for providing information on network firewall host application identification and authentication include an identifying and transmitting agent on a host...
US-8,590,033 One button security lockdown of a process control network
Proper function and security of a complex network for communicating data within a process control system may be manually or automatically "locked-down" with a...
US-8,590,025 Techniques for accessing a backup system
A technique accesses a backup system. The technique involves receiving a logon command to logon a user to a website of the backup system. The backup system...
US-8,590,011 Variable domain resource data security for data processing systems
The variable domain data access control system and method described herein use the same variable domain to describe a data security model and a variable domain...
US-8,590,004 Method and system for dynamic security using authentication server
Disclosed is a method and system for network access control, including an authentication proxy that authenticates different access-points, retrieves data from...
US-8,589,703 Tamper respondent covering
Disclosed is a tamper respondent covering. The tamper respondent covering has a cover-shaped structure to cover an electronic part which is exposed. This...
US-8,589,671 Security implementation within a browser
Techniques for implementing security within a browser of a data processing system are described herein. According to one embodiment, first data representing a...
US-8,589,667 Booting and configuring a subsystem securely from non-local storage
According to one aspect, a multifunctional computing device having a wireless communications processor (e.g., cellular processor) and an application processor...
US-8,589,544 System and method for providing a script-based collection for devices in a network environment
A method is provided in one example and includes verifying a storage capacity of a network element coupled to an end device over a network connection. The...
US-8,589,333 System and method for information sharing across security boundaries
A system and method for sharing information across security boundaries including a server for sharing information between networks. The method for includes...
US-8,589,307 Ecommerce system with payment data division
In at least one embodiment of an ecommerce system, payment data is divided into proper subsets and distributed among multiple data processing systems, and each...
US-8,589,276 Using accounting data based indexing to create a portfolio of financial objects
A system, method and computer program product creates an index based on accounting based data, as well as a portfolio of financial objects based on the index...
US-8,589,260 System and method for monitoring securities holdings for related entities
Systems, methods, and computer-executable instruction mechanisms such as programming structures for generating signals representing holdings of securities held...
US-8,589,093 Home network system augmentation with remote guidance and local set up and monitoring
A network including powerline adapters ("PLAs") of the HomePlug Alliance variety or similar implementations such as the European in Opera standard provides for...
US-8,589,032 Security system
A security system having an inner door handle of a door for a vehicle. The door is brought into a locked and unlocked state with a locking system. The security...
US-8,588,966 Cabinet system
A cabinet system for securely storing items includes a cabinet housing, a controller, and at least one drawer unit. The cabinet housing has a locking mechanism,...
US-8,588,957 Cutting tool data verification system and method
A method of operating a machining system includes comparing one or more features of a cutting tool to information stored on a data chip secured to a tool holder...
US-8,588,745 Communications system
A cellular communications system is provided in which a user device sends a Service Request to a Mobility Management Entity together with parameter data that...
US-8,588,506 Image algorithms to reject undesired image features
A method for detecting authorized security markers includes capturing an image of a region of interest on a product with a camera; storing image data in a...
US-8,588,424 Communication apparatus and communication method
A communication apparatus includes an encryption key generation unit that generates encryption key information at constant encryption key generation intervals,...
US-8,588,422 Key management to protect encrypted data of an endpoint computing device
Methods and apparatus involve protecting encrypted data of endpoint computing assets by managing decryption keys. The endpoint has both a traditional operating...
US-8,588,418 User level security for an emulated removable mass storage device
A communication session is established, via a wireless communication link, with a mobile communication device that is connected to a computer system. The mobile...
US-8,588,417 Systems and methods for multicast retransmission over a secure wireless LAN
Systems and methods for broadcast and multicast retransmissions within a protected wireless communications system are described. Retransmitted broadcast or...
US-8,588,415 Method for securing a telecommunications terminal which is connected to a terminal user identification module
A method of securing a telecommunication terminal that is connected to a module used to identify a user of the terminal is described. The method includes a step...
US-8,588,410 Simplified secure symmetrical key management
Nodes of a network are each provided with a seed value and a seed identifier. Each seed value has a corresponding unique seed identifier which is maintained...
US-8,588,226 Integrated security switch
An integrated security switch and related method for managing connectivity and security among networks. The integrated security switch includes a security...
US-8,588,189 Wireless internet terminal and packet transmission method for improving quality of service
Disclosed are a terminal of an OFDMA-TDMA wireless Internet system capable of reducing transmission delay time while securing QoS for uplink data and a packet...
US-8,585,556 Exercising apparatus
An apparatus is disclosed for enabling an operator to exercise comprising a frame having a body, a base and a top. A load is positioned on the frame for...
US-8,584,999 Retaining mechanism for data storage device
This invention relates to a retaining mechanism adapted for securing a data storage device having sides formed with a plurality of mounting holes. The retaining...
US-D693,984 Drive-up financial transaction machine
US-8,584,254 Data access reporting platform for secure active monitoring
Technologies pertaining to detecting accesses to monitored regions of memory and transmitting data to a protection system responsive to the detecting are...
US-8,584,250 Methods and apparatus for information assurance in a multiple level security (MLS) combat system
Methods and apparatus are provided for information assurance in a multiple level security (MLS) combat system. A plurality of tasks are executed, where at least...
US-8,584,246 Eliminating false reports of security vulnerabilities when testing computer software
A system for eliminating false reports of security vulnerabilities when testing computer software, including a taint analysis engine configured to identify a...
US-8,584,226 Method and apparatus for geographically regulating inbound and outbound network communications
A system and method for regulating and analyzing inbound and outbound communications in and between computer networks on the basis of geographic security...
US-8,584,215 System and method for securing distributed exporting models in a network environment
A method is provided in one example implementation and includes identifying a plurality of exporters that are authorized to communicate data to a collector on...
US-8,584,199 System and method to apply a packet routing policy to an application session
A security gateway includes packet routing policies, each including a host network address, an application network address, and a forwarding interface. In...
US-8,583,943 Method and system for providing data field encryption and storage
An approach is provided for securely storing and managing sensitive data. A system and method are provided that include a central device that receives an actual...
US-8,583,928 Portable security transaction protocol
A technique for providing message authenticity includes accepting transaction information, accepting a first data item used for authenticating an originating...
US-8,583,914 Reducing processing load in proxies for secure communications
In one embodiment, a method for providing secure communications using a proxy is provided. The proxy negotiates with a client and a server to determine a...
US-8,583,880 Method for secure data reading and data handling system
A method for secure data reading and a data handling system is provided. The method protects the data reading from fault attacks by repeating read request in an...
US-8,583,876 Logical unit security for clustered storage area networks
A system is described in which a plurality of host computers are coupled to a storage system for storing and retrieving data in the storage system. The storage...
US-8,583,834 Secure detection of removable medical accessories using data transfer
The invention relates to an assembly comprising a main device and an accessory, which can be connected by a safe connector and a safe detection method....
US-8,583,800 Packet routing system and method
Methods and systems for offering network-based managed security services are provided. According to one embodiment, an IP service processing switch includes...
US-8,583,721 Systems and methods for distributing work among a plurality of workers
Systems and methods for distributing work among a plurality of workers in a distributed environment using a granularity determinator module to determine a...
US-8,583,660 Information processing apparatus, information processing method, and computer program
A configuration is provided that allows secure data management to be performed on subsequently acquired data associated with content management units. When...
US-8,583,597 System and method for on-site monitoring data archival
In an embodiment, a system includes an on-site monitoring (OSM) data archival portion having one or more sensors configured to monitor a machine and generate...
US-8,583,561 Apparatus, method, and computer program product for providing a quality control mechanism for the contactless...
Techniques for enabling performance of a quality control function on the contactless interface while the contactless interface is disabled are provided. The...
US-8,583,493 Payment terminal using a mobile communication device, such as a mobile phone; a method of direct debit payment...
A payment terminal using a mobile communication device, such as a mobile phone, is located on a removable memory card (1) which is adjusted in such a way so it...
US-8,583,321 Method and device for secured control of alternator-starter assembly coupled to thermal engine of vehicle, and...
An electric control unit is used to generate control signals for the alternator-starter assembly on the basis of first information signals representative of a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.