Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,539,593 Extraction of code level security specification
A method comprising, receiving a source code, identifying a data structure access in the source code, determining whether the data structure access is...
US-8,539,592 Method and apparatus of encrypting content delivery
A method for delivering a data stream to a plurality of clients in a network. The method involves receiving the data stream from a media server, where the data...
US-8,539,589 Adaptive configuration management system
An automated configuration management system (ACMS) oversees resources of a virtualized ecosystem by establishing a baseline configuration (including, e.g.,...
US-8,539,582 Malware containment and security analysis on connection
Systems and methods for malware containment and security analysis on connection are provided. Digital devices are quarantined for a predetermined period of time...
US-8,539,564 IP multimedia security
A method of establishing keys for at least partially securing media plane data exchanged between first and second end users via respective first and second...
US-8,539,254 Method and integrated circuit for protecting against differential power analysis attacks
In one embodiment of the invention, a method is provided for protecting against attacks on security of a programmable integrated circuit (IC). At least a...
US-8,539,253 System and method for securing information by obscuring contents of a persistent image
Files or directories in a persistent image such as a file system backup structure are hidden from general access by establishing a data set used by the file...
US-8,539,250 Secure, two-stage storage system
A two-stage storage security system comprising an address translator and a cryptographic engine for a mobile computing platform is provided. In response to a...
US-8,539,238 Authenticated nonvolatile memory signing operations
A wireless device includes a nonvolatile memory that handles the task of securely performing integrity checks that do not expose the authentication private key...
US-8,539,234 Secure client-side communication between multiple domains
Methods and systems for secure client-side communication between multiple domains is provided. Such methods and systems can provide for decreased communication...
US-8,539,229 Techniques for secure data management in a distributed environment
Techniques for secure data management in a distributed environment are provided. A secure server includes a modified operating system that just allows a kernel...
US-8,539,222 System for securing virtual machine disks on a remote shared storage subsystem
Embodiments of the present invention provide a method, data processing system and computer program product for secure distribution of virtualized storage. In an...
US-8,539,216 System-on-a-chip (SoC) security using one-time programmable memories
A system-on-a-chip including a first one-time-programmable memory, a second memory, a test interface, an input circuit, and a processor. The input circuit is...
US-8,539,183 Memory cards including a standard security function
A memory card of one published standard, such as the Multi-Media Card (MMC) or Secure Digital Card (SD), is modified to include the function of a Subscriber...
US-8,539,100 Method, device, and communications system for managing querying mapping information
The present invention discloses a method, a device, and a communications system for managing and querying mapping information. The method for managing mapping...
US-8,539,047 Apparatus, method and system for a tunneling client access point
The disclosure details the implementation of a tunneling client access point (TCAP) that is a highly secure, portable, power efficient storage and data...
US-8,538,937 Method for searching a database or data sharing system for the presence of data
A database search system ensures the privacy of a search request and the security of a database with high processing efficiency. The system comprises a database...
US-8,538,934 Contextual gravitation of datasets and data services
Through proactive structured dataset management, suggestions are made for dataset enrichment, cleansing, and other enhancements. Users need not go looking for...
US-8,538,888 Method for generating a secure copy of media data
A system for transferring verified media data. The system comprising: an item of content storing the media data, and having an associated serial number; a...
US-8,538,885 Encryption switch processing
A method for delivering non-financial electronic data through a secure communications channel between a payment processing network and an access device is...
US-8,538,839 System, method, and program product for unit transfer fee processing
A method, system and program product, the method comprising: accessing Transfer Fee data to be paid to a third party that is not the borrower or the lender of a...
US-8,538,332 Communications devices comprising NFC communicators
A communications device has a NFC communicator (15) having a coupler (17) to couple with a coupler of a near field RF communicator in near field range to enable...
US-8,538,272 Data security in optical communications systems
A method of encrypting an optical communications signal involves determining an encryption function, filtering an electrical input signal using the encryption...
US-8,538,178 Image processing device and image processing method
An image processing device includes: a plurality of encoding units that encode image data; a shared memory that stores reference image data which is used for...
US-8,538,019 Method and apparatus for configuring nodes in a wireless network
Methods, systems, devices and computer programs for configuring nodes on a wireless network can include generating a security key for the network, setting the...
US-8,538,011 Systems, methods and devices for trusted transactions
The invention discloses a system for enhancing trust in transactions, most particularly in remote transactions between a plurality of transactional parties, for...
US-8,537,807 Method and system for a gigabit ethernet IP telephone chip with integrated security module
A method for processing Ethernet data and may include receiving Ethernet data via at least one Ethernet physical interface transceiver (PHY) integrated within a...
US-8,537,770 System and method for enabling VPN-less session setup for connecting mobile data devices to an enterprise data...
A mobile application gateway configured to interconnect mobile communication devices on a cellular network with an enterprise network is provided. The mobile...
US-8,537,726 Method and system for secure data transmission
A method and system are disclosed that secure data transmission in a communications system employed to control safety-relevant processes, through the provision...
US-8,537,536 Rapid deployment mobile data center
A portable air cooled data center can include interior fans, a heat sink integrally serving as part of a wall or ceiling, and an outer heat pipe assembly in...
US-8,537,492 Securing apparatus
The invention relates to apparatus such as a broadcast data receiver which can selectively receive a data storage item therewith to allow the passage of data...
US-8,535,223 Wireless patient monitoring using streaming of medical data with body-coupled communication
The invention relates to a system and method for wirelessly monitoring a patient (4), the system comprising a medical sensor (1) for collecting medical data and...
US-8,535,114 Method for manufacturing a precursor lens for a rim-shaped lens
A method for manufacturing an externally circular precursor lens that is processed into a rim-shaped lens includes inputting processing data to specify the...
US-8,534,549 Network for blood pressure data management and rechargeable smart card
Enabling the management of biometric data, including and not limited to blood pressure readings taken on automated kiosks, which is stored on personal Smart...
US-8,534,132 Method for measuring tension in an anchored rod at an accessible end
The present invention may be used for measuring the tension in an elongated rod like body that may be fastened at an anchor end to an anchor element and that...
US-D690,074 Financial transaction machine
US-8,533,852 Method and system for securely communicating between a primary service provider and a partner service provider
A method and system for authenticating a partner service provider and a primary service provider includes a network and, a partner service provider generating a...
US-8,533,850 Fraudulent manipulation detection method and computer for detecting fraudulent manipulation
A client computer detects a user operation for transmitting data to a server or a storage device, determines whether the detected user operation is a fraudulent...
US-8,533,844 System and method for security data collection and analysis
Disclosed herein is a system and method for efficiently gathering information about applications for mobile communication devices (e.g., smartphones, netbooks,...
US-8,533,840 Method and system of quantifying risk
The method of quantifying risk, implemented as a computerized program, quantifies the risk of releasing security sensitive words, data objects, characters or...
US-8,533,823 System and method for source IP anti-spoofing security
A system and method that provides for using source IP addresses and MAC addresses in a network to provide security against attempts by users of the network to...
US-8,533,818 Profiling backup activity
Mitigating a network security threat is disclosed. Information associated with a data protection event is received. The received information is evaluated for an...
US-8,533,808 Network security smart load balancing using a multiple processor device
A method for protecting data communications using a multiple processor device in which multiple processors are operatively connected by a transport mechanism...
US-8,533,801 System and method for binding a subscription-based computing system to an internet service
A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the...
US-8,533,794 Streaming content in guest mode
The present application relates to systems, apparatus and methods for transmitting image data from a content source to an image display in a dual mode system...
US-8,533,793 Location-aware security and access system
An invention is afforded for providing security for a protected network resource. The system includes a network access apparatus in communication with a...
US-8,533,790 Sharing management program, sharing management method, terminal apparatus and sharing management system
A sharing management method for sharing a terminal with plural users includes: after completion of login to an operating system of the terminal or after booting...
US-8,533,746 Health integration platform API
An application program interface (API) is provided for requesting, storing, and otherwise accessing data within a health integration network. The API...
US-8,533,734 Application programming interface for managing time sharing option address space
A method includes receiving a start request from a client at a launcher application programming interface (API), determining whether an existing time sharing...
US-8,533,687 Methods and system for global real-time transaction tracing
Methods and systems for out-of-application bytecode instrumentation and performance monitoring of applications, such as globally-distributed applications,...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.