Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,573,479 Banking system controlled responsive to data bearing records
A machine (10) is operative to carry out financial transfers responsive to data included on data bearing records including user cards. The machine includes a...
US-8,572,757 Seamless secure private collaboration across trust boundaries
Seamless, secure, private, collaborative file synchronization across trust boundaries, typically as a companion to a store and sync file service. Information...
US-8,572,749 Information security control self assessment
Apparatuses, computer readable media, methods, and systems are described for identifying risk assessment queries for assessing risk of a process, providing the...
US-8,572,748 Label-based taint analysis
A computer-implemented method and apparatus, adapted to receive a computer program, and dynamically analyze the computer program to determine flow of untrusted...
US-8,572,744 Information security auditing and incident investigation system
An information security auditing and incident investigation method can include applying a correlation template to query different audit targets in an enterprise...
US-8,572,733 System and method for active data collection in a network security system
A network security system comprises a plurality of sensors, a management server, and a data collection module. The plurality of sensors receive first data...
US-8,572,723 Utilizing virtual private networks to provide object level security on a multi-node computer system
The disclosure herein provides data security on a parallel computer system using virtual private networks connecting the nodes of the system. A mechanism sets...
US-8,572,720 System, method, and device for communicating and storing and delivering data
A system, method, and device optionally includes a server that is isolated from open networks which assigns secure random socket connections, e.g.,...
US-8,572,719 Firewall proxy systems and methods in a backup environment
According to certain aspects, a method for performing remote backup operations is provided that includes receiving a first unidirectional connection request...
US-8,572,717 Dynamic access control policy with port restrictions for a network security appliance
A network security appliance supports definition of a security policy to control access to a network. The security policy is defined by match criteria including...
US-8,572,713 Universal authentication token
A universal authentication token is configured to securely acquire security credentials from other authentication tokens and/or devices. In this manner, a...
US-8,572,712 Device independent authentication system and method
A system is disclosed which facilitates authentication processes with web-enabled wireless devices, including those that do not support the use of cookie files....
US-8,572,700 Method and system for exchanging setup configuration protocol information in beacon frames in a WLAN
Certain aspects of a method for enabling exchange of information in a secure communication system may comprise configuring at least one 802.11 client station...
US-8,572,696 Contextual data aided security protection
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for providing contextual data aided security protection. In...
US-8,572,673 Data processing apparatus and method
There is a described a method of certifying compliance with a designated process defined by a plurality of rules which are specified in a public template,...
US-8,572,547 Systems and methods for a development environment
A developer zone is provided for use by developers. A method for providing a developer zone may include receiving a request, initializing a provisional...
US-8,572,409 Method and apparatus for non-redundant encrypted storage
For secure non-redundant storage of data, to store a data blocklet (sub-block), one takes a hash of each blocklet. The hash value is used as a key to encrypt...
US-8,572,405 Collusion-resistant outsourcing of private set intersection
Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for receiving an encrypted first data set from a first...
US-8,572,403 Digital video guard
This invention relates to the veracity of information displayed to a user of a computer, and information provided to a computer by human input devices such as...
US-8,572,401 Systems and methods for securing data of volume mirrors
Various computer-implemented methods for securing data of replicated volumes are disclosed. In one example, an exemplary method for performing such a task may...
US-8,572,390 Method for transmitting and receiving data, in particular for secure exchanges between an aircraft and a ground...
A method for transmitting data, a receiving method, related devices, and an aircraft equipped with the devices. The method includes determining an ...
US-8,572,389 System and method for protecting master encryption keys
A system and method for protecting master transport encryption keys stored on a computing device. Master transport encryption keys are used to secure data...
US-8,572,382 Out-of band authentication method and system for communication over a data network
A method and system for out-of-band authentication of messages transmitted, e.g. as packets, on a communication network, whereby a first stream of data is...
US-8,572,370 Accessing a remote virtual environment without user authentication
A method, system and computer program product for providing a secure connection between a client and a remote server to run a Virtual Environment (VE),...
US-8,572,369 Security for collaboration services
Various embodiments, in the form of at least one of systems, methods, and software, are provided that include security solutions for use of collaboration...
US-8,572,268 Managing secure sessions
The different illustrative embodiments provide a method, a computer program product, and an apparatus for managing secure sessions. An identity of a requestor...
US-8,572,119 System for providing session-based network privacy, private, persistent storage, and discretionary access...
The invention provides secure and private communication over a network, as well as persistent private storage and private access control to the stored...
US-8,572,059 Surveillance, monitoring and real-time events platform
Systems and methods according to the invention provide a surveillance, monitoring and real-time events platform to (i) enable the integration and communication...
US-8,572,050 Method and system for real time system log integrity protection
A method and system for managing integrity of system log file data. The system comprises a first component which, using a hook in a kernel of an operating...
US-8,572,047 Method and system for data update synchronization by two-phase commit
In an integrated management database system having a plurality of element databases holding the configuration information about an information system and an...
US-8,571,995 Purchase transaction system with encrypted payment card data
Systems and methods are provided for securing payment card information. A user may present a payment card such as a credit card to point-of-sale equipment. The...
US-8,571,993 Reprogrammable security for controlling piracy and enabling interactive content
Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic...
US-8,571,992 Methods and apparatus for title structure and management
A title management apparatus resident on a first computer including a memory for storing a control program and data, and a processor for executing the control...
US-8,571,624 Method and apparatus for mounting a data transmission device in a communication system
Method and apparatus for mounting a data transmission device in a communication system including and adhesive pad with pull tab and raised border portions is...
US-8,571,220 Method and apparatus for securing data in a memory device
A Method and a terminal intended for securing information in a local memory device which is couplable to a terminal having a data link interface. At the...
US-8,571,213 Security method for preventing the unauthorized use of multimedia contents
A method embeds tracing secret data into multimedia contents delivered to particular users. The method descrambles a first scrambled video stream having...
US-8,571,193 Systems and methods for facilitating conference calls using security keys
Systems and methods are described that facilitate a conference call between a plurality of communication devices. The method can comprise: providing a first...
US-8,570,910 Wireless transmission apparatus and wireless transmission method
In DFT-s-OFDM, disclosed are a wireless transmission apparatus and wireless transmission method whereby freedom of allocation of frequencies is secured, while...
US-8,570,720 CFAST duplication system
The CFAST duplication system allows digital data copy from a master CFAST storage device to multiple target CFAST storage devices. The CFAST duplication system...
US-8,570,375 Method and apparatus for random-access review of point of sale transactional video
The present disclosure includes a system in which a video displayer, having access to video surveillance data and point-of-sale transaction data, provides...
US-8,568,864 Data carrier with see-through window and method for producing it
A data carrier is provided having a see-through portion (24) that allows revealing security features (36) with a different appearance on each of its sides (S1,...
US-8,568,224 Wireless wagering system
A casino game is implemented on the basis of a wireless mobile player unit adapted to play poker, slots, bingo and other casino games. The unit obtains random...
US-8,567,757 Wireless fluid shut-off valve
A low-cost safety valve for gas lines and similar supply lines that can be remotely activated via a secure wireless link employing a low leakage sealing...
US-8,566,951 Apparatus and methods for setting security to storage unit and computer
Methods and apparatus are provided for inhibiting data writing to an optical disc drive connected to a computer. A BIOS confirms presence of a security function...
US-8,566,950 Method and apparatus for detecting potentially misleading visual representation objects to secure a computer
A method and apparatus for detecting potentially misleading visual representation objects to secure a computer is described. In one embodiment, the method...
US-8,566,935 Balancing malware rootkit detection with power consumption on mobile devices
The subject disclosure presents a novel technique for balancing the tradeoff between security monitoring and energy consumption on mobile devices....
US-8,566,934 Apparatus and method for enhancing security of data on a host computing device and a peripheral device
A method is provided of enhancing security of at least one of a host computing device and a peripheral device. In the method, the host computing device is...
US-8,566,932 Enforcing good network hygiene using reputation-based automatic remediation
Reputation-based automatic remediation is applied for enforcing good network hygiene of a client. A scanning module scans the client to detect files on the...
US-8,566,929 Integrity check failure detection and recovery in radio communications system
In a packet-based communication between a mobile radio and a base station in a radio communication system, an authenticity of a packet based on authentication...
US-8,566,922 System for isolating a secured data communication network
A system for isolating a data communication network has been developed. The system includes an internal computer system with an internal computer that is in...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.