Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,516,117 Agile network protocol for secure communications with assured system availability
A plurality of computer nodes communicate using seemingly random Internet Protocol source and destination addresses. Data packets matching criteria defined by a...
US-8,516,076 System and method for compiling statistics in an IP marketplace
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
US-8,516,068 System and method for processing messages being composed by a user
A system and method for processing messages being composed by a user of a computing device (e.g. a mobile device). Embodiments are described in which the...
US-8,515,390 System and method for protecting data in wireless devices
When a network-based wireless device such as a mobile phone or data terminal is reported lost or stolen or is determined to be malfunctioning, a service...
US-8,515,289 Wavelength sensing lighting system and associated methods for national security application
A wavelength sensing lighting system may include a light source, a sensor and a controller. One or more light sources and sensors may be included in an array....
US-8,515,211 Methods, apparatuses, and computer program products for maintaining of security and integrity of image data
A user interface for masking portions of an image is provided. A controller included in the user interface is arranged for receiving a request for an image,...
US-8,515,080 Method, system, and computer program product for encryption key management in a secure processor vault
A method for encryption key management including accepting authenticated unencrypted data into a processor of a server computing device that is configured as a...
US-8,515,076 Security system and method using automatic meter reading protocol
The present invention relates to a security system using an automatic meter reading protocol. The security system includes a Device Language Message...
US-8,515,073 Method and system for secure communication in near field communication network
Disclosed is a method for secure communication between a plurality of electronic devices in a Near Field Communication (NFC) network, and a system for...
US-8,515,072 Method and apparatus for providing secure communications for mobile communication devices
A method and apparatus that enables secure communications from a wireless communication device is disclosed. The method may include receiving a signal to...
US-8,514,752 Communication method, communication terminal, and base station apparatus
A radio transmitting apparatus and a radio transmitting method wherein the increase of the guard time in a random access region is reduced to secure the data...
US-8,514,561 Locking mechanism and information handling system using the same
A data storage device is inserted in an information handling apparatus, and is prevented from being accidently disconnecting from the information handling...
US-8,514,420 Image forming apparatus and method of user authentication
An image forming apparatus includes a user authentication function that authorizes a user to operate saved print data with a password without requiring an input...
US-8,512,071 Electrical connector assembly having a printed circuit board with soldering holes interconnected to a plurality...
A SATA connector assembly is provided with an insulating housing, a plurality of data and power terminals, a PCB and an FFC, wherein the data and power...
US-8,511,544 Banking system controlled responsive to data bearing records
An automated banking machine operates to cause financial transfers responsive to data read from data bearing records. The automated banking machine includes a...
US-8,510,848 Method and system for managing data in a communication network
A method and a system for managing one or more files in a communication network are provided. The system includes a server, a first client, and a second client....
US-8,510,842 Pinpointing security vulnerabilities in computer software applications
A build process management system can acquire data pertaining to a software build process that is currently being executed by an automated software build...
US-8,510,835 Techniques for protecting data in cloud computing environments
A client computer runs a communicator employed to connect to a server computer in a cloud. The communicator is updated on a regular basis to update its...
US-8,510,827 Taint tracking mechanism for computer security
Mechanisms have been developed for securing computational systems against certain forms of attack. In particular, it has been discovered that, by maintaining...
US-8,510,825 Secure computing environment to address theft and unauthorized access
Techniques for securing a client. A BIOS agent stores policy data within a BIOS of the client. The BIOS agent is one or more software modules that execute in...
US-8,510,816 Security device provisioning
The provisioning of a security token object to a user is disclosed. The security token object is used for accessing a computing resource through a client...
US-8,510,760 Systems and methods for secure host resource management
Systems and methods are described herein to provide for secure host resource management on a computing device. Other embodiments include apparatus and system...
US-8,510,736 Computer system, information processing apparatus, and security protection method
According to one embodiment, a computer system includes a server and a client computer. The client computer is connected to the server via a network. The server...
US-8,510,553 Secure credential management
Apparatus and methods associated with providing secure credential management are described. One apparatus embodiment includes a data store to store...
US-8,510,551 Policy handling for multicast transmissions
A device, receives a unicast packet designating a unicast source and a unicast destination, and determines whether the received unicast packet is a Data...
US-8,510,549 Transmission of packet data over a network with security protocol
A method, device, system and computer program for providing a transport distribution scheme for a security protocol are disclosed. A first packet data...
US-8,510,476 Secure remote diagnostic customer support network
A system for accessing data remotely from a network. In one embodiment, the system comprises a first network interface card permitting data transfer between a...
US-8,510,335 Database and method for controlling access to a database
A method for controlling access to a database is disclosed, as well as a corresponding database system. The method comprises: receiving, from a user, a request...
US-8,510,204 System, method, and apparatus for trading in a decentralized market
A method and system for facilitating the execution of transactions in a decentralized market are provided herein. The decentralized market includes a number of...
US-8,510,202 Computer system for evaluating fixed income trade opportunities
Systems and methods embodying the present invention permit a trader of securities such as municipal bonds to observe real-time data relating to actual or...
US-8,509,787 Communications base station with decision function for distributing traffic across multiple backhauls
A communication station, such as a base station or access point, has multiple backhaul options and distributes backhaul data between the available backhaul...
US-8,509,737 Security module and method of controlling usability of application modules
For a communication terminal (10), proposed is a security module (1) configured to authenticate a telecommunications network (2). The security module (1)...
US-8,509,493 Biometric identification system
A biometric identification system enabling biometric authentication without a user providing his or her biometric data to an authentication entity, including an...
US-8,509,439 Assigning nonces for security keys
Secure communications may be implemented by transmitting packet data units with information sufficient to enable a receiving entity to reconstruct a nonce. That...
US-8,509,430 Storage devices having a security function and methods of securing data stored in the storage device
A storage device may include a storage unit that stores data transmitted via a plurality of first wires; and a security control unit that controls connection...
US-8,509,115 Multicast control method in Ethernet Passive Optical Network
A multicast control method in an Ethernet passive optical network, the method includes steps: (A) configuring different id for user-end devices and their user...
US-8,506,407 Gaming system network and method for delivering gaming media
A gaming system network and gaming method are described. The network includes at least one network access device, a registration database configured to store...
US-8,505,095 System and method for monitoring and analyzing multiple interfaces and multiple protocols
The present invention is a system and method for providing security for a mobile device by analyzing data being transmitted or received by multiple types of...
US-8,505,092 Dynamic provisioning of protection software in a host intrusion prevention system
Methods and apparatus for optimizing security configurations of a set of computers are disclosed. A set of local servers, each functioning as a deep-security...
US-8,505,075 Enterprise device recovery
An administrator of an enterprise can recover a user secure storage device in conjunction with a third-party service without the administrator knowing a user...
US-8,505,031 Method for sharing data
A method for sharing data includes creating a socket serviced by a server application executing within a central operating system environment and creating...
US-8,504,847 Securing data in a dispersed storage network using shared secret slices
A data element can be encoded into multiple encoded data elements using an encoding algorithm that includes an encoding function and one or more encoder...
US-8,504,846 Method and apparatus for secure storing of private data on user devices in telecommunications networks
A system for securely storing data is provided. The system includes a transformation component operable to scramble or encrypt the data, a dissection component...
US-8,504,841 Systems and methods for software application security management
Apparatus and method for managing password information associated with a service account are disclosed. In some embodiments, a service account management system...
US-8,504,839 Method, apparatus, and device for protecting against programming attacks and/or data corruption
The method and accompanying apparatus and device protects against programming attacks and/or data corruption by computer viruses, malicious code, or other types...
US-8,504,826 Client and host validation based on hash of key and validation of encrypted data
A data security protection method generates dynamic encryption keys and dynamic decryption keys for a host and a client during data transmission between the...
US-8,504,820 Method for improving network application security and system thereof
The invention, related to information security field, discloses a method for improving network application security and a system thereof. The method comprises...
US-8,504,697 System and method employing an agile network protocol for secure communications using secure domain names
A system and method connect a first network device and a second network device by initiating a secure communication link. The system includes one or more...
US-8,504,532 System and method for deletion of data in a remote computing platform
Embodiments of a system and method to perform a secure deletion of a set of data from a remote cloud computing system are described. As described, in some...
US-8,504,458 Investment strategy system
Embodiments of the present invention relate to apparatuses, systems, methods, and computer program products for determining an investment strategy for a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.