Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,539,216 System-on-a-chip (SoC) security using one-time programmable memories
A system-on-a-chip including a first one-time-programmable memory, a second memory, a test interface, an input circuit, and a processor. The input circuit is...
US-8,539,183 Memory cards including a standard security function
A memory card of one published standard, such as the Multi-Media Card (MMC) or Secure Digital Card (SD), is modified to include the function of a Subscriber...
US-8,539,100 Method, device, and communications system for managing querying mapping information
The present invention discloses a method, a device, and a communications system for managing and querying mapping information. The method for managing mapping...
US-8,539,047 Apparatus, method and system for a tunneling client access point
The disclosure details the implementation of a tunneling client access point (TCAP) that is a highly secure, portable, power efficient storage and data...
US-8,538,937 Method for searching a database or data sharing system for the presence of data
A database search system ensures the privacy of a search request and the security of a database with high processing efficiency. The system comprises a database...
US-8,538,934 Contextual gravitation of datasets and data services
Through proactive structured dataset management, suggestions are made for dataset enrichment, cleansing, and other enhancements. Users need not go looking for...
US-8,538,888 Method for generating a secure copy of media data
A system for transferring verified media data. The system comprising: an item of content storing the media data, and having an associated serial number; a...
US-8,538,885 Encryption switch processing
A method for delivering non-financial electronic data through a secure communications channel between a payment processing network and an access device is...
US-8,538,839 System, method, and program product for unit transfer fee processing
A method, system and program product, the method comprising: accessing Transfer Fee data to be paid to a third party that is not the borrower or the lender of a...
US-8,538,332 Communications devices comprising NFC communicators
A communications device has a NFC communicator (15) having a coupler (17) to couple with a coupler of a near field RF communicator in near field range to enable...
US-8,538,272 Data security in optical communications systems
A method of encrypting an optical communications signal involves determining an encryption function, filtering an electrical input signal using the encryption...
US-8,538,178 Image processing device and image processing method
An image processing device includes: a plurality of encoding units that encode image data; a shared memory that stores reference image data which is used for...
US-8,538,019 Method and apparatus for configuring nodes in a wireless network
Methods, systems, devices and computer programs for configuring nodes on a wireless network can include generating a security key for the network, setting the...
US-8,538,011 Systems, methods and devices for trusted transactions
The invention discloses a system for enhancing trust in transactions, most particularly in remote transactions between a plurality of transactional parties, for...
US-8,537,807 Method and system for a gigabit ethernet IP telephone chip with integrated security module
A method for processing Ethernet data and may include receiving Ethernet data via at least one Ethernet physical interface transceiver (PHY) integrated within a...
US-8,537,770 System and method for enabling VPN-less session setup for connecting mobile data devices to an enterprise data...
A mobile application gateway configured to interconnect mobile communication devices on a cellular network with an enterprise network is provided. The mobile...
US-8,537,726 Method and system for secure data transmission
A method and system are disclosed that secure data transmission in a communications system employed to control safety-relevant processes, through the provision...
US-8,537,536 Rapid deployment mobile data center
A portable air cooled data center can include interior fans, a heat sink integrally serving as part of a wall or ceiling, and an outer heat pipe assembly in...
US-8,537,492 Securing apparatus
The invention relates to apparatus such as a broadcast data receiver which can selectively receive a data storage item therewith to allow the passage of data...
US-8,535,223 Wireless patient monitoring using streaming of medical data with body-coupled communication
The invention relates to a system and method for wirelessly monitoring a patient (4), the system comprising a medical sensor (1) for collecting medical data and...
US-8,535,114 Method for manufacturing a precursor lens for a rim-shaped lens
A method for manufacturing an externally circular precursor lens that is processed into a rim-shaped lens includes inputting processing data to specify the...
US-8,534,549 Network for blood pressure data management and rechargeable smart card
Enabling the management of biometric data, including and not limited to blood pressure readings taken on automated kiosks, which is stored on personal Smart...
US-8,534,132 Method for measuring tension in an anchored rod at an accessible end
The present invention may be used for measuring the tension in an elongated rod like body that may be fastened at an anchor end to an anchor element and that...
US-D690,074 Financial transaction machine
US-8,533,852 Method and system for securely communicating between a primary service provider and a partner service provider
A method and system for authenticating a partner service provider and a primary service provider includes a network and, a partner service provider generating a...
US-8,533,850 Fraudulent manipulation detection method and computer for detecting fraudulent manipulation
A client computer detects a user operation for transmitting data to a server or a storage device, determines whether the detected user operation is a fraudulent...
US-8,533,844 System and method for security data collection and analysis
Disclosed herein is a system and method for efficiently gathering information about applications for mobile communication devices (e.g., smartphones, netbooks,...
US-8,533,840 Method and system of quantifying risk
The method of quantifying risk, implemented as a computerized program, quantifies the risk of releasing security sensitive words, data objects, characters or...
US-8,533,823 System and method for source IP anti-spoofing security
A system and method that provides for using source IP addresses and MAC addresses in a network to provide security against attempts by users of the network to...
US-8,533,818 Profiling backup activity
Mitigating a network security threat is disclosed. Information associated with a data protection event is received. The received information is evaluated for an...
US-8,533,808 Network security smart load balancing using a multiple processor device
A method for protecting data communications using a multiple processor device in which multiple processors are operatively connected by a transport mechanism...
US-8,533,801 System and method for binding a subscription-based computing system to an internet service
A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the...
US-8,533,794 Streaming content in guest mode
The present application relates to systems, apparatus and methods for transmitting image data from a content source to an image display in a dual mode system...
US-8,533,793 Location-aware security and access system
An invention is afforded for providing security for a protected network resource. The system includes a network access apparatus in communication with a...
US-8,533,790 Sharing management program, sharing management method, terminal apparatus and sharing management system
A sharing management method for sharing a terminal with plural users includes: after completion of login to an operating system of the terminal or after booting...
US-8,533,746 Health integration platform API
An application program interface (API) is provided for requesting, storing, and otherwise accessing data within a health integration network. The API...
US-8,533,734 Application programming interface for managing time sharing option address space
A method includes receiving a start request from a client at a launcher application programming interface (API), determining whether an existing time sharing...
US-8,533,687 Methods and system for global real-time transaction tracing
Methods and systems for out-of-application bytecode instrumentation and performance monitoring of applications, such as globally-distributed applications,...
US-8,533,493 Method of securing transmission data
A method is provided for securing transmission data between an upload device and a download device. The upload device is configured to generate a first matrix,...
US-8,533,491 Data security for digital data storage
A computing system includes data encryption in the data path between a data source and data storage devices. The data encryption may utilize a key which is...
US-8,533,466 Electronic file access control system and method
A digital file is associated with a header in which identification data for a physical key is stored. The digital file content is encrypted, and may not be...
US-8,533,460 Key camouflaging method using a machine identifier
A method is provided for generating a human readable passcode to an authorized user including providing a control access datum and a PIN, and generating a...
US-8,533,457 Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols
The disclosure provides a method and apparatus for transmitting data securely using an unreliable communication protocol, such as User Datagram Protocol. In one...
US-8,533,452 System and method for securing wireless data
Systems and methods for operation upon a data processing device for handling secure data stored on the device. The device is configurable to communicate over a...
US-8,533,242 File management method in web storage system
The present invention relates to a file management method in a web storage system, and more specifically, to a file management method in a web storage system,...
US-8,533,144 Automation and security application store suggestions based on usage data
A method, system, and computer-readable medium that facilitate the reception of usage data about the utilization of an intelligent home system and recommend...
US-8,533,116 Internet payment, authentication and loading system using virtual smart card
A system loads, authenticates and uses a virtual smart card for payment of goods and/or services purchased on-line over the Internet. An online purchase and...
US-8,532,978 Natural language interface, compiler and de-compiler for security policies
A method and system for enabling non-programmers to create certifiable Extensible Access Control Markup Language (XACML) policies. The graphical user interface...
US-8,532,498 Secure orthogonal frequency multiplexed optical communications
The invention provides a system and method for secure communication that involve encoding and transmitting an optical orthogonal frequency division multiplexed...
US-8,532,330 Security printing analysis system and method for enhancing security printing
A method for enhancing security printing includes generating data for a region of interest (14), where the data includes information for at least one of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.