Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,621,242 Display of a verification image to confirm security
A handheld device 300 generates a verification image to indicate that the device is operating in a secure domain. The verification image is generated in...
US-8,621,229 System and method of facilitating the identification of a computer on a network
A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may...
US-8,621,227 System and method for cryptographic key exchange using matrices
Two parties can establish a cryptographic key using a matrix based key exchange protocol, for secure communications without any prior distribution of secret...
US-8,621,225 Method and apparatus for enhancing security of wireless communications
The present invention is related to a method and apparatus for enhancing security of communications. The apparatus comprises a security processing unit, a data...
US-8,621,224 Alert options for electronic-paper verification
A system and method to control the writing on electronic paper (e-paper). An e-paper device may incorporate authentication indicia as part of informational data...
US-8,621,223 Data security method and system
A method of verifying integrity of a digital file includes receiving the digital file subsequent to exposure to a foreign environment and validating the digital...
US-8,621,214 Document encryption and decryption
A document encryption and decryption system for selectively encrypting and decrypting files and any other items and method for same to protect or secure its...
US-8,621,213 Remote control of medical devices using instant messaging infrastructure
Systems and methods for remote control and management of medical workstations using an instant messaging infrastructure. A remote client, such as a mobile...
US-8,621,210 Ad-hoc trust establishment using visual verification
Methods for ad-hoc trust establishment using visual verification are described. In a first embodiment, a visual representation of a shared data is generated on...
US-8,621,208 Secure key server based file and multimedia management system
An embodiment of the present invention proposes a novel file and multimedia management and tracking system using a secure key server. The invention also...
US-8,621,200 Key delivery method and apparatus in a communications system
In order to facilitate access to encrypted broadcast or multicast data an encrypted service key is sent from an access server of the communication network to...
US-8,621,199 Secured presentation layer virtualization for wireless handheld communication device having endpoint independence
The connectivity and security of wireless handheld devices (HDs) can he leveraged to provide a presentation appliance (PA) (e.g. a laptop) with an ability to...
US-8,621,189 System and method for hardware strengthened passwords
A cryptographic module and a computing device implemented method for securing data using a cryptographic module is provided. The cryptographic module may...
US-8,621,168 Partitioning the namespace of a contactless smart card
Systems, methods, computer programs, and devices are disclosed herein for partitioning the namespace of a secure element in contactless smart card devices and...
US-8,621,036 Secure file access using a file access server
A secure file access system and method are disclosed which comprises a file access module executed on a processor of a computing device. The file access module...
US-8,620,882 Tokenization of multiple-field records
An improved technique for granting access to a complex datum maps a single user token representing a user onto a set of data group tokens, each data group token...
US-8,620,876 Firewalls for securing customer data in a multi-tenant environment
Network security is enhanced in a multi-tenant database network environment using a query plan detection module to continually poll the database system to...
US-8,620,832 Network-centric cargo security system
Network-centric systems and methods for monitoring the security of a cargo container during shipment from an origination point to a destination are described....
US-8,620,821 Systems and methods for secure parcel delivery
A method and system for secure package delivery utilizing digital signatures is described. In one configuration, data regarding the weight, dimensions and...
US-8,620,816 Information vault, data format conversion services system and method
A system and method for providing a secured information vault so that individual owners of personal data may control and manage the access and dissemination of...
US-8,620,789 Using accounting data based indexing to create a low volatility portfolio of financial objects
A system, method and computer program product creates an index based on accounting data, or a portfolio of financial objects based on the index where the...
US-8,620,308 Method and apparatus for a distributed roaming master (DRM) in wireless data networks
A system and methodology that can facilitate communication between home and roaming radio access networks by employing IP-based messaging is provided. The...
US-8,620,268 Secure system for programming electronically controlled locking devices by means of encrypted acoustic...
The invention relates to a system implementing a mobile telephone (20) to which a master user authorized to program a lock (22) has access. A remote management...
US-8,620,266 Security for mobile communications device
A mobile communications device for communicating with a wireless network, including an electronic storage having data stored thereon, a processor connected to...
US-8,620,215 Personalization of a mobile communcation device
An accessory for personalizing a mobile communication device includes an accessory body that is configured to adorn the mobile communication device and at least...
US-8,620,214 Process for establishing a data link between two processors, specifically within an NFC chipset
A process for establishing a data link between a first processor configured to supply, upon a contact communication port, a first data carrying signal, and a...
US-8,620,020 Methods and systems for preventing unauthorized disclosure of secure information using image fingerprinting
The present invention provides methods and systems to protect an organization's secure image information from unauthorized disclosure. In one embodiment,...
US-8,619,986 Systems and methods for secure communication using a communication encryption bios based upon a message...
An apparatus and methods of securely communicating a message between a first device and a second device using a message specific identifier is disclosed. The...
US-8,619,982 Method and system for secure distribution of selected content to be protected on an appliance specific basis
The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related...
US-8,619,951 Systems and methods to securely collect data over a telephone
A computer-implemented method to securely collect data over a telephone is described. Telephone communications between a customer and a customer service...
US-8,619,607 Method and system for verifying logical connection
A method and system for maintaining a high reliability logical connection between hosts employs adaptive transparent pinging, clone blocking and bandwidth...
US-8,619,578 Communications switching architecture
Presently described is a system and method for switching multimedia data communications, including but not limited to Voice over IP (VoIP) telephony, cable TV,...
US-8,618,913 Radio frequency identification enabled mobile device
An RFID enabled mobile device is configured to provide a secure release of RFID information. The RFID enabled mobile device, such as an RFID enabled cellular...
US-8,617,081 Estimating cardiac pulse recovery from multi-channel source data via constrained source separation
What is disclosed is a system and method for recovering a patient's cardiac pulse rate from a sequence of video images recording of that patient. In one...
US-8,616,452 Sensor module and sensor module manufacturing method
Provided is a sensor module capable of ensuring security of data in which card data output from a magnet head is not stolen by a third party. In a sensor module...
US-8,616,439 System and method for the secure transfer of information to a web session
A system and method includes displaying a prompt on a display device of a first computing device to input information for an e-commerce session. Next, a...
US-8,616,438 Optical detector at point of care
A patient support apparatus including a barrier, an optical detector, and a control system. The optical detector secured to the barrier and configured to detect...
US-8,615,808 Method of processing data to enable external storage thereof with minimized risk of information leakage
A method is provided to process data so that the data can be externally stored with minimized risk of information leakage. A framework (virtual execution...
US-8,615,804 Complementary character encoding for preventing input injection in web applications
Method to prevent the effect of web application injection attacks, such as SQL injection and cross-site scripting (XSS), which are major threats to the security...
US-8,615,795 Secure network privacy system
The invention provides a method and system of receiving communications from a network device in a network to a source of network data and establishing a secure...
US-8,615,786 System and method for enhancing, securing, controlling and customizing employee network applications and usage
The invention relates to various solutions to the challenges of supporting call centers and networks having a plurality of network connected agents or...
US-8,615,667 Processor and processor system
In a processor including a CPU core executing instruction codes and a cache memory part having plural ways, encryption counter data encrypting and decrypting...
US-8,615,652 System and method for providing load balanced secure media content and data delivery in a distributed computing...
A system and method for providing load balanced secure media content and data delivery (10) in a distributed computing environment is disclosed. Media content...
US-8,615,620 Wireless internet access device, SD control chip, and method for data communication
A wireless Internet access device, a secure digital (SD) control chip, and a data communication method are disclosed. The method includes the following steps:...
US-8,615,605 Automatic identification of travel and non-travel network addresses
A system to automatically classify types of IP addresses associated with a user. Information, such as user names, machine information, IP address, etc., may be...
US-8,615,517 Systems and methods for metadata-based workflows for content creation and media distribution
A secure networked metadata-based workflow method and system, managed through core application logic and master database management system for picture, sound,...
US-8,615,465 Real-time security verification for banking cards
Embodiments of the invention provide a means for verifying that a person using a bank card at a point-of-sale merchant location is in fact a person authorized...
US-8,615,412 Methods and systems for managing distributed digital medical data
A network for mediating the peer-to-peer transfer of digital patient medical data includes a plurality of distributed agents each associated with a health care...
US-8,615,007 Network switching system with asynchronous and isochronous interface
To provide a switching system with telephone switching function mainly on the basis of hardware processing by using isochronous channel which is a real time...
US-8,613,387 Banking system controlled reponsive to data bearing records
An automated banking machine operates to cause financial transfers responsive to data read from data bearing records. The automated banking machine includes a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.