Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,549,283 System and method of transmitting/receiving security data
There are provided a security server for intermediating transmission/reception of security data between a service providing server and a user terminal, a...
US-8,549,280 System, device and method for securely transferring data across a network
A method, system, server device and computer program product for securely transferring data from one or more non-subscribers to a subscriber or ...
US-8,549,275 Method and apparatus for secure execution using a secure memory partition
A processor capable of secure execution. The processor contains an execution unit and secure partition logic that secures a partition in memory. The processor...
US-8,549,208 Cache memory having enhanced performance and security features
A cache memory having enhanced performance and security feature is provided. The cache memory includes a data array storing a plurality of data elements, a tag...
US-8,549,087 Methods and systems for allocating and indicating trustworthiness of secure communications
Embodiments of the present invention enable allocating and indicating the trustworthiness of a message, especially messages that comprise content that has been...
US-8,548,998 Methods and systems for securing and protecting repositories and directories
A system and method for protecting a networked organizational data storage facility, which is accessible by a network environment, by mapping the network...
US-8,548,982 Methods and systems for controlling access to custom objects in a database
In embodiments, methods and systems for controlling access to custom objects are provided. These techniques for controlling access to custom objects can enable...
US-8,548,923 Method and system for facilitating data access and management on a secure token
A system for facilitating data access and management on a smart card is provided. According to one exemplary aspect of the system, a storage architecture is...
US-8,548,922 System and method for a private and secure payment system between two parties using a central system
A private and secure payment system has a portable wireless device belonging to party A with a payment function and a central system that is used to effect a...
US-8,548,913 Method and apparatus to secure an electronic commerce transaction
A method begins by a processing module receiving data content. The method continues with the processing module embedding the data content into a data stream to...
US-8,548,889 Method and system for graphically differentiating user preferred securities from one another
A system for graphically differentiating user preferred securities from one another is disclosed. The system comprises a server system (12) and a client system...
US-8,548,884 Systems and methods for portfolio analysis
In one aspect, the invention comprises a computer-implemented method comprising: (i) electronically receiving data describing one or more risk factors driving...
US-8,548,607 Automation system network management, architectures, and methods and applications thereof
An automation system including a plurality of peripheral devices, each configured to perform at least one function relating to energy consumption in a facility...
US-8,548,429 Cellular device security apparatus and method
A cellular communication device has one or more access modes which allow reading and writing of data, for example to change its settings, for example passwords...
US-8,548,417 Secure control for desktop secure video teleconferencing
Method, system, and computer program product example embodiments of the invention are disclosed to provide multi-network secure video teleconferencing (VTC) for...
US-8,548,381 Wireless audio device and wireless media player to communicate and playback audio, and method of operation
A wireless media player and a related system and methodology are disclosed. One aspect of the wireless media player system pertains to a virtual connector...
US-8,548,206 Methods and systems for capturing biometric data
A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an...
US-8,548,171 Pair-wise keying for tunneled virtual private networks
In an embodiment, a method for generating and distributing keys retains the scalability of a group VPN, but also provides true pair-wise keying such that an...
US-8,548,167 System for traceable decryption of bandwidth-efficient broadcast of encrypted messages and security module...
The present invention makes use of techniques such as those described by Boneh and Franklin to allow for the realization of a pseudo-asymmetric encryption...
US-8,547,568 Approach for securely printing electronic documents
An approach is provided for securely printing electronic documents using a portable media. The approach is applicable to a wide variety of contexts and...
US-8,547,566 Image processing apparatus in pull printing system, and method of controlling image processing apparatus
In a pull printing system, it is possible to perform an alternate print with appropriate security and in consideration of loads on a server while securing...
US-8,545,928 Double layer UV variable data text
A method and system for including a double layer security mark in digital document data defining an image of a document to be printed and in the printed...
US-D690,580 Lock
US-8,544,110 Sensitive data aliasing
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed...
US-8,544,105 Method and apparatus for managing policies for time-based licenses on mobile devices
Methods and devices provide for creating, managing, modifying, and/or enforcing flexible digital rights management license policies for protecting games, media,...
US-8,544,098 Security vulnerability information aggregation
Security vulnerability information aggregation techniques are disclosed. Vulnerability information associated with one or more security vulnerabilities is...
US-8,544,085 Image processing apparatus, image processing method, and image forming apparatus
Provided is an image forming apparatus that improves operability while securing security of image data stored in an apparatus. In the image forming apparatus...
US-8,544,084 System and method for secure control of resources of wireless mobile communication devices
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
US-8,544,080 Mobile virtual private networks
An apparatus for establishing a virtual private network with an internet protocol multimedia subsystem (IMS) device that includes a key derivation module, a...
US-8,544,075 Extending a customer relationship management eventing framework to a cloud computing environment in a secure manner
A customer relationship management (CRM) eventing framework may be extended to a cloud computing environment. A listening channel may be opened between a...
US-8,544,071 Systems and methods for software application security management
Systems ands methods for managing service account security are described. The apparatus may include a security record data store that contains information...
US-8,544,065 Dataspace protection utilizing virtual private networks on a multi-node computer system
A method and apparatus provide data security on a parallel computer system using virtual private networks. An access setup mechanism sets up access control data...
US-8,544,062 Method and system for improving computer network security
Computers connected to a private network are monitored and controlled through the use of a client agent that operates in association with the computer and a...
US-8,543,997 Secure dynamic loading
A method for loading, installing and running software, called loading units, having different levels of confidence by a data processing unit (1). The method...
US-8,543,830 Method and apparatus for connecting to a security token without restarting an application
A method and apparatus for reconnecting a security token without restarting an application that supports use of the security token. In some embodiments, the...
US-8,543,827 Methods and systems for providing access control to secured data
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all...
US-8,543,826 MACSec implementation
A media access control (MAC) security apparatus for a local area network interface includes multiple independently controlled power domains, each of which...
US-8,543,819 Secure authenticated distance measurement
The invention relates to a method for a first communication device to performing authenticated distance measurement between said first communication device and...
US-8,543,809 Method for misbehaviour detection in secure wireless mesh networks
In a method for secure data transmission in a wireless mesh network, a sending node sends at least one packet to at least one forwarding node which receives the...
US-8,543,808 Trusted intermediary for network data processing
A networked computer system in which a trusted intermediary device is allowed access to packets transmitted through a secured connection. An endpoint to a...
US-8,543,805 Systems and methods for split proxying of SSL via WAN appliances
The present invention is directed towards systems and methods for split proxying Secure Socket Layer (SSL) communications via intermediaries deployed between a...
US-8,543,804 Adaptive security policy based scalable video service apparatus and method
An adaptive security policy based scalable video service apparatus includes a video streaming server, an adaptive security policy server and a terminal. The...
US-8,543,623 Secure distribution of media data
A technique for playing a media file by a data processing system. A degraded initial version of the media file is received from a sending data processing...
US-8,543,488 High performance trading data interface and trading data distribution protocol
A network enables monitors, trading platforms and libraries to share information about customers' trading activities and locally recalculate customer trading...
US-8,543,421 Methods and systems for managing distributed digital medical data
A network for mediating the peer-to-peer transfer of digital patient medical data includes a plurality of distributed agents each associated with a health care...
US-8,543,410 Method and system providing advice and services to consumers
The present invention provides a method and system for providing advice and/or services to a consumer including the secure electronic storage of rich private...
US-8,543,344 Power meter arrangement
An electric power meter arrangement, includes a metrology unit configured to be coupled to a power line and to determine power consumption and provide...
US-8,543,098 Apparatus and method for securely providing communications between devices and networks
An apparatus, method, and computer-readable medium for securely providing communications between devices and networks are provided. According to one aspect of...
US-8,543,091 Secure short message service (SMS) communications
Embodiments of the present disclosure provide systems and methods for secure Short Message Service (SMS) communications. According to an embodiment, a method of...
US-8,542,833 Systems and methods to secure laptops or portable computing devices
A security system includes an appliance to be secured, including a processor and a first wireless transceiver for accessing a data network with a first power...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.