Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,620,821 Systems and methods for secure parcel delivery
A method and system for secure package delivery utilizing digital signatures is described. In one configuration, data regarding the weight, dimensions and...
US-8,620,816 Information vault, data format conversion services system and method
A system and method for providing a secured information vault so that individual owners of personal data may control and manage the access and dissemination of...
US-8,620,789 Using accounting data based indexing to create a low volatility portfolio of financial objects
A system, method and computer program product creates an index based on accounting data, or a portfolio of financial objects based on the index where the...
US-8,620,308 Method and apparatus for a distributed roaming master (DRM) in wireless data networks
A system and methodology that can facilitate communication between home and roaming radio access networks by employing IP-based messaging is provided. The...
US-8,620,268 Secure system for programming electronically controlled locking devices by means of encrypted acoustic...
The invention relates to a system implementing a mobile telephone (20) to which a master user authorized to program a lock (22) has access. A remote management...
US-8,620,266 Security for mobile communications device
A mobile communications device for communicating with a wireless network, including an electronic storage having data stored thereon, a processor connected to...
US-8,620,215 Personalization of a mobile communcation device
An accessory for personalizing a mobile communication device includes an accessory body that is configured to adorn the mobile communication device and at least...
US-8,620,214 Process for establishing a data link between two processors, specifically within an NFC chipset
A process for establishing a data link between a first processor configured to supply, upon a contact communication port, a first data carrying signal, and a...
US-8,620,020 Methods and systems for preventing unauthorized disclosure of secure information using image fingerprinting
The present invention provides methods and systems to protect an organization's secure image information from unauthorized disclosure. In one embodiment,...
US-8,619,986 Systems and methods for secure communication using a communication encryption bios based upon a message...
An apparatus and methods of securely communicating a message between a first device and a second device using a message specific identifier is disclosed. The...
US-8,619,982 Method and system for secure distribution of selected content to be protected on an appliance specific basis
The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related...
US-8,619,951 Systems and methods to securely collect data over a telephone
A computer-implemented method to securely collect data over a telephone is described. Telephone communications between a customer and a customer service...
US-8,619,607 Method and system for verifying logical connection
A method and system for maintaining a high reliability logical connection between hosts employs adaptive transparent pinging, clone blocking and bandwidth...
US-8,619,578 Communications switching architecture
Presently described is a system and method for switching multimedia data communications, including but not limited to Voice over IP (VoIP) telephony, cable TV,...
US-8,618,913 Radio frequency identification enabled mobile device
An RFID enabled mobile device is configured to provide a secure release of RFID information. The RFID enabled mobile device, such as an RFID enabled cellular...
US-8,617,081 Estimating cardiac pulse recovery from multi-channel source data via constrained source separation
What is disclosed is a system and method for recovering a patient's cardiac pulse rate from a sequence of video images recording of that patient. In one...
US-8,616,452 Sensor module and sensor module manufacturing method
Provided is a sensor module capable of ensuring security of data in which card data output from a magnet head is not stolen by a third party. In a sensor module...
US-8,616,439 System and method for the secure transfer of information to a web session
A system and method includes displaying a prompt on a display device of a first computing device to input information for an e-commerce session. Next, a...
US-8,616,438 Optical detector at point of care
A patient support apparatus including a barrier, an optical detector, and a control system. The optical detector secured to the barrier and configured to detect...
US-8,615,808 Method of processing data to enable external storage thereof with minimized risk of information leakage
A method is provided to process data so that the data can be externally stored with minimized risk of information leakage. A framework (virtual execution...
US-8,615,804 Complementary character encoding for preventing input injection in web applications
Method to prevent the effect of web application injection attacks, such as SQL injection and cross-site scripting (XSS), which are major threats to the security...
US-8,615,795 Secure network privacy system
The invention provides a method and system of receiving communications from a network device in a network to a source of network data and establishing a secure...
US-8,615,786 System and method for enhancing, securing, controlling and customizing employee network applications and usage
The invention relates to various solutions to the challenges of supporting call centers and networks having a plurality of network connected agents or...
US-8,615,667 Processor and processor system
In a processor including a CPU core executing instruction codes and a cache memory part having plural ways, encryption counter data encrypting and decrypting...
US-8,615,652 System and method for providing load balanced secure media content and data delivery in a distributed computing...
A system and method for providing load balanced secure media content and data delivery (10) in a distributed computing environment is disclosed. Media content...
US-8,615,620 Wireless internet access device, SD control chip, and method for data communication
A wireless Internet access device, a secure digital (SD) control chip, and a data communication method are disclosed. The method includes the following steps:...
US-8,615,605 Automatic identification of travel and non-travel network addresses
A system to automatically classify types of IP addresses associated with a user. Information, such as user names, machine information, IP address, etc., may be...
US-8,615,517 Systems and methods for metadata-based workflows for content creation and media distribution
A secure networked metadata-based workflow method and system, managed through core application logic and master database management system for picture, sound,...
US-8,615,465 Real-time security verification for banking cards
Embodiments of the invention provide a means for verifying that a person using a bank card at a point-of-sale merchant location is in fact a person authorized...
US-8,615,412 Methods and systems for managing distributed digital medical data
A network for mediating the peer-to-peer transfer of digital patient medical data includes a plurality of distributed agents each associated with a health care...
US-8,615,007 Network switching system with asynchronous and isochronous interface
To provide a switching system with telephone switching function mainly on the basis of hardware processing by using isochronous channel which is a real time...
US-8,613,387 Banking system controlled reponsive to data bearing records
An automated banking machine operates to cause financial transfers responsive to data read from data bearing records. The automated banking machine includes a...
US-8,613,107 System, method and apparatus for electronically protecting data associated with RFID tags
The present invention provides a system, method and apparatus for protecting sensitive data associated with RFID tags by extracting the sensitive data from RFID...
US-8,613,105 Method and apparatus for storing confidential information
Techniques for securely storing confidential information associated with a transaction are disclosed. A method for securely storing confidential information may...
US-8,613,092 System, method and computer program product for updating a security system definition database based on...
A prioritized update system, method, and computer program product are provided. In use, a priority is assigned to a plurality of instances of known unwanted...
US-8,613,091 Method and apparatus for creating a secure anywhere system
A method and apparatus for providing portable end-point security are provided. In one embodiment, a PEPS system may include a PEPS processor having a memory...
US-8,613,090 Method for processing a secure system manager
Method and apparatus for secure processing. The method includes detecting communication among secure and non-secure data entities, prohibiting execution of...
US-8,613,087 Computing system
Disclosed is a computing system which comprises a data processing device exchanging communication data with the external and processing the communication data;...
US-8,613,072 Redirection of secure data connection requests
Methods, systems, and computer-readable media are disclosed for processing a secure data connection request. A particular method receives, at a first gateway, a...
US-8,613,071 Split termination for secure communication protocols
Transaction accelerators can be configured to terminate secure connections. A server-side accelerator intercepts a secure connection request that is from a...
US-8,613,043 Identity mediation in enterprise service bus
A method for identity mediation in an enterprise service bus is provided in the illustrative embodiments. A security information is received at the enterprise...
US-8,613,031 Method for transferring video and sound data directly between distinct digital video recorders
A method for transferring video and sound data from a first digital video recorder situated in a first local area network to a second digital video recorder...
US-8,612,774 Secure OTP using external memory
A set-top-box has on-chip OTP memory emulated using an external flash memory and a series of on-chip fuses. The external memory is comprised of one or more...
US-8,612,772 Security core using soft key
Implementing a key and a protection circuit in a configurable device. A soft key associated with a protection circuit is combined with a user's electronic...
US-8,612,766 Secure credential unlock using trusted execution environments
Computing devices utilizing trusted execution environments as virtual smart cards are designed to support expected credential recovery operations when a user...
US-8,612,765 Security based on subliminal and supraliminal channels for data objects
This invention relates to security for data objects; more particularly, the present invention relates to improved security based on subliminal and supraliminal...
US-8,612,758 System and method for inherently secure identification over insecure data communications networks
A method for secure identification of stations connected over data communications networks during a transaction, comprising transmitting, on the part of a first...
US-8,612,757 Method and apparatus for securely providing identification information using translucent identification member
An apparatus and method for securely providing identification information generates one or more obscured identifiers for a recipient, such as one or more...
US-8,612,754 Digital fingerprinting via SQL filestream with common text exclusion
A method provides data loss protection of sensitive data using digital fingerprinting. The method includes assigning a security level to each document of a...
US-8,612,751 Method and apparatus for entitled data transfer over the public internet
In one embodiment, a method for securely transferring entitled data from one or more devices in a customer's network to a vendor's network via a public network...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.