Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,548,913 Method and apparatus to secure an electronic commerce transaction
A method begins by a processing module receiving data content. The method continues with the processing module embedding the data content into a data stream to...
US-8,548,889 Method and system for graphically differentiating user preferred securities from one another
A system for graphically differentiating user preferred securities from one another is disclosed. The system comprises a server system (12) and a client system...
US-8,548,884 Systems and methods for portfolio analysis
In one aspect, the invention comprises a computer-implemented method comprising: (i) electronically receiving data describing one or more risk factors driving...
US-8,548,607 Automation system network management, architectures, and methods and applications thereof
An automation system including a plurality of peripheral devices, each configured to perform at least one function relating to energy consumption in a facility...
US-8,548,429 Cellular device security apparatus and method
A cellular communication device has one or more access modes which allow reading and writing of data, for example to change its settings, for example passwords...
US-8,548,417 Secure control for desktop secure video teleconferencing
Method, system, and computer program product example embodiments of the invention are disclosed to provide multi-network secure video teleconferencing (VTC) for...
US-8,548,381 Wireless audio device and wireless media player to communicate and playback audio, and method of operation
A wireless media player and a related system and methodology are disclosed. One aspect of the wireless media player system pertains to a virtual connector...
US-8,548,206 Methods and systems for capturing biometric data
A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an...
US-8,548,171 Pair-wise keying for tunneled virtual private networks
In an embodiment, a method for generating and distributing keys retains the scalability of a group VPN, but also provides true pair-wise keying such that an...
US-8,548,167 System for traceable decryption of bandwidth-efficient broadcast of encrypted messages and security module...
The present invention makes use of techniques such as those described by Boneh and Franklin to allow for the realization of a pseudo-asymmetric encryption...
US-8,547,568 Approach for securely printing electronic documents
An approach is provided for securely printing electronic documents using a portable media. The approach is applicable to a wide variety of contexts and...
US-8,547,566 Image processing apparatus in pull printing system, and method of controlling image processing apparatus
In a pull printing system, it is possible to perform an alternate print with appropriate security and in consideration of loads on a server while securing...
US-8,545,928 Double layer UV variable data text
A method and system for including a double layer security mark in digital document data defining an image of a document to be printed and in the printed...
US-D690,580 Lock
US-8,544,110 Sensitive data aliasing
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed...
US-8,544,105 Method and apparatus for managing policies for time-based licenses on mobile devices
Methods and devices provide for creating, managing, modifying, and/or enforcing flexible digital rights management license policies for protecting games, media,...
US-8,544,098 Security vulnerability information aggregation
Security vulnerability information aggregation techniques are disclosed. Vulnerability information associated with one or more security vulnerabilities is...
US-8,544,085 Image processing apparatus, image processing method, and image forming apparatus
Provided is an image forming apparatus that improves operability while securing security of image data stored in an apparatus. In the image forming apparatus...
US-8,544,084 System and method for secure control of resources of wireless mobile communication devices
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
US-8,544,080 Mobile virtual private networks
An apparatus for establishing a virtual private network with an internet protocol multimedia subsystem (IMS) device that includes a key derivation module, a...
US-8,544,075 Extending a customer relationship management eventing framework to a cloud computing environment in a secure manner
A customer relationship management (CRM) eventing framework may be extended to a cloud computing environment. A listening channel may be opened between a...
US-8,544,071 Systems and methods for software application security management
Systems ands methods for managing service account security are described. The apparatus may include a security record data store that contains information...
US-8,544,065 Dataspace protection utilizing virtual private networks on a multi-node computer system
A method and apparatus provide data security on a parallel computer system using virtual private networks. An access setup mechanism sets up access control data...
US-8,544,062 Method and system for improving computer network security
Computers connected to a private network are monitored and controlled through the use of a client agent that operates in association with the computer and a...
US-8,543,997 Secure dynamic loading
A method for loading, installing and running software, called loading units, having different levels of confidence by a data processing unit (1). The method...
US-8,543,830 Method and apparatus for connecting to a security token without restarting an application
A method and apparatus for reconnecting a security token without restarting an application that supports use of the security token. In some embodiments, the...
US-8,543,827 Methods and systems for providing access control to secured data
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all...
US-8,543,826 MACSec implementation
A media access control (MAC) security apparatus for a local area network interface includes multiple independently controlled power domains, each of which...
US-8,543,819 Secure authenticated distance measurement
The invention relates to a method for a first communication device to performing authenticated distance measurement between said first communication device and...
US-8,543,809 Method for misbehaviour detection in secure wireless mesh networks
In a method for secure data transmission in a wireless mesh network, a sending node sends at least one packet to at least one forwarding node which receives the...
US-8,543,808 Trusted intermediary for network data processing
A networked computer system in which a trusted intermediary device is allowed access to packets transmitted through a secured connection. An endpoint to a...
US-8,543,805 Systems and methods for split proxying of SSL via WAN appliances
The present invention is directed towards systems and methods for split proxying Secure Socket Layer (SSL) communications via intermediaries deployed between a...
US-8,543,804 Adaptive security policy based scalable video service apparatus and method
An adaptive security policy based scalable video service apparatus includes a video streaming server, an adaptive security policy server and a terminal. The...
US-8,543,623 Secure distribution of media data
A technique for playing a media file by a data processing system. A degraded initial version of the media file is received from a sending data processing...
US-8,543,488 High performance trading data interface and trading data distribution protocol
A network enables monitors, trading platforms and libraries to share information about customers' trading activities and locally recalculate customer trading...
US-8,543,421 Methods and systems for managing distributed digital medical data
A network for mediating the peer-to-peer transfer of digital patient medical data includes a plurality of distributed agents each associated with a health care...
US-8,543,410 Method and system providing advice and services to consumers
The present invention provides a method and system for providing advice and/or services to a consumer including the secure electronic storage of rich private...
US-8,543,344 Power meter arrangement
An electric power meter arrangement, includes a metrology unit configured to be coupled to a power line and to determine power consumption and provide...
US-8,543,098 Apparatus and method for securely providing communications between devices and networks
An apparatus, method, and computer-readable medium for securely providing communications between devices and networks are provided. According to one aspect of...
US-8,543,091 Secure short message service (SMS) communications
Embodiments of the present disclosure provide systems and methods for secure Short Message Service (SMS) communications. According to an embodiment, a method of...
US-8,542,833 Systems and methods to secure laptops or portable computing devices
A security system includes an appliance to be secured, including a processor and a first wireless transceiver for accessing a data network with a first power...
US-8,540,192 Method and apparatus for operation of railroad protection installation
A method and a device operate a railroad security system having trackside devices for specific functions. In order to reduce the number of cable connections,...
US-8,540,158 Document verification using dynamic document identification framework
Techniques are described for identifying and validating security documents according to a dynamic document identification framework. For example, a security...
US-8,540,146 Automated banking machine that operates responsive to data bearing records
An automated banking machine operates to cause financial transfers responsive at least in part to data read from data bearing records. The automated banking...
US-8,540,144 Automated banking machine operated responsive to data bearing records with improved security
An automated banking machine is operative to cause financial transfers responsive to data read from data bearing records, such as user cards. The machine...
US-8,539,606 Data protection method and data protection system
Present invention provides a data protection method, used by a data owner to share data with a data sharer securely through a data distribution system. The data...
US-8,539,603 System and method for secure communication
A system for secure communication comprises a secure electronic messaging server which is accessible by the public and a database for storing data of messaging...
US-8,539,602 Microcontroller with secure feature for multiple party code development
Multiple secure environments are established within a system on a chip (SoC) by defining a first secure region within a non-volatile memory in the SoC with a...
US-8,539,601 Secure data storage and retrieval
A system for secure data processing can include an electronic data storage device and a field programmable gate array coupled to the electronic data storage...
US-8,539,597 Securing sensitive data for cloud computing
A system and associated method for securing sensitive data in a cloud computing environment. A customer system has proprietary data as a record stored in a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.