Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,473,334 System and method for issuing and redeeming incentives on electronic data cards
A system for issuing, redeeming and monitoring incentive offers generated in response to qualifying on-line and off-line non-purchase activities. For example,...
US-8,473,312 Diagnostic image security system
A method for restricting unauthorised access to a patient's diagnostic images. Patient identification data is stored in a first database and diagnostic images...
US-8,472,980 Flexible architecture for location based crowdsourcing of contextual data
A system for the collection, aggregation and analysis of location based crowdsourcing data includes a server that server that controls the distribution of...
US-8,472,874 Method and system for pairing of wireless devices using physical presence
Techniques that facilitate pairing of wireless devices with other wireless devices are disclosed. Once paired, the wireless devices can exchange data in a...
US-8,471,899 System and method for documenting patient procedures
The local surveillance sub-system recognizes that a patient medical procedure has or will soon commence by sensing the presence of a healthcare professional in...
US-8,471,818 Flexible data entry device
A data entry device includes a flexible base, a receiving module, a rolling mechanism, and a stop mechanism. The receiving module includes a sleeve and a...
US-8,471,700 Global positioning systems and methods for asset and infrastructure protection
Security systems may include sensing, networked communications, stealth, alarms, and countermeasures, any or all of which may adapt to threats. These systems...
US-8,469,282 Optically readable identification security tag or stamp
The invention relates to a security tag made by randomly distributing a mixture of large numbers of multicolored objects into a unique, non-reproducible...
US-8,469,266 Banking system controlled responsive to data bearing records
An automated banking machine operates to cause financial transfers responsive to data read from data bearing records. The automated banking machine includes a...
US-8,468,609 Authenticating use of a dispersed storage network
At least one dispersed storage (DS) processing unit (14), at least one dispersed storage managing unit (18), and at least one dispersed storage unit (44)...
US-8,468,591 Client authentication and data management system
Methods and systems for performing an authenticated boot (310); performing a continuous data protection (350); performing automatic protection and optionally a...
US-8,468,366 Method for securely storing a programmable identifier in a communication station
Disclosed is a method for storing an identifier in a first station having a secure non-volatile data store protected by cryptographic data, an identifier flag...
US-8,468,364 Secure processor
A secure hardware comprises a secure pipe, a secure DMA, a secure assist and a secure bus, which connects between those blocks. The secure pipe stores a common...
US-8,468,361 System and method for securely provisioning and generating one-time-passwords in a remote device
A secure processor such as a TPM generates one-time-passwords used to authenticate a communication device to a service provider. In some embodiments the TPM...
US-8,468,339 Efficient security information distribution
Methods and software for distributing several data objects containing status information about security certificates, and a directory of the data objects,...
US-8,468,337 Secure data transfer over a network
A system and method are described for secure data transfer over a network. According to an exemplary embodiment a system for secure data transfer over a network...
US-8,468,256 Automatically configuring a computer firewall based on network connection
A method, system, and policy file data structure stored on computer-readable medium comprise reading a policy identifier field containing data representing an...
US-8,468,244 Digital information infrastructure and method for security designated data and with granular data stores
Distributed computer system processes data having select content (SC) represented by one or more predetermined words, characters, etc. The system has a...
US-8,468,167 Automatic data validation and correction
Techniques disclosed herein include systems and methods for data validation and correction. Such systems and methods can reduce costs, improve productivity,...
US-8,468,113 Method and system for management of security rule set
There are provided a method of automated managing two or more security rule-sets and a system thereof. The method comprises: obtaining data characterizing a...
US-8,468,089 Method of improving security in electronic transactions
A computerized method (10) is provided which improves data security in electronic transactions in an insecure network (12). This is accomplished when the method...
US-8,468,080 System and method for administering invested funds
A computer system for administering investment funds holding shares of funds includes a processor and a memory storage device in communication with the...
US-8,467,779 Decision support
Decision support information is exchanged over a secure wireless network among mobile computing devices, and also optionally a central command computer. Each of...
US-8,467,770 System for securing a mobile terminal
A method and apparatus for securing user data on a mobile device using a Bluetooth fob. The method and apparatus enables robust access security, issues alerts...
US-8,467,768 System and method for remotely securing or recovering a mobile device
The present invention provides a system and method for remotely securing, accessing, and managing a mobile device or group of mobile devices. The invention...
US-8,467,536 Binding keys to secure media streams
A key message can include a key-encryption-key (KEK) associated with a KeyDomainID and a KeyGroupID. A session description message can describe streaming media...
US-8,467,534 Method and system for secure access and processing of an encryption/decryption key
Secure access and processing of an encryption/decryption key may include generating one or more keys within a key controller block of a chip. The generated keys...
US-8,467,532 System and method for secure transaction of data between a wireless communication device and a server
The present invention provides a system and method for a set of Extensible Authentication Protocols (EAPs) that can serve Confidentiality, Authentication,...
US-8,467,527 Efficient key derivation for end-to-end network security with traffic visibility
Both end-to-end security and traffic visibility may be achieved by a system using a controller that derives a cryptographic key that is different for each...
US-8,467,230 Data security for dynamic random access memory using body bias to clear data at power-up
A circuit and method erase at power-up all data stored in a DRAM chip for increased data security. All the DRAM memory cells are erased by turning on the...
US-8,466,774 Remote keyless entry transmitter
A remote wireless keyless entry transmitter includes a communications interface for connecting the transmitter directly to an in-vehicle network for registering...
US-8,464,941 Method and terminal for providing controlled access to a memory card
There is provided a method for providing access to data securely stored in a memory card. An exemplary method comprises receiving the memory card in a terminal....
US-8,464,360 Information processing apparatus and image processing program
There is described an information processing apparatus, which makes it possible to prevent a third party from stealing and using data owned by the correctly...
US-8,464,352 Techniques for detecting and preventing unintentional disclosures of sensitive data
Protection is provided to prevent a computer user from unintentionally giving away sensitive data (e.g., security credentials, credit card number, PINs,...
US-8,464,351 Security apparatus
A security apparatus positioned between at least one domain having a level of trust or of sensitivity A and at least one domain having a level of trust or...
US-8,464,344 Device for receiving messages, in particular within the framework of secure data exchanges, associated aircraft...
A device and method for receiving messages each having an order number includes a storage to store a plurality of prior-reception statuses, a mechanism to...
US-8,464,336 VPN network client for mobile device having fast reconnect
A virtual private network client for cellular mobile devices is described. The VPN network client establishes a secure VPN connection with a remote VPN security...
US-8,464,334 Systems and methods for computer network defense II
This invention discloses a technique of computer network defense. The technique is called Random IP-Security (RIP-Sec) 30, and it may preferably be deployed in...
US-8,464,333 System and method for distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the...
US-8,464,331 Data transmission management server and method
A data transmission management server for managing a terminal device to access a network resource providing server by a source gateway in a virtual private...
US-8,464,329 System and method for providing security for SIP-based communications
A security device for SIP communications operates to inhibit the effect of malicious attacks and/or inadvertent erroneous events on the provision of SIP-based...
US-8,464,285 System and method for digital rights management of digital video broadcasting
A system and method for Digital Right Management (DRM) of Digital Video Broadcasting (DVB). The system for DRM of DVB includes a DVB transmitting device for...
US-8,464,073 Method and system for secure data storage
A secure storage device includes a storage medium configured to securely store data received from a host. The storage device further includes a host interface...
US-8,464,071 Trusted storage systems and methods
Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of...
US-8,464,069 Secure data access methods and apparatus
Embodiments include systems and methods for securely accessing data in the context of a data transaction. A system may include a memory block, within which a...
US-8,464,062 Systems, devices, and methods for securely transmitting a security parameter to a computing device
Embodiments of the systems, devices, and methods described herein generally facilitate the secure transmittal of security parameters. In accordance with at...
US-8,464,059 System and method for device bound public key infrastructure
Techniques are provided secured communication of data, such as in the context of a public key infrastructure (PKI). In one embodiment, the technique may involve...
US-8,464,057 Enterprise computer investigation system
A method, apparatus and system for secure forensic investigation of a target machine by a client machine over a communications network. In one aspect the method...
US-8,464,056 Method for secure dynamic bandwidth allocation in a TT ethernet
A communication method for transmitting TT Ethernet messages is a distributed real-time system, including a plurality of node computers. Each node computer has...
US-8,464,053 Systems, methods, and media for retransmitting data using the secure real-time transport protocol
Systems, methods, and media for retransmitting data using the SRTP are provided. In some embodiments, methods for retransmitting data using the SRTP are...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.