Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,412,789 System and method for connecting a security system using a network
A system and method for connecting a security system using a network. The security system includes at least two discrete parts and is connected using a local...
US-8,412,653 Knowledge extraction and transformation
The present disclosure includes a system and method for learning (or discovering and extracting) business knowledge from a collection of source code. The...
US-8,412,643 Apparatus, system, and method for quantifying, bundling, and applying credits and incentives to financial...
An apparatus, system, and method for quantifying, aggregating and bundling green incentives based on green construction enables applying at least a portion of...
US-8,412,625 System and methods for a multi-channel payment platform
The platform executes secure payment transactions between customers and registered merchants by using remote terminals. When the user authorizes his/her payment...
US-8,412,619 Systems and methods regarding targeted dissemination
One exemplary aspect comprises a computer-implemented method comprising: (a) electronically receiving, from a first securities market participant, data...
US-8,412,617 Methods and systems related to securities trading
One exemplary aspect comprises a method comprising: (a) receiving data describing an executed trading order in a market traded security and related trade...
US-8,412,157 Method and apparatus for security protection of an original user identity in an initial signaling message
A wireless transmit/receive unit (WTRU) includes a control plane (C-plane) packet data convergence protocol (C-PDCP) layer which performs ciphering of a...
US-8,411,867 Scalable and secure key management for cryptographic data processing
A method and system for secure and scalable key management for cryptographic processing of data is described herein. In the method, a General Purpose...
US-8,411,330 Image processing system, control method, recording medium, and image supplying apparatus
An image processing system is provided in which an image supplying apparatus is connected to a plurality of image processing apparatuses via a network, where at...
US-8,411,328 Print control apparatus, print control method, and program therefor
Conventionally, during a copy operation, certain advanced mode settings make the extraction of additional security information impossible. In order to solve...
US-8,410,926 Alarm for security tag
A security system can include a tag unit adapted to be secured to an infant via band. The first tag unit can include a temperature sensor, and a capacitance...
US-8,409,693 Data carrier having identifiers
The invention relates to a data carrier into which, by means of a laser beam, identifiers are introduced that are visible in the form of irreversible changes,...
US-8,408,932 Connector with locking mechanisms
A connector of a cable (e.g., a 30-pin connector) can be used to facilitate various security-related and other functionalities. For example, a connector can...
US-8,407,808 Security thread for protecting media content
Disclosed herein is a system and method for protecting copyrighted media content. The copyright and playback management information is embedded into at least...
US-8,407,807 Dynamic assertion providers for logic-based security policy languages
Architecture that employs dynamic assertion providers in logic-based security policy languages. The dynamic assertion providers provide a mechanism by which...
US-8,407,798 Method for simulation aided security event management
A method for simulation aided security event management, the method includes: generating attack simulation information that comprises multiple simulation data...
US-8,407,795 Systems and methods to secure backup images from viruses
A system and method provide for storing virus metadata with a backup image. Upon restoring files or data from the backup image, the virus metadata from the...
US-8,407,789 Method and system for dynamically optimizing multiple filter/stage security systems
A method and apparatus for dynamically and automatically optimizing multiple filter/stage security systems whereby a multiple filter/stage security system is...
US-8,407,780 Method and system for messaging security
An e-mail firewall applies policies to e-mail messages transmitted between a first site and a plurality of second sites. The e-mail firewall includes a...
US-8,407,773 Data and application access combined with communication services
An apparatus conveniently provides a user with access to applications and data that the user accesses on other devices in a secure and authenticated manner. The...
US-8,407,768 Data and application access combined with communication services
An apparatus conveniently provides a user with access to applications and data that the user accesses on other devices in a secure and authenticated manner. The...
US-8,407,763 Secure network interface device
An interface device for a protected workstation or host has a network interface for connection to a multi-level secure network, a first address corresponding to...
US-8,407,761 Encrypting operating system
A method of and system for encrypting and decrypting data on a computer system is disclosed. In one embodiment, the system comprises an encrypting operating...
US-8,407,759 Device, method, and system for secure mobile data storage
A device, method, and system for secure mobile data storage includes a mobile data storage device having a short-range communication circuit, a long-range...
US-8,407,758 Network security appliance
A network security appliance that provides security to devices in industrial environments by transparently bridging traffic to the endpoint device. The security...
US-8,407,720 Inter-process communication management
Inter-process communication management allows a first data storage system management application to execute a second data storage system management application....
US-8,407,488 Semiconductor device including encryption section, semiconductor device including external interface, and...
A secure LSI device 1 includes an encryption section 2 for encrypting a program, and an external I/F 50 for inputting/outputting a program or data from/to an...
US-8,407,476 Method and apparatus for loading a trustable operating system
An article of manufacture is provided for securing a region in a memory of a computer. According to one embodiment, the article of manufacture comprises a...
US-8,407,284 Systems and methods for cloud data deployment based on preferential and/or existing subscription relationships
Embodiments relate to systems and methods for transporting data to a cloud network. In aspects, an administrator of a data payload may wish to transport the...
US-8,407,194 Data classification and privacy repository
A data classification and privacy repository for creating a secure and accurate database to inventory an organization's private or sensitive personally...
US-8,407,130 Method and system for providing principal protection exposure to equity markets
Various embodiments of the present invention relate to methods and systems for providing principal protection exposure to equity markets. More particularly, one...
US-8,407,127 Fair value model based system, method, and computer program product for valuing foreign-based securities in a...
A system for determining fair value prices of financial securities of international markets includes selecting a universe of securities of a particular...
US-8,407,112 Transaction authorisation system and method
A transaction authorization system allows a customer to authorize transactions relating to at least one account associated with an institution. Data storage...
US-8,406,786 Methods and apparatus for extended generic messaging in a networked geolocation system
Generic messaging and protocols are provided for handset-to-handset communications in accordance with, for example, the Secure User Plane Location (SUPL)...
US-8,406,456 Methods and systems for image fingerprinting
The present invention provides methods and systems to protect an organization's secure image information from unauthorized disclosure. In one embodiment,...
US-8,406,427 Communication network with secure access for portable users
A communication network includes a local area network (LAN) and a wireless access point coupled to the LAN. In one embodiment, each access point includes a...
US-8,406,423 Multi-bit cryptographically secure encryptor for M-ary spectral phase encoder optical code division multiple access
A system and methods are provided for transmitting an encrypted data word of two or more bits. This involves identifying a random key word comprising two or...
US-8,405,982 Method and apparatus for installation and removal of overhead cooling equipment
Disclosed is a data center comprising a first row of equipment racks, a second row of equipment racks, a hot aisle defined by a space between the first row of...
US-8,405,847 System and method for providing security data and image forming device therefor
A system implementing a method of providing a security data has a requesting image forming device receiving an authorization information from a user to...
US-8,405,508 Use of gamma hardened RFID tags in pharmaceutical devices
A system and method for utilizing RFID tags in environments where radiation is used is disclosed. RFID tags are secured to various components of a...
US-8,405,506 Secure data entry device
A secure data entry device including a housing, tamper sensitive circuitry located within the housing and tampering alarm indication circuitry arranged to...
US-8,405,499 Methods, systems, and products for security services
Methods, systems, and products are disclosed for notification of alarms in security systems. A packetized alarm message is received from a security system...
US-8,405,486 Electric power transmitting and receiving device, electric power transmitting device and electric power...
In wireless electric power transmission and reception, the efficiency of transmission and reception is improved and a device to which electric power can be...
US-8,403,229 Secure card packaging with concealed activation field
Improved secure card packaging is provided which includes a concealed region within which an activation data field corresponding with a transaction card is...
US-8,403,210 Installation-free chip card reader for secure online banking
In order to use a mobile smartcard reader that can address commercial smartcards conforming to the EMV standard in a simple manner, the invention provides a...
US-8,403,207 Transaction recordal method
A method of recording a transaction relating to a security document is disclosed. Coded data portions are provided on the security document, with each coded...
US-RE44,111 Record carrier comprising encryption indication information
A record carrier, recording device, read-out device and method is provided which provides a flexible security level to protect user data during transmission...
US-8,402,558 Securing digital content system and method
A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or...
US-8,402,552 System and method for securely accessing mobile data
The present invention provides a system and method for maintaining secure information on mobile devices and that balances security and convenience in the...
US-8,402,547 Apparatus and method for detecting, prioritizing and fixing security defects and compliance violations in...
A static code analysis (SCA) tool, apparatus and method detects, prioritizes and fixes security defects and compliance violations in SAP.RTM. ABAP.TM. code. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.