Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,488,458 Secure unauthenticated virtual local area network
An apparatus having a corresponding method and computer program comprises a control circuit to determine a number N of network devices belonging to a virtual...
US-8,488,428 Enhanced security of optical article
An optical article comprising a first file encoded on the optical article comprising data structure information; a second file encoded on the optical article...
US-8,488,311 Container data center
A container data center includes a mobile container and a number of servers. The mobile container includes a main room receiving the servers, and an air shower...
US-8,488,310 Thin data storage device
The present invention is to provide a thin data storage device with a support pad's length positioned at a USB port's height in a way for a supporting segment...
US-8,488,175 Method for transforming and transporting printer data over the internet in a secure and reliable manner
A method for managing a plurality of printers connected to a network, the method comprising the following steps: scanning the network to obtain printer usage...
US-8,488,013 System for remote control of a medical imaging system
A system enables secure, safe remote access and control of stand-alone medical imaging systems whilst maintaining physical separation and independence from the...
US-8,487,762 Using abnormal mobile station gathering to trigger security measures
A server may detect a threshold number of mobile stations (e.g., total mobile stations or mobile stations belonging to a predefined group) currently located at...
US-8,487,757 Method and system for providing tracking services to locate an asset
The present invention is directed to a method of asset location. Location data is received from a cellular transmitter associated with a selected asset, which...
US-8,484,748 Method and device for classifying and processing data in instant messaging system
The embodiment of this invention provides a method for classifying and processing data in an instant messaging system, which includes: classifying the data of...
US-8,484,733 Messaging security device
In one embodiment, a system can comprise an interface that receives data related to a communication session and a messaging security device component that...
US-8,484,726 Key security indicators
Systems, methods and apparatus for a distributed security system that provides security processing for security customers external to network edges of external...
US-8,484,698 Multichannel device utilizing a centralized out-of-band authentication system (COBAS)
A multichannel security system is disclosed, which system is for granting and denying access to a host computer in response to a demand from an access-seeking...
US-8,484,483 Method for protecting computer programs and data from hostile code
A method that protects computer data from untrusted programs. Each computer's object and process is assigned with trust attributes, which define the way it can...
US-8,484,481 Chip lockout protection scheme for integrated circuit devices and insertion thereof
A system for implementing a chip lockout protection scheme for an IC device includes an on-chip password register that stores a password externally input by a...
US-8,484,464 Method and devices for providing secure data backup from a mobile communication device to an external computing...
A method and devices for providing secure data backup from a mobile communication device to an external computing device is described. In accordance with one...
US-8,484,268 Random wave envelope derived random numbers and their use in generating transient keys in communication...
A random wave envelope is created from a set of bounded random numbers by additively combining a triangle, a square and a sine wave. The random wave envelope is...
US-8,484,263 Method for keyless protection of data using a local array of disks
A method secures data in a network. The data includes a data message that has a first bit length. A random number is generated and transformed to create a first...
US-8,484,247 System and method of securing and authorizing multidimensional transactional data
In one embodiment the present invention includes a system for securing and authorizing access to multidimensional transactional data. The system includes online...
US-8,484,133 Secure targeted personal buying/selling method and system
Embodiments described herein include a buying and selling method including receiving a request from a user to book a ticket for an event, determining a time for...
US-8,484,109 Systems and methods for improved financial calculators
In various embodiments, financial calculators with improved data security and data integration, collecting, managing and sharing data generated by a user are...
US-8,483,391 Optical communication system and method for secure data communication using quantum key distribution
The invention provides time-synchronised transmission of data on the (polarisation or phase-modulated) QKD channel and the (on-off modulated) conventional...
US-8,482,633 Apparatus and method for image processing using security function
An image processing apparatus includes: a user input unit that converts input manipulation of a user into an input signal; a security setting unit that sets a...
US-8,482,540 Configuring a user interface for use with an overlay
An overlay secured to a mobile device and positioned over a portion of a touch-activated user interface on the mobile device functions as a guide and includes...
US-8,480,761 Security enclosure for a router
A router comprises a local network interface and routing services. The router also includes a data exchanger interface that can be configured to connect to a...
US-8,480,144 Holding aid for a personal, hand-held, tablet-shaped device and methods of use
A securement device to make it much easier for a user to securely hold onto a personal, hand-held, tablet-shaped device such as an electronic reader, a tablet...
US-8,479,983 Automated banking machine operation authorization based on user location verified by data read from data...
An automated banking machine transaction request is authorized based on the determined location of an authorized user relative to the machine. Identification of...
US-8,479,978 Banking system controlled responsive to data bearing records
An automated banking machine is part of a banking system that operates to cause financial transfers responsive to data read from data bearing records. The...
US-RE44,362 Using accounting data based indexing to create a portfolio of financial objects
A system, method and computer program product creates an index based on accounting based data, as well as a portfolio of financial objects based on the index...
US-8,479,304 Selectively protecting against chosen plaintext attacks in untrusted storage environments that support data...
Various methods and systems for selectively protecting against chosen plaintext attacks when encrypting data for storage on an untrusted storage system are...
US-8,479,278 Virtualized secure networking
The invention provides a data processing system for the support of secure networking on a single, virtualized hardware platform. The data processing system...
US-8,479,276 Malware detection using risk analysis based on file system and network activity
A virtual machine computing platform uses a security virtual machine (SVM) in operational communications with a risk engine which has access to a database...
US-8,479,275 Secure high-throughput data-center network employing routed firewalls
A reliable and secure data-center. The data center includes a first data-center tier that is adapted to connect to an external network and an internal portion...
US-8,479,264 Architecture for virtual security module
A device supports the processing of multiple active applications in a processor through a mapping system that securely identifies and differentiates commands...
US-8,479,259 Secure customer interface for web based data management
An integrated series of security protocols is disclosed that protect remote user communications with remote enterprise services, and simultaneously protect the...
US-8,479,258 Garage management system
A garage management and monitoring system defines and manages each operational event in a parking facility. Access events, management events, equipment...
US-8,479,022 Secure mode indicator for smart phone or PDA
A digital system is provided with a secure mode (3.sup.rd level of privilege) built in a non-invasive way on a processor system that includes a processor core,...
US-8,479,020 Method and apparatus for providing an asymmetric encrypted cookie for product data storage
A process may be utilized by a device to implement public key asymmetric encryption. The process encrypts a data set with a symmetric encryption key to form an...
US-8,479,013 Secure portable data transport and storage system
A portable data transport device that provides security to data stored therein, and is configured to communicate data with a host computer for securing and...
US-8,479,008 Providing security services on the cloud
Embodiments are directed to the providing a cloud keying and signing service and to securing software package distribution on the cloud. In an embodiment, a...
US-8,479,003 Electronic signature validation systems and methods for asynchronous environments
A system and method for non-real-time validation of an electronically signed message transmitted via an asynchronous communications link is provided. The method...
US-8,478,997 Multi-level security software architecture
A multi-level security software architecture includes various components configured to provide full data separation across multiple processors while limiting...
US-8,478,995 Method of encrypting and transferring data between a sender and a receiver using a network
A method of encrypting and transferring data between a sender and a receiver using a network thereby transferring data in a secure manner includes the steps of...
US-8,478,982 Media access control security management in physical layer
A media access control (MAC) security (MACsec) function block may implement MACsec protocols on a network. A physical layer device (PHY) may connect to the...
US-8,478,894 Web application response cloaking
Method and system for centralized control of data transfers between a Web client and a Web application by receiving a response from the Web application. After...
US-8,478,788 Centralized information technology resources analysis system
SecureFusion is a knowledge management system that integrates asset and risk management of Information technology resources for enterprises and provides metrics...
US-8,478,673 Using commercial share of wallet in private equity investments
Commercial size of spending wallet ("CSoSW") is the total business spend of a business including cash but excluding bartered items. Commercial share of wallet...
US-8,478,104 Copy secure multimedia RFID with analog transmitter
A portable RFID device includes an analog modulation radio frequency transmitter and a data storage holding audio data files. In response to user entered...
US-8,477,941 Maintaining secure communication while transitioning networks
A method and medium are provided for maintaining a secure communication of a media stream as a mobile device transitions from a first network a second network....
US-8,477,936 Management system including display apparatus and data management apparatus for displaying data on the display...
In order to restrict a destination of data for security and facilitate acquisition of the data at the destination, a conference system includes an MFP and a...
US-8,477,792 System and method for managing dynamic network sessions
For an Internet Access Gateway operative between an area network and a public network, managing dynamic network sessions therebetween whereby a primary server...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.