Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,417,788 File system for virtual local area network
A file system that utilizes Virtual Local Area Network (VLAN) addressing and routing schemes to permit implementing multiple networked file system applications...
US-8,417,776 Online evidence collection
Collecting and preserving evidence developed during an on-line investigation. Evidence gathered on-line is hashed with a time stamp from an external time source...
US-8,417,741 System and method for replication, integration, consolidation and mobilisation of data
The system for replication, integration, consolidation and mobilization of data according to the present invention provides a flexible framework of functionally...
US-8,417,734 Systems and methods for managing sets of model objects via unified management interface
A computing system generates a model object from source data, the model object based on an extracted data element of the source data and an attribute of the...
US-8,417,643 Trusted service manager (TSM) architectures and methods
A client device comprises a first secure element and a second secure element. The first secure element comprises a first computer-readable medium having a...
US-8,417,623 System and method for implementing an investment company that issues a class of conventional shares and a class...
A system is provided for administering a single investment company that issues one or more classes of shares that are bought from and redeemed with the single...
US-8,417,604 Personal data aggregation, integration and access
A data storage archive is provided for storing personal information and other data from a variety of disparate information sources. The information stored may...
US-8,417,536 Ultrasound laboratory information management system and method
A multifunctional information management system that integrates a plurality of modules, each of the modules being interfaced via a relational database. The...
US-8,417,470 Safety pulser for fuel dispenser and method for judging fraud activity
A security pulse generator and methods thereof are applied in fuel dispensers. The fuel dispenser includes a flow measuring transducer and a control main board...
US-8,417,217 Portable information terminal, security method, and program storage medium
A mobile phone, when it is stolen or lost, autonomously detecting and protecting by itself the data held inside, wherein a security managing unit performs a...
US-8,416,948 System for secure variable data rate transmission
Secure Variable Data Rate Transceivers and methods for implementing Secure Variable Data Rate are presented. An efficient and systematic method and circuit for...
US-8,416,942 Methods, systems, and computer program products for implementing a custom, interactive call flow
A method, system, and computer program product for implementing a custom, interactive call flow are provided. The method includes receiving a sequence of user...
US-8,416,929 Sharing solutions for a universal linking gateway between telephonic devices
A universal linking gateway interfaces between a local network of one or more local phones, such as analog phones or PBX phones, a plurality of cell phones and...
US-8,416,704 Radio communication system and communication method
A radio communication system of a frequency hopping system, which carries out time division multiplex by TDMA and carries out communications while changing over...
US-8,416,688 Automatic adaptive network traffic prioritization and shaping
A local area network includes computers and peripherals networked in a high-speed LAN with access to a WAN through a slower connection via a broadband modem. A...
US-8,416,081 Microprocessor controlled security tag
A microprocessor controlled security tag and accompanying security system is described. The tag generally includes a housing having external contacts to...
US-8,416,058 Secure method for biometric verification of a person
In various embodiments, a method for biometric verification of a person is provided. The method may include detecting a biometric sample of a biometric...
US-8,414,387 Peer-to-peer wagering platform
A system includes a third party game server, a plurality of third party game instances and a transactional server. The third party game server provides data...
US-8,413,906 Countermeasures to secure smart cards
The present disclosure introduces a new technique for hiding sensitive information in smart cards. A smartcard system relying on stegnography rather than...
US-8,413,248 Method for secure single-packet remote authorization
A method for secure single-packet remote authorization using a single packet authorization (SPA) server on a host system that passively monitors the network for...
US-8,413,247 Adaptive data collection for root-cause analysis and intrusion detection
Endpoints in an enterprise security environment are configured to adaptively switch from their normal data collection mode to a long-term, detailed data...
US-8,413,235 Malware detection using file heritage data
A security module on a client monitors file creations at the client and reports heritage data describing the monitored file creations to a security server. A...
US-8,413,233 Authorizing local application activity using remotely defined security data
Systems and methods, including computer software adapted to perform certain operations, can be implemented for preventing content received from non-trusted...
US-8,413,224 Method for data transfer in a network
A sophisticated gateway is connectable with at least one device, further sophisticated gateways, and/or a network. The sophisticated gateway includes an...
US-8,413,215 System and method for extending secure authentication using unique session keys derived from entropy
In some aspects of the present disclosure a device is disclosed that includes a processor; a storage unit; a user interface; a transceiver; a device identifying...
US-8,412,957 Encryption and decryption of records in accordance with group access vectors
According to some embodiments, a system, method, means, and/or computer program code are provided to facilitate an appropriate access to secure information by a...
US-8,412,955 Framework and method for secure data management in a diversified platform
The disclosure provides a method and a framework for secure data management, in which the method comprises: enabling, by an enterprise server, a user to...
US-8,412,949 Personal digital key initialization and registration for secure transactions
A system and method provide efficient, secure, and highly reliable authentication for transaction processing and/or access control applications. A personal...
US-8,412,947 System and method of secure encryption for electronic data transfer
A system for secure transfer of encrypted data involves a sender client (36), a recipient client (38), a main server (40), and a key server (42). The sender...
US-8,412,945 Systems and methods for implementing security in a cloud computing environment
Computer systems and methods are provided in which an agent executive, when initially executed in a virtual machine, obtains an agent API key from a user. This...
US-8,412,941 Secure data exchange technique
Techniques utilizing common encryption approaches for data from multiple parties enable those parties to discover information that is held in common by the...
US-8,412,938 Zero-knowledge based authentication method, system, and apparatus
In the fields of data security and system reliability and qualification, this disclosure is of a method, system and apparatus for verifying or authenticating a...
US-8,412,930 Device authentication within deployable computing environment
A deployable computing environment may facilitate interaction and data sharing between users and devices. Users, devices, and relationships between the users...
US-8,412,926 Using file metadata for data obfuscation
A system and method may assist in securing data for transmission to a receiving entity. Received data may include metadata associated therewith. The data may be...
US-8,412,903 Method and system for managing secure code loading in PC-slave devices
A secure processor in a PC-slave device manages secure loading of execution code and/or data, which is stored, in encrypted form, in a PC hard-drive. The secure...
US-8,412,854 Secure communication port redirector
A method and system that allows a host system application to securely communicate with a legacy device is provided. A redirector software module receives data...
US-8,412,837 Data privacy
In some embodiments, techniques for data security may include encoding and decoding unreadably encoded data, such as data encrypted with a public key or...
US-8,412,806 Setting a preliminary time on a network appliance using a message received from a server
A method and system for setting a time on a network appliance. The method may include attempting to establish a secure connection with a backend server using a...
US-8,412,789 System and method for connecting a security system using a network
A system and method for connecting a security system using a network. The security system includes at least two discrete parts and is connected using a local...
US-8,412,653 Knowledge extraction and transformation
The present disclosure includes a system and method for learning (or discovering and extracting) business knowledge from a collection of source code. The...
US-8,412,643 Apparatus, system, and method for quantifying, bundling, and applying credits and incentives to financial...
An apparatus, system, and method for quantifying, aggregating and bundling green incentives based on green construction enables applying at least a portion of...
US-8,412,625 System and methods for a multi-channel payment platform
The platform executes secure payment transactions between customers and registered merchants by using remote terminals. When the user authorizes his/her payment...
US-8,412,619 Systems and methods regarding targeted dissemination
One exemplary aspect comprises a computer-implemented method comprising: (a) electronically receiving, from a first securities market participant, data...
US-8,412,617 Methods and systems related to securities trading
One exemplary aspect comprises a method comprising: (a) receiving data describing an executed trading order in a market traded security and related trade...
US-8,412,157 Method and apparatus for security protection of an original user identity in an initial signaling message
A wireless transmit/receive unit (WTRU) includes a control plane (C-plane) packet data convergence protocol (C-PDCP) layer which performs ciphering of a...
US-8,411,867 Scalable and secure key management for cryptographic data processing
A method and system for secure and scalable key management for cryptographic processing of data is described herein. In the method, a General Purpose...
US-8,411,330 Image processing system, control method, recording medium, and image supplying apparatus
An image processing system is provided in which an image supplying apparatus is connected to a plurality of image processing apparatuses via a network, where at...
US-8,411,328 Print control apparatus, print control method, and program therefor
Conventionally, during a copy operation, certain advanced mode settings make the extraction of additional security information impossible. In order to solve...
US-8,410,926 Alarm for security tag
A security system can include a tag unit adapted to be secured to an infant via band. The first tag unit can include a temperature sensor, and a capacitance...
US-8,409,693 Data carrier having identifiers
The invention relates to a data carrier into which, by means of a laser beam, identifiers are introduced that are visible in the form of irreversible changes,...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.