Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,700,429 System and method for managing pedigree information
Methods and systems are provided for managing and transmitting pedigree information. The methods and systems allow a user to access a pedigree information...
US-8,700,202 System for positioning a tool in a work space
A system for assisting in the use by an operator of the operating element of a tool at desired locations at a worksite, includes a stationary control and a...
US-8,700,095 Management method and apparatuses
After a successful authentication in a femto system, a home base station management system is used to send configuration data to a home base station and manage...
US-8,700,010 Communications device with secure data path processing agents
A communications device comprising one or more communication input/output (I/O) ports, at least one of the one or more communication I/O ports being a wide area...
US-8,699,798 Information input output method using a dot pattern
In exemplary embodiments, a dot pattern technique is provided with flexible length of data to be registered and with enhanced security by arranging a dot...
US-8,699,712 Randomization of plain text for GSM SACCH
The present document relates to the transmission of data in a digital cellular telecommunications network. In particular, the present document relates to the...
US-8,699,466 Apparatus and method of controlling seamless handover between heterogeneous networks based on IPv6 over IPv4...
The invention relates to a method and an apparatus for controlling seamless handover between heterogeneous networks based on IPv6 over IPv4 tunneling. When IPv6...
US-8,699,377 System and method for implementing mesh network communications using a mesh network protocol
The following describes data structures, communication protocol formats and process flows for controlling and facilitating secure communications between the...
US-8,699,263 DRAM security erase
In a method of erasing data, a wordline of the DRAM array is set active, and signals develop on bitlines according to flows of charge between memory cells...
US-8,699,087 Image generating apparatus, image processing apparatus, image forming apparatus, and recording medium
Additional image data of an additional image, which is based on first data and second data concerning security of obtained data, is added to image data that is...
US-8,698,630 RFID remote antenna security system
An RFID remote antenna security system for preventing unauthorized reading of RFID cards. The RFID remote antenna security system generally includes a remote...
US-8,698,625 Systems and methods for providing security at a vehicle yard
Systems and methods for providing security at a vehicle yard are provided. A communicator may collect data associated with a plurality of vehicles or trailers...
US-8,698,594 System, device and method for securing a user device component by authenticating the user of a biometric sensor...
A novel system, device and method of validation is provided for sensing a biometric such as a fingerprint, where biometric data corresponding to the biometric...
US-8,695,066 System and method for secure communication between domains
A method for secure communications between first and second domains where a first logical unit calculates timestamps and hashes and transmits web forms to a...
US-8,695,059 Method and system for providing network security services in a multi-tenancy format
An approach is provided for performing cloud based computer network security services. Security policies are established for each of a number of subscribers....
US-8,695,056 Method for information tracking in multiple interdependent dimensions
A method for information flow tracking is provided using, for example, a functional programming language based on lambda calculus, .lamda..sub.I. The method...
US-8,694,801 Method and computer program for securely storing data
A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving...
US-8,694,800 Apparatus and method for securing data on a portable storage device
A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of...
US-8,694,796 Secure data deletion in a database
A data storage application encrypts one or more data pages using a first initialization vector and one or more encryption keys. In addition, the data storage...
US-8,694,788 Security system
A security system includes an interface, a main computer, and an application server. The interface enables a user to access a remote document related to a...
US-8,694,787 Apparatus and method for securing digital data with a security token
A security token includes a wireless interface to communicate with a secured device. A cryptographic module generates cryptographic information, encrypts...
US-8,694,767 Method and system for NAND flash support in an autonomously loaded secure reprogrammable system
A system and method that enables secure system boot up with a restricted central processing unit (CPU). The system includes a memory, a segmenting device, and a...
US-8,694,600 Remote monitoring systems for monitoring medical devices via wireless communication networks
A remote monitoring system for monitoring a plurality of medical devices at a patient care or home care facility. The system includes a device integration...
US-8,694,467 Random number based data integrity verification method and system for distributed cloud storage
A data integrity verification method and system based on a root random number to ensure secure distributed data storage on a public cloud. A new root random...
US-8,694,437 Smartcard-based value transfer
In a value transfer scheme, users are provided with programmable devices, for example, smart cards, capable of carrying data representing at least one available...
US-8,694,418 Integrated trading information processing and transmission system for exempt securities
The present invention provides a system for processing and transmitting trading information incorporating (a) a risk analytic module using the latest market...
US-8,694,408 Methods, systems and securities for assuring a company an opportunity to sell stock after a specified time
Various embodiments of the present invention relate to methods, systems and securities for assuring a company an opportunity to sell stock after a specified...
US-8,694,402 Using accounting data based indexing to create a low volatility portfolio of financial objects
A system, method and computer program product creates an index based on accounting data, or a portfolio of financial objects based on the index where the...
US-8,694,352 System and method for providing handheld field force data gathering automation in a big box retail environment
The present invention provides systems and methods for tracking service representative activity and data. Service representatives are equipped with handheld...
US-8,694,339 System and method for determining loss data based on industry indices
Systems and methods for evaluating basis risk associated with index based security instruments. The systems and methods calculating an element factor for each...
US-8,694,136 Performance monitoring devices and methods
We have disclosed devices and methods for monitoring an individual's performance during a physical activity. The devices may include multiple elements such as a...
US-8,693,944 Method and apparatus of performing video programming security control
Disabling data channels at a customer premises provides, in one embodiment, generating at least one jamming signal and inserting the at least one jamming signal...
US-8,693,865 Network security using optical attenuation data
A data processing device is connectable to a communication network and operable to receive data associated with an attenuation characteristic of a transmission...
US-8,693,689 Location brokering for providing security, privacy and services
Location brokering technique embodiments are presented that employ sensor data captured by a user's mobile device to determine the device's location, encrypt...
US-8,693,669 Methods, systems, and computer program products for implementing a custom, interactive call flow
A custom call flow is implemented by receiving a sequence of user inputs provided as part of an interactive call between a caller requesting a service and a...
US-8,693,029 Systems and methods for the reliable transmission of facsimiles over packet networks
A method to efficiently and reliably guarantee delivery of fax documents not residing on the internet being transported through the internet to a non-internet...
US-8,692,884 Apparatus and method for assessing visual acuity
Disclosed is an apparatus and associated method an apparatus and method for assessing visual acuity of an image captured by a digital security camera. The user...
US-8,692,695 Methods for encoding and decoding data
The transmission of broadcast data, such as financial data and news feeds, is accelerated over a communication channel using data compression and decompression...
US-8,692,675 Vibratory feedback systems and methods
Vibratory feedback systems and methods are disclosed. A vibratory feedback system includes a shoe adapted to be secured to a user's foot, a plurality of force...
US-8,692,669 Constant optical output illumination system
The present invention is an illuminator for CCTV surveillance and security applications that maintains constant optical output from an array of LEDs by...
US-8,692,665 Methods, systems, and products for security services
Methods, systems, and products notify of alarms in security systems. Sensor data is received from an alarm sensor, and an alarm condition is determined by an...
US-8,690,773 Security enabled medical screening device
Embodiments of the invention pertain to networked kiosks capable of providing enhanced health and/or entertainment and/or advertising information. In an...
US-8,690,211 Holding aid for a personal, hand-held, tablet-shaped device and methods of use
A securement device to make it much easier for a user to securely hold onto a personal, hand-held, tablet-shaped device such as an electronic reader, a tablet...
US-8,690,056 Secure payment card transactions
Payment card transactions at a point of sale (POS) are secured in certain embodiments by intercepting, with a POS security layer installed on a POS terminal,...
US-8,690,054 System and method for chip-enabled card transaction processing and alert communication
A system, method and computer program product is capable of proactive assessment of transactions and communication of alerts based on pre-set rules to increase...
US-8,689,354 Method and apparatus for accessing secure data in a dispersed storage system
A method begins by a processing module receiving, from a user device, a request to access secure data, wherein the request includes a user identification code...
US-8,689,343 System and method for securely transmitting video data
Exemplary embodiments provide a system and method for securely transmitting video data to an electronic display. The video data may be transmitted using a wired...
US-8,689,338 Secure terminal, a routine and a method of protecting a secret key
The method of protecting a secret key from being read by a non-secure software application, comprises a step (94) of recording the secret key as a routine...
US-8,689,336 Tiered exposure model for event correlation
A method for real-time threat monitoring includes identifying two or more real time vulnerabilities, each associated with one or more objects of an enterprise,...
US-8,689,320 Image forming apparatus with hard disk drive securely formatted
If the validity of authorization information read from a USB key is verified (S1 to S4), use-information that indicates "used" is written in both of the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.