Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,296,584 Storage and retrieval of encrypted data blocks with in-line message authentication codes
Techniques are disclosed for in-line storage of message authentication codes with respective encrypted data blocks. In one aspect, a given data block is...
US-8,296,570 Flexible method of user authentication
A method of authorizing a user in communication with a workstation is disclosed. According to the method, a system automatically determines a plurality of...
US-8,296,538 Storing secure mode page table data in secure and non-secure regions of memory
Apparatus for data processing 2 is provided with processing circuitry 8 which operates in one or more secure modes 40 and one or more non-secure modes 42. When...
US-8,296,477 Secure data transfer using legitimate QR codes wherein a warning message is given to the user if data transfer...
User data is securely transferred from a client device to a mobile device. Data transfer activities at the client are monitored to detect a request to transfer...
US-8,296,462 Header-based network API
A method and apparatus for communicating with entities outside of a secure network by intercepting and modifying messages is provided. Techniques for...
US-8,296,323 Personal data subscriber systems and methods
Methods and systems for facilitating the propagation of personal data include a Personal Data Propagation Environment ("PDP environment") that facilitates the...
US-8,296,301 Systems and methods for probabilistic data classification
A system for performing data classification operations. In one embodiment, the system comprises a filesystem configured to store a plurality of computer files...
US-8,296,269 Apparatus and method for read consistency in a log mining system
A computer readable storage medium includes executable instructions to receive a specification for requested data in a log based replication system where data...
US-8,296,244 Method and system for standards guidance
A method and system for guiding end-users with respect to payment card data security standards. The system uses guidance questions that are worded simply and...
US-8,296,221 Methods and systems related to securities trading
At least one exemplary aspect comprises a method comprising: (a) receiving electronic data describing a trading order for a market-traded security; (b) checking...
US-8,295,851 Realtime, interactive and geographically defined computerized personal matching systems and methods
A system and method of interactive and live computerized matching in which a first user is provided with a personal data device including a wireless...
US-8,295,808 Secure remote subscription module access
Disclosed is a method of granting a client communications terminal access to a subscription module of a server communications terminal, the method comprising...
US-8,295,773 Communication apparatus and communication system
Remote control data is securely transmitted to a device under control. A remote control device transmits an acknowledge request for A ch to the device under...
US-8,295,484 System and method for securing data from a remote input device
An input device with an integrated security module communicates with a processing component over an insecure medium. The insecure medium may be a wireless...
US-8,295,306 Layer-4 transparent secure transport protocol for end-to-end application protection
Techniques for providing layer 4 transparent secure transport for end-to-end application protection are described herein. According to one embodiment, a packet...
US-8,295,273 Standard telephone equipment (STE) based deployable secure communication system
Sensitive, Standard Telephone Equipment (STE) data is encapsulated into IP packets in a remotely deployed, secure communication system. The IP packets are...
US-8,295,168 Security groups
Methods and devices are provided for implementing security groups in an enterprise network. The security groups include first network nodes that are subject to...
US-8,295,149 Recording medium, method and apparatus for reproducing data on the recording medium, and method and apparatus...
A recording medium on which data is recorded in units of clusters, a method and apparatus for reproducing data on the recording medium, and a method and...
US-8,294,881 Security system using LADAR-based sensors
A security sensor system comprises one or more laser detection and ranging (LADAR) sensors configured for accumulation of three-dimensional image data. In one...
US-8,294,574 Security device comprising a plurality of interfaces
A security device comprising interfacing means incorporating a speaker (50) and a microphone (49) for interfacing with a person; a mobile network transmitter;...
US-8,294,549 Apparatus for access control and processing
The present invention relates to methods and systems for providing secure access control to a facility. An access control system comprises a scanner located...
US-8,294,302 System for providing power and data transmission between a door and a frame
A system for providing wire-free and contact free electric power and communication connection in a security installation between a door and a frame. The cores,...
US-8,291,490 Tenant life cycle management for a software as a service platform
Managing user access to application-specific capabilities of a system includes maintaining data correlating application-specific capabilities for each of the...
US-8,291,487 System and method for distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the...
US-8,291,483 Remote network device with security policy failsafe
A remote network device having a network security policy, includes: a firewall component embedded within the network device to filter data flow with a network;...
US-8,291,475 Secure cross-domain communication for web mashups
A secure cross-domain communication system and method for facilitating secure communication between a website having a web mashup and websites having content...
US-8,291,473 Methods, systems, and computer program products for modeling a secure production network
Methods, systems, and computer program products for modeling a secure production network are provided. A method includes generating a test network for emulating...
US-8,291,472 Real-time adjustments to authentication conditions
Embodiments of the invention provide for adjusting authentication conditions in real-time. A graph-theoretic data structure is dynamically constructing, having...
US-8,291,467 Information processing apparatus, information management method, and storage medium therefor
An image forming apparatus capable of flexibly setting a security policy for a modified file. A client terminal generates a print job added with a new security...
US-8,291,342 Secure device sharing
A device and method for placing the device in a locked state having an associated set of permitted tasks so as to permit the device owner to share the device...
US-8,291,258 High availability for network security devices
In one example, a backup intrusion detection and prevention (IDP) device includes one or more network interfaces to receive a state update message from a...
US-8,291,240 Securely storing data
A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving...
US-8,291,236 Methods and apparatuses for secondary conditional access server
Conditional access to media content of primary security systems on a secondary networked environment. In one embodiment, a conditional access server is used to...
US-8,291,230 Method and system for signing JavaScript object notation (JSON) messages
A machine-implemented method for signing a JSON message begins by constructing a reference element for each data object in the JSON message. The data object is...
US-8,291,226 Method and apparatus for securely booting from an external storage device
Techniques to securely boot up an electronics device (e.g., a cellular phone) from an external storage device are described. Secure data (e.g., a hash digest, a...
US-8,291,220 Securing wireless body sensor networks using physiological values for nonces
A key establishment protocol for securing wireless body sensor networks using environmental data for nonce values. To establish a secure communication between...
US-8,291,218 Creating and using secure communications channels for virtual universes
A system and method provides secure channels for communication in a virtual universe by employing a packet interception layer for incoming and outgoing data...
US-8,291,212 System and method for compressing secure E-mail for exchange with a mobile data communication device
A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile...
US-8,291,184 Copy control apparatus
A copy control apparatus for controlling a copy process between disks includes a copy process execution unit, a data capacity measuring unit, and a changing...
US-8,291,119 Method and systems for securing remote access to private networks
A method for securing remote access to private networks includes a receiver intercepting from a data link layer a packet in a first plurality of packets...
US-8,291,084 Communication mediating device for mediating communication over network
A mediation server 200 mediates a print demand from a client device 100 to a printing device 300. In order to elude a firewall F/W set between the mediation...
US-8,291,057 Data transferring method and content transferring method
In a method of transferring data in a data interoperable environment, a secure authenticated channel is established with a receiving entity corresponding to...
US-8,290,955 Classification of data in a hierarchical data structure
Embodiments of the invention are generally related to data security, and more specifically to data classification. The nodes of a hierarchical data structure...
US-8,290,871 Systems and methods for a secure recording environment
Systems and methods are disclosed for providing secure, captured data in a customer center. In one embodiment, the method comprises: capturing data with a...
US-8,290,433 Method and system for securing transactions made through a mobile communication device
A method for transmitting data between a mobile communication device and a server. The method includes running a mobile application on the mobile communication...
US-8,290,371 OCDM-based all optical multi-level security
A high data rate optical signal is inverse multiplexed into a multitude of lower-rate tributaries, each of which is coded by its unique OCDM code, and the...
US-8,290,165 Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and...
A key management system includes secured data stored on a first system secured by a control key stored securely on a key server. The secured data is secured...
US-8,290,160 Method and apparatus for secured facsimile transmission
A novel and unique method, program and apparatus for secured facsimile transmission. It converts the image pixels into 8 bit ASCII characters, encrypting the...
US-8,290,159 Data recovery method, image processing apparatus, controller board, and data recovery program
A disclosed data recovery method, image processing apparatus, controller board, and data recovery program enable data stored encrypted in a storage unit within...
US-8,290,135 Systems and methods for facilitating conference calls using security keys
Systems and methods are described that facilitate a conference call between a plurality of communication devices. The method may comprise: providing a first...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.