Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,332,526 Data communication protocol including negotiation and command compounding
Described is a data communication protocol, in which a client and server negotiate in a manner that does not require the client to retry negotiation when...
US-8,332,524 Information on demand process framework to generate, manage, secure, and deploy browsers and application...
Disclosure is a method and system for delivering a reusable framework. The disclosure invokes an interface to define an information service within the reusable...
US-8,332,511 System and method for providing a script-based collection for devices in a network environment
A method is provided in one example and includes verifying a storage capacity of a network element coupled to an end device over a network connection. The...
US-8,332,325 Encryption switch processing
A method for delivering non-financial electronic data through a secure communications channel between a payment processing network and an access device is...
US-8,332,174 Computer instructions for positioning a wire using sensor information
Computer instructions for determining coordinates for nodes on a wire secured to tow lines of a floating vessel for analyzing geological formations is provided....
US-8,331,905 Communications terminal device
A communication terminal device is provided with a communication unit; a memory unit that stores a telephone directory data having at least names, telephone...
US-8,331,904 Apparatus and a security node for use in determining security attacks
Apparatus including functionality configured to monitor said apparatus for security attacks; and a reporter configured to send data to a security node, wherein...
US-8,331,775 Fingerprint scanning systems and methods
Embodiments relate to methods and systems for gathering, archiving, transmitting, and processing forensic and latent fingerprints. An integrated forensic...
US-8,331,449 Fast encoding method and system using adaptive intra prediction
Fast encoding method and system are provided which can transmit video data in real time using adaptive intra prediction in accordance with the H.264/AVC...
US-8,331,294 Method and system for managing information among personalized and shared resources with a personalized portable...
A user's request via a portable or handheld wireless communication device (HWCD) to process data may result in discovery of one or more networked resources...
US-8,330,966 Unit using OS and image forming apparatus using the same
A chip mountable on a customer replaceable unit monitory (CRUM) unit used in an image forming job includes a central processing unit (CPU) to perform...
US-8,330,755 Image display device and driving method for same for collective write in
An image display with high brightness where a long time can be secured for light emission of self-luminous elements can be implemented using only line memories....
US-8,330,647 Sensor suite and signal processing for border surveillance
A land-based smart sensor system and several system architectures for detection, tracking, and classification of people and vehicles automatically and in real...
US-8,330,624 Enhancements to meterless remote parking monitoring systems
A remote meterless parking monitoring system including a plurality of individual parking spaces, a plurality of vehicle detector/RFID units for monitoring the...
US-8,330,606 Secure data entry device
A secure data entry device including a housing, a keypad mounted in the housing and including a plurality of selectably depressible keys, tampering alarm...
US-8,330,493 High utilization universal logic array with variable circuit topology and logistic map circuit to realize a...
Disclosed is a novel circuit able to generate any logic combination possible as a function of the input logic signals. The circuit is described as a 2 input...
US-8,328,095 Secure payment card transactions
Payment card transactions at a point of sale (POS) are secured in certain embodiments by intercepting, with a POS security layer installed on a POS terminal,...
US-8,328,007 Business card package
A package of business cards arranged in a stack. Each card has a main body bearing data and an end tab connected to one end of the main body along a tear line,...
US-8,327,451 Secure system and method for enforcement of privacy policy and protection of confidentiality
The invention includes various systems, architectures, frameworks and methodologies that can securely enforce a privacy policy. A method is included for...
US-8,327,450 Digital safety deposit box
A system that enables secure data storage into a third party managed electronic storage vault is disclosed. This electronic storage vault provides customers...
US-8,327,439 System, method and computer program product for identifying functions in computer code that control a behavior...
A security data structure, method and computer program product are provided. In use, computer code is received. Furthermore, functions in the computer code that...
US-8,327,437 Securing network traffic by distributing policies in a hierarchy over secure tunnels
A technique for securing message traffic in a data network using a protocol such as IPsec, and more particularly various methods for distributing security...
US-8,327,419 System and method for efficiently securing enterprise data resources
Some embodiments provide a system and method that secures access to data objects of an enterprise that includes multiple data objects and multiple user...
US-8,327,157 Secure encrypted email server
A computing system utilizing a local or remote secure email server that intercepts secure message that include an identifying domain extension provides secure...
US-8,327,149 Efficient and secure data currentness systems
Indicating data currentness includes, on any date of a sequence of dates, issuing a proof indicating the currentness status of the data during a particular time...
US-8,327,146 Wireless communication using compact certificates
A method and communications system for generating and using compact digital certificates for secure wireless communication. Each compact certificate includes a...
US-8,327,142 System and method for facilitating secure online transactions
A method and system for mutually authenticating a client and a server is provided in accordance with an aspect of the present invention. The method commences...
US-8,327,139 System and method for securely exchanging sensitive information with an implantable medical device
A system and method for securely exchanging sensitive information with an implantable medical device is presented. A crypto key stored on an implantable medical...
US-8,327,137 Secure computer system with service guest environment isolated driver
A virtualized computer system includes at least one guest environment (guest), a service guest environment (SG) and trusted software. The at least one guest...
US-8,327,110 Storage system including a virtual volume, a plurality of disk drives and a plurality of flash memory devices
The temporary area capacity required to be secured with respect to the whole permanent area is calculated in accordance with the capacity and access frequency...
US-8,327,051 Portable handheld memory card and methods for use therewith
In one embodiment, a portable handheld memory card may include a Universal Serial Bus (USB) port, USB controller circuitry, an input/output (I/O) port, a...
US-8,327,038 Secured system for transferring data between two equipments
A system, apparatus and a method to connect at least two items of equipment, a first item of equipment having a first confidentiality level and a second item of...
US-8,327,014 Multi-layer hardware-based service acceleration (MHSA)
Methods and apparatus for intelligent sharing and tighter integration between a service engine (SE) for network communication and a high-speed forwarding...
US-8,326,884 Data storage system
The present invention is directed to an archival data storage system. The archival data storage system includes write once and read many (WORM) capability, data...
US-8,326,881 Detection of network security breaches based on analysis of network record logs
Computer program products and methods of inspecting a log of security records in a computer network are provided. The method includes retrieving a log record,...
US-8,326,877 Region-based security
The subject invention relates to systems and methods that provide region-based security to database objects having hierarchical relationships. In one aspect, a...
US-8,326,725 Method and system for obtaining user data from third parties
A user of a data management system agrees to allow the data management system to obtain user data associated with the user from a third party target site...
US-8,326,648 System for secure mobile healthcare selection
A method, system and device for secure mobile healthcare selection are presented in which a user can, from a mobile device, authorize the comparison of...
US-8,325,926 Method for providing a broadcast encryption based home security system
Provided is a method for providing a home or business security system that relies upon data encryption for both communication and the storage of content. The...
US-8,325,922 Group key security in a multihop relay wireless network
A security zone key is used to secure data traffic/control messages in a multi-hop wireless relay network. In one embodiment, the security zone key is generated...
US-8,325,653 System and method for restricting network access to one or more nodes in a wireless communications network
A system and method for providing security to a wireless network by using a mobile node's location as a parameter for deciding if access is to be given to the...
US-8,325,636 Local area network of serial intelligent cells
A serial intelligent cell (SIC) and a connection topology for local area networks using Electrically-conducting media. A local area network can be configured...
US-8,325,634 Apparatus for transceiving point to point moving signal reception high channel using horizontal blanking...
Provided are a method and apparatus for transceiving an asymmetric point-to-point moving signal and securing an uplink channel using a horizontal blanking...
US-8,325,519 Method of operating integrated circuit embedded with non-volatile programmable memory having variable coupling...
A programmable non-volatile device is operated with a floating gate that functions as a FET gate that overlaps a portion of a source/drain region and allows for...
US-8,325,150 Integrated overlay system for mobile devices
The invention is directed to a physical overlay that can be secured to a mobile device and that covers at least a portion of the mobile device's user interface....
US-8,325,018 Method and apparatus to reduce data lost on personal mobile devices
Methods and apparatus for providing security for mobile devices are disclosed. In one embodiment, a method includes maintaining responsibility for a first item...
US-8,324,111 Liquid crystal display device and method for fabricating the same
Disclosed are a liquid crystal display device employing an amorphous zinc oxide-based semiconductor as an active layer, and a method for fabricating the same,...
US-8,322,848 Method for generating documents having stored electrostatic pattern information
A method for generating documents having stored electrostatic pattern information provides security with respect to the authenticity of documents. A liquid...
US-8,322,610 Secure access module for integrated circuit card applications
Mechanisms are provided for executing security-sensitive applications with a general-purpose computing device. In particular, the general-purpose computing...
US-8,321,956 Remote access control of storage devices
An access control device can be communicationally coupled to a storage device and can control access thereto. The access control device can comprise...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.