Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,295,306 Layer-4 transparent secure transport protocol for end-to-end application protection
Techniques for providing layer 4 transparent secure transport for end-to-end application protection are described herein. According to one embodiment, a packet...
US-8,295,273 Standard telephone equipment (STE) based deployable secure communication system
Sensitive, Standard Telephone Equipment (STE) data is encapsulated into IP packets in a remotely deployed, secure communication system. The IP packets are...
US-8,295,168 Security groups
Methods and devices are provided for implementing security groups in an enterprise network. The security groups include first network nodes that are subject to...
US-8,295,149 Recording medium, method and apparatus for reproducing data on the recording medium, and method and apparatus...
A recording medium on which data is recorded in units of clusters, a method and apparatus for reproducing data on the recording medium, and a method and...
US-8,294,881 Security system using LADAR-based sensors
A security sensor system comprises one or more laser detection and ranging (LADAR) sensors configured for accumulation of three-dimensional image data. In one...
US-8,294,574 Security device comprising a plurality of interfaces
A security device comprising interfacing means incorporating a speaker (50) and a microphone (49) for interfacing with a person; a mobile network transmitter;...
US-8,294,549 Apparatus for access control and processing
The present invention relates to methods and systems for providing secure access control to a facility. An access control system comprises a scanner located...
US-8,294,302 System for providing power and data transmission between a door and a frame
A system for providing wire-free and contact free electric power and communication connection in a security installation between a door and a frame. The cores,...
US-8,291,490 Tenant life cycle management for a software as a service platform
Managing user access to application-specific capabilities of a system includes maintaining data correlating application-specific capabilities for each of the...
US-8,291,487 System and method for distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the...
US-8,291,483 Remote network device with security policy failsafe
A remote network device having a network security policy, includes: a firewall component embedded within the network device to filter data flow with a network;...
US-8,291,475 Secure cross-domain communication for web mashups
A secure cross-domain communication system and method for facilitating secure communication between a website having a web mashup and websites having content...
US-8,291,473 Methods, systems, and computer program products for modeling a secure production network
Methods, systems, and computer program products for modeling a secure production network are provided. A method includes generating a test network for emulating...
US-8,291,472 Real-time adjustments to authentication conditions
Embodiments of the invention provide for adjusting authentication conditions in real-time. A graph-theoretic data structure is dynamically constructing, having...
US-8,291,467 Information processing apparatus, information management method, and storage medium therefor
An image forming apparatus capable of flexibly setting a security policy for a modified file. A client terminal generates a print job added with a new security...
US-8,291,342 Secure device sharing
A device and method for placing the device in a locked state having an associated set of permitted tasks so as to permit the device owner to share the device...
US-8,291,258 High availability for network security devices
In one example, a backup intrusion detection and prevention (IDP) device includes one or more network interfaces to receive a state update message from a...
US-8,291,240 Securely storing data
A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving...
US-8,291,236 Methods and apparatuses for secondary conditional access server
Conditional access to media content of primary security systems on a secondary networked environment. In one embodiment, a conditional access server is used to...
US-8,291,230 Method and system for signing JavaScript object notation (JSON) messages
A machine-implemented method for signing a JSON message begins by constructing a reference element for each data object in the JSON message. The data object is...
US-8,291,226 Method and apparatus for securely booting from an external storage device
Techniques to securely boot up an electronics device (e.g., a cellular phone) from an external storage device are described. Secure data (e.g., a hash digest, a...
US-8,291,220 Securing wireless body sensor networks using physiological values for nonces
A key establishment protocol for securing wireless body sensor networks using environmental data for nonce values. To establish a secure communication between...
US-8,291,218 Creating and using secure communications channels for virtual universes
A system and method provides secure channels for communication in a virtual universe by employing a packet interception layer for incoming and outgoing data...
US-8,291,212 System and method for compressing secure E-mail for exchange with a mobile data communication device
A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile...
US-8,291,184 Copy control apparatus
A copy control apparatus for controlling a copy process between disks includes a copy process execution unit, a data capacity measuring unit, and a changing...
US-8,291,119 Method and systems for securing remote access to private networks
A method for securing remote access to private networks includes a receiver intercepting from a data link layer a packet in a first plurality of packets...
US-8,291,084 Communication mediating device for mediating communication over network
A mediation server 200 mediates a print demand from a client device 100 to a printing device 300. In order to elude a firewall F/W set between the mediation...
US-8,291,057 Data transferring method and content transferring method
In a method of transferring data in a data interoperable environment, a secure authenticated channel is established with a receiving entity corresponding to...
US-8,290,955 Classification of data in a hierarchical data structure
Embodiments of the invention are generally related to data security, and more specifically to data classification. The nodes of a hierarchical data structure...
US-8,290,871 Systems and methods for a secure recording environment
Systems and methods are disclosed for providing secure, captured data in a customer center. In one embodiment, the method comprises: capturing data with a...
US-8,290,433 Method and system for securing transactions made through a mobile communication device
A method for transmitting data between a mobile communication device and a server. The method includes running a mobile application on the mobile communication...
US-8,290,371 OCDM-based all optical multi-level security
A high data rate optical signal is inverse multiplexed into a multitude of lower-rate tributaries, each of which is coded by its unique OCDM code, and the...
US-8,290,165 Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and...
A key management system includes secured data stored on a first system secured by a control key stored securely on a key server. The secured data is secured...
US-8,290,160 Method and apparatus for secured facsimile transmission
A novel and unique method, program and apparatus for secured facsimile transmission. It converts the image pixels into 8 bit ASCII characters, encrypting the...
US-8,290,159 Data recovery method, image processing apparatus, controller board, and data recovery program
A disclosed data recovery method, image processing apparatus, controller board, and data recovery program enable data stored encrypted in a storage unit within...
US-8,290,135 Systems and methods for facilitating conference calls using security keys
Systems and methods are described that facilitate a conference call between a plurality of communication devices. The method may comprise: providing a first...
US-8,289,857 Method for determining a data transport unit parameter for the communication between two stations in a network...
The invention concerns the technical field of a so-called Path MTU (Maximum Transmission Unit) Discovery process between two computing nodes over packet...
US-8,289,180 Device and method for managing configuration and for managing maintenance of apparatus
The subject of the invention is a device for managing configuration and for managing maintenance of apparatus. It relates to a device for managing configuration...
US-8,289,147 Building security system
A security system that can be used in a home, office, or other building in order to generate alarms or take other actions depending on conditions within the...
US-8,286,889 Electronic financial transaction cards and methods
An electronic card has a card body with a power source electrically coupled to a general processor which is electrically coupled to a secure processor and a...
US-8,286,865 Authenticating electronic financial transactions
To improve security and simplify financial transactions in electronic communications environments, a cryptographic Private Key is securely stored in a storage...
US-8,286,228 Secure streaming container
A system and method for securely streaming encrypted digital media content out of a digital container to a user's media player. This streaming occurs after the...
US-8,286,171 Methods and systems to fingerprint textual information using word runs
The present invention provides methods and systems to enable fast, efficient, and scalable means for fingerprinting textual information using word runs. The...
US-8,286,164 Secure recursive virtualization
A mechanism is provided for performing secure recursive virtualization of a computer system. A portion of memory is allocated by a virtual machine monitor (VMM)...
US-8,285,997 Backup apparatus with higher security and lower network bandwidth consumption
A system for more secure, more efficient, more widely applicable backup, retention, and retrieval of data. An apparatus comprising improved means for...
US-8,285,996 Verification of identity based signatures
A database management system (1) comprises up to fifty or more workstations (2), each for a user. The environment may, for example, be a hospital and the system...
US-8,285,986 Apparatus and method for data packet security in a wireless sensor network
An apparatus and method for providing data packet security in a wireless sensor network including a plurality of sensor nodes. The apparatus includes a memory...
US-8,285,748 Proactive information security management
A method and apparatus for proactive information security management is described. In one embodiment, for example, a computer-implemented method for controlling...
US-8,285,746 Securing data from a shared device
A method for securing the use of data on a first device where the data is sent from a second device, the method including registering at least a first...
US-8,285,731 Smart road-toll-system
A road pricing smart client and method for a road pricing system enabling the removal of information from the positioning data describing the itinerary which...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.