Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,196,194 Method and network for securely delivering streaming data
In a procedure for delivering streaming media, a Client first requests the media from an Order Server. The Order Server authenticates the Client and sends a...
US-8,196,192 Setting a preliminary time on a network appliance using a digital certificate
A method and system for setting a time on a network appliance. The method may include attempting to establish a secure connection with a server using a...
US-8,196,186 Security architecture for peer-to-peer storage system
An exemplary method includes receiving a request to register a peer in a peer-to-peer system; generating or selecting a transaction key for the peer; storing...
US-8,196,184 Efficient data structures for multi-dimensional security
Efficient data structures are generated to enforce permissions on a multi-dimensional representation in a performance management application. A model site is...
US-8,196,183 Policy enforcement in a secure data file delivery system
A server interacts with a sender to form a package which can include one or more attached data files to be sent to one or more recipients, and the server...
US-8,196,143 Storing resource information
In an illustrative embodiment, a data processing system for resource data management is provided. The data process system comprises a set of data structures...
US-8,196,064 Method, system, and computer program product for managing controlled residential or non-residential environments
A control server, or similar central processor, manages the distribution of data (including audio and video), voice, and control signals among a plurality of...
US-8,195,958 Security module for encrypting a telephone conversation
A telephone conversation between one or several first telecommunication terminals in a packet oriented data network and telecommunication terminals in an analog...
US-8,195,952 System and method of facilitating the identification of a computer on a network
A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may...
US-8,195,950 Secure and seamless wireless public domain wide area network and method of using the same
A wireless public domain Wide Area Network (WPDWAN) is a system and method of providing high throughput data services to public domain customers through the use...
US-8,195,942 Network security authentication method
An authentication method for network security includes: configuring a Media Gateway (MG) with an authentication key and setting a security data package on a...
US-8,195,937 Remote virtual medical diagnostic imaging viewer
A medical image and data application service provider system provides a way of remotely viewing and manipulating medical images and data for diagnostic and...
US-8,195,932 Authentication and encryption for secure data transmission
A system and method for authenticating and encrypting messages for secure transmission is disclosed. A frame to be transmitted between devices comprises a frame...
US-8,195,823 Dynamic network link acceleration
A method and apparatus for dynamic network link acceleration provides a managed communication link for accelerated and reliable network communication between a...
US-8,195,820 System and method for dynamic security provisioning of computing resources
The present invention facilitates the dynamic provisioning of computing and data assets in a commodity computing environment. The invention provides a system...
US-8,195,776 Data backup, storage, transfer and retrieval system, method and computer program product
A file storage and retrieval system, method and computer program product connects an account user's computer to a remote, secure, redundant system computer via...
US-8,195,763 Secure method of synchronizing cache contents of a mobile browser with a server
A method of securely synchronizing cache contents of a mobile browser with a server includes initiating a session between the browser and server, including...
US-8,195,724 Providing a virtual binding for a worm storage system on rewritable media
A virtual binding system ensures that the WORM logic for protecting data immutability cannot be circumvented, effectively guaranteeing WORM property of a WORM...
US-8,195,569 E-bazaar featuring personal information security
Utilization of the E-Metro Community and Personal Information Agents assure an effective and comprehensive agent-rule based command and control of informational...
US-8,195,542 Web-based issuer support services
A web-based process, residing on a server, provides issuer support services to a financial market. This web-based process includes an issue and issuer process...
US-8,195,476 Method for the administration of medical patient data
In a method for the administration of medical patient data with a centralized or decentralized patient medical file having secured access enabled by the patient...
US-8,195,445 Data backup system including a data protection component
A data backup system is provided for backing up data files from a data source and for securing those data files against accidental modification or deletion. The...
US-8,195,092 Method and system for utilizing a high frequency PHY layer for high speed data transmission between wireless...
A single communication stack may be utilized to setup a data transmission session between wireless devices. A primary physical layer corresponding to the single...
US-8,194,858 Chaotic cipher system and method for secure communication
The present invention provides a method for a data encryption device to perform network communications, the method comprising obtaining an indexed array of...
US-8,194,827 Secure voice transaction method and system
A security method and system. The method includes receiving by a computing system, a telephone call from a user. The computing system comprises an existing...
US-8,194,658 Transmitting and receiving method and apparatus in real-time system
A method and apparatus transmitting and receiving in a real-time system are disclosed. The method of transmitting in a real-time system includes scheduling a...
US-8,194,519 Method for transmitting content with copy control information, content identification information and content...
A content transmitting apparatus and the like which execute copy control of content more securely than conventional, and can count copy number correctly...
US-8,194,289 Image processing device, method and program product processing barcodes with link information corresponding to...
In a copy generation management on paper, the present invention aims to detect a falsification in embedded information and increase the capacity of embedded...
US-8,194,140 Image pickup apparatus for performing a desirable self timer shooting and an automatic shooting method using...
An image pickup apparatus includes a system controller and a face detector, and can register face data of a photographer for a self-timer shooting mode in...
US-8,192,286 System for secure transfer of online privileges
Methods and apparatus for transferring privileges in a computer system. In one implementation, a system for transferring online privileges includes: a game...
US-8,191,167 Secure system and method for processing data between a first device and at least one second device provided...
A secure system (1) for processing data includes a first device (2), and at least one second device (3) is characterized in that--each second device (3)...
US-8,191,162 System and method for securing and tracking files
A method, system and computer program product for securing and tracking restricted files stored in a data processing system is provided. The data processing...
US-8,191,159 Data security for digital data storage
A computing system includes data encryption in the data path between a data source and data storage devices. The data storage devices may be local or they may...
US-8,191,152 Methods systems and articles of manufacture for generating and displaying video related to financial application
Systems, methods and articles of manufacture for generating a video such that when another person views the video, the other person can view non-private...
US-8,191,139 Intrusion detection report correlator and analyzer
A computer/computer network security alert management system aggregates information from multiple intrusion detectors. Utilizing reports from multiple intrusion...
US-8,191,135 Secured web based access of failed flows in an integration server
A method for accessing failed events in an integrated server environment is disclosed. The method comprises providing a thin client in an application server...
US-8,191,134 Lockless distributed IPsec processing
According to one embodiment of the invention, a plurality of IPsec packets belonging to a single IPsec tunnel are received. Different ones of the plurality of...
US-8,191,128 Systems and methods for controlling access to a public data network from a visited access provider
To allow a user to access a public data network from a region of service operated by a visited access provider, the visited provider is supplied with an...
US-8,191,113 Trusted network connect system based on tri-element peer authentication
A trusted network connect (TNC) system based on tri-element peer authentication (TePA) is provided. An network access requestor (NAR) of an access requestor...
US-8,191,109 Application verification
A device that is configured for wireless communication and for execution of at least one client application is disclosed. The device comprises an integrated...
US-8,191,079 Data transfer across a network
Requests for retrieval of data items from another data processing apparatus include embedded objects having executable class functions for performing operations...
US-8,190,921 Methodology for vaulting data encryption keys with encrypted storage
A method is provided to allow for encryption keys to be safely vaulted and for restarts after system failures, even when an external key server is not...
US-8,190,913 System and method for content protection on a computing device
Systems and methods for handling user interface field data. A system and method can be configured to receive input which indicates that the mobile device is to...
US-8,190,910 Information processing apparatus, information recording medium manufacturing apparatus, and information...
A configuration is provided for enabling a process in which appropriate content code corresponding to apparatuses and applications of various model types and...
US-8,190,908 Secure data verification via biometric input
An architecture is presented that controls access to secure data via biometric verification. The system comprises a memory module that communicates with...
US-8,190,903 Method and apparatus for verifying authenticity of digital data using trusted computing
A method and apparatus for authenticity and origin of Digital data such as recorded voice samples, video clips or still picture images etc. is provided. The...
US-8,190,901 Layered security in digital watermarking
A media object authentication system uses layers of security features based on digital watermarks embedded in media objects. The system generates a first...
US-8,190,900 Secure telemetric link
A communications protocol is used to provide data privacy, message integrity, message freshness, and user authentication to telemetric traffic, such as to and...
US-8,190,898 Portable electronic entity and communication method
The pocket portable electronic entity (400) with connection element (420) for removable connection to a host station (300), having first members (460, 470, 471)...
US-8,190,897 Method and system for secure exchange of data in a network
A first network device implements a method for the secure exchange of data in a network. The network also includes a second network device and a remote device....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.