Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,195,950 Secure and seamless wireless public domain wide area network and method of using the same
A wireless public domain Wide Area Network (WPDWAN) is a system and method of providing high throughput data services to public domain customers through the use...
US-8,195,942 Network security authentication method
An authentication method for network security includes: configuring a Media Gateway (MG) with an authentication key and setting a security data package on a...
US-8,195,937 Remote virtual medical diagnostic imaging viewer
A medical image and data application service provider system provides a way of remotely viewing and manipulating medical images and data for diagnostic and...
US-8,195,932 Authentication and encryption for secure data transmission
A system and method for authenticating and encrypting messages for secure transmission is disclosed. A frame to be transmitted between devices comprises a frame...
US-8,195,823 Dynamic network link acceleration
A method and apparatus for dynamic network link acceleration provides a managed communication link for accelerated and reliable network communication between a...
US-8,195,820 System and method for dynamic security provisioning of computing resources
The present invention facilitates the dynamic provisioning of computing and data assets in a commodity computing environment. The invention provides a system...
US-8,195,776 Data backup, storage, transfer and retrieval system, method and computer program product
A file storage and retrieval system, method and computer program product connects an account user's computer to a remote, secure, redundant system computer via...
US-8,195,763 Secure method of synchronizing cache contents of a mobile browser with a server
A method of securely synchronizing cache contents of a mobile browser with a server includes initiating a session between the browser and server, including...
US-8,195,724 Providing a virtual binding for a worm storage system on rewritable media
A virtual binding system ensures that the WORM logic for protecting data immutability cannot be circumvented, effectively guaranteeing WORM property of a WORM...
US-8,195,569 E-bazaar featuring personal information security
Utilization of the E-Metro Community and Personal Information Agents assure an effective and comprehensive agent-rule based command and control of informational...
US-8,195,542 Web-based issuer support services
A web-based process, residing on a server, provides issuer support services to a financial market. This web-based process includes an issue and issuer process...
US-8,195,476 Method for the administration of medical patient data
In a method for the administration of medical patient data with a centralized or decentralized patient medical file having secured access enabled by the patient...
US-8,195,445 Data backup system including a data protection component
A data backup system is provided for backing up data files from a data source and for securing those data files against accidental modification or deletion. The...
US-8,195,092 Method and system for utilizing a high frequency PHY layer for high speed data transmission between wireless...
A single communication stack may be utilized to setup a data transmission session between wireless devices. A primary physical layer corresponding to the single...
US-8,194,858 Chaotic cipher system and method for secure communication
The present invention provides a method for a data encryption device to perform network communications, the method comprising obtaining an indexed array of...
US-8,194,827 Secure voice transaction method and system
A security method and system. The method includes receiving by a computing system, a telephone call from a user. The computing system comprises an existing...
US-8,194,658 Transmitting and receiving method and apparatus in real-time system
A method and apparatus transmitting and receiving in a real-time system are disclosed. The method of transmitting in a real-time system includes scheduling a...
US-8,194,519 Method for transmitting content with copy control information, content identification information and content...
A content transmitting apparatus and the like which execute copy control of content more securely than conventional, and can count copy number correctly...
US-8,194,289 Image processing device, method and program product processing barcodes with link information corresponding to...
In a copy generation management on paper, the present invention aims to detect a falsification in embedded information and increase the capacity of embedded...
US-8,194,140 Image pickup apparatus for performing a desirable self timer shooting and an automatic shooting method using...
An image pickup apparatus includes a system controller and a face detector, and can register face data of a photographer for a self-timer shooting mode in...
US-8,192,286 System for secure transfer of online privileges
Methods and apparatus for transferring privileges in a computer system. In one implementation, a system for transferring online privileges includes: a game...
US-8,191,167 Secure system and method for processing data between a first device and at least one second device provided...
A secure system (1) for processing data includes a first device (2), and at least one second device (3) is characterized in that--each second device (3)...
US-8,191,162 System and method for securing and tracking files
A method, system and computer program product for securing and tracking restricted files stored in a data processing system is provided. The data processing...
US-8,191,159 Data security for digital data storage
A computing system includes data encryption in the data path between a data source and data storage devices. The data storage devices may be local or they may...
US-8,191,152 Methods systems and articles of manufacture for generating and displaying video related to financial application
Systems, methods and articles of manufacture for generating a video such that when another person views the video, the other person can view non-private...
US-8,191,139 Intrusion detection report correlator and analyzer
A computer/computer network security alert management system aggregates information from multiple intrusion detectors. Utilizing reports from multiple intrusion...
US-8,191,135 Secured web based access of failed flows in an integration server
A method for accessing failed events in an integrated server environment is disclosed. The method comprises providing a thin client in an application server...
US-8,191,134 Lockless distributed IPsec processing
According to one embodiment of the invention, a plurality of IPsec packets belonging to a single IPsec tunnel are received. Different ones of the plurality of...
US-8,191,128 Systems and methods for controlling access to a public data network from a visited access provider
To allow a user to access a public data network from a region of service operated by a visited access provider, the visited provider is supplied with an...
US-8,191,113 Trusted network connect system based on tri-element peer authentication
A trusted network connect (TNC) system based on tri-element peer authentication (TePA) is provided. An network access requestor (NAR) of an access requestor...
US-8,191,109 Application verification
A device that is configured for wireless communication and for execution of at least one client application is disclosed. The device comprises an integrated...
US-8,191,079 Data transfer across a network
Requests for retrieval of data items from another data processing apparatus include embedded objects having executable class functions for performing operations...
US-8,190,921 Methodology for vaulting data encryption keys with encrypted storage
A method is provided to allow for encryption keys to be safely vaulted and for restarts after system failures, even when an external key server is not...
US-8,190,913 System and method for content protection on a computing device
Systems and methods for handling user interface field data. A system and method can be configured to receive input which indicates that the mobile device is to...
US-8,190,910 Information processing apparatus, information recording medium manufacturing apparatus, and information...
A configuration is provided for enabling a process in which appropriate content code corresponding to apparatuses and applications of various model types and...
US-8,190,908 Secure data verification via biometric input
An architecture is presented that controls access to secure data via biometric verification. The system comprises a memory module that communicates with...
US-8,190,903 Method and apparatus for verifying authenticity of digital data using trusted computing
A method and apparatus for authenticity and origin of Digital data such as recorded voice samples, video clips or still picture images etc. is provided. The...
US-8,190,901 Layered security in digital watermarking
A media object authentication system uses layers of security features based on digital watermarks embedded in media objects. The system generates a first...
US-8,190,900 Secure telemetric link
A communications protocol is used to provide data privacy, message integrity, message freshness, and user authentication to telemetric traffic, such as to and...
US-8,190,898 Portable electronic entity and communication method
The pocket portable electronic entity (400) with connection element (420) for removable connection to a host station (300), having first members (460, 470, 471)...
US-8,190,897 Method and system for secure exchange of data in a network
A first network device implements a method for the secure exchange of data in a network. The network also includes a second network device and a remote device....
US-8,190,893 Portable security transaction protocol
A technique for providing message authenticity includes accepting transaction information, accepting a first data item used for authenticating an originating...
US-8,190,888 System and methodology providing multi-tier security for network data with industrial control components
The present invention relates to a system and methodology facilitating network security and data access in an industrial control environment. An industrial...
US-8,190,887 Cable network system and method for controlling security in cable network encrypted dynamic multicast session
A security control method in a cable network dynamic multicast session, and more particularly, a method of controlling forward secrecy and backward secrecy in a...
US-8,190,885 Non-volatile memory sub-system integrated with security for storing near field transactions
An architecture is presented that facilitates maintaining a log of near field transactions in a memory module that includes security functionalities and near...
US-8,190,875 Reducing processing load in proxies for secure communications
In one embodiment, a method for providing secure communications using a proxy is provided. The proxy negotiates with a client and a server to determine a...
US-8,190,840 Memory devices with data protection
A memory device comprises a memory array, a status register, a status-register write-protect bit and a security register. The memory array contains a number of...
US-8,190,767 Data structures and state tracking for network protocol processing
Described are data structures, and methodology for forming same, for network protocol processing. A method for creating data structures for firewalling and...
US-8,190,764 Method and system for an intercept chain of custody protocol
Techniques for establishing a chain of custody for intercepted electronic information are disclosed. In one particular exemplary embodiment, the techniques may...
US-8,190,716 Method and system for managing bluetooth communication using software or firmware filtering
Aspects of method and system for managing secure Bluetooth communication using software or firmware filtering are provided. In this regard, the IT or system...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.