Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,200,761 Method and apparatus for improving security in a data processing system
Methods and Apparatuses for processing data are described herein. In one aspect of the invention, an exemplary method receives data which may include an...
US-8,200,700 Systems and methods for use of structured and unstructured distributed data
The invention relates to hardware, software and electronic service components and systems to provide large-scale, reliable, and secure foundations for...
US-8,200,639 Secure data scrubbing utility
A software method and utility for performing a user-controlled data shredding operation for overwriting an entire file structure inclusive of all black-shaded...
US-8,200,599 100Gbps security and search architecture using programmable intelligent search memory
Memory architecture provides capabilities for high performance content search. The architecture creates an innovative memory that can be programmed with content...
US-8,200,566 Fair value model based system, method, and computer program product for valuing foreign-based securities in a...
A system and method for determining fair value prices of financial securities of international markets includes steps of selecting a universe of securities of a...
US-8,200,556 Issuer support services
A process, residing on a server, provides issuer support services to a financial market. A compliance process reviews issue and issuer data and filing and...
US-8,200,510 Method for secure diagnostic screening, servicing, treatment, and compliance monitoring for sleep apnea for...
A secure method for delivering sleep apnea diagnostic services on an at least one operator of a transport vehicle to a transport company. The sleep apnea...
US-8,200,377 System for securing an aircraft flight plan
The system for securing an aircraft flight plan has a flight management system delivering: a flight plan and points comprising passage setpoints in terms of...
US-8,200,281 Secure removable card and a mobile wireless communication device
A removable card for use with a mobile wireless communication device has a processor and a non-volatile memory, connected to the processor. The removable card...
US-8,200,193 Detection of anomalies in traffic transmitted by a mobile terminal within a radiocommunication network
To detect an anomaly in traffic sent by at least one mobile terminal (TM) in a radiocommunication network, a device capable of communicating with a ...
US-8,200,184 Evacuation route obtaining system, mobile terminal apparatus, evacuation directive apparatus, evacuation route...
In an evacuation route obtaining system according to the present invention, a mobile terminal apparatus and a plurality of display apparatuses are connected to...
US-8,199,922 Ethernet isolator for microphonics security and method thereof
A system and method for providing microphonic isolation on a transmission line. The transmission line has a first part and a second part. The first part of...
US-8,199,916 Selectively loading security enforcement points with security association information
A method, network element, and computer storage program product, are provided for selectively loading a communication network security enforcement point ("SEP")...
US-8,199,912 Security storage of electronic keys within volatile memories
It is described a method for providing an electronic key within an integrated circuit (100) including both a volatile memory (102) and a non-volatile memory...
US-8,199,911 Secure encryption algorithm for data deduplication on untrusted storage
Various methods and systems for performing data deduplication when encrypting data for storage on an untrusted storage system are disclosed. One method involves...
US-8,199,440 Transducer positioning apparatus with magnetically preloaded linear guide
A transducer positioning apparatus is provided that supports a read/write head on a data storage machine and biases the head against rotation. The transducer...
US-8,199,339 Printing system and method for securely producing self-authenticating documents
There is provided a printing system including a reading unit that reads paper identification information of a paper sheet, a first controller that implements...
US-8,199,195 Wireless video surveillance system and method with security key
A surveillance system and method having at least one wireless input capture device ICD(s) and a corresponding digital input recorder (DIR) and/or another ICD,...
US-8,199,174 Method and system for generating documents having stored electrostatic pattern information
A method and apparatus for generating documents having stored electrostatic pattern information provides security with respect to the authenticity of documents....
US-8,198,988 Secure link between controller and device
In certain embodiments consistent with the invention, a method of associating a controlled device with a remote controller device involves providing a...
US-8,198,984 Method, RFID reader, RFID tag and RFID system for secure communication
In an RFID system a method for communication between a reader (1) and a tag (2) comprises: at the reader (1), switching on an electromagnetic signal (SS) for...
US-8,198,142 General purpose ball grid array security cap
A general purpose BGA security cap includes a substrate, an integrated circuit die, and an array of bond balls. The substrate includes an anti-tamper security...
US-8,197,389 Exercising apparatus
An apparatus is disclosed for enabling an operator to exercise comprising a frame having a body, a base and a top. A load is positioned on the frame for...
US-8,197,344 Gaming terminal data monitoring network
A method of storing data serially transmitted between a gaming terminal and a computer on one or more servers in a network. The gaming terminal and computer are...
US-8,196,815 Secure card terminal using keypad scanning sequence determined by card
To provide alphanumeric data, such as a PIN code, to a smart card (2) a terminal (1) is used which is capable of communicating with the smart card. The terminal...
US-8,196,543 Defect repairing apparatus, defect repairing method, program, and computer-readable recording medium
A defect repairing apparatus (1) capable of efficiently repairing defects includes: a substrate-mounting plate (3) for securing a substrate conveyed; a...
US-8,196,202 Mobile network security system
A security system for a mobile network (1) has a gateway (3) for receiving messages from outside the network and a HLR (10) storing mobile terminal location...
US-8,196,194 Method and network for securely delivering streaming data
In a procedure for delivering streaming media, a Client first requests the media from an Order Server. The Order Server authenticates the Client and sends a...
US-8,196,192 Setting a preliminary time on a network appliance using a digital certificate
A method and system for setting a time on a network appliance. The method may include attempting to establish a secure connection with a server using a...
US-8,196,186 Security architecture for peer-to-peer storage system
An exemplary method includes receiving a request to register a peer in a peer-to-peer system; generating or selecting a transaction key for the peer; storing...
US-8,196,184 Efficient data structures for multi-dimensional security
Efficient data structures are generated to enforce permissions on a multi-dimensional representation in a performance management application. A model site is...
US-8,196,183 Policy enforcement in a secure data file delivery system
A server interacts with a sender to form a package which can include one or more attached data files to be sent to one or more recipients, and the server...
US-8,196,143 Storing resource information
In an illustrative embodiment, a data processing system for resource data management is provided. The data process system comprises a set of data structures...
US-8,196,064 Method, system, and computer program product for managing controlled residential or non-residential environments
A control server, or similar central processor, manages the distribution of data (including audio and video), voice, and control signals among a plurality of...
US-8,195,958 Security module for encrypting a telephone conversation
A telephone conversation between one or several first telecommunication terminals in a packet oriented data network and telecommunication terminals in an analog...
US-8,195,952 System and method of facilitating the identification of a computer on a network
A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may...
US-8,195,950 Secure and seamless wireless public domain wide area network and method of using the same
A wireless public domain Wide Area Network (WPDWAN) is a system and method of providing high throughput data services to public domain customers through the use...
US-8,195,942 Network security authentication method
An authentication method for network security includes: configuring a Media Gateway (MG) with an authentication key and setting a security data package on a...
US-8,195,937 Remote virtual medical diagnostic imaging viewer
A medical image and data application service provider system provides a way of remotely viewing and manipulating medical images and data for diagnostic and...
US-8,195,932 Authentication and encryption for secure data transmission
A system and method for authenticating and encrypting messages for secure transmission is disclosed. A frame to be transmitted between devices comprises a frame...
US-8,195,823 Dynamic network link acceleration
A method and apparatus for dynamic network link acceleration provides a managed communication link for accelerated and reliable network communication between a...
US-8,195,820 System and method for dynamic security provisioning of computing resources
The present invention facilitates the dynamic provisioning of computing and data assets in a commodity computing environment. The invention provides a system...
US-8,195,776 Data backup, storage, transfer and retrieval system, method and computer program product
A file storage and retrieval system, method and computer program product connects an account user's computer to a remote, secure, redundant system computer via...
US-8,195,763 Secure method of synchronizing cache contents of a mobile browser with a server
A method of securely synchronizing cache contents of a mobile browser with a server includes initiating a session between the browser and server, including...
US-8,195,724 Providing a virtual binding for a worm storage system on rewritable media
A virtual binding system ensures that the WORM logic for protecting data immutability cannot be circumvented, effectively guaranteeing WORM property of a WORM...
US-8,195,569 E-bazaar featuring personal information security
Utilization of the E-Metro Community and Personal Information Agents assure an effective and comprehensive agent-rule based command and control of informational...
US-8,195,542 Web-based issuer support services
A web-based process, residing on a server, provides issuer support services to a financial market. This web-based process includes an issue and issuer process...
US-8,195,476 Method for the administration of medical patient data
In a method for the administration of medical patient data with a centralized or decentralized patient medical file having secured access enabled by the patient...
US-8,195,445 Data backup system including a data protection component
A data backup system is provided for backing up data files from a data source and for securing those data files against accidental modification or deletion. The...
US-8,195,092 Method and system for utilizing a high frequency PHY layer for high speed data transmission between wireless...
A single communication stack may be utilized to setup a data transmission session between wireless devices. A primary physical layer corresponding to the single...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.