Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,156,034 Method and system for enhanced distribution of financial instruments
An issuer models financial instruments (e.g., proposed securities) with initial financial parameters to facilitate defining a financial instrument with final...
US-8,156,027 Fair-value pricing of a financial asset
An exemplary embodiment comprises a method for determining at an effective valuation time a fair value of an exchange traded fund comprising securities, at...
US-8,156,020 Charge managing system, image forming apparatus, charge managing server, and image forming method
A charge managing system including an image forming apparatus and a charge managing server is provided. The image forming apparatus includes plural applications...
US-8,155,322 Systems and methods for distributing and securing data
A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A...
US-8,155,314 Systems and methods for securing video card output
The various methods and systems described herein are directed to supplying a secure channel for software executing on a host computer. The methods and systems...
US-8,155,151 Secure combined interoperable multiplexing
Systems and methods for combining a plurality of transport streams into a single transport stream for transmission to, e.g., a single frequency network via a...
US-8,155,121 Detection of physical movement for document sharing
A system for using accelerometer-based detection of physical movement for document sharing provides easy and intuitive ways to securely share documents, even...
US-8,155,075 Wireless communication system, mobile station and handover control method
A processing capability for data communication with a packet terminal is secured while packet loss is prevented, and a load to a mobile station in a handover is...
US-8,155,053 Method and apparatus for data security and automatic repeat request implementation in a wireless communication...
A method and apparatus for implementing data security and automatic repeat request (ARQ) in a wireless communication system are disclosed. Cipher entities are...
US-8,155,036 Portable multi-level security communications system
A portable multi-level security communications system (system) provides a communications backbone for Internet Protocol (IP) based data at multiple levels of...
US-8,154,863 Data storage device assembly
A data storage device assembly includes a rack, a mounting member, and a handle. The rack has a data storage device mounted therein. The mounting member is...
US-8,154,308 Method for characterizing integrated circuits for identification or security purposes
A method of detecting small changes to a complex integrated circuit measuring RF/microwave scattering parameters between every pin over a wide frequency range....
US-8,152,059 Secure commercial transactions system
A secure financial transactions system. The system generally includes a card that can be used a credit card, ATM card or debit card having a personal...
US-8,152,057 Method of authorising a transaction between a computer and a remote server and communications system, with...
A transaction between a computer, a remote server and a communications system can be authorized securely. A portable card reader is connected to a computer....
US-8,152,055 Banking system controlled responsive to data bearing records and user input of a phone received security code
A banking system operates to cause financial transfers responsive to card data read from data bearing records by a card reader. The system includes at least one...
US-8,152,053 RFID architecture in an industrial controller environment
An RFID reader and/or writer module in an industrial controller (e.g., PLC). The RFID module interfaces internally to the controller for tight integration...
US-RE43,308 Adjustment of period of real-time slow drift correction of alignment of handset's local oscillator for a...
A method and apparatus to perform a real-time drift correction of a remote handset's local oscillator in a digital cordless telephone. The remote handset begins...
US-8,151,351 Apparatus, method and computer program product for detection of a security breach in a network
A method for detecting a security breach in a network comprises at one of a plurality of transceivers each having a different media access control address,...
US-8,151,342 Contents execution device equipped with independent authentication means and contents re-distribution method
The present invention particularly relates to a digital content providing service method and a content execution device for the same, for maximizing user...
US-8,151,340 Data relay device and data relay method
A data relay device has a plurality of security functions sequentially executes security functions on inputted data based on a predetermined rule, to determine...
US-8,151,329 Secure handling of stored-value data objects
An approach to managing stored-value data objects, such as electronic tickets, comprises secure systems and procedures for ticket issuing, storage, and...
US-8,151,322 Systems and methods for user access authentication based on network access point
Systems and methods of authenticating user access based on an access point to a secure data network include a secure data network having a plurality of a...
US-8,151,169 Method and device for securing the memory of a computer against errors due to radiation
The method is for hardening a computer based on off-the-shelf components so that it resists bombardment by particles of cosmic origin encountered at high...
US-8,151,121 Secure data storage
Securely storing data to an optical disc has been described, including generating write data that includes the data and overhead data that facilitates reading...
US-8,151,119 Method and apparatus for secure data mirroring a storage system
A secure data mirroring capability in a storage system includes encrypting data blocks in a primary volume in preparation for a data mirroring operation. The...
US-8,151,110 Methods and apparatuses for configuring products
Methods and apparatuses for configuring products for security. In one aspect, a method of manufacturing a device, includes: determining a first executable code...
US-8,150,984 Enhanced data security through file access control of processes in a data processing system
A software system for controlling the unauthorized transfer of data from a data processing system to a network is provided. A file monitor module monitors...
US-8,150,783 Security system for and method of detecting and responding to cyber attacks on large network systems
An improved security system for and method of detecting and responding to cyber attacks on a network or network element. The system comprises: (a) an...
US-8,150,772 Biometric authentication of mobile financial transactions by trusted service managers
A method for authenticating a financial transaction at a point of sale (POS) includes storing an application program in a first secure element of a mobile...
US-8,150,766 System and method for investing public deposits
A method, system and program product for operating an exchange method for municipal and/or state funds from banking institutions, comprising: (A) accessing, by...
US-8,150,374 System and method for remotely assigning and revoking access credentials using a near field communication...
The present invention is generally directed toward a mobile device that can be used in a secure access system. More specifically, the mobile device can have...
US-8,150,371 Interactive control of access to services and capabilities of a mobile device
A system device and method are provided which determine authorization for access to one or more services grouped together as a package of services without...
US-8,150,329 Wireless communication device and method for switching modulation system thereof
A further secure channel is ensured after switching of a modulation system at the time of deterioration channel quality. A wireless communication device...
US-8,150,033 Optical security system using fourier plane encoding
A method of encrypting a set of data is disclosed. The method may include encoding a set of data with a first encryption key, and transforming the set of data...
US-8,150,011 Apparatus, method, and computer program product for geographic call center status and security
An apparatus, method, system, and computer program product are provided for producing a geographical mapping of the status, activity, security, work-force, and...
US-8,149,685 Covert OFDM transmission using cyclic prefix
Methods for secure OFDM communications include changing the length of OFDM symbols in a pseudo-random fashion by appending a totally random signal to some of...
US-8,149,119 Utility meter tamper monitoring system and method
A method includes activating a tamper monitoring circuit of a security seal configured to securely lock a utility meter. The method also includes wirelessly...
US-8,149,118 Device and method for registering the opening of closures of spaces to be secured
In a device and a method for registering the opening of closures of spaces to be secured, a sealing module, which includes a sensor, a microprocessor, a memory,...
US-8,149,114 Utility meter tamper monitoring system and method
A method includes activating a tamper monitoring circuit of a security seal configured to securely lock a utility meter. The method also includes wirelessly...
US-8,149,092 Device and method for managing equipment maintenance
The subject of the invention is a device for managing equipment maintenance. It relates to a device for managing maintenance of a number N of items of equipment...
US-8,146,803 Automated banking machine with noncontact reading of card data
An automated banking machine can receive user card data from a cell phone. The phone stores the card data of several selectable cards, including electronic...
US-8,146,802 Automated banking machine with noncontact reading of card data
An automated banking machine can receive user card data from a cell phone. The phone stores the card data of several selectable cards, including electronic...
US-8,146,800 Apparatus for recognizing security code having electromagnetic band-gap pattern
In an apparatus for recognizing a security code having an electromagnetic band gap (EBG) pattern which uses reflection and transmission characteristics of the...
US-8,146,448 Apparatus for mobile collection of atmospheric sample for chemical analysis
Portable devices and related methods for collecting and storing atmospheric samples for subsequent chemical analysis are provided. A sample cartridge according...
US-8,146,163 Method and system for securing personal computing devices from unauthorized data copying and removal
A method for securing personal computing devices from unauthorized data copying and removal includes detecting an attachment of a device to a client included...
US-8,146,157 Method and apparatus for secure transport and storage of surveillance video
Security information such as fixed or dynamically received camera location information, laser signature information, timestamp information, and network...
US-8,146,150 Security management in multi-node, multi-processor platforms
Multi-node and multi-processor security management is described in this application. Data may be secured in a TPM of any one of a plurality of nodes, each node...
US-8,146,134 Scalable firewall policy management platform
Securing large networks having heterogeneous computing resources including provision of multiple services both to clients within and outside of the network,...
US-8,145,915 System and method for platform-independent biometrically secure information transfer and access control
The inventive data processing system and method enable verifiable secure transfer of information between two or more parties, each having access to at least one...
US-8,145,907 Secure data transfer
The invention concerns secure data transfer from a first radio communication device of a first party to a second radio communication device. A random first...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.