Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,112,175 Methods and apparatus for medicament tracking
Methods and apparatus for medicament tracking are disclosed herein. In one embodiment, medicaments are initially stored within secure medicament containers. One...
US-8,112,114 Multiple access communications cell phone (MAC cell phone)
The MAC Cell Phone is an automated transparent programmable telecommunication multiple access call and high-speed digital data stream facilitator as a router...
US-8,112,065 Mobile authentication through strengthened mutual authentication and handover security
A method of mobile authentication with enhanced mutual authentication and handover security is disclosed. The method of mutual authentication in a mobile...
US-8,111,828 Management of cryptographic keys for securing stored data
A management system generates a sequence of keys and an identifier of each key in the sequence. A current key in the sequence and the identifier of the current...
US-8,111,677 Systems and methods of combined bluetooth and WLAN signaling
Disclosed herein are systems and methods of combined Bluetooth and WLAN signaling. Such systems and methods may use a Bluetooth connection to signal WLAN...
US-8,111,639 Radio transmitting apparatus and radio transmitting method
A radio transmitting apparatus and a radio transmitting method wherein the increase of the guard time in a random access region is reduced to secure the data...
US-8,111,620 Ability to provide quality of service (QOS) to an IPSEC tunnel in a foreign network
Quality of Service (QoS) is provided to a secure data tunnel such an IPsec tunnel using information about the tunnel and the underlying data session to...
US-8,110,894 Protection for an integrated circuit chip containing confidential data
An integrated circuit chip for holding or processing data on information for secure protection. A first side of the chip has at least one first conductor...
US-8,109,445 Data carrier and data carrier system
A region to store authentication commands to perform authentication between a data carrier and a reader/writer device is divided into at least three areas, and...
US-8,109,436 Secure card
Systems and methods for monetary cards are described. The cards are free from personally identifiable data, e.g., no name or embossment. In an example, the card...
US-8,109,043 Secure data center having redundant cooling and blast protection for protecting computer servers by the...
This application relates to improvements to data centers, including protection from: (1) vandalism, (2) high winds, (3) earthquake, (4) storms, (5) water used...
US-RE43,171 Data security method and device for computer modules
A security method for an attached computer module in a computer system. The security method reads a security identification number in an attached computer...
US-8,108,933 System and method for attack and malware prevention
The present invention is a system and method for detecting and preventing attacks and malware on mobile devices such as a cell phones, smartphones or PDAs,...
US-8,108,914 Converged logical and physical security
A security management system that includes a hierarchical security platform, converged IT and physical security management, unified credentialing, credential...
US-8,108,912 Systems and methods for management of secure data in cloud-based network
Embodiments relate to systems and methods for the management of secure data in a cloud-based network. A secure data store can store sensitive or confidential...
US-8,108,905 System and method for an isolated process to control address translation
A system, method, and computer-usable medium for an isolated process to control address translation. According to a preferred embodiment of the present...
US-8,108,692 Solid-state storage subsystem security solution
A solid-state storage subsystem, such as a non-volatile memory card or drive, includes a main memory area that is accessible via standard memory access commands...
US-8,108,691 Methods used in a secure memory card with life cycle phases
A secure memory card with encryption capabilities comprises various life cycle states that allow for testing of the hardware and software of the card in certain...
US-8,108,675 External signature device for a PC with wireless communication capacity
External signature device for a PC, with capacity for wireless communication with the computer, which can be used immediately in electronic banking and...
US-8,108,550 Real-time identification of an asset model and categorization of an asset to assist in computer network security
A unique identifier is assigned to a network node and is used to obtain an "asset model" corresponding to the node and to determine whether the node is a member...
US-8,108,519 Secure inter-process communication for safer computing environments and systems
Techniques for Inter-Process Communication (IPC) in a more secure manner are disclosed. A communication component operating outside of an operating system can...
US-8,108,494 Systems and methods for managing converged workspaces
Embodiments provide systems and methods for managing converged workspaces that go beyond storing related files and additionally include other features such as...
US-8,108,427 System and method for storage operation access security
A method and system for controlling access to stored data is provided. The storage access control system leverages a preexisting security infrastructure of a...
US-8,108,318 Trusted service manager (TSM) architectures and methods
A client device comprises a first secure element and a second secure element. The first secure element comprises a first computer-readable medium having a...
US-8,108,295 Dynamic aggressive/passive pegged trading
A computer-implemented system and method for executing trades of financial securities according to a combination passive/aggressive trading strategy that...
US-8,108,266 Methods for providing secure eCommerce transactions
A method of facilitating an eCommerce transaction between a consumer and an eCommerce merchant via a third party entity is provided. The eCommerce merchant...
US-8,108,184 Methods and systems for power systems analysis: a non-iterative state solver/estimator for power systems...
Described are software tools and techniques for use in power system operations and control, enabling direct non-iterative solution and estimation of the state...
US-8,107,944 System and method for automatic data security, back-up and control for mobile devices
Systems and methods for providing security and control of mobile communications device activity including at least one mobile communication device with software...
US-8,107,621 Encrypted file system mechanisms
Mechanisms for providing an encrypted file system are provided. The mechanisms use a combination of encryption methodologies so as to reduce the amount of...
US-8,107,397 Protocol for secure and energy-efficient reprogramming of wireless multi-hop sensor networks
A protocol for optimizing the energy for code upload to sensors in a wireless sensor network and speeding up the dissemination if multiple sources of code are...
US-8,107,100 Post deployment electronic document management and security solution
A method for managing deployed electronic documents that can begin when the deployed electronic document is accessed. A data probe can be automatically conveyed...
US-8,106,771 Traceability method for an electronic payment terminal in the event of a theft thereof, and corresponding...
A traceability method is provided for an electronic payment terminal, in the event of a theft thereof. The method includes the following steps: detection of a...
US-8,105,750 Optical recording medium and method of manufacturing the same
Recording and reproducing characteristics and data saving reliability are secured in a write-once two-layer recording medium. A second recording layer from a...
US-8,105,296 Automatic surgical sponge counter and blood loss determination system
A surgical sponge detection system includes a plurality of surgical sponges (2) having radio frequency identification tags (1) securely attached thereto and a...
US-8,104,683 Hand-operated document reader/imager with document retention device including manually-powered anti-skew...
A hand-operated document processor includes a base including a perforated bed for receiving a document containing magnetic ink character data to be read and...
US-8,103,987 System and method for managing the design and configuration of an integrated circuit semiconductor design
A system and methods that facilitate the design process and minimize the time and effort required to complete the design and fabrication of an integrated...
US-8,103,946 Secure data strategy for vehicle control systems
A method of providing secure data from vehicle operational variable data that includes a plurality of data message bits includes the steps of dividing the...
US-8,103,933 Method for securing data and device for implementing the same
A method and system to ensure the integrity of data in a data-processing device, a data packet is read from a memory and checked to determine whether the data...
US-8,103,882 Apparatus and method for securing data on a portable storage device
A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of...
US-8,103,881 System, method and apparatus for electronic ticketing
The present invention provides a system, method and apparatus for securely granting access to an event. For example, in one embodiment of the present invention,...
US-8,103,844 Secure direct platter access
Bulk data transfers by directly accessing a persistent and secured area on the data storage device, e.g., a disk drive having a magnetic storage medium, without...
US-8,103,797 Parameterized recursive network architecture with topological addressing
A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the...
US-8,103,783 Systems and methods of providing security and reliability to proxy caches
The present solution provides a variety of techniques for accelerating and optimizing network traffic, such as HTTP based network traffic. The solution...
US-8,103,765 Method of non-intrusive analysis of secure and non-secure web application traffic in real-time
Provided is a method and system for monitoring and analysis of networked systems, that is non-intrusive and real time. Both secure and non-secure traffic may be...
US-8,103,618 Hosted system for enabling enterprises to build and operate online communities
A system that enables enterprises to design, create integrate and operate online communities. The system operates as an on-demand hosted platform ...
US-8,103,579 Systems and methods regarding targeted dissemination
One exemplary aspect comprises a computer-implemented method comprising: (a) electronically receiving, from a first securities market participant, data...
US-8,103,001 Method for verifying rights contained in a security module
A method of verification of rights is disclosed, contained in a security module associated to an apparatus processing broadcasted digital data. The apparatus is...
US-8,102,999 Secure telemetric link
A communications protocol is used to provide data privacy, message integrity, message freshness, and user authentication to telemetric traffic, especially to...
US-8,102,988 Method and system for dynamically terminating wireless and wireline calls between carriers
A third party tandem provider that intercepts and routes voice and data traffic between telecommunications carriers, e.g., wireless carriers, local exchange...
US-8,102,863 High-speed WAN to wireless LAN gateway
A gateway interconnecting a high speed Wide Area Network (WAN) and a lower speed Wireless Local Area Network (WLAN) is provided. The high speed WAN is...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.