Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,019,671 Legacy risk
Data corresponding to a set of securities is identified. For each security in the set, data corresponding to a legacy risk contribution from a corresponding...
US-8,019,365 Conducting a payment using a secure element and SMS
A method for transmitting data between a wireless communication and a remote server. The method includes running a mobile application on the wireless...
US-8,019,283 Automatic data encryption and access control based on Bluetooth device proximity
A method, apparatus, and system for using Bluetooth devices to secure sensitive data on other Bluetooth devices is described. A Bluetooth device is paired with...
US-8,018,673 Disk drive, method for measuring clearance and method for writing servo patterns
A disk drive. The disk drive includes a plurality of head-sliders, an actuator, a plurality of clearance adjustment sections, and a controller. Each head-slider...
US-8,016,416 Automatic system and methods for measuring and evaluating at least one of mass vision, cognition, knowledge,...
Integrating automatic systems and methods for rapid and objective mass tests, evaluations, measurements, screenings, trainings, or any combination thereof are...
US-8,016,188 Banking system operated responsive to data bearing records
A system for use in banking operates responsive to data included in data bearing records. The system is suitable for securing the contents in safety deposit...
US-8,015,612 Addressing security in writes to memory
A computer includes a processor. When an instruction to be executed by the processor involves writing to memory, the write can be redirected to a temporary page...
US-8,015,406 Method to create an OSI network layer 3 virtual private network (VPN) using an HTTP/S tunnel
A method of creating and using a virtual private network (VPN) client encrypts network communications to server/gateways using strong algorithms to ensure data...
US-8,015,211 Secure peer-to-peer object storage system
A peer-to-peer (P2P) networking system is disclosed that provides a large, persistent object repository with the ability to easily scale to significant size....
US-8,015,204 Scoped access control metadata element
Methods, systems, and data structures for communicating object metadata are provided. A generic metadata container is presented that allows object metadata to...
US-8,015,128 Biometric security using neuroplastic fidelity
A system, method and program product for providing biometric security using neuroplastic fidelity. A method is disclosed that includes: receiving biometric...
US-8,015,121 System for franking mail items with data document or file associated therewith
This invention relates to a machine for franking mail items, comprising means for printing postal indicia on a mail item and means for also printing on this...
US-8,015,116 Methods for authentication
A method for managing access to application software contained on a computer system or network. The computer system utilizes an authentication component that is...
US-8,015,106 Dynamic credit management
A method for providing a financial evaluation of at least one financial instrument or of an issuer supports the provision of a dynamic credit limit. A dynamic...
US-8,015,094 Fair value model based system, method, and computer program product for valuing foreign-based securities in a...
A system and method for determining fair value prices of financial securities of international markets includes steps of selecting a universe of securities of a...
US-8,015,032 Broadcasting medical image objects with digital rights management
Techniques are disclosed for efficiently and securely handling of patient medical images and data. In one particular embodiment, an acquisition service and...
US-8,015,024 System and method for managing patient-related data
A system and method for managing patient-related data includes transmitting a power signal to an orthopaedic implant, receiving implant identification data from...
US-8,014,976 Secure digital forensics
A security module is used to perform an audit of both a computer memory and the computer's processor status. The security module may assert itself as a bus...
US-8,014,892 Method and device for compensating for positional and shape deviations
A method for compensating for at least one of positional deviations and shape deviations in NC-controlled cutting production machines where the method includes...
US-8,014,795 GPSS-based system and method for enabling or disabling cellphones in predefined zones
A system and method are described for initiating, enabling, disabling or restoring cellphone operations when the cellphone is in a zone, which is where...
US-8,014,726 Method and system for collecting wireless information transparently and non-intrusively
A method of collecting information on a wireless device. A wireless device may comprise a processor, a transceiver, a memory and a data collecting component....
US-8,014,722 Provisioning of wireless connectivity for devices using NFC
The claimed subject matter provides a system and/or a method that facilitates connecting a wireless device to a secure network. A device can establish a near...
US-8,014,526 Secure wireless local or metropolitan area network and related methods
A secure wireless local or metropolitan area network and data communications device therefor are provided, where the device transmits plain text in an encrypted...
US-8,014,522 Optical storage media and the corresponding cryptography for data encryption thereof
Based on the demand of developing a data encryption technique for the optical storage media, the present invention discloses a cryptography for data encryption...
US-8,014,520 Exponentiation ladder for cryptography
Method and apparatus for data security using exponentiation. This is suitable for public key cryptography authentication and other data security applications...
US-8,014,035 Decoding message data embedded in an image print via halftone dot orientation
What is disclosed is a novel system and method for encoding/decoding data in a cover contone image via halftone dot orientation modulation. Arrays of halftone...
US-8,013,730 Customization of personal emergency features for security systems
The inventive system and method comprises a processor operable to detect an event, storage having detailed data corresponding to the event, an input device...
US-8,011,615 Internet linked environmental data collection system and method
An environmental data collection system and method is provided having an internet link for providing an additional level of security for a remotely controlled...
US-8,011,593 Smart apparatus for making secure transactions
The disclosed invention relates to an apparatus and method for making secured transactions. Such an apparatus may include a smart card device configured with a...
US-8,011,573 Automated banking machine operated responsive to data bearing records
An automated banking machine operates responsive to data read from user cards. The automated banking machine operates responsive to the card data to carry out...
US-8,011,004 Apparatus and method for VPN communication in socket-level
Provided is an apparatus and method for virtual private network (VPN) communication in a socket level that can be applied in an Internet Protocol version...
US-8,011,001 Method for managing security in a mobile communication system using proxy mobile internet protocol and system...
A security management method in a mobile communication system supporting Proxy Mobile Internet Protocol (IP). In the security management method, a Mobile Node...
US-8,010,992 Devices, systems, and methods for providing increased security when multiplexing one or more services at a...
Systems, devices, and methods are disclosed for providing increased security when multiplexing one or more services at customer premises. Such systems and...
US-8,010,989 System and method for configuring devices for secure operations
Systems and methods for establishing a security-related mode of operation for computing devices. A security-related mode of operation is established through...
US-8,010,958 Data processing apparatus, program managing apparatus, control program updating method, program managing...
The object is to provide a data processing apparatus, a program managing apparatus, a program managing system, etc., capable of securely and efficiently...
US-8,010,809 Method and system for securing network data
Method and system for storing data in a storage device accessible through a storage area network is provided. The method includes receiving data from a host...
US-8,010,805 Secure porting of information from one device to another
A generic access card is paired with a data destination device by insertion into its card slot, and the public portion of a public/private key is stored in the...
US-8,010,801 Multi-data rate security architecture for network security
An architecture and associated methods and devices are described in which a first selectable data path may be associated with a first port operating at a first...
US-8,010,791 Database system and method for encryption and protection of confidential information
A database system for encryption and protection of confidential data is provided. The database system includes a data source system receiving confidential data...
US-8,010,789 Secure data transfer using an embedded system
A method and device for securing data transmission via an embedded system that is operationally coupled to a local device and a remote computing system using a...
US-8,010,788 Program security through stack segregation
For each process a stack data structure that includes two stacks, which are joined at their bases, is created. The two stacks include a normal stack, which...
US-8,010,717 Method and system for communication and collaboration between a patient and healthcare professional
Methods and platforms for enhancing collaboration and communication between a patient and his healthcare team are described. A personal health record is created...
US-8,010,617 Securing serial console redirection via serial-over-LAN (SOL)
An information handling system has the capability of securing serial console redirection via serial-over-LAN (SOL) by using a baseboard management controller...
US-8,010,469 Systems and methods for processing data flows
Methods and systems for flow processing and switching, security, and other network applications, including a facility that processes a data flow to address...
US-8,010,450 Systems and methods for processing commercial financial transactions
Systems and methods for processing commercial financial transactions are provided. In one aspect, a method for processing a commercial financial transaction...
US-8,010,442 Financial data processing system
To process financial articles of trade, real time data is collected from a plurality of liquidity destinations in trading at least one of securities,...
US-8,010,436 Methods, systems and securities for assuring a company an opportunity to sell stock after a specified time
Various embodiments of the present invention relate to methods, systems and securities for assuring a company an opportunity to sell stock (e.g., common stock)...
US-8,010,085 Traffic redirection in cloud based security services
Systems, methods and apparatus for tunneling in a cloud based security system. Management of tunnels, such as data tunnels, between enterprises and processing...
US-8,009,909 Image processing apparatus and its method
Even through security information is embedded in a printed document, if the security level is changed after original data is printed, it is impossible to change...
US-8,009,830 Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.