Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,015,094 Fair value model based system, method, and computer program product for valuing foreign-based securities in a...
A system and method for determining fair value prices of financial securities of international markets includes steps of selecting a universe of securities of a...
US-8,015,032 Broadcasting medical image objects with digital rights management
Techniques are disclosed for efficiently and securely handling of patient medical images and data. In one particular embodiment, an acquisition service and...
US-8,015,024 System and method for managing patient-related data
A system and method for managing patient-related data includes transmitting a power signal to an orthopaedic implant, receiving implant identification data from...
US-8,014,976 Secure digital forensics
A security module is used to perform an audit of both a computer memory and the computer's processor status. The security module may assert itself as a bus...
US-8,014,892 Method and device for compensating for positional and shape deviations
A method for compensating for at least one of positional deviations and shape deviations in NC-controlled cutting production machines where the method includes...
US-8,014,795 GPSS-based system and method for enabling or disabling cellphones in predefined zones
A system and method are described for initiating, enabling, disabling or restoring cellphone operations when the cellphone is in a zone, which is where...
US-8,014,726 Method and system for collecting wireless information transparently and non-intrusively
A method of collecting information on a wireless device. A wireless device may comprise a processor, a transceiver, a memory and a data collecting component....
US-8,014,722 Provisioning of wireless connectivity for devices using NFC
The claimed subject matter provides a system and/or a method that facilitates connecting a wireless device to a secure network. A device can establish a near...
US-8,014,526 Secure wireless local or metropolitan area network and related methods
A secure wireless local or metropolitan area network and data communications device therefor are provided, where the device transmits plain text in an encrypted...
US-8,014,522 Optical storage media and the corresponding cryptography for data encryption thereof
Based on the demand of developing a data encryption technique for the optical storage media, the present invention discloses a cryptography for data encryption...
US-8,014,520 Exponentiation ladder for cryptography
Method and apparatus for data security using exponentiation. This is suitable for public key cryptography authentication and other data security applications...
US-8,014,035 Decoding message data embedded in an image print via halftone dot orientation
What is disclosed is a novel system and method for encoding/decoding data in a cover contone image via halftone dot orientation modulation. Arrays of halftone...
US-8,013,730 Customization of personal emergency features for security systems
The inventive system and method comprises a processor operable to detect an event, storage having detailed data corresponding to the event, an input device...
US-8,011,615 Internet linked environmental data collection system and method
An environmental data collection system and method is provided having an internet link for providing an additional level of security for a remotely controlled...
US-8,011,593 Smart apparatus for making secure transactions
The disclosed invention relates to an apparatus and method for making secured transactions. Such an apparatus may include a smart card device configured with a...
US-8,011,573 Automated banking machine operated responsive to data bearing records
An automated banking machine operates responsive to data read from user cards. The automated banking machine operates responsive to the card data to carry out...
US-8,011,004 Apparatus and method for VPN communication in socket-level
Provided is an apparatus and method for virtual private network (VPN) communication in a socket level that can be applied in an Internet Protocol version...
US-8,011,001 Method for managing security in a mobile communication system using proxy mobile internet protocol and system...
A security management method in a mobile communication system supporting Proxy Mobile Internet Protocol (IP). In the security management method, a Mobile Node...
US-8,010,992 Devices, systems, and methods for providing increased security when multiplexing one or more services at a...
Systems, devices, and methods are disclosed for providing increased security when multiplexing one or more services at customer premises. Such systems and...
US-8,010,989 System and method for configuring devices for secure operations
Systems and methods for establishing a security-related mode of operation for computing devices. A security-related mode of operation is established through...
US-8,010,958 Data processing apparatus, program managing apparatus, control program updating method, program managing...
The object is to provide a data processing apparatus, a program managing apparatus, a program managing system, etc., capable of securely and efficiently...
US-8,010,809 Method and system for securing network data
Method and system for storing data in a storage device accessible through a storage area network is provided. The method includes receiving data from a host...
US-8,010,805 Secure porting of information from one device to another
A generic access card is paired with a data destination device by insertion into its card slot, and the public portion of a public/private key is stored in the...
US-8,010,801 Multi-data rate security architecture for network security
An architecture and associated methods and devices are described in which a first selectable data path may be associated with a first port operating at a first...
US-8,010,791 Database system and method for encryption and protection of confidential information
A database system for encryption and protection of confidential data is provided. The database system includes a data source system receiving confidential data...
US-8,010,789 Secure data transfer using an embedded system
A method and device for securing data transmission via an embedded system that is operationally coupled to a local device and a remote computing system using a...
US-8,010,788 Program security through stack segregation
For each process a stack data structure that includes two stacks, which are joined at their bases, is created. The two stacks include a normal stack, which...
US-8,010,717 Method and system for communication and collaboration between a patient and healthcare professional
Methods and platforms for enhancing collaboration and communication between a patient and his healthcare team are described. A personal health record is created...
US-8,010,617 Securing serial console redirection via serial-over-LAN (SOL)
An information handling system has the capability of securing serial console redirection via serial-over-LAN (SOL) by using a baseboard management controller...
US-8,010,469 Systems and methods for processing data flows
Methods and systems for flow processing and switching, security, and other network applications, including a facility that processes a data flow to address...
US-8,010,450 Systems and methods for processing commercial financial transactions
Systems and methods for processing commercial financial transactions are provided. In one aspect, a method for processing a commercial financial transaction...
US-8,010,442 Financial data processing system
To process financial articles of trade, real time data is collected from a plurality of liquidity destinations in trading at least one of securities,...
US-8,010,436 Methods, systems and securities for assuring a company an opportunity to sell stock after a specified time
Various embodiments of the present invention relate to methods, systems and securities for assuring a company an opportunity to sell stock (e.g., common stock)...
US-8,010,085 Traffic redirection in cloud based security services
Systems, methods and apparatus for tunneling in a cloud based security system. Management of tunnels, such as data tunnels, between enterprises and processing...
US-8,009,909 Image processing apparatus and its method
Even through security information is embedded in a printed document, if the security level is changed after original data is printed, it is impossible to change...
US-8,009,830 Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-8,009,566 Packet classification in a network security device
Methods and apparatuses are described for inspecting data packets in a computer network. One or more data packets through the network have associated header...
US-8,009,425 Retaining apparatus for data storage device
A retaining apparatus for at least one data storage device includes a tray and a retaining device. The tray is used for receiving the at least one data storage...
US-8,009,032 Remote display tamper detection using data integrity operations
Methods and systems for detecting tampering of a remote display. According to one method, a first data integrity result is generated by performing a first data...
US-8,007,319 Electrical connector contacts retained by releasable first and second inserts held by releasable first and...
In accordance with one aspect, a connector includes contacts meeting MIL-C-39029/57 or MIL-C-39029/58 without requiring a retaining clip to hold such contacts...
US-8,006,897 Banking system controlled responsive to data bearing records
An automated banking machine is operated responsive to data bearing records. The machine operates using data read from user cards and causes funds to be...
US-8,006,311 System and methodology for validating compliance of anti-piracy security and reporting thereupon
A movie anti-piracy system with sensing and reporting is provided. An anti-piracy subsystem is utilized to preclude, interfere with and/or prevent copying of...
US-8,006,304 System and method for ARP anti-spoofing security
A system and method that provides for copying ARP replies, and generating data packets which include the ARP reply, and other information such as an...
US-8,006,300 Two-channel challenge-response authentication method in random partial shared secret recognition system
Random partial shared secret recognition is combined with using more than one communication channel between server-side resources and two logical or physical...
US-8,006,284 Electronic device, information processing system, information processing apparatus and method, program, and...
A user is enabled to easily access a data area on a network, and to use the data area with security, wherein a recording medium records an address for accessing...
US-8,006,101 Radio transceiver or other encryption device having secure tamper-detection module
An encryption device includes a system processor having a first key for encrypting information. The system processor periodically generates random data strings...
US-8,006,098 Integrating legacy application/data access with single sign-on in a distributed computing environment
The present invention provides methods, systems, computer program products, and methods of doing business whereby legacy host application/system access is...
US-8,006,095 Configurable signature for authenticating data or program code
System and method for authenticating data or program code via a configurable signature. Configuration information is retrieved from a protected first memory,...
US-8,006,078 Central processing unit having branch instruction verification unit for secure program execution
Provided are a central processing unit (CPU) and method for executing a branch instruction of a CPU, which can protect user's data by preventing an error due to...
US-8,006,058 Method and securing electronic device data processing
A method for securing electronic device processes against attacks (e.g. side channel attacks) during the processing of sensitive and/or confidential data by a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.