Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,356,104 Secure messaging facility system
A secure message facility transfers authentication data between various applications, operating systems, and authentication devices and software in the form of...
US-8,355,706 Method and system for utilizing context data tags to catalog data in wireless system
A Wireless mobile communication (WMC) device may maintain user preference information, which is unique to the WMC device capabilities and the device user. The...
US-8,355,695 Secured data transmission in communications system
A solution for providing a data security service in a wireless communications system (S) is disclosed. In the solution, a first security association (SA1) is...
US-8,355,367 Method and apparatus for transmitting/receiving a reference signal in a wireless communication system
A method and apparatus for transmitting/receiving reference signals in Long Term Evolution (LTE) and LTE-Advanced (LTE-A) systems includes determining whether a...
US-8,353,450 Banking system controlled responsive to data bearing recordings and user input of a phone received security code
A banking system operates to cause financial transfers responsive to card data read from data bearing records by a card reader. The system includes at least one...
US-RE43,936 Method and system for providing secure digital music duplication
A system and method are provided wherein digital data representing content and associated license rights may copied to a storage medium, such as a removable...
US-RE43,933 System for providing fault tolerant data warehousing environment by temporary transmitting data to alternate...
A method and system utilizing one or more data generating computing devices as default data warehouses in the event of a primary data warehouse failure are...
US-8,353,022 Bilateral communication using multiple one-way data links
A bilateral data transfer system comprising a first node, a second node, a first one-way link for unidirectional transfer of first data from the first node to...
US-8,353,013 Authorized application services via an XML message protocol
Disclosed are systems and methods to provide a persistent authorized server address space (ASAS). The ASAS can host components from product suites that are not...
US-8,352,999 Method for managing data in a shared computing environment
A method of storing secret data in a shared computing environment includes defining secret data, such as a password and administration policies according to a...
US-8,352,939 System, method and computer program product for performing a security or maintenance operation in association...
A system, method and computer program product are provided for performing a security or maintenance operation in association with virtual disk data accessed...
US-8,352,809 Checking method and electronic circuit for the secure serial transmission of data
A checking method in which serial data protected by check data are transmitted via a serial data bus from a transmitter to a receiver, the receiver then...
US-8,352,807 Semiconductor memory device, host device and semiconductor memory system
A host device 200A includes a data buffer 250. When data has been already written to a part of a physical block and data is additionally written to the physical...
US-8,352,749 Local trusted services manager for a contactless smart card
Systems, methods, computer programs, and devices are disclosed herein for deploying a local trusted service manager within a secure element of a contactless...
US-8,352,731 Secure decentralized storage system
A secure decentralized storage system provides scalable security by addressing the performance bottleneck of the security manager and the complexity issue of...
US-8,352,727 Protection of data delivered out-of-order
A basic idea of this system is to separate ordered delivery data and unordered delivery data in a security protocol running on top of a reliable transport...
US-8,352,679 Selectively securing data and/or erasing secure data caches responsive to security compromising conditions
Techniques are generally described for methods, systems, data processing devices and computer readable media configured to decrypt data to be stored in a data...
US-8,352,587 Parameterized recursive network architecture with topological addressing
A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the...
US-8,352,450 Database update through a one-way data link
A database updating application for updating through a one-way data link a remote database in accordance with a change in a reference database is disclosed,...
US-8,352,448 Securely deleting data in a transactionally consistent manner
A process is disclosed by which data is securely deleted in a transactionally consistent manner. This may be accomplished by committing a preparation...
US-8,352,444 User-driven menu generation system with dynamic generation of target files with placeholders for persistent...
Dynamic generation of target files is described. A user can select a template file. The template file includes: at least first and second changeable fields...
US-8,352,417 System, method and program product for management of life sciences data and related research
A system, method and program product for managing data for researchers. A research data server receives and manages experimental data and research data and...
US-8,352,364 Financial transaction system with integrated electronic messaging, control of marketing data, and user defined...
A method of performing financial transactions between users of Summa accounts, each Summa account including an electronic messaging system that provides for...
US-8,352,353 Method and system for maintaining trading accounts
Orders relating to a sale or purchase of securities are staged into an execution management system that includes a processor programmed to perform securities...
US-8,352,347 Investment classification and tracking system using diamond ratings
The present invention is directed to an asset classification system based on investment strategy. The system determines a number for performance measures and...
US-8,351,605 Stealth message transmission in a network
Embodiments of the invention include methods of transmitting a hidden message within a secured primary data transmission. In one embodiment, a method involves...
US-8,351,579 System and method for securely authenticating and lawfully intercepting data in telecommunication networks...
A system and method for securely authenticating and lawfully intercepting data in a telecommunication network using biometrics is disclosed. In one embodiment,...
US-8,351,445 Network interface systems and methods for offloading segmentation and/or checksumming with security processing
Network interface systems are disclosed comprising a bus interface system, a media access control system, a memory system, a security system for selectively...
US-8,351,398 Mobile communication terminal, incoming data detecting method and incoming data detecting program
Included are a system information receiving unit for receiving, from a first base station or a second base station, system information including a PI within a...
US-8,351,178 Electronic system with secured data accessing
A first electronic device includes an electromagnetic component embedded in its connecting port and controlled to be activated during data transmission between...
US-8,351,145 Method retaining a moveable head assembly with an anti-rotation guide for a transducer
A transducer positioning apparatus is provided that supports a read/write head on a data storage machine and biases the head against rotation. The transducer...
US-8,350,718 Secure collector diagnostic portal activation
Disclosed are methodology and apparatus for providing communications with an Automatic Meter Reading/Advanced Metering Infrastructure (AMR/AMI) collector...
US-8,348,686 Plug security structure for electrical connector
A plug security structure includes a plug, a cable, a jacket, a movable cap and a key. By means of a middle block, the movable cap is slidably insertable into...
US-8,347,427 Water use monitoring apparatus
A water use and/or a water energy use monitoring apparatus that is affixed to the hot and cold main water supply piping for continuously (or on demand)...
US-8,347,405 Asynchronous java script and XML (AJAX) form-based authentication using java 2 platform enterprise edition (J2EE)
An apparatus, system, and method are disclosed for Asynchronous Java Script and XML (AJAX) form-based authentication using Java 2 Platform Enterprise Edition...
US-8,347,404 Method, system, and data server for checking revocation of content device and transmitting data
A method of checking revocation of a device and software, and transmitting data to a secure device and secure software whose keys have not been leaked is...
US-8,347,398 Selected text obfuscation and encryption in a local, network and cloud computing environment
A keyboarded a mix of private and public text composing a source-text document is submitted through an encryption adapter intersituated in a data signal link...
US-8,347,387 Addressing security in writes to memory
A computer includes a processor. When an instruction to be executed by the processor involves writing to memory, the write can be redirected to a temporary area...
US-8,347,115 System and method for transparent disk encryption
A data storage system providing transparent encryption. The data storage system has a hardware encryption/decryption engine and a register coupled to the...
US-8,347,111 Data processing apparatus
A data processing apparatus comprises a monolithic integrated circuit having a data processor, a non-volatile memory storing at least one security code, and at...
US-8,347,105 Method and system for obtaining a PIN validation signal in a data processing unit
The present invention relates to a method for obtaining a PIN validation signal in a data processing unit, the method including the steps of receiving a PIN in...
US-8,347,104 Security interface for a mobile device
A method and device are described which provide a security interface, preferably for a mobile device. The security interface provides user-selectable non-secure...
US-8,347,094 Securing wireless body sensor networks using physiological data
A password protocol for establishing secure communications between sensor nodes in a network using secure environmental values (SEV). A first sensor sends a...
US-8,347,088 Security systems and methods for use with structured and unstructured data
Disclosed herein are systems and methods including hardware, software and electronic service components and systems to provide large-scale, reliable, and secure...
US-8,347,085 Integrating security protection tools with computer device integrity and privacy policy
At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and...
US-8,347,073 Inspection and rewriting of cryptographically protected data from group VPNs
Systems, methods, and other embodiments associated with processing secure network traffic are described. One example method includes determining whether a...
US-8,347,072 Method and apparatus for secure execution using a secure memory partition
A processor capable of secure execution. The processor contains an execution unit and secure partition logic that secures a partition in memory. The processor...
US-8,346,969 Scalable network apparatus for content based switching or validation acceleration
A network apparatus is provided that may include one or more security accelerators. The network apparatus also includes a plurality of network units cascaded...
US-8,346,925 Apparatus for providing security over untrusted networks
A network security apparatus adapted to provide for secure communications across data networks, including untrusted networks. In one embodiment, the security...
US-8,346,918 Apparatus and method for biased and weighted sampling of network traffic to facilitate network monitoring
An apparatus is described that performs biased and weighted sampling of network traffic to facilitate network monitoring. One embodiment of the apparatus...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.