Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-7,883,128 Security system for shipping containers
The system described here is a system for monitoring security of shipping containers, which includes: a plurality of shipping containers, each having a bolt-type...
US-7,883,127 Shipping container security system
The system described here is a shipping container security system including a bolt-type seal lock module located on an exterior surface of a door of a shipping...
US-7,882,562 Apparatus, system, and method for deploying iSCSI parameters to a diskless computing device
An apparatus, system, and method are disclosed for deploying sensitive communication parameters to a diskless computing device. A parameter structure module is...
US-7,882,554 Apparatus and method for selective mirroring
An apparatus is described that facilitates selective mirroring through processing of network traffic in accordance with provisioned rules and policies. The...
US-7,882,552 Remote administration of smart cards for secure access systems
A secure access method for use with a communication network which communicates information between an information resource controller and a remote unit...
US-7,882,547 Securely calling web services from macros
A method of securing communications between an application that includes a macro and a Web Service. The method includes an act of, at the macro, generating a...
US-7,882,542 Detecting compromised computers by correlating reputation data with web access logs
Compromised host computers in an enterprise network environment comprising a plurality of security products called endpoints are detected in an automated manner...
US-7,882,540 System and method for on-demand dynamic control of security policies/rules by a client computing device
A system and method for an end user to change the operation of a data flow filter mechanism, such as a firewall, that operates to control data flows between a...
US-7,882,351 Systems and methods for authenticating and protecting the integrity of data streams and other data
Systems and methods are disclosed for enabling a recipient of a cryptographically-signed electronic communication to verify the authenticity of the communication...
US-7,882,238 Using bluetooth to establish ad-hoc connections between non-bluetooth wireless communication modules
Using Bluetooth to provide the network management functions such as device discovery, service discovery, security negotiation, and connection establishment. Upon...
US-7,882,229 Security checking program for communication between networks
A method for determining if a multiplicity of networks are authorized to communicate with each other and what IP protocol can be used for communication between...
US-7,882,214 Communication system and session establishment method
A communication system capable of securely preventing illegal use of addresses and enhancing confidentiality of communication. Based on an originating-side real...
US-7,882,157 Content data recording device and recording control method
Electronic device capable of automatically securing a capacity for recording a second content data other than a first content data even in the case of...
US-7,882,070 System and method for UDDI data migration using standard UDDI v3 API
A system and method are described for Universal Description Discovery and Integration (UDDI) data migration exporting existing UDDI V3 data from a UDDI V3...
US-7,882,036 System and method for postal indicia printing evidencing and accounting
System and method for printing indicia on mailing items, such as envelopes, cards, or label media, has a host computer system connected to a postal security...
US-7,882,028 Systems and methods for credit card fee calculation
In some embodiments, a calculation system may be used by a merchant to determine a merchant fee associated with a credit card transaction. The calculation system...
US-7,882,023 Method and system for managing collateral or property risk in a secured loan or lease portfolio
A method for managing collateral or property risk in a secured loan or lease portfolio includes monitoring the insurance status of each individual loan or lease....
US-7,882,020 Method and system for collection and analysis of shareholder information
A system and method is provided for the gathering of and manipulation of shareholder data, including information on individual shareholders and related...
US-7,881,667 Methods and apparatus for secure, portable, wireless and multi-hop data networking
A mobile network solution provides secure and portable wireless networking service to mobile users with devices equipped with wireless network interfaces. The...
US-7,881,477 Method for key distribution in a hierarchical multicast traffic security system for an internetwork
Multicast networks are partitioned into hierarchical security domains. Each security domain may comprise one or more lower security domains. Each security domain...
US-7,881,475 Systems and methods for negotiating security parameters for protecting management frames in wireless networks
Systems and methods provide a mechanism for wireless stations and access points to negotiate security parameters for protecting management frames. The access...
US-7,881,470 Network mobility security management
A node that couples to the Internet establishes a secure connection with another node that couples to the Internet. The secure connection to be established via...
US-7,881,329 Method and system for maintaining high reliability logical connection
A method and system for maintaining a high reliability logical connection between hosts employs adaptive transparent pinging, clone blocking and bandwidth...
US-7,881,177 Recording medium, method and apparatus for reproducing data on the recording medium, and method and apparatus...
A recording medium on which data is recorded in units of clusters, a method and apparatus for reproducing data on the recording medium, and a method and...
US-7,880,938 Image processing apparatus
An image processing apparatus that enables to embed a secure pattern code in an output image with an inexpensive configuration. An image reader has a color...
US-7,880,767 Security system for mass transit and mass transportation
A security system and method for mass transit and mass transportation whereby high capacity mobile vehicles such as ships, buses, planes, trains and subways...
US-7,880,641 Configurable smart utility meter box
The invention relates to a meter box for housing a utility meter and configured for associating a customer service line to a utility service line. The meter box...
US-7,878,993 Ankle-foot orthosis device
An ankle-foot orthosis comprising a leg member 12; a foot member 14; a frame 16 connecting the leg member to the foot member, wherein the frame comprises a first...
US-7,878,908 Multiplexed secure video game play distribution
Multiple video game players access an encrypted video game library stored on a shared mass storage device. A multiplexer multiplexes data read from the mass...
US-7,878,902 Secured verification of configuration data for field programmable gate array devices
A method and apparatus for providing automated and secured verification of configuration data for a volatile progrannmable electronic device, such as an FPGA, is...
US-7,878,413 Method for the dual coding of information on physical media and in a computerized format (DOTEM)
DOTEM is an information-coding method which is used to represent same on physical media with the aid of dots and in a computerised format, in memory and on...
US-7,877,805 Apparatus, method and computer program product for detection of a security breach in a network
A method for detecting a security breach in a network comprises at one of a plurality of transceivers each having a different media access control address,...
US-7,877,804 Comprehensive security structure platform for network managers
A computer system and method for detecting and monitoring network intrusion events from log data received from network service devices in a computer network, the...
US-7,877,788 Method and apparatus for securing a peripheral data interface
A method and apparatus for controlling connectivity comprising a connectivity control element coupled between an interface connector and an interface circuit,...
US-7,877,787 Method and apparatus for optimal transfer of data in a wireless communications system
An apparatus and method for sharing data in a communications system include a bootstrapping server function (BSF) configured to transmit a first message. The...
US-7,877,712 System for and method of verifying IC authenticity
A verification system disclosed herein uses the unique signatures of an IC to perform authentication of the IC after the IC is shipped to a customer. The...
US-7,877,597 Anonymous peer-to-peer communication
An anonymous peer-to-peer network has a security protocol that allows hosts in the network to determine whether data received from the network is valid. The...
US-7,877,563 Programmable memory device security
A removable digital data storage device has a programmable memory controller, a data storage medium and a data destruction means. The memory controller is...
US-7,877,503 Method and system for an intercept chain of custody protocol
Techniques for establishing a chain of custody for intercepted electronic information are disclosed. In one particular exemplary embodiment, the techniques may...
US-7,877,494 Method, components and system for tracking and controlling end user privacy
A privacy service is provided for use in protection of user data transferred in a network, including a converged network. The privacy service extracts and...
US-7,877,410 System and method for providing private inference control
A system and method for providing private inference control is presented. A query count and database including records are maintained. Each record includes...
US-7,877,322 Preferred credit information data collection method
A creditor creates a lock box at a financial institution. The lock box includes an escrow provision. A consumer makes regularly scheduled payments to the...
US-7,877,319 Integrated trading information processing and transmission system for exempt securities
A system is provided for processing and transmitting trading information for exempt securities or assets not otherwise listed, traded, valuated or bought/sold in...
US-7,877,318 Method for directing and executing certified trading interests
Preferred embodiments of the subject invention comprise: (a) electronically receiving securities order-related data regarding a set of securities market...
US-7,877,314 Method and system for optimal pricing and allocation for a set of debt instruments to be offered
A method and system for the determination of optimal pricing and allocation of securities in an open, competitive environment. The method and system may also be...
US-7,876,897 Data security in wireless network system
For data protection in a wireless network system, a frame, including its Medium Address Control (MAC) header and payload, is encrypted with an initialization...
US-7,876,894 Method and system to provide security implementation for storage devices
In one embodiment, method that can be performed on a system, is provided to security implementations for storage devices. In one embodiment, the method comprises...
US-7,876,776 Local area network of serial intelligent cells
A serial intelligent cell (SIC) and a connection topology for local area networks using Electrically-conducting media. A local area network can be configured...
US-7,876,615 Method of operating integrated circuit embedded with non-volatile programmable memory having variable coupling...
A programmable non-volatile device is operated with a floating gate that functions as a FET gate that overlaps a portion of a source/drain region and allows for...
US-7,876,259 Automatic dependent surveillance system secure ADS-S
An air traffic control automatic dependent, WAAS/GPS based, surveillance system (ADS), for operation in the TRACON airspace. The system provides encryption...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.