Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,892,855 Encryption keys distribution for conditional access software in TV receiver SOC
A method for securely generating and distributing encryption keys includes generating, by a secured server, a pair of keys including a first key and a second...
US-8,892,778 Method and systems for securing remote access to private networks
A method for securing remote access to private networks includes a receiver intercepting from a data link layer a packet in a first plurality of packets...
US-8,892,687 Client/server security by an intermediary rendering modified in-memory objects
In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define one or more objects and one or more...
US-8,892,513 Method, process and system to atomically structure varied data and transform into context associated data
A novel method, system and process for the enterprise software are described. The data is created, captured, ingested, stored, atomized, monitored, separated,...
US-8,892,454 Configuration of web services
Methods and apparatus, including computer program products, for configuration of web services. In general, data is received characterizing web service calls for...
US-8,892,069 Method for automatically configuring addresses and/or security data between evolved node Bs (eNBs) of a long...
A method is intended for automatically configuring address(es) between eNBs (NBi) of an LTE access network. This method comprises i) transmitting a chosen...
US-8,891,770 Pair-wise keying for tunneled virtual private networks
In an embodiment, a method for generating and distributing keys retains the scalability of a group VPN, but also provides true pair-wise keying such that an...
US-8,891,768 Increasing data security in enterprise applications by obfuscating encryption keys
A method, system, and computer program product for using hidden buffer formatting and passing obfuscated encryption key values to detect tampering with and/or...
US-8,891,107 Image forming apparatus, control method thereof and computer-readable storage medium
This invention provides an image forming apparatus capable of reliably printing security information even when image data of an original document that is...
US-8,890,976 Imaging apparatus and image capturing method for increasing security of a captured image file
An imaging apparatus that includes an image capturing unit that captures image data, a memory that stores the image data and a password for accessing the stored...
US-8,890,893 Data processing and display system
A data processing and display system includes processing and display means adapted for displaying, from a more secured domain and on a same screen of a display...
US-8,888,762 Flexible shaft extender and method of using same
An extender for use in an electro-mechanical surgical system that includes a surgical attachment that may be detachably coupled to an electro-mechanical driver...
US-8,888,744 Infusion and sensing device with battery charging and data transferring mechanisms
Disclosed is a portable ambulatory fluid delivery device. The device includes a dispensing unit to dispense therapeutic fluid, the dispensing unit including one...
US-8,888,585 Game console system, method and computer program product with anti-malware/spyware and parental control...
A system, method and computer program product are provided for securing a game console capable of processing game-related data. In use, the game-related data is...
US-8,888,010 Detection of security marks simulating natural defects for embedding information in documents
A system for generating a security mark includes a data reception component that receives information. A security mark generation component in communication...
US-8,888,006 Decoder, a coupling card reader and an application system and method for the same
The present application is directed to a decoder, a coupling card reader and an application system. The decoder includes a card base which is produced from at...
US-8,887,324 Water use monitoring apparatus
The present invention is a water use and/or a water energy use monitoring apparatus that is affixed to the hot and cold water supply piping for continuously (or...
US-8,887,300 Automated message transmission prevention based on a physical reaction
Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive...
US-8,887,298 Updating and validating documents secured cryptographically
Aspects of the subject matter described herein relate to updating and validating documents secured cryptographically. In aspects, documents are encrypted to...
US-8,887,297 Creating and validating cryptographically secured documents
Aspects of the subject matter described herein relate to creating and validating cryptographically secured documents. In aspects, documents are encrypted to...
US-8,887,295 Method and system for enabling enterprises to use detachable memory devices that contain data and executable...
Secure operation of SEMDs on a client computer in a host system is obtained by controlling what applications (i.e., U3 applications) that can run on the host...
US-8,887,293 Method, system, and storage medium for secure communication utilizing social networking sites
Embodiments disclosed herein provide secure communication among enterprise users utilizing social networking sites. A server computer may encrypt a post...
US-8,887,284 Exfiltration testing and extrusion assessment
An improved technique employs an automated agent inside the network perimeter, which generates and sends data packets to a listener outside the network...
US-8,887,282 Techniques for protecting data in cloud computing environments
A client computer runs a communicator employed to connect to a server computer in a cloud. The communicator is updated on a regular basis to update its...
US-8,887,276 System for providing a secure video display
A system for providing a secure video display using a one-way data link. An input interface for receives a video stream signal. The one-way data link has an...
US-8,887,271 Method and system for managing object level security using an object definition hierarchy
In one embodiment the present invention includes a computer-implemented method comprising receiving a request from a user to perform an action on a first object...
US-8,887,256 Establishing virtual private network session using roaming credentials
Providing virtual private network (VPN) sessions or other types of secure or private access to data when a client authorized to access the data travels or...
US-8,887,230 Configuring and providing profiles that manage execution of mobile applications
Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user...
US-8,887,156 Parallel processing of data
An untrusted application is received at a data center including one or more processing modules and providing a native processing environment. The untrusted...
US-8,886,997 Hardware security module and processing method in such a module with augmented communication features
The present invention relates to the field of processing within hardware security modules, such as for example debugging of compiled programs. A debugging...
US-8,886,993 Storage device replacement method, and storage sub-system adopting storage device replacement method
Based on information security rules, it is not possible to take out a failure HDD to the exterior of a facility for replacement without erasing data therefrom....
US-8,886,963 Secure relocation of encrypted files
Systems and methods are disclosed for secure relocation of encrypted files for a system having non-volatile memory ("NVM"). A system can include an encryption...
US-8,886,959 Secure processor and a program for a secure processor
The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated...
US-8,886,956 Data storage apparatus having cryption and method thereof
A storage apparatus including a storage unit to store data, a processor unit to process the data according to a command received from an external device, a key...
US-8,886,940 Hash function using a card shuffling process
In the computer data security field, a cryptographic hash function process embodied in a computer system and which is typically keyless, but is highly secure....
US-8,886,939 Secure authenticated distance measurement
The invention relates to a method for a first communication device to performing authenticated distance measurement between said first communication device and...
US-8,886,934 Authorizing physical access-links for secure network connections
A method of authenticating a network link of a first device to a second device is described. The method includes communicating a challenge request including a...
US-8,886,926 Single-pass data compression and encryption
Embodiments compress and encrypt data in a single pass to reduce inefficiencies that occur from compression and encrypting data separately. Typically,...
US-8,886,925 Protecting enterprise data through policy-based encryption of message attachments
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application...
US-8,886,779 Performance modeling for SOA security appliance
A device, system, and method are directed towards optimizing a security apparatus within a Service-Oriented Architecture (SOA). Performance data is gathered for...
US-8,886,673 Optimizing data cache when applying user-based security
A secure caching system and caching method include receiving a user request for data, the request containing a security context, and searching a cache for the...
US-8,886,670 Securely accessing remote systems
A method for securely accessing a number of computing systems within a remote facility includes, with a mobile computing system, checking out access data from a...
US-8,886,570 Hacker-resistant balance monitoring
Methods of and systems for securely monitoring a balance of a payment account include storing, in a first database, ledger data and storing, in a second...
US-8,886,564 Program for resource security in a database management system
An inventive method is presented for resource security in a database management system having a plurality of resources, the method comprising creating a macro...
US-8,886,560 System and method for enabling channel agreements negotiations in an IP marketplace
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
US-8,886,473 System and method for vibration analysis
Identification and correction of component vibration issues in an industrial plant is accomplished with a database of component vibration data collected and...
US-8,886,468 Method and system for monitoring the structural integrity of structural members of a building
A system for monitoring the structural integrity of structural members of a building using radio frequency identification tags. A plurality of radio frequency...
US-8,886,216 Method and apparatus for tracking a transported item while accommodating communication gaps
A method and apparatus is provided for minimizing potential security problems and battery power usage in a tracking device used in tracking an associated...
US-8,886,215 Method and apparatus for tracking a transported item while accommodating communication gaps
A method and apparatus is provided for minimizing potential security problems and battery power usage in a tracking device used in tracking an associated...
US-8,885,938 Detecting concealed threats
Potential threat items may be concealed inside objects, such as portable electronic devices, that are subject to imaging for example, at a security checkpoint....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.