Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,862,867 Method and system for protecting security of the third layer mobility user plane data in NGN
The disclosure discloses a method for protecting security of layer-3 mobility user plane data in Next Generation Network (NGN), includes: performing...
US-8,862,844 Backup apparatus, backup method and computer-readable recording medium in or on which backup program is recorded
Upon production of a backup of a first generation, all of an operation volume is stored. However, upon production of a backup of a second or later generation,...
US-8,862,773 Scalable network apparatus for content based switching or validation acceleration
A network apparatus is provided that may include one or more security accelerators. The network apparatus also includes a plurality of network units cascaded...
US-8,862,687 Method and system for secure digital file sharing
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and...
US-8,862,518 Multi-way transaction related data exchange apparatus and methods
Methods and apparatus for conducting electronic transactions such as commerce transactions or purchases and exchanging related information. In one aspect, a...
US-8,862,379 Vehicle collision shield
In the present disclosure, systems and methods for preventing collisions between a ground services vehicle and other objects are described. In one embodiment, a...
US-8,862,120 System and method for speeding call originations to a variety of devices using intelligent predictive...
A mobile application gateway configured to interconnect mobile communication devices on a cellular network with an enterprise network is provided. The mobile...
US-8,861,733 Method of personalizing a NFC chipset
The invention relates to a method for personalizing a secure processor in a NFC system to execute a secure application, comprising steps of obtaining by a...
US-8,861,729 Method and system for the secure distribution of audiovisual data by transactional marking
A process for distributing a marked audiovisual sequence from a nominal audiovisual sequence towards a receiver, said nominal audiovisual sequence having a...
US-8,861,722 Generating a session key for authentication and secure data transfer
A device for generating a session key which is known to a first communication partner and a second communication partner, for the first communication partner,...
US-8,861,006 Device management in a distributed scan system
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on...
US-8,860,820 Video recording system, method, and computer program for memory space distribution in a video recording system
In the present digital age, the storage of data and the administration of the stored data is a problem area which, despite rapidly dropping prices for storage...
US-8,860,556 Method and system for the secure detection of an RFID electronic tag
The invention relates to a method and a system for the secure detection of an RFID electronic tag (ET1). This detection system comprises a read/write station...
US-8,860,465 Protecting data from decryption from power signature analysis in secure applications
Disclosed is a novel circuit able to generate any logic combination possible as a function of the input logic signals. The circuit is described as a 2 input...
US-8,857,727 System for generating an incrementally completed 3D security mark
A system (10) for generating an incrementally completed 3D security mark (20''') includes a computer-readable medium encoded with a computer program. The...
US-D715,347 Data recording device
US-8,856,946 Security filter for context-based data gravity wells
A processor-implemented method, system, and/or computer program product defines multiple security-enabled context-based data gravity wells on a security-enabled...
US-8,856,935 Automatic synthesis of unit tests for security testing
Performing security analysis on a computer program under test (CPUT). The CPUT can be analyzed to identify data pertinent to potential security vulnerabilities...
US-8,856,925 Native code module security for arm instruction set architectures
Some embodiments provide a system that executes a native code module. During operation, the system obtains the native code module. Next, the system loads the...
US-8,856,920 System and method of securely processing lawfully intercepted network traffic
A system and method are provided for supporting storage and analysis by law enforcement agency premises equipment of intercepted network traffic. The system and...
US-8,856,919 Authorization of server operations
An authorization device for authorizing operations of a remote server requested from user computers via a data communications network includes a computer...
US-8,856,915 Security communication apparatus and security communication method
A negotiation unit, of a logical network control apparatus connected to a LAN, judges settings of processing to be performed on communication data by a network...
US-8,856,914 System and method for intelligent coordination of host and guest intrusion prevention in virtualized environment
A distributed and coordinated security system providing intrusion-detection and intrusion-prevention for the virtual machines (VMs) in a virtual server is...
US-8,856,909 IF-MAP provisioning of resources and services
A method may include receiving a request from an endpoint to access a network; granting access to the network; and subscribing to an IF-MAP server for updates...
US-8,856,908 Management and delivery of profile data
Aspects of the invention relate to systems and methods for securely retaining profile data and the use of such data for the targeted delivery of content. In one...
US-8,856,869 Enforcement of same origin policy for sensitive data
Methods, systems, and apparatus relating to enforcement of same origin policy of sensitive data are described. In an embodiment, a security agent may help...
US-8,856,866 Image forming apparatus to restrict use of a hard disc drive and a method thereof
An image forming apparatus capable of restricting use of a hard disc drive and a method of restricting the use of the hard disc drive of the image forming...
US-8,856,790 Systems and methods for data management in a virtual computing environment
Systems and methods are disclosed for performing operations on a host system with one or more virtual machines without persistently storing an agent or daemon...
US-8,856,780 Method and system to remotely flash an external module
A method to remotely flash an external module comprises the steps to electronically transfer a computer program from a computer device to an external module, to...
US-8,856,548 Public cloud data at rest security
An encryption switch which is used in a cloud environment to secure data on the LUNs used by the clients. A client provides a certificate to the cloud service....
US-8,856,547 Speed up secure hash algorithm (SHA) using single instruction multiple data (SIMD) architectures
A processing apparatus comprises logic to, according to a selected secure hash algorithm (SHA) algorithm, generate hash values by preparing message schedules...
US-8,856,546 Speed up secure hash algorithm (SHA) using single instruction multiple data (SIMD) architectures
A processing apparatus may comprise logic to preprocess a message according to a selected secure hash algorithm (SHA) algorithm to generate a plurality of...
US-8,856,539 Universal secure registry
A secure registry system and method for the use thereof are provided which permits secure access to a database containing selected data on a plurality of...
US-8,856,534 Method and apparatus for secure scan of data storage device from remote server
A method and device for providing a secure scan of a data storage device from a remote server are disclosed. In some embodiments, a computing device may include...
US-8,856,509 System and method for cognizant transport layer security (CTLS)
A method of authentication and authorization over a communications system is provided. Disclosed herein are systems and methods for creating a cryptographic...
US-8,856,508 Onboard access control system for communication from the open domain to the avionics domain
An onboard access control system to an information system onboard an aircraft, for communication from the open domain to the avionics domain, the open end...
US-8,856,507 Secure identity and personal information storage and transfer
The invention presented herein consists of systems and methods of secure storage for sensitive and confidential data, such as personal identity data, along with...
US-8,856,474 Nonvolatile memory unit with secure erasing function
An apparatus includes a nonvolatile memory, an interface that at least receives an erase command of the nonvolatile memory, a first controller that controls the...
US-8,856,439 Method and device for utilizing application-level prior knowledge for selectively storing data in higher...
A method for selectively storing data identified by a software application in higher performance media may include executing control programming for an...
US-8,856,323 Device and method for facilitating secure communications over a cellular network
A process for communicating utility-related data over at least one network is described. the process includes: collecting utility-related data at a hub device...
US-8,856,317 Secure data transfer in a virtual environment
In one embodiment, a method includes receiving at one of a plurality of servers, a request from a client for a secure communication session, storing context...
US-8,856,295 System and method for providing an enterprise deployment topology with thick client functionality
In accordance with an embodiment, one or more software application products, such as Oracle Fusion Applications, can be installed and/or configured according to...
US-8,856,169 Multi-modality, multi-resource, information integration environment
A multi-modality, multi-resource, information integration environment system is disclosed that comprises: (a) at least one computer readable medium capable of...
US-8,856,086 Ensuring integrity of security event log upon download and delete
A cloud deployment appliance includes a mechanism to enable permitted users to move event records reliably from an internal event log of the appliance to a data...
US-8,856,057 Cognitive security system and method
A cognitive system and method for predicting and detecting security breaches is provided which yields cognitive inputs to a security management interface...
US-8,856,044 Segmented access of remotely stored biographical data to a client device
Methods and systems of segmented access of remotely stored biographical data to a client device are disclosed. In one embodiment, a biographical information is...
US-8,856,029 Systems and methods for regulating the receipt of data transmitted from a messaging device
A computer-implemented method for regulating the receipt of data transmitted from a messaging device is described. A security application that includes a...
US-8,855,599 Method and apparatus for auxiliary communications with mobile communications device
A method and apparatus for auxiliary communications capability in a mobile communications device. The mobile communications device is configured with a hidden...
US-8,855,318 Master key generation and distribution for storage area network devices
Mechanisms are provided for generating a master key used to secure key objects associated with data blocks in a data center. A cryptographic node creation...
US-8,855,313 System and method for providing variable security level in a wireless communication system
A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.