Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,855,311 Advanced container security device network protocols
In one preferred embodiment, a set of air interface protocols (AIPs) provides a method for secure wireless-to-IP communication between conveyance-mounted...
US-8,855,310 System and method for exchanging encryption keys between a mobile device and a peripheral device
Systems and methods for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless...
US-8,855,058 Wireless architecture in support of voice and data communications
A wireless access network including a wireless base station configured to, for Iu-CS voice traffic, act as a network controller, by, terminating Iu-b signals...
US-8,855,012 Mobile, secure and customizable emergency service gateway system
A mobile, secure and customizable emergency communication gateway system for providing effective electronic data communications for emergency personnel in a...
US-8,854,972 Security device implementing flow lookup scheme for improved performance
A security device performing flow classification and storing flow information in a flow table includes a flow engine generating a flow key identifying a flow to...
US-8,854,966 Apparatus and methods for network resource allocation
Methods and apparatus for allocating resources (such as communications bandwidth) using a network access device. In one embodiment, the network includes a...
US-8,854,692 Printing device and printing method generating watermark information
The present invention provides an information printing method and a printing device, which assure a higher level of security when outputting printed matter. The...
US-8,854,189 Method for a secure non-volatile logging in an active RFID tag of a process in a tagged article
Prior to logging of a process flags for locking at all addresses of a logging area of a tag are set to state 1 by means of an interrogator. A high limit (h) and...
US-8,854,181 Remote keyless entry transmitter
A remote wireless keyless entry transmitter includes a communications interface for connecting the transmitter directly to an in-vehicle network for registering...
US-8,854,180 Access control system
An access controlled storage device may include multiple doors, each having a different lock, to insure safety and security of the contents of the storage...
US-8,851,184 Process, device, and system to cap and seal oil and gas in a riser pipe
A containment valve assembly using the upcoming pressures to control the flow of oil/gas through a riser pipe with a stop flow plug positioned within the valve...
US-8,850,608 Embedded ring oscillator network for integrated circuit security and threat detection
Aspects of the disclosure relate to combining on-chip structure with external current measurements for threat detection in an integrated circuit. This method...
US-8,850,600 Data storage device and data storage system including the same
A data storage device protecting security code stored therein and a data storage system including same are disclosed. The data storage device efficiently...
US-8,850,597 Automated message transmission prevention based on environment
Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive...
US-8,850,590 Systems and methods for using transport stream splicing for programming information security
Apparatus and methods for indicating the identity of a device for receiving and retransmitting programming information. The device, which may be a set-top box...
US-8,850,588 Systems and methods for providing mobile security based on dynamic attestation
Instrumented networks, machines and platforms having target subjects (devices, transactions, services, users, organizations) are disclosed. A security...
US-8,850,583 Intrusion detection using secure signatures
A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way...
US-8,850,557 Processor and data processing method with non-hierarchical computer security enhancements for context states
Disclosed are a processor and processing method that provide non-hierarchical computer security enhancements for context states. The processor can comprise a...
US-8,850,552 Use of data links for aeronautical purposes without compromising safety and security
A method of ensuring secure and cost effective communication of aeronautical data to and from an aircraft is provided. The method includes uplinking air-ground...
US-8,850,539 Adaptive policies and protections for securing financial transaction data at rest
A system for challenge-response authentication is provided by receiving, from an external terminal over a communication network, a request for access to a...
US-8,850,530 Enterprise-wide security system for computer devices
A system and method for securing data in mobile devices (104) includes a computing mode (102) and a plurality of mobile devices (104). A node security program...
US-8,850,527 Method of performing a secure application in an NFC device
The invention relates to a method of executing a secure application in an NFC device, the method comprising steps during which: a contactless link is...
US-8,850,520 Dual cookie security system with interlocking validation requirements and remedial actions to protect personal data
A first server associated with a first URL receives a request from a client, including a first object having a respective user identifier and validation value....
US-8,850,513 System for data flow protection and use control of applications and portable devices configured by location
The present invention relates to a system for implementing a firewall service on portable devices such as mobile phones, tablets or notebooks, which has changed...
US-8,850,428 User transparent virtualization method for protecting computer programs and data from hostile code
A secure computing environment that prevents malicious code from "illegitimately" interacting with programs and data residing on the computing platform. While...
US-8,850,227 Cryptographic operations using a key hierarchy
Aspects of the subject technology relate to systems, methods, and machine-readable media for performing a cryptographic operation. A system can be configured to...
US-8,850,207 Data recording device, and method of processing data recording device
A controller is provided with a controller key and a first controller identification information unique to the controller. The controller generates a controller...
US-8,850,206 Client-server system with security for untrusted server
In the context of a computer client-server architecture, typically used in the Internet for communicating between a server and applications running on user...
US-8,850,200 Method and apparatus for secure communications through a trusted intermediary server
A method and apparatus for a trusted intermediary server to assist with the secure exchange of data across a communications network, and in particular a...
US-8,850,182 Data capture for secure protocols
This disclosure relates capture of encrypted network traffic. As an example, a non-transitory computer readable medium can include a command interface...
US-8,850,180 Secure data communication system
The description relates to a system designed to protect data exchange involved with the use of cloud computing infrastructures by services and individuals. The...
US-8,850,179 Encapsulation of secure encrypted data in a deployable, secure communication system allowing benign, secure...
Sensitive, Type 1 KIV-encrypted data is encapsulated into IP packets in a remotely deployed, secure communication system. The IP packets are addressed to a...
US-8,850,150 Managing security in solid-state devices
A computing device and method for managing security of a memory or storage device without the need for administer privileges. To access the secure memory, a...
US-8,850,025 Data communication coordination with sequence numbers
Described are sequence numbers for client-server communication, to control a client's use of server resources. A server grants the client credits, and the...
US-8,850,009 System and method employing an agile network protocol for secure communications using secure domain names
A network device comprises a storage device storing an application program for a secure communications service; and at least one processor configured to execute...
US-8,849,908 Internet based data, voice and video alert notification communications system
A real-time integrated information sharing and telecommunications collaboration system is disclosed. The system includes at least one central server to create,...
US-8,849,862 Architectural frameworks, functions and interfaces for relationship management (AFFIRM)
Uniform subject and object oriented data structure adopted in computing device to efficiently store, distribute and process data in a variety of applications....
US-8,849,718 Medical data encryption for communication over a vulnerable system
A system for securing patient medical information for communication over a potentially vulnerable system includes separating patient's medical file into a...
US-8,848,906 Encrypting data for storage in a dispersed storage network
A method begins by a dispersed storage (DS) processing module encrypting a plurality of data segments of the data using a plurality of encryption keys to...
US-8,848,610 Lightweight data transmission mechanism
User plane data is sent between a user device and a network entity within a packet core network via a radio access network. The user device is authenticated to...
US-8,848,222 Mechanism for previewing secure print jobs
A computer generated method disclosed. The method includes receiving a print job data stream, determining if the print job data stream comprises a secure print...
US-8,847,732 Biometric security device
The invention relates to a security device (1) comprising at least one authentication device (17) and a locking device (18), which authentication device (17)...
US-8,844,820 Multi-directional optical reader for a patient support
A patient support apparatus includes a patient support, a multi-directional optical reader, and a control system. The multi-directional optical reader is...
US-8,844,766 Dispenser assembly for dispensing disinfectant fluid and data collection and monitoring system for monitoring...
A dispenser assembly for dispensing disinfectant to a user and associated monitoring systems and methods. The dispenser assembly includes a main housing...
US-8,844,054 System, method, and device for communicating and storing and delivering data
A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller, executable sensors, and a virtual...
US-8,844,052 Double sand-boxing for flash library
A Flash advertisement is provided, and access to sensitive data associated with the Flash advertisement is restricted. First library code is stored at a first...
US-8,844,045 Methods and systems for evaluating software for known vulnerabilities
A vulnerability identification and resolution (VIR) computer device for identifying security vulnerabilities in a computer system is provided. The VIR computer...
US-8,844,030 Anti-virus protection system and method thereof
An anti-virus protection system and method including receiving an address of a data server from a user, writing and transmitting a request message including the...
US-8,844,028 Arrangement and methods for performing malicious data detection and information leakage prevention
An integrated secured open database connectivity (ODBC) application programming interface (API) arrangement is provided. The arrangement includes a driver...
US-8,844,009 Resilient device authentication system
A resilient device authentication system comprising: one or more verification authorities (VAs) including a memory loaded with a complete verification set that...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.