Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,868,437 Methods and systems for managing distributed digital medical data
A network for mediating the peer-to-peer transfer of digital patient medical data includes a plurality of distributed agents each associated with a health care...
US-8,868,102 Method and apparatus for tracking a transported item while accommodating communication gaps
A method and apparatus is provided for minimizing potential security problems and battery power usage in a tracking device used in tracking an associated...
US-8,868,085 Communications base station with decision function for distributing traffic across multiple backhauls
A communication station, such as a base station or access point, has multiple backhaul options and distributes backhaul data between the available backhaul...
US-8,868,057 Staging a mobile device to an enterprise network securely using voice channel of a wireless wide area network...
Wireless networking systems and methods are provided for "staging" a wireless communication device (WCD). The WCD is designed to communicate over the air with a...
US-8,867,745 Efficient transmission of cryptographic information in secure real time protocol
Efficient transmission of cryptographic information in secure real time protocol. A transmitting terminal may be used to encrypt data with a session key derived...
US-8,867,743 Encryption of large amounts of data using secure encryption methods
Information is encrypted using randomly generated information, a multiple step process, and additional secured logic. Upon receiving a credit card authorization...
US-8,867,742 Optical transmission device and reception device for Yuen encryption, optical transmission method and reception...
A configuration method of an optical signal, an encryption device, and an encryption system makes it possible for a legitimate communicating party to ensure...
US-8,867,523 Local area network of serial intelligent cells
A serial intelligent cell (SIC) and a connection topology for local area networks using Electrically-conducting media. A local area network can be configured...
US-8,867,516 Binary CDMA image-transceiving system directly connected to an image capture device
A binary CDMA image transmission and receiving system directed connected to an image capturing device includes an image transmission unit including: an image...
US-8,867,490 Secure and seamless handover between IP-based cellular networks and Wi-Fi networks
A method of offloading data from an IP-based cellular network to a Wi-Fi network is disclosed. A request from a user equipment (UE) to connect to a Wi-Fi...
US-8,867,428 Split-cell relay application protocol
Systems and methodologies are described that facilitate packet routing among relay eNBs in a wireless network. Packet data convergence protocol (PDCP) layer...
US-8,867,080 Metadata support in a distributed scan system
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on...
US-8,867,060 Information processing apparatus that prevents unauthorized access, method of controlling the same, and storage...
An information processing apparatus which is capable of preventing unauthorized access from an external apparatus, such as a PC, and improving...
US-8,865,285 Composite weldable panel with embedded devices
A panel having a central panel element formed of a composite material, having peripheral edges formed of a weldable material, such as steel. In one form, the...
US-8,864,847 Systems and methods for preventing mobile device loss
A computer-implemented method for preventing mobile device loss may include 1) identifying historical data specifying a plurality of past locations of a...
US-8,864,578 Methods for secure game entry generation via multi-part generation seeds
Methods and systems for securely generating lottery games are presented. A final game generation seed number is formed from multiple seed numbers from multiple...
US-8,864,041 System for generating an incrementally completed 2D security mark
A system (10) for generating an incrementally completed 2D security mark (20''') includes a computer-readable medium encoded with a computer program. The...
US-8,864,024 System and method for chip-enabled card transaction processing and alert communication
A system, method and computer program product is capable of proactive assessment of transactions and communication of alerts based on pre-set rules to increase...
US-D715,846 Data recording device
US-8,863,299 Secure virtual file management system
A virtual file management system provides user access to managed content on mobile devices. The system comprises storage domains storing the managed content...
US-8,863,298 Secure virtual file management system
A virtual file management system provides user access to managed content on mobile devices. The system comprises storage domains storing the managed content...
US-8,863,297 Secure virtual file management system
A virtual file management system provides user access to managed content on mobile devices. The system comprises storage domains storing the managed content...
US-8,863,290 Methods and devices for improving the reliability of communication between an aircraft and a remote system
Methods and devices for improving the reliability of communication between an aircraft and a remote system. The aircraft transmits a request for verification of...
US-8,863,289 Portable security device and methods for detection and treatment of malware
Disclosed is a portable security device and method for detection and treatment of computer malware. The security device includes a communication interface for...
US-8,863,284 System and method for determining a security status of potentially malicious files
Disclosed are systems, methods and computer program products for determining a security status of at least one potentially malicious file in a customer network....
US-8,863,278 Grid security intrusion detection configuration mechanism
A method, apparatus, and article of manufacture are provided to support security in a distributed grid computer cluster. Each non-node root node in the cluster...
US-8,863,250 Logout from multiple network sites
Disclosed are various embodiments for logging out from multiple network sites using an authentication client that manages sessions for the network sites....
US-8,863,247 LDAP security domain data storage
A Security Domain Access System (SDAS) provides highly available security domain data. The SDAS receives a request pertaining to a security domain. The request...
US-8,863,243 Location-based access control for portable electronic device
When a portable electronic device receives an access request for an application, the device detects one or more available communication networks. Based on the...
US-8,863,109 Updating secure pre-boot firmware in a computing system in real-time
Updating secure pre-boot firmware in a computing system in real-time, including: storing in a secure firmware memory region a firmware update module configured...
US-8,862,902 Cascaded data encryption dependent on attributes of physical memory
Apparatus and method for providing data security through cascaded encryption. In accordance with various embodiments, input data are encrypted in relation to a...
US-8,862,900 Secure distributed storage system and method
Moving from server-attached storage to distributed storage brings new vulnerabilities in creating a secure data storage and access facility. The Data Division...
US-8,862,898 Secure environment management during switches between different modes of multicore systems
The invention relates to the switching from a first mode of operation to a second mode, of a first and a second cores of a processor of a processing device...
US-8,862,897 Increasing data security in enterprise applications by using formatting, checksums, and encryption to detect...
A method, system, and computer program product for using hidden buffer formatting and passing obfuscated encryption key values to detect tampering with and/or...
US-8,862,896 Data protection using key translation
In the data security field, a data protection process embodied in a computer system or computing device or equivalent and which securely descrambles protected...
US-8,862,889 Protocol for controlling access to encryption keys
A secure remote-data-storage system stores encrypted data and both plaintext and encrypted keys at a server, where data at the server is inadequate to recover...
US-8,862,874 Certificate distribution using secure handshake
A method, system, and computer usable program product for certificate distribution using a secure handshake are provided in the illustrative embodiments. A...
US-8,862,869 Method and apparatus for providing network initiated session encryption
A network system and method capable of implementing network initiated packet data protocol ("PDP") context to enhance security of network communications are...
US-8,862,867 Method and system for protecting security of the third layer mobility user plane data in NGN
The disclosure discloses a method for protecting security of layer-3 mobility user plane data in Next Generation Network (NGN), includes: performing...
US-8,862,844 Backup apparatus, backup method and computer-readable recording medium in or on which backup program is recorded
Upon production of a backup of a first generation, all of an operation volume is stored. However, upon production of a backup of a second or later generation,...
US-8,862,773 Scalable network apparatus for content based switching or validation acceleration
A network apparatus is provided that may include one or more security accelerators. The network apparatus also includes a plurality of network units cascaded...
US-8,862,687 Method and system for secure digital file sharing
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and...
US-8,862,518 Multi-way transaction related data exchange apparatus and methods
Methods and apparatus for conducting electronic transactions such as commerce transactions or purchases and exchanging related information. In one aspect, a...
US-8,862,379 Vehicle collision shield
In the present disclosure, systems and methods for preventing collisions between a ground services vehicle and other objects are described. In one embodiment, a...
US-8,862,120 System and method for speeding call originations to a variety of devices using intelligent predictive...
A mobile application gateway configured to interconnect mobile communication devices on a cellular network with an enterprise network is provided. The mobile...
US-8,861,733 Method of personalizing a NFC chipset
The invention relates to a method for personalizing a secure processor in a NFC system to execute a secure application, comprising steps of obtaining by a...
US-8,861,729 Method and system for the secure distribution of audiovisual data by transactional marking
A process for distributing a marked audiovisual sequence from a nominal audiovisual sequence towards a receiver, said nominal audiovisual sequence having a...
US-8,861,722 Generating a session key for authentication and secure data transfer
A device for generating a session key which is known to a first communication partner and a second communication partner, for the first communication partner,...
US-8,861,006 Device management in a distributed scan system
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on...
US-8,860,820 Video recording system, method, and computer program for memory space distribution in a video recording system
In the present digital age, the storage of data and the administration of the stored data is a problem area which, despite rapidly dropping prices for storage...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.