Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,856,919 Authorization of server operations
An authorization device for authorizing operations of a remote server requested from user computers via a data communications network includes a computer...
US-8,856,915 Security communication apparatus and security communication method
A negotiation unit, of a logical network control apparatus connected to a LAN, judges settings of processing to be performed on communication data by a network...
US-8,856,914 System and method for intelligent coordination of host and guest intrusion prevention in virtualized environment
A distributed and coordinated security system providing intrusion-detection and intrusion-prevention for the virtual machines (VMs) in a virtual server is...
US-8,856,909 IF-MAP provisioning of resources and services
A method may include receiving a request from an endpoint to access a network; granting access to the network; and subscribing to an IF-MAP server for updates...
US-8,856,908 Management and delivery of profile data
Aspects of the invention relate to systems and methods for securely retaining profile data and the use of such data for the targeted delivery of content. In one...
US-8,856,869 Enforcement of same origin policy for sensitive data
Methods, systems, and apparatus relating to enforcement of same origin policy of sensitive data are described. In an embodiment, a security agent may help...
US-8,856,866 Image forming apparatus to restrict use of a hard disc drive and a method thereof
An image forming apparatus capable of restricting use of a hard disc drive and a method of restricting the use of the hard disc drive of the image forming...
US-8,856,790 Systems and methods for data management in a virtual computing environment
Systems and methods are disclosed for performing operations on a host system with one or more virtual machines without persistently storing an agent or daemon...
US-8,856,780 Method and system to remotely flash an external module
A method to remotely flash an external module comprises the steps to electronically transfer a computer program from a computer device to an external module, to...
US-8,856,548 Public cloud data at rest security
An encryption switch which is used in a cloud environment to secure data on the LUNs used by the clients. A client provides a certificate to the cloud service....
US-8,856,547 Speed up secure hash algorithm (SHA) using single instruction multiple data (SIMD) architectures
A processing apparatus comprises logic to, according to a selected secure hash algorithm (SHA) algorithm, generate hash values by preparing message schedules...
US-8,856,546 Speed up secure hash algorithm (SHA) using single instruction multiple data (SIMD) architectures
A processing apparatus may comprise logic to preprocess a message according to a selected secure hash algorithm (SHA) algorithm to generate a plurality of...
US-8,856,539 Universal secure registry
A secure registry system and method for the use thereof are provided which permits secure access to a database containing selected data on a plurality of...
US-8,856,534 Method and apparatus for secure scan of data storage device from remote server
A method and device for providing a secure scan of a data storage device from a remote server are disclosed. In some embodiments, a computing device may include...
US-8,856,509 System and method for cognizant transport layer security (CTLS)
A method of authentication and authorization over a communications system is provided. Disclosed herein are systems and methods for creating a cryptographic...
US-8,856,508 Onboard access control system for communication from the open domain to the avionics domain
An onboard access control system to an information system onboard an aircraft, for communication from the open domain to the avionics domain, the open end...
US-8,856,507 Secure identity and personal information storage and transfer
The invention presented herein consists of systems and methods of secure storage for sensitive and confidential data, such as personal identity data, along with...
US-8,856,474 Nonvolatile memory unit with secure erasing function
An apparatus includes a nonvolatile memory, an interface that at least receives an erase command of the nonvolatile memory, a first controller that controls the...
US-8,856,439 Method and device for utilizing application-level prior knowledge for selectively storing data in higher...
A method for selectively storing data identified by a software application in higher performance media may include executing control programming for an...
US-8,856,323 Device and method for facilitating secure communications over a cellular network
A process for communicating utility-related data over at least one network is described. the process includes: collecting utility-related data at a hub device...
US-8,856,317 Secure data transfer in a virtual environment
In one embodiment, a method includes receiving at one of a plurality of servers, a request from a client for a secure communication session, storing context...
US-8,856,295 System and method for providing an enterprise deployment topology with thick client functionality
In accordance with an embodiment, one or more software application products, such as Oracle Fusion Applications, can be installed and/or configured according to...
US-8,856,169 Multi-modality, multi-resource, information integration environment
A multi-modality, multi-resource, information integration environment system is disclosed that comprises: (a) at least one computer readable medium capable of...
US-8,856,086 Ensuring integrity of security event log upon download and delete
A cloud deployment appliance includes a mechanism to enable permitted users to move event records reliably from an internal event log of the appliance to a data...
US-8,856,057 Cognitive security system and method
A cognitive system and method for predicting and detecting security breaches is provided which yields cognitive inputs to a security management interface...
US-8,856,044 Segmented access of remotely stored biographical data to a client device
Methods and systems of segmented access of remotely stored biographical data to a client device are disclosed. In one embodiment, a biographical information is...
US-8,856,029 Systems and methods for regulating the receipt of data transmitted from a messaging device
A computer-implemented method for regulating the receipt of data transmitted from a messaging device is described. A security application that includes a...
US-8,855,599 Method and apparatus for auxiliary communications with mobile communications device
A method and apparatus for auxiliary communications capability in a mobile communications device. The mobile communications device is configured with a hidden...
US-8,855,318 Master key generation and distribution for storage area network devices
Mechanisms are provided for generating a master key used to secure key objects associated with data blocks in a data center. A cryptographic node creation...
US-8,855,313 System and method for providing variable security level in a wireless communication system
A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of...
US-8,855,311 Advanced container security device network protocols
In one preferred embodiment, a set of air interface protocols (AIPs) provides a method for secure wireless-to-IP communication between conveyance-mounted...
US-8,855,310 System and method for exchanging encryption keys between a mobile device and a peripheral device
Systems and methods for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless...
US-8,855,058 Wireless architecture in support of voice and data communications
A wireless access network including a wireless base station configured to, for Iu-CS voice traffic, act as a network controller, by, terminating Iu-b signals...
US-8,855,012 Mobile, secure and customizable emergency service gateway system
A mobile, secure and customizable emergency communication gateway system for providing effective electronic data communications for emergency personnel in a...
US-8,854,972 Security device implementing flow lookup scheme for improved performance
A security device performing flow classification and storing flow information in a flow table includes a flow engine generating a flow key identifying a flow to...
US-8,854,966 Apparatus and methods for network resource allocation
Methods and apparatus for allocating resources (such as communications bandwidth) using a network access device. In one embodiment, the network includes a...
US-8,854,692 Printing device and printing method generating watermark information
The present invention provides an information printing method and a printing device, which assure a higher level of security when outputting printed matter. The...
US-8,854,189 Method for a secure non-volatile logging in an active RFID tag of a process in a tagged article
Prior to logging of a process flags for locking at all addresses of a logging area of a tag are set to state 1 by means of an interrogator. A high limit (h) and...
US-8,854,181 Remote keyless entry transmitter
A remote wireless keyless entry transmitter includes a communications interface for connecting the transmitter directly to an in-vehicle network for registering...
US-8,854,180 Access control system
An access controlled storage device may include multiple doors, each having a different lock, to insure safety and security of the contents of the storage...
US-8,851,184 Process, device, and system to cap and seal oil and gas in a riser pipe
A containment valve assembly using the upcoming pressures to control the flow of oil/gas through a riser pipe with a stop flow plug positioned within the valve...
US-8,850,608 Embedded ring oscillator network for integrated circuit security and threat detection
Aspects of the disclosure relate to combining on-chip structure with external current measurements for threat detection in an integrated circuit. This method...
US-8,850,600 Data storage device and data storage system including the same
A data storage device protecting security code stored therein and a data storage system including same are disclosed. The data storage device efficiently...
US-8,850,597 Automated message transmission prevention based on environment
Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive...
US-8,850,590 Systems and methods for using transport stream splicing for programming information security
Apparatus and methods for indicating the identity of a device for receiving and retransmitting programming information. The device, which may be a set-top box...
US-8,850,588 Systems and methods for providing mobile security based on dynamic attestation
Instrumented networks, machines and platforms having target subjects (devices, transactions, services, users, organizations) are disclosed. A security...
US-8,850,583 Intrusion detection using secure signatures
A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way...
US-8,850,557 Processor and data processing method with non-hierarchical computer security enhancements for context states
Disclosed are a processor and processing method that provide non-hierarchical computer security enhancements for context states. The processor can comprise a...
US-8,850,552 Use of data links for aeronautical purposes without compromising safety and security
A method of ensuring secure and cost effective communication of aeronautical data to and from an aircraft is provided. The method includes uplinking air-ground...
US-8,850,539 Adaptive policies and protections for securing financial transaction data at rest
A system for challenge-response authentication is provided by receiving, from an external terminal over a communication network, a request for access to a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.