Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,875,112 Implementing portable content protection to secure secrets
A source-level compiler may randomly select compilation conventions to implement portable content protection, securing the secrets embedded in a program by...
US-8,875,110 Code inspection executing system for performing a code inspection of ABAP source codes
The present invention relates to a code inspection executing system for performing a code inspection of ABAP source codes, and particularly, to a code...
US-8,875,053 Secure connection protocol for image projecting unit, process and program
There has been a problem of necessitating a complicated work for establishing a connection capable of intercommunication between a computer as server and a...
US-8,874,932 Method for order invariant correlated encrypting of data and SQL queries for maintaining data privacy and...
According to one embodiment of the present invention, a method for debugging a computer system is provided. According to one embodiment of the invention, a...
US-8,874,926 Increasing security in inter-chip communication
An apparatus for increasing security in inter-chip communication includes a sending control module, a communication bus, and a receiving control module. The...
US-8,874,912 Systems and methods for securely transferring personal identifiers
A system for transferring secured data has an authentication facilitator that transmits data indicative of a graphical key pad to a remote display device of a...
US-8,874,901 Authentication of data streaming service
A service provider may provide one or more services to and/or for a client. Providing a service may involve receiving a service request including a security...
US-8,874,896 Secure processing systems and methods
This disclosure relates to systems and methods for enabling the use of secret digital or electronic information without exposing the sensitive information to...
US-8,874,771 Agile network protocol for secure communications with assured system availability
A plurality of computer nodes communicates using seemingly random IP source and destination addresses and (optionally) a seemingly random discriminator field....
US-8,874,768 Methods for providing security over untrusted networks
Methods for providing for secure communications across data networks, including untrusted networks. In one embodiment, the method comprises establishing...
US-8,874,724 Using a content delivery network for security monitoring
A content delivery network includes a plurality of cache servers. Each cache server is configured to receive a request for content from a client system and...
US-8,874,668 Directing messages based on domain names
A communication system has a plurality of collections. Each collection comprises a security boundary within which private data is accessible. Each collection is...
US-8,874,657 Method for securely distributing meeting data from interactive whiteboard projector
Distributing meeting data from an interactive whiteboard projector to at least one computer of a meeting member, comprises: in the interactive whiteboard...
US-8,874,550 Method and apparatus for security information visualization
Visualization for presenting event information indicative of a computer security threat is automatically selected from available visualizations. Event...
US-8,874,500 Rule based processing system and method for identifying events
The present invention generally relates to a computerized system and method for creating, optimizing, and using a rules processing system that evaluates...
US-8,874,453 Methods and systems for managing distributed digital medical data
A network for mediating the peer-to-peer transfer of digital patient medical data includes a plurality of distributed agents each associated with a health care...
US-8,874,038 Secure communications via NFC device
A system, method, and apparatus for negotiating a communication link between first and second near field communication (NFC) devices is disclosed. A third NFC...
US-8,874,035 Apparatus, system and method for monitoring and maintaining critical medical equipment
An apparatus, system and method for maintaining critical medical equipment for stockpile applications are provided. The apparatus, system and method of the...
US-8,874,025 Time-varying PHY-level wireless security
A method for communication includes generating a data transmission including multiple successive parts in respective time intervals, for transmission to a...
US-8,873,814 System and method for using fingerprint sequences for secured identity verification
According to one embodiment of the present disclosure, a method includes receiving session information including first fingerprint data corresponding to each of...
US-8,873,813 Application of Z-webs and Z-factors to analytics, search engine, learning, recognition, natural language, and...
Here, we introduce Z-webs, including Z-factors and Z-nodes, for the understanding of relationships between objects, subjects, abstract ideas, concepts, or the...
US-8,873,746 Establishing, at least in part, secure communication channel between nodes so as to permit inspection, at least...
An embodiment may include circuitry to establish, at least in part, a secure communication channel between, at least in part, a client in a first domain and a...
US-8,873,095 Delegate access in a distributed scan system
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on...
US-8,872,917 Tamper-resistant video surveillance network
A network of surveillance digital video cameras is provided. Each camera records video data and provides the video recordings to other networked cameras as well...
US-8,869,309 Dynamically reconfigurable 2D topology communication and verification scheme
Systems and methods for securing devices and encoding information in hardware and hardware arrangements are provided. Variations include switched networks...
US-8,869,308 Computer motherboard having peripheral security functions
A secure motherboard for a computer, wherein each user accessible peripheral port is protected by hardware based peripheral protection circuitry soldered to the...
US-8,869,295 Automated privacy enforcement
A system and method of protecting the privacy of data is presented. The system and method may include receiving data from a data warehouse and determining an...
US-8,869,291 Generating and storing document data
A markup language document is generated and stored within a network, the network including a client, and one or more storage locations. A markup language...
US-8,869,286 Systems and methods for analyzing client-side storage security for internet applications
A computer-implemented method for analyzing client-side storage security for Internet applications may include 1) identifying an interactive Internet resource,...
US-8,869,273 Apparatus and method for enhancing security of data on a host computing device and a peripheral device
A method of enhancing security of at least one of a host computing device and a peripheral device coupled to the host computing device through a communication...
US-8,869,270 System and method for implementing content and network security inside a chip
Systems and methods for implementing content, streaming, and network security inside a chip or inside a computing device are disclosed. In exemplary...
US-8,869,255 Method and system for abstracted and randomized one-time use passwords for transactional authentication
A security system and method for authenticating a user's access to a system is disclosed. The security system receives an authentication request from the user...
US-8,869,250 Providing secure dynamic role selection and managing privileged user access from a client device
An approach is provided that receives a first role selection from a client device. Each of the roles includes various user accounts provisioned to access...
US-8,869,240 Soft method for local secure connection to a device
A system for pairing two devices includes a monitoring system and a server. The monitoring system receives a request made by a local submitter, such as...
US-8,869,235 Secure mobile browser for protecting enterprise data
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application...
US-8,869,142 Secure content publishing and distribution
Sending installation information. A method may be performed, for example, in a network computing environment including one or more servers connected to one or...
US-8,868,931 System and method of security function activation for a mobile electronic device
A system and a method are provided for activating one or more security functions of a mobile electronic device. The system and method provide for the activation...
US-8,868,927 Method and apparatus for secure data input and output
A method and apparatus for secure information input and output is described. The method may include initiating a secure data input mode at a user input device...
US-8,868,920 Method, system and device for securing a digital storage device
Method of securing a digital storage device, wherein a host is connected to the storage device, the host digitally locks the storage device so that unauthorized...
US-8,868,911 Method for key generation, member authentication, and communication security in dynamic group
The present invention provides a method for keys generation, member authentication and communication security in a dynamic group, which comprises steps:...
US-8,868,786 Apparatus, systems and methods for transformation services
A web services hub receives a request from a data source system, transforms the request, and transmits the transformed request to an external system. A secure...
US-8,868,768 Secure medical data transmission
A system may include a first network in which user device(s) and a HIP server are communicably coupled. The first network may include a secure data...
US-8,868,767 System and method for enabling IP marketplace APIs
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
US-8,868,683 Method and system for multi-factor remote data access
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and...
US-8,868,641 System, method and computer program product for gathering and delivering personalized user information
A system, method and computer program product for providing a secure data channel between a user and associates. The method may receive pushed information from...
US-8,868,636 Apparatus for secured distributed computing
An apparatus for distributed computing is disclosed. The apparatus includes a semiconductor memory, a biometric device for receiving biometric data, a connector...
US-8,868,521 Method for improving security in distribution of electronic documents
In the distribution of electronic documents within an organization or across the perimeter of the organization, security is an important issue as the documents...
US-8,868,467 Method for performing transactional communication using a universal transaction account identifier assigned to...
Methods, systems, computer data signals, recordable media and methods of doing business for wireless or wired network communication between network resources...
US-8,868,437 Methods and systems for managing distributed digital medical data
A network for mediating the peer-to-peer transfer of digital patient medical data includes a plurality of distributed agents each associated with a health care...
US-8,868,102 Method and apparatus for tracking a transported item while accommodating communication gaps
A method and apparatus is provided for minimizing potential security problems and battery power usage in a tracking device used in tracking an associated...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.