Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,850,597 Automated message transmission prevention based on environment
Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive...
US-8,850,590 Systems and methods for using transport stream splicing for programming information security
Apparatus and methods for indicating the identity of a device for receiving and retransmitting programming information. The device, which may be a set-top box...
US-8,850,588 Systems and methods for providing mobile security based on dynamic attestation
Instrumented networks, machines and platforms having target subjects (devices, transactions, services, users, organizations) are disclosed. A security...
US-8,850,583 Intrusion detection using secure signatures
A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way...
US-8,850,557 Processor and data processing method with non-hierarchical computer security enhancements for context states
Disclosed are a processor and processing method that provide non-hierarchical computer security enhancements for context states. The processor can comprise a...
US-8,850,552 Use of data links for aeronautical purposes without compromising safety and security
A method of ensuring secure and cost effective communication of aeronautical data to and from an aircraft is provided. The method includes uplinking air-ground...
US-8,850,539 Adaptive policies and protections for securing financial transaction data at rest
A system for challenge-response authentication is provided by receiving, from an external terminal over a communication network, a request for access to a...
US-8,850,530 Enterprise-wide security system for computer devices
A system and method for securing data in mobile devices (104) includes a computing mode (102) and a plurality of mobile devices (104). A node security program...
US-8,850,527 Method of performing a secure application in an NFC device
The invention relates to a method of executing a secure application in an NFC device, the method comprising steps during which: a contactless link is...
US-8,850,520 Dual cookie security system with interlocking validation requirements and remedial actions to protect personal data
A first server associated with a first URL receives a request from a client, including a first object having a respective user identifier and validation value....
US-8,850,513 System for data flow protection and use control of applications and portable devices configured by location
The present invention relates to a system for implementing a firewall service on portable devices such as mobile phones, tablets or notebooks, which has changed...
US-8,850,428 User transparent virtualization method for protecting computer programs and data from hostile code
A secure computing environment that prevents malicious code from "illegitimately" interacting with programs and data residing on the computing platform. While...
US-8,850,227 Cryptographic operations using a key hierarchy
Aspects of the subject technology relate to systems, methods, and machine-readable media for performing a cryptographic operation. A system can be configured to...
US-8,850,207 Data recording device, and method of processing data recording device
A controller is provided with a controller key and a first controller identification information unique to the controller. The controller generates a controller...
US-8,850,206 Client-server system with security for untrusted server
In the context of a computer client-server architecture, typically used in the Internet for communicating between a server and applications running on user...
US-8,850,200 Method and apparatus for secure communications through a trusted intermediary server
A method and apparatus for a trusted intermediary server to assist with the secure exchange of data across a communications network, and in particular a...
US-8,850,182 Data capture for secure protocols
This disclosure relates capture of encrypted network traffic. As an example, a non-transitory computer readable medium can include a command interface...
US-8,850,180 Secure data communication system
The description relates to a system designed to protect data exchange involved with the use of cloud computing infrastructures by services and individuals. The...
US-8,850,179 Encapsulation of secure encrypted data in a deployable, secure communication system allowing benign, secure...
Sensitive, Type 1 KIV-encrypted data is encapsulated into IP packets in a remotely deployed, secure communication system. The IP packets are addressed to a...
US-8,850,150 Managing security in solid-state devices
A computing device and method for managing security of a memory or storage device without the need for administer privileges. To access the secure memory, a...
US-8,850,025 Data communication coordination with sequence numbers
Described are sequence numbers for client-server communication, to control a client's use of server resources. A server grants the client credits, and the...
US-8,850,009 System and method employing an agile network protocol for secure communications using secure domain names
A network device comprises a storage device storing an application program for a secure communications service; and at least one processor configured to execute...
US-8,849,908 Internet based data, voice and video alert notification communications system
A real-time integrated information sharing and telecommunications collaboration system is disclosed. The system includes at least one central server to create,...
US-8,849,862 Architectural frameworks, functions and interfaces for relationship management (AFFIRM)
Uniform subject and object oriented data structure adopted in computing device to efficiently store, distribute and process data in a variety of applications....
US-8,849,718 Medical data encryption for communication over a vulnerable system
A system for securing patient medical information for communication over a potentially vulnerable system includes separating patient's medical file into a...
US-8,848,906 Encrypting data for storage in a dispersed storage network
A method begins by a dispersed storage (DS) processing module encrypting a plurality of data segments of the data using a plurality of encryption keys to...
US-8,848,610 Lightweight data transmission mechanism
User plane data is sent between a user device and a network entity within a packet core network via a radio access network. The user device is authenticated to...
US-8,848,222 Mechanism for previewing secure print jobs
A computer generated method disclosed. The method includes receiving a print job data stream, determining if the print job data stream comprises a secure print...
US-8,847,732 Biometric security device
The invention relates to a security device (1) comprising at least one authentication device (17) and a locking device (18), which authentication device (17)...
US-8,844,820 Multi-directional optical reader for a patient support
A patient support apparatus includes a patient support, a multi-directional optical reader, and a control system. The multi-directional optical reader is...
US-8,844,766 Dispenser assembly for dispensing disinfectant fluid and data collection and monitoring system for monitoring...
A dispenser assembly for dispensing disinfectant to a user and associated monitoring systems and methods. The dispenser assembly includes a main housing...
US-8,844,054 System, method, and device for communicating and storing and delivering data
A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller, executable sensors, and a virtual...
US-8,844,052 Double sand-boxing for flash library
A Flash advertisement is provided, and access to sensitive data associated with the Flash advertisement is restricted. First library code is stored at a first...
US-8,844,045 Methods and systems for evaluating software for known vulnerabilities
A vulnerability identification and resolution (VIR) computer device for identifying security vulnerabilities in a computer system is provided. The VIR computer...
US-8,844,030 Anti-virus protection system and method thereof
An anti-virus protection system and method including receiving an address of a data server from a user, writing and transmitting a request message including the...
US-8,844,028 Arrangement and methods for performing malicious data detection and information leakage prevention
An integrated secured open database connectivity (ODBC) application programming interface (API) arrangement is provided. The arrangement includes a driver...
US-8,844,009 Resilient device authentication system
A resilient device authentication system comprising: one or more verification authorities (VAs) including a memory loaded with a complete verification set that...
US-8,843,954 Information transmission method, system and data card
The disclosure provides an information transmission method, system and data card, wherein the method comprises: a sender scrambling original information in a...
US-8,843,948 Methods and apparatus to detect carrying of a portable audience measurement device
Methods and apparatus to detect carrying of a portable audience measurement device are disclosed herein. An example portable audience measurement device...
US-8,843,785 Collecting debug data in a secure chip implementation
Mechanisms, in a processor chip, are provided for obtaining debug data from on-chip logic of the processor chip while the processor chip is in a secure mode of...
US-8,843,767 Secure memory transaction unit
A method for providing security for plaintext data being transferred between units in a computer system includes steps of dividing a memory into a series of...
US-8,843,762 Cryptographic system for performing secure iterative computations and signal processing directly on encrypted...
Disclosed embodiments include a cryptographic system implemented in at least one digital computer with one or more processors or hardware such as FPGAs for...
US-8,843,757 One time PIN generation
A method and system is provided for generating a one-time passcode (OTP) configured for use as a personal identification number (PIN) for a user account from a...
US-8,843,752 Multi-factor device authentication
A method and system for the secure delivery of data to a remote device that has been registered and which requires authentication through the use of a...
US-8,843,742 Hypervisor security using SMM
Methods, systems, apparatuses and program products are disclosed for protecting computers and similar equipment from undesirable occurrences, especially attacks...
US-8,843,738 TLS abbreviated session identifier protocol
A method, system and computer program product related to an authentication security protocol, which associates a unique Abbreviated Session Identifier (ASI)...
US-8,843,735 Method and apparatus of communicating security/encryption information to a physical layer transceiver
An apparatus for providing link layer security in a Physical Layer Transceiver (PHY) is disclosed. In one embodiment, the apparatus may comprise analog...
US-8,843,695 Reversible write-protection for non-volatile semiconductor memory device
A serial memory device having a non-volatile memory array including a plurality of memory blocks, one or more said plurality of blocks being capable of being...
US-8,843,679 Transmitting device, transmitting method, receiving device, receiving method, transmitting/receiving system,...
To enable signal transmission at a high data rate while securing backward compatibility. A source device 110 and a sink device 120 are connected by an HDMI...
US-8,843,637 Managed peer-to-peer content backup service system and method using dynamic content dispersal to plural storage...
Systems, method, computer program stored on computer readable media, and business method for providing and operating a distributed network based secure storage...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.