Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,869,291 Generating and storing document data
A markup language document is generated and stored within a network, the network including a client, and one or more storage locations. A markup language...
US-8,869,286 Systems and methods for analyzing client-side storage security for internet applications
A computer-implemented method for analyzing client-side storage security for Internet applications may include 1) identifying an interactive Internet resource,...
US-8,869,273 Apparatus and method for enhancing security of data on a host computing device and a peripheral device
A method of enhancing security of at least one of a host computing device and a peripheral device coupled to the host computing device through a communication...
US-8,869,270 System and method for implementing content and network security inside a chip
Systems and methods for implementing content, streaming, and network security inside a chip or inside a computing device are disclosed. In exemplary...
US-8,869,255 Method and system for abstracted and randomized one-time use passwords for transactional authentication
A security system and method for authenticating a user's access to a system is disclosed. The security system receives an authentication request from the user...
US-8,869,250 Providing secure dynamic role selection and managing privileged user access from a client device
An approach is provided that receives a first role selection from a client device. Each of the roles includes various user accounts provisioned to access...
US-8,869,240 Soft method for local secure connection to a device
A system for pairing two devices includes a monitoring system and a server. The monitoring system receives a request made by a local submitter, such as...
US-8,869,235 Secure mobile browser for protecting enterprise data
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application...
US-8,869,142 Secure content publishing and distribution
Sending installation information. A method may be performed, for example, in a network computing environment including one or more servers connected to one or...
US-8,868,931 System and method of security function activation for a mobile electronic device
A system and a method are provided for activating one or more security functions of a mobile electronic device. The system and method provide for the activation...
US-8,868,927 Method and apparatus for secure data input and output
A method and apparatus for secure information input and output is described. The method may include initiating a secure data input mode at a user input device...
US-8,868,920 Method, system and device for securing a digital storage device
Method of securing a digital storage device, wherein a host is connected to the storage device, the host digitally locks the storage device so that unauthorized...
US-8,868,911 Method for key generation, member authentication, and communication security in dynamic group
The present invention provides a method for keys generation, member authentication and communication security in a dynamic group, which comprises steps:...
US-8,868,786 Apparatus, systems and methods for transformation services
A web services hub receives a request from a data source system, transforms the request, and transmits the transformed request to an external system. A secure...
US-8,868,768 Secure medical data transmission
A system may include a first network in which user device(s) and a HIP server are communicably coupled. The first network may include a secure data...
US-8,868,767 System and method for enabling IP marketplace APIs
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
US-8,868,683 Method and system for multi-factor remote data access
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and...
US-8,868,641 System, method and computer program product for gathering and delivering personalized user information
A system, method and computer program product for providing a secure data channel between a user and associates. The method may receive pushed information from...
US-8,868,636 Apparatus for secured distributed computing
An apparatus for distributed computing is disclosed. The apparatus includes a semiconductor memory, a biometric device for receiving biometric data, a connector...
US-8,868,521 Method for improving security in distribution of electronic documents
In the distribution of electronic documents within an organization or across the perimeter of the organization, security is an important issue as the documents...
US-8,868,467 Method for performing transactional communication using a universal transaction account identifier assigned to...
Methods, systems, computer data signals, recordable media and methods of doing business for wireless or wired network communication between network resources...
US-8,868,437 Methods and systems for managing distributed digital medical data
A network for mediating the peer-to-peer transfer of digital patient medical data includes a plurality of distributed agents each associated with a health care...
US-8,868,102 Method and apparatus for tracking a transported item while accommodating communication gaps
A method and apparatus is provided for minimizing potential security problems and battery power usage in a tracking device used in tracking an associated...
US-8,868,085 Communications base station with decision function for distributing traffic across multiple backhauls
A communication station, such as a base station or access point, has multiple backhaul options and distributes backhaul data between the available backhaul...
US-8,868,057 Staging a mobile device to an enterprise network securely using voice channel of a wireless wide area network...
Wireless networking systems and methods are provided for "staging" a wireless communication device (WCD). The WCD is designed to communicate over the air with a...
US-8,867,745 Efficient transmission of cryptographic information in secure real time protocol
Efficient transmission of cryptographic information in secure real time protocol. A transmitting terminal may be used to encrypt data with a session key derived...
US-8,867,743 Encryption of large amounts of data using secure encryption methods
Information is encrypted using randomly generated information, a multiple step process, and additional secured logic. Upon receiving a credit card authorization...
US-8,867,742 Optical transmission device and reception device for Yuen encryption, optical transmission method and reception...
A configuration method of an optical signal, an encryption device, and an encryption system makes it possible for a legitimate communicating party to ensure...
US-8,867,523 Local area network of serial intelligent cells
A serial intelligent cell (SIC) and a connection topology for local area networks using Electrically-conducting media. A local area network can be configured...
US-8,867,516 Binary CDMA image-transceiving system directly connected to an image capture device
A binary CDMA image transmission and receiving system directed connected to an image capturing device includes an image transmission unit including: an image...
US-8,867,490 Secure and seamless handover between IP-based cellular networks and Wi-Fi networks
A method of offloading data from an IP-based cellular network to a Wi-Fi network is disclosed. A request from a user equipment (UE) to connect to a Wi-Fi...
US-8,867,428 Split-cell relay application protocol
Systems and methodologies are described that facilitate packet routing among relay eNBs in a wireless network. Packet data convergence protocol (PDCP) layer...
US-8,867,080 Metadata support in a distributed scan system
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on...
US-8,867,060 Information processing apparatus that prevents unauthorized access, method of controlling the same, and storage...
An information processing apparatus which is capable of preventing unauthorized access from an external apparatus, such as a PC, and improving...
US-8,865,285 Composite weldable panel with embedded devices
A panel having a central panel element formed of a composite material, having peripheral edges formed of a weldable material, such as steel. In one form, the...
US-8,864,847 Systems and methods for preventing mobile device loss
A computer-implemented method for preventing mobile device loss may include 1) identifying historical data specifying a plurality of past locations of a...
US-8,864,578 Methods for secure game entry generation via multi-part generation seeds
Methods and systems for securely generating lottery games are presented. A final game generation seed number is formed from multiple seed numbers from multiple...
US-8,864,041 System for generating an incrementally completed 2D security mark
A system (10) for generating an incrementally completed 2D security mark (20''') includes a computer-readable medium encoded with a computer program. The...
US-8,864,024 System and method for chip-enabled card transaction processing and alert communication
A system, method and computer program product is capable of proactive assessment of transactions and communication of alerts based on pre-set rules to increase...
US-D715,846 Data recording device
US-8,863,299 Secure virtual file management system
A virtual file management system provides user access to managed content on mobile devices. The system comprises storage domains storing the managed content...
US-8,863,298 Secure virtual file management system
A virtual file management system provides user access to managed content on mobile devices. The system comprises storage domains storing the managed content...
US-8,863,297 Secure virtual file management system
A virtual file management system provides user access to managed content on mobile devices. The system comprises storage domains storing the managed content...
US-8,863,290 Methods and devices for improving the reliability of communication between an aircraft and a remote system
Methods and devices for improving the reliability of communication between an aircraft and a remote system. The aircraft transmits a request for verification of...
US-8,863,289 Portable security device and methods for detection and treatment of malware
Disclosed is a portable security device and method for detection and treatment of computer malware. The security device includes a communication interface for...
US-8,863,284 System and method for determining a security status of potentially malicious files
Disclosed are systems, methods and computer program products for determining a security status of at least one potentially malicious file in a customer network....
US-8,863,278 Grid security intrusion detection configuration mechanism
A method, apparatus, and article of manufacture are provided to support security in a distributed grid computer cluster. Each non-node root node in the cluster...
US-8,863,250 Logout from multiple network sites
Disclosed are various embodiments for logging out from multiple network sites using an authentication client that manages sessions for the network sites....
US-8,863,247 LDAP security domain data storage
A Security Domain Access System (SDAS) provides highly available security domain data. The SDAS receives a request pertaining to a security domain. The request...
US-8,863,243 Location-based access control for portable electronic device
When a portable electronic device receives an access request for an application, the device detects one or more available communication networks. Based on the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.