Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,819,764 Network security monitor apparatus and network security monitor system
A network security monitoring apparatus and a network security monitoring system manages "permitted" or "not permitted" communication between nodes based on an...
US-8,819,637 Fixing security vulnerability in a source code
A computer implemented method for automatically fixing a security vulnerability in a source code. The method includes obtaining identification of a code block...
US-8,819,447 Secure storage of protected data in a wireless communication device
A wireless communication device comprises first processing circuitry configured to execute an RF operating system and second processing circuitry configured to...
US-8,819,446 Support for secure objects in a computer system
A method and structure in a computer system, including a mechanism supporting a Secure Object that includes code and data that is cryptographically protected...
US-8,819,442 Assessing risk associated with a computer technology
Systems and methods of assessing vulnerability or risk associated with a computer technology are presented. The system and method may include receiving a...
US-8,819,436 Protection method, decryption method, recording medium and terminal for said protection method
Protecting data transmission, either multimedia or a control word, between a security processor and a terminal includes, at the security processor, building a...
US-8,819,434 Method and processing unit for secure processing of access controlled audio/video data
A method based on access conditions verification performed by two conditional access devices consecutively on a control message before releasing a control word...
US-8,819,429 Near field registration of home system audio-video device
A near field communication (NFC) sticker which stores a key is attached to a new client device. A remote commander in a home network reads the key using a NFC...
US-8,819,428 Point of sale (POS) personal identification number (PIN) security
A key is securely injected into a POS PIN pad processor in its usual operating environment. In response to entry of a personal identification number (PIN) into...
US-8,819,409 Distribution system and method for distributing digital information
A distribution system and method for distributing digital information is provided, which has high recoverability from a security breach. The distribution system...
US-8,819,405 Remote access to a mass memory and a security memory in a portable communicating object
The invention relates to a system for remotely accessing a mass storage unit and a security storage unit in a portable communicating object. According to the...
US-8,819,257 Method and device for performing communication on a bus structured network
The invention refers to a method for performing communication on a bus structured network between master device and slave devices using a bi-directional data...
US-8,819,255 Relevancy improvement through targeting of information based on data gathered from a networked device...
A method, apparatus, and system related to relevancy improvement through targeting of information based on data gathered from a networked device associated with...
US-8,819,253 Network message generation for automated authentication
A message generation mechanism for a network interface is provided. The message generation mechanism is operable to generate a message which includes data for...
US-8,819,248 Secure messaging facility system
A secure message facility transfers authentication data between various applications, operating systems, and authentication devices and software in the form of...
US-8,819,234 Supplying data storage services
A method is used in supplying data storage services. For a set of applications running on an electronic system, an application service is provided to each...
US-8,819,213 System, method and apparatus for traffic mirror setup, service and security in communication networks
The present invention provides method and systems for dynamically mirroring network traffic. The mirroring of network traffic may comprise data that may be...
US-8,819,178 Controlling data routing in integrated security systems
An integrated security system integrates broadband and mobile access and control with conventional security systems and premise devices to provide a tri-mode...
US-8,818,906 Systems and methods for performing authentication of a customer interacting with a banking platform
The invention provides systems and methods of authenticating a customer device, in conjunction with a requested interaction, the customer device associated with...
US-8,818,757 Modular object and host matching
An object can be used in an industrial control configuration in relation to performing a function or task. Matching can occur such that an object with...
US-8,818,614 Personal event data recorder
A personal event data recorder (PEDR) is provided. The PEDR may be integrated within a mobile communications device or may be provided as a separate add-on...
US-8,818,369 Method for a secure detach procedure in a radio telecommunications network
The present invention proposes a method for performing a detach of a terminal registered to a telecommunication network by associating an identification for...
US-8,818,351 Method and apparatus for tracking a transported item while accommodating communication gaps
A method and apparatus is provided for minimizing potential security problems and battery power usage in a tracking device used in tracking an associated...
US-8,818,334 Secure data exchange with identity information exchange
Systems and methods for authenticating authorized users of electronic communication devices, such mobile communication devices, for a secure data exchange...
US-8,818,202 Wavelength sensing lighting system and associated methods for national security application
A wavelength sensing lighting system may include a light source, a sensor and a controller. One or more light sources and sensors may be included in an array....
US-8,818,020 Method of providing security for transmitting a digital medical image
A method of preparing a digital medical image for secure transmission, the method comprising embedding data into the digital medical image using a reversible...
US-8,817,984 Cryptographic security functions based on anticipated changes in dynamic minutiae
Dynamic key cryptography validates mobile device users to cloud services by uniquely identifying the user's electronic device using a very wide range of...
US-8,817,983 Streaming video to cellular phones
A method, system, and computer program product for deploying data to a web server for streaming video to a mobile device. The method can include receiving a...
US-8,817,668 Distributable, scalable, pluggable conferencing architecture
Architecture for a scalable, pluggable multi-party, and distributed multimedia conferencing. A centralized policy and control conferencing component allows the...
US-8,816,819 Dynamic information radio-frequency identification (RFID) card with biometric capabilities
Embodiments of the present invention implement dynamic elements within a RFID card. Specifically, the embodiments update card information dynamically, using a...
US-8,816,816 Methods and apparatus for securing a portable device
An apparatus for securing a portable device is described. The portable device includes a housing having a mating feature adapted to mate with a corresponding...
US-8,814,052 Secure smart card system
A smart card usable in magnetic stripe swipe transactions with a transaction terminal configured to read transaction information encoded on a magnetic stripe of...
US-8,813,255 Security classification applying social norming
An embodiment of the invention provides a method for security classification applying social norming. More specifically, content is received from a user via an...
US-8,813,253 Method for the authentication of applications
Authentication method of at least one application using resources stored in a security module associated to an equipment connected to a control server via a...
US-8,813,247 Providing cryptographic security for objective-oriented programming files
An apparatus and method for providing an Internet Web services for securing the transmission of data between object oriented software infrastructure and...
US-8,813,243 Reducing a size of a security-related data object stored on a token
Embodiments of the present invention provide a method and system, including a client and security token, for reducing a size of a security-related object stored...
US-8,813,220 Methods and systems for internet protocol (IP) packet header collection and storage
A computer-based method for providing information about a potential security incident ascertained from received internet protocol (IP) packets is described. The...
US-8,813,218 Security-enhanced computer systems and methods
In general, the invention provides a computer architecture designed for enhanced data security. In embodiments, the architecture comprises two sub-systems, each...
US-8,813,216 Network security protection
A method and system for providing security to a Network Job Entry (NJE) network. A first NJE node and a third NJE node are connected by a second NJE node. The...
US-8,813,214 Method and system for providing secure peer-to-peer file transfers
A method and system for providing secure peer-to-peer file transfers whereby request/negotiation message mechanisms used to negotiate file transfers between...
US-8,813,201 Generating security material
An apparatus and method establish a secure, direct, station-to-station communication between a first station and a second station in a topology (e.g., PBSS)...
US-8,813,178 Systems and methods for preparing and submitting documents to comply with securities regulations
Systems and methods for preparing and submitting documents to a regulatory agency in an on-line environment are provided, which are used for the purpose of...
US-8,813,176 Method and apparatus for creating an information security policy based on a pre-configured template
A method and apparatus for creating a policy based on a pre-configured template is described. In one embodiment, source data having a tabular structure is...
US-8,813,173 Mobile communication device surveillance system
A mobile communication device surveillance system is described. The system includes a gateway, a web server, a wireless mobile communication device, and a...
US-8,813,162 Information receiving apparatus, data downloading method, and information receiving system
An information receiving apparatus includes: a communication unit; a storage unit that stores data; a data acquisition unit that acquires distribution data that...
US-8,813,159 Data transmission device and data transmission control device
Disclosed is a technique for effectively transmitting a plurality of contents under the situation securing minimum QoS. According to the technique, among a...
US-8,813,115 Service access method, device, and system
The present invention provides a service access method, device, and system, and relates to the field of television services, to guarantee multicast security of...
US-8,813,113 Method and system for adding a conditional access system
A method for adding a conditional access system to a digital audio/video transmission system that delivers content from a source to a security device associated...
US-8,812,877 Database encryption system, method, and program
A user apparatus connected to database apparatus via network comprises: unit that manages key information in order to encrypt and decrypt; storage unit that...
US-8,812,868 Secure execution of unsecured apps on a device
Given the volume of apps being developed and downloaded, performing operations to enable security for mobile devices, such as locating relevant classes and...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.