Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,779,891 Access control device
The invention relates to an access control device, in particular for a switchgear cabinet system, having a central unit, which is designed to receive and...
US-8,777,116 Display-enabled card with security authentication function
A display-enabled card with security authentication function includes a flexible card structure internally provided with a flexible electronic system, which...
US-8,776,622 Apparatus for mobile collection of atmospheric sample for chemical analysis
Portable devices and related methods for collecting and storing atmospheric samples for subsequent chemical analysis are provided. A sample cartridge according...
US-8,776,254 System and method for the secure unidirectional transfer of software and software updates
A system is disclosed that provides an authenticated payload, e.g., a software program or update, to a recipient device. A storage device stores a payload. A...
US-8,776,252 System, method, and computer program product for securing data on a server based on a heuristic analysis
A system, method, and computer program product are provided for securing data on a server based on a heuristic analysis. In use, information associated with...
US-8,776,251 Data exchange between a secure element and a terminal
A method for data exchange between a secure element and a terminal, the secure element including a CRS (Contactless Registry Service) application, a CREL...
US-8,776,247 Verification of process integrity
A system implements a secure transaction of data between a server and a remote device. The remote device comprises: processing means adapted to process input...
US-8,776,238 Verifying certificate use
A method, system, and computer usable program product for verifying certificate use are provided in the illustrative embodiments. A secure data communication is...
US-8,776,230 Master security policy server
A master policy server manages security polices for client computers through a network of local policy servers. Each local policy server is responsible for the...
US-8,776,213 Mobile application security system and method
A system for authenticating the user of a computing device comprises an authorized user directory. Each record is uniquely associated with an authorized user...
US-8,776,211 Processing commands according to authorization
Devices, systems, methods, and other embodiments associated with processing commands according to authorization are described. In one embodiment, a chip...
US-8,776,206 Method, a system, and an apparatus for content security in computer networks
The present invention relates to a method, a system, and an apparatus for protecting data in a computer network. A device is placed on a network edge in such a...
US-8,776,198 Techniques for non-unique identity establishment
Techniques for non-unique identity establishment are presented. A plurality of biometric data associated with a user is acquired from a plurality of biometric...
US-8,776,183 Networks
A Personal Area Network Security Domain (PSD) is formed between devices (142, 150, 152, 154 and 156). The PSD allows the sharing of data and/or resources...
US-8,776,182 Secure boot of a data breakout appliance with multiple subsystems at the edge of a mobile data network
A secure boot is provided for a breakout system having multiple subsystems at the edge of a mobile data network. The secure boot utilizes two trusted platform...
US-8,776,145 In-transit electronic media with location-based content
Exemplary methods, systems and components are implemented on a multipassenger transit vehicle to provide passenger access to a pre-assigned interactive...
US-8,775,824 Protecting the security of secure data sent from a central processor for processing by a further processing device
A data processing apparatus comprising: a data processor for processing data in a secure and a non-secure mode, said data processor processing data in said...
US-8,775,819 Flexible method of user authentication
A method of authorising a user in communication with a workstation is disclosed. According to the method, a system automatically determines a plurality of...
US-8,775,816 Method and apparatus to enhance security and/or surveillance information in a communication network
Existing video surveillance security approaches enhanced with suitable functionality of the telecommunications wireless network are provided. Security personnel...
US-8,775,805 System and method for variable length encryption
Systems and methods for performing a secure transaction provided. In one embodiment, the method for encrypting data is provided, comprising: selecting clear...
US-8,775,803 High security display of private data
A device, method, and computer-readable medium are disclosed. In one embodiment, the device includes an inbound port to receive information from an information...
US-8,775,799 Apparatus and method of securely moving security data
Provided is an apparatus and method of securely moving security data. An apparatus for securely moving security stored in a first apparatus to a second...
US-8,775,792 Method of and system for encryption and authentication
The invention provides a method of and system for networked security, involving multiple clients and servers. Rather than relying on single server based...
US-8,775,791 System and method for secure messaging between wireless device and application gateway
A method and system for secure messaging between a wireless device and an application gateway provides for connecting a device to an application mapping layer...
US-8,775,790 System and method for providing secure network communications
A method includes receiving a data message, from a first embedded node, in a first end point device. The first data message is addressed to a second embedded...
US-8,775,773 Object storage system
The storage system exports logical storage volumes that are provisioned as storage objects. These storage objects are accessed on demand by connected computer...
US-8,775,715 Protection of data from virtual machine clones via paravirtualization
A system and method for protecting secure data from virtual machine clones are disclosed. In accordance with one embodiment, a hypervisor receives a message...
US-8,775,710 Mobile information handling apparatus
A mobile information handling apparatus and system is configured for convenient mobile data entry, communication, and computation. A mobile computing device is...
US-8,775,619 Web hosted security system communication
A distributed proxy server system is operable to receive a request for Internet data from a user, obtain the user's identity, store at least one cookie on the...
US-8,775,604 Distributed frequency data collection via indicator embedded with DNS request
Domain Name Service (DNS) requests are used as the reporting vehicle for ensuring that security-related information can be transferred from a network. As one...
US-8,775,402 Trusted query network systems and methods
Systems and methods for enabling organizations to anonymously share aggregated security assessment results while keeping the raw or private data locally within...
US-8,775,369 Computer system architecture and method having isolated file system management for secure and reliable data...
System, method, computer, and computer program for secure data processing of potentially malicious code and documents or other data that may contain malicious...
US-8,775,364 Model-theoretic approach to data anonymity and inference control
A system and method for secure data management is presented. The method comprises receiving a query, performing the query and obtaining answers to it, creating...
US-8,775,305 Card-present on-line transactions
Embodiments of the invention can provide systems and methods for on-line credit card transactions. According to one example embodiment of the invention, a...
US-8,775,291 Systems and methods for enrichment of data relating to consumer credit collateralized debt and real property...
Systems and methods for enrichment of data associated with risk prediction. Data may be enriched by incorporating one or more aspects of consumer credit,...
US-8,775,272 System and method for enabling marketing channels in an IP marketplace
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
US-8,775,246 System and method for enabling channel registration in an IP marketplace
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
US-8,775,212 Electronic health records in clinical trials
A method for collecting self-reported data from an individual for use in a clinical trial is provided. The method includes providing a web site allowing the...
US-8,775,204 System and method for enabling group channels in an IP marketplace
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
US-8,775,189 Control center for a voice controlled wireless communication device system
A wireless communication device is disclosed that accepts recorded audio data from an end-user. The audio data can be in the form of a command requesting user...
US-8,774,411 Session key generation and distribution with multiple security associations per protocol instance
A single instance of a session key generation protocol is executed in a manner that generates a plurality of security associations between user equipment and a...
US-8,774,382 Online reporting tool for conferencing customers
Embodiments consistent with the present invention provide an integrated system for conferencing services reporting to support customer billing needs. Systems...
US-8,773,705 Data transmitting method of image forming apparatus and image forming apparatus for performing data...
A method of transmitting data from an image forming apparatus, the method including: receiving identification information of a destination of the data;...
US-8,773,279 Apparatus for visually and remotely determining an angular position of a relative rotation of parts
A visually and remotely readable apparatus is provided which comprises a plurality of sensing units, a control unit and a flexible printed cable (FPC) to...
US-8,773,241 Device for the secure contactless data exchange between a reader and a card
A transponder of a contactless data exchange system includes a unit to receive and transmit data provided with at least one first antenna loop and at least one...
US-8,770,486 Arrangement, apparatus, and associated method, for providing stored data in secured form for purposes of...
Card member apparatus, and an associated method, for storing and permitting selectable use of informational data associated with a subject. Identifying indicia...
US-RE45,009 Dynamic network link acceleration
A method and apparatus for dynamic network link acceleration provides a managed communication link for accelerated and reliable network communication between a...
US-8,769,699 Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-8,769,680 Alert passwords for detecting password attacks on systems
Detecting attacks on secured computer resources, including gathering user security data for a user having a user password protecting resources on a computer...
US-8,769,678 Cloud-based gateway security scanning
Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.