Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,521,808 Uploading and executing command line scripts
A mechanism is provided for a non-root-level user to execute command line script files via a generic command line interface. A command line interface in the...
US-8,521,637 Systems, methods, and computer program products for providing real time analytic widgets in a financial trading...
Methods, systems, and computer program products are provided for providing real time analytics and monitoring to a user of a securities trading system. In one...
US-8,521,130 System and method of secure message processing
A system and method for handling message indicator processing on a wireless mobile communications device. Message state data is stored in a cache for use in...
US-8,520,905 Data security system
A data security system comprises a host processor, and a plurality of remote computers. Each remote computer provides biometric authentication of a user prior...
US-8,520,851 Wireless communication device with securely added randomness and related method
A wireless communication system which employs cryptographic functions requiring random data input in a mobile wireless device includes provisions for securely...
US-8,520,850 Downloadable security and protection methods and apparatus
Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional...
US-8,520,843 Method and apparatus for encrypting a discrete signal, and method and apparatus for decrypting
In an inventive method for encrypting a discrete signal consisting of successive samples the successive samples are subdivided into successive time blocks, and...
US-8,520,839 Data transmitter with a secure and efficient signature
An encryption device encrypts a first block of user data to obtain a first encryption result and encrypts a second block of user data, which follows the first...
US-8,520,670 Automated operation and security system for virtual private networks
A node device provides secure communication services over a data network, such as the Internet or another public or private packet switched network, to multiple...
US-8,520,558 Quality of service securing method and apparatus
A quality of service (QoS) securing apparatus and method using a communication protocol is provided. The QoS securing method is performed by a reception side...
US-8,518,779 Semiconductor device and method for fabricating the same
A semiconductor device includes a step-type recess pattern formed in a substrate, a gate electrode buried in the recess pattern and having a gap disposed...
US-8,517,262 Automated banking machine that operates responsive to data bearing records
An automated banking machine operates to cause financial transfers responsive at least in part to data read from data bearing records. The automated banking...
US-RE44,468 Data security method and device for computer modules
A security method for an attached computer module in a computer system. The security method reads a security identification number in an attached computer...
US-8,516,592 Wireless hotspot with lightweight anti-malware
A mobile computing device, such as a mobile phone, serves as a wireless hotspot for other mobile computing devices. The other mobile computing devices connect...
US-8,516,576 Network intrusion detection with distributed correlation
A network security system employing multiple levels of processing to identify security threats. Multiple host machines may each contain an agent that detects...
US-8,516,575 Systems, methods, and media for enforcing a security policy in a network including a plurality of components
Systems, methods, and media for enforcing a security policy in a network are provided, including, for example, receiving a plurality of events describing...
US-8,516,564 Secure user interaction using virtualization
A first virtualization layer is inserted between (i) an operating system of a computer system, and (ii) at least first and second hardware devices of the...
US-8,516,560 Secure remote authentication through an untrusted network
A method for securely authenticating a user of a portable consumer device at an access device comprising the following steps. First, a dynamic data element and...
US-8,516,539 System and method for inferring access policies from access event records
A method of security gateway policy definition to quickly infer a new policy based on event data extracted and analyzed using business logic and workflow from a...
US-8,516,538 Providing security for queries to electronic product code information services
Methods and apparatus, including computer program products, implementing and using techniques for protecting data residing in a repository of an electronic...
US-8,516,272 Secure dynamically reconfigurable logic
A mechanism for securely and dynamically reconfiguring reconfigurable logic is provided. A state machine within a data processing system establishes a hardware...
US-8,516,268 Secure field-programmable gate array (FPGA) architecture
A method and system for configuring a field-programmable gate array (FPGA) includes receiving an encrypted FPGA load-decryption key at an FPGA from a remote...
US-8,516,257 Secure media peripheral association in a media exchange network
A method for establishing secure access to a media peripheral in a home via a node in a communication network includes acquiring by the node, security data...
US-8,516,255 Methods and apparatus for peer-to-peer transfer of secure data using near field communications
The present invention discloses an apparatus and method of transferring data from a first device to a second device. The method includes transmitting a request...
US-8,516,241 Zone-based firewall policy model for a virtualized data center
Techniques are provided for implementing a zone-based firewall policy. At a virtual network device, information is defined and stored that represents a security...
US-8,516,211 Secure storage management system and method
A storage management system and method for managing access between a plurality of processes and a common store. In one embodiment, each individual process...
US-8,516,131 System and method employing an agile network protocol for secure communications using secure domain names
A network device comprises a storage device storing an application program for a secure communications service; and at least one processor configured to execute...
US-8,516,117 Agile network protocol for secure communications with assured system availability
A plurality of computer nodes communicate using seemingly random Internet Protocol source and destination addresses. Data packets matching criteria defined by a...
US-8,516,076 System and method for compiling statistics in an IP marketplace
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
US-8,516,068 System and method for processing messages being composed by a user
A system and method for processing messages being composed by a user of a computing device (e.g. a mobile device). Embodiments are described in which the...
US-8,515,390 System and method for protecting data in wireless devices
When a network-based wireless device such as a mobile phone or data terminal is reported lost or stolen or is determined to be malfunctioning, a service...
US-8,515,289 Wavelength sensing lighting system and associated methods for national security application
A wavelength sensing lighting system may include a light source, a sensor and a controller. One or more light sources and sensors may be included in an array....
US-8,515,211 Methods, apparatuses, and computer program products for maintaining of security and integrity of image data
A user interface for masking portions of an image is provided. A controller included in the user interface is arranged for receiving a request for an image,...
US-8,515,080 Method, system, and computer program product for encryption key management in a secure processor vault
A method for encryption key management including accepting authenticated unencrypted data into a processor of a server computing device that is configured as a...
US-8,515,076 Security system and method using automatic meter reading protocol
The present invention relates to a security system using an automatic meter reading protocol. The security system includes a Device Language Message...
US-8,515,073 Method and system for secure communication in near field communication network
Disclosed is a method for secure communication between a plurality of electronic devices in a Near Field Communication (NFC) network, and a system for...
US-8,515,072 Method and apparatus for providing secure communications for mobile communication devices
A method and apparatus that enables secure communications from a wireless communication device is disclosed. The method may include receiving a signal to...
US-8,514,752 Communication method, communication terminal, and base station apparatus
A radio transmitting apparatus and a radio transmitting method wherein the increase of the guard time in a random access region is reduced to secure the data...
US-8,514,561 Locking mechanism and information handling system using the same
A data storage device is inserted in an information handling apparatus, and is prevented from being accidently disconnecting from the information handling...
US-8,514,420 Image forming apparatus and method of user authentication
An image forming apparatus includes a user authentication function that authorizes a user to operate saved print data with a password without requiring an input...
US-8,512,071 Electrical connector assembly having a printed circuit board with soldering holes interconnected to a plurality...
A SATA connector assembly is provided with an insulating housing, a plurality of data and power terminals, a PCB and an FFC, wherein the data and power...
US-8,511,544 Banking system controlled responsive to data bearing records
An automated banking machine operates to cause financial transfers responsive to data read from data bearing records. The automated banking machine includes a...
US-8,510,848 Method and system for managing data in a communication network
A method and a system for managing one or more files in a communication network are provided. The system includes a server, a first client, and a second client....
US-8,510,842 Pinpointing security vulnerabilities in computer software applications
A build process management system can acquire data pertaining to a software build process that is currently being executed by an automated software build...
US-8,510,835 Techniques for protecting data in cloud computing environments
A client computer runs a communicator employed to connect to a server computer in a cloud. The communicator is updated on a regular basis to update its...
US-8,510,827 Taint tracking mechanism for computer security
Mechanisms have been developed for securing computational systems against certain forms of attack. In particular, it has been discovered that, by maintaining...
US-8,510,825 Secure computing environment to address theft and unauthorized access
Techniques for securing a client. A BIOS agent stores policy data within a BIOS of the client. The BIOS agent is one or more software modules that execute in...
US-8,510,816 Security device provisioning
The provisioning of a security token object to a user is disclosed. The security token object is used for accessing a computing resource through a client...
US-8,510,760 Systems and methods for secure host resource management
Systems and methods are described herein to provide for secure host resource management on a computing device. Other embodiments include apparatus and system...
US-8,510,736 Computer system, information processing apparatus, and security protection method
According to one embodiment, a computer system includes a server and a client computer. The client computer is connected to the server via a network. The server...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.