Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,792,645 Authentication and data security for wireless networks
A method and apparatus of providing a security system. The method includes the steps of a registering sensor having a secret key and an IEEE or MAC address...
US-8,792,640 Systems and methods for securing a digital communications link
A digital data signal, such as a digital video signal, is intentionally pre-distorted before being sent over a network. In one embodiment, this pre-distortion...
US-8,792,637 Downloading of data to secure devices
An encryption key may be generated based on personalized unit data associated with a software download recipient, for example, a secure processor. In some...
US-8,792,626 Transmission of utility data
Certain embodiments are directed at methods and systems for transmitting utility usage data using a public switched telephone network ("PSTN"). The methods and...
US-8,792,115 System and control method for securing information between image processing device and image forming device
A system includes an image processing device configured to output image data to an image forming device and the image forming device is configured to form an...
US-8,792,114 System, method and recordable medium for previewing a document over the network
The invention generally relates to sending data (e.g. print data or a document), in a network environment, to a port monitor, and to upload the data to an...
US-8,791,984 Digital security camera
The systems and methods described herein provide imaging systems for imaging a scene. The imaging system includes an optical head, a processor, and an analog...
US-8,791,791 Sea-based security arch for identifying shipping contraband
The invention discloses devices and methods for analyzing inbound and outbound ships for illegal or dangerous cargo or persons. An arch is generally placed...
US-8,791,665 Energy storage device security
Exemplary embodiments are directed to energy storage device security. An energy storage device may include at least one energy storage cell and a controller....
US-8,789,201 Secure personal content server
A local content server system (LCS) for creating a secure environment for digital content is disclosed, which system comprises: a communications port in...
US-8,789,195 Method and system for access control and data protection in digital memories, related digital memory and...
A digital memory such as a memory card for mobile communication equipment, is adapted to be accessed by a plurality of users and have protected data stored...
US-8,789,181 Flow data for security data loss prevention
There are techniques for detecting and preventing possible security violations in a computer network. The security violation detection may be based on data...
US-8,789,166 Verification method and system thereof
The invention discloses an authenticating method and a system thereof, which relates to information security field and solves the problem that the user...
US-8,789,161 Device and method for authenticating a transaction with a data processing apparatus
A device or "dongle" (30) is provided for controlling communications between a Subscriber Identity Module (for SIM) (12), such as of the type used in a GSM...
US-8,789,160 Function-based authorization to access electronic devices
Systems and methods to secure authorized access are disclosed. A method includes receiving, an electronic device, a request to generate function-authorization...
US-8,789,149 Method and apparatus for communicating between a user device and a user device locating module to allow a...
A system and method for communicating between a user device locator module and a user receiving device includes forming a secure connection with the user device...
US-8,789,148 Systems and methods for deployment of secure shell devices
A shell device with minimal software and/or hardware resources can download from a server configuration information and/or user data in order to allow the shell...
US-8,789,140 System and method for interfacing with heterogeneous network data gathering tools
A prevention-based network auditing system includes a plurality of heterogeneous information sources gathering information about the network. An audit server...
US-8,789,136 Securing a device based on atypical user behavior
A system and method for securing the mobile device applies the rules to determine if an event associated with an application is a secure event. If the event is...
US-8,789,027 Software analysis framework
Presently described is a decompilation method of operation and system for parsing executable code, identifying and recursively modeling data flows, identifying...
US-8,788,971 Methods and arrangements for composing information-carrying artwork
Data defining several different information-carrying patterns can be stored on mass storage of a computer workstation and serve as a library of design elements...
US-8,788,850 Systems and methods for using a security circuit to monitor a voltage of an integrated circuit to counter...
One embodiment, having a corresponding method, features an integrated circuit comprising: a power supply terminal configured to receive electrical power; a core...
US-8,788,847 Secure data processing method and associated device
A secure data processing method includes the following steps: padding (E206) a memory area (MAC') with a pad value (A); writing (E208) a first datum in the...
US-8,788,845 Data access security
An execution environment of a computer computes an initial effective permissions set for managed code based on user identity evidence, code evidence and/or a...
US-8,788,840 Secure processor
A secure hardware comprises a secure pipe, a secure DMA, a secure assist and a secure bus, which connects between those blocks. The secure pipe stores a common...
US-8,788,819 System and method for a cloud-based electronic communication vault
Disclosed is a system and method for securely, conveniently and effectively storing information in a secure data repository or database, and securely delivering...
US-8,788,814 Secure data transfer using an embedded system
A method and device for securing data transmission via an embedded system that is operationally coupled to a local device and a remote computing system using a...
US-8,788,805 Application-level service access to encrypted data streams
Techniques for securely providing cryptographic keys to trusted intermediate nodes or monitoring devices are described so that SSL, TLS, or IPSec communications...
US-8,788,786 Storage system creating cache and logical volume areas in flash memory
The temporary area capacity required to be secured with respect to the whole permanent area is calculated in accordance with the capacity and access frequency...
US-8,788,705 Methods and apparatus for secure routing of data packets
Methods and arrangements for supporting a forwarding process in routers when routing data packets through a packet-switched network, by employing hierarchical...
US-8,788,532 Firewalls for securing customer data in a multi-tenant environment
Network security is enhanced in a multi-tenant database network environment using a query plan detection module to continually poll the database system to...
US-8,788,428 Multimode retail system
Embodiments of a multimode system for use in, for example, a fuel dispenser, are configured for receiving data in a retail environment. The multimode system can...
US-8,788,427 Limiting data exposure in authenticated multi-system transactions
The limiting of data exposure in authenticated multi-system transactions is disclosed. A client system authenticates and requests secured data and unsecured...
US-8,788,399 Systems and methods for trading a trade list in financial markets
Systems and methods are provided for maintaining neutrality while trading a list of securities using an algorithmic trading facility coupled with at least one...
US-8,788,398 Method and apparatus for automated trading of equity securities using a real time data analysis
A system and method for buying and selling securities based on volatility and liquidity rather than other fundamentals is demonstrated. The method involves:...
US-8,788,071 Security for objects in a process plant configuration system
A configuration system uses process plant items that may represent, or be capable of representing, entities in a process plant to assist in configuring,...
US-8,787,973 Device and method for controlling usage of a memory card
A memory card includes a memory for storing data and a controller that is operative to control access to storage of at least a portion of storage conditional...
US-8,787,626 OMNIGENE software system
A software system which employs a special set of simulated electrical circuits to generate user-specific textured and signature color images based on DNA,...
US-8,787,583 Systems and methods for distributing and securing data
A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A...
US-8,787,581 Teired key communication system and method in support of controlled vendor message processing
A computer-implemented system processes secure electronic documents from one or more content providers in accordance with subscriber instructions has a...
US-8,787,571 Wired communications systems with improved capacity and security
Provided are methods and systems of using division-free duplexing (DFD) in a cable communication network. Techniques for applying DFD in a cable communication...
US-8,787,569 System and method for secure communication of components inside self-service automats
Method to secure the communication of components within self-service automats that are linked to each other by a bus system, having a transmitter and a...
US-8,787,568 Data transformation apparatus, data transformation method, and computer program
A non-linear transformation processing structure having a high implementation efficiency and a high security is realized. Data transformation is performed using...
US-8,786,521 Representation system
The present invention relates to a depiction arrangement for security papers, value documents, electronic display devices or other data carriers, having a...
US-8,784,310 Vascular pressure sensor with electrocardiogram electrodes
Devices, systems, and methods for sensing cardiac electrical activity and blood pressure within a blood vessel are disclosed. A vascular sensor includes a...
US-8,782,874 Railway tie automated preplating apparatus
The invention is an apparatus for pre-plating railway ties, including switch ties of varying lengths. An infeed deck and singulator feeds individual ties, each...
US-8,782,869 Unlocking tool for male connector
A connector of a cable (e.g., a 30-pin connector) can be used to facilitate various security-related and other functionalities. For example, a connector can...
US-8,782,796 Data exfiltration attack simulation technology
Novel systems and methods for testing network security are disclosed. In one example, at least one specified data message and at least one specified access...
US-8,782,790 Signature creation for malicious network traffic
An endpoint on a network uses detection data to detect a malicious software attack. The endpoint identifies content associated with the attack, such as a...
US-8,782,785 System, method and computer program product for rendering data of an on-demand database service safe
In accordance with embodiments, there are provided mechanisms and methods for rendering data of an on-demand database service safe. These mechanisms and methods...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.