Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,726,353 Secure computer use system
Methods and apparatus for ensuring the computer security of users of a computer system are described. A user is allocated a security grading relating to how...
US-8,726,338 Dynamic threat protection in mobile networks
In general, techniques are described for dynamic threat protection in mobile networks. A network system comprising a network security device and a management...
US-8,726,305 Methods and systems for application rendering and management on internet television enabled displays
Computer implemented methods for managing communication between a display device and a remote server or services is provided. A remote server provides access to...
US-8,726,043 Securing backing storage data passed through a network
Techniques described herein generally relate to methods, data processing devices and computer readable media to ensure that data stored in a remote backing...
US-8,726,042 Tamper resistant memory protection
Various mechanisms are disclosed for protecting the security of memory in a computing environment. A security layer can have an encryption layer and a hashing...
US-8,726,035 Method and system for a recursive security protocol for digital copyright control
Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with...
US-8,726,025 Secured critical information storage and transaction
An enterprise system includes a storage having stored thereon a private key and a processor that is configured to receive a data object including an encrypted...
US-8,726,022 Method for the access of the mobile terminal to the WLAN and for the data communication via the wireless link...
The present invention relates to a method for the secure access of mobile terminal to the Wireless Local Area Network (WLAN) and for secure data communication...
US-8,726,018 Electronic authorization system and method
An electronic authorization system comprising a data source system configured to transmit transaction data. A secure data system is coupled to the data source...
US-8,726,016 Intelligent integrated network security device
Methods, computer program products and apparatus for processing data packets are described. Methods include receiving the data packet, examining the data...
US-8,726,015 Methods and apparatus for secure content routing
Systems and methods are described which provide handling and secure routing of an article of content in accordance with a code or instruction set identifier...
US-8,726,008 Network security smart load balancing
A system and method for protecting data communications in a system including a load-balancer connected to a cluster of security network components, e.g....
US-8,726,006 System and method for establishing a virtual private network
A system and method for establishing a virtual private network (VPN) between a client and a private data communication network. An encrypted data communication...
US-8,725,943 Method and system for secure data storage
A method and system for secure data storage and retrieval is provided. A sequence of data units is divided into multiple subsets of data units corresponding to...
US-8,725,644 Secure online transaction processing
Various methods for securely processing an online transaction between a customer and a merchant are disclosed. In one method, an authentication credentials...
US-8,725,619 Fair value model based system, method, and computer program product for valuing foreign-based securities in a...
A system for determining fair value prices of financial securities of international markets includes selecting a universe of securities of a particular...
US-8,725,610 System and method for managing privacy for offerings
Methods, systems, and articles of manufacture consistent with the present invention provide for managing privacy in a data processing system having an offering...
US-8,725,438 Linear actuator
A linear actuator comprises a reversible electric motor (2) which, via a transmission, is capable of driving a spindle (4) having a spindle nut (5) secured...
US-8,725,138 Methods for network selection and discovery of service information in public wireless hotspots
A roaming information code which can be wirelessly or otherwise transmitted as a SSID or other data field(s) of a wireless technology or standard. Further, a...
US-8,725,123 Communications device with secure data path processing agents
A communications device comprising one or more communication input/output (I/O) ports, at least one of the one or more communication I/O ports being a wide area...
US-8,724,998 Carrier and subcarrier hopping for optical OFDM security
Methods and systems for secure communication include assigning data streams to respective orthogonal sub-carriers according to random number information at a...
US-8,724,819 Credential provisioning
Disclosed is a method in a provisioning apparatus. The method comprises obtaining a family key, a family key defining a family; submitting the family key to a...
US-8,724,816 Security service control method and wireless local area network terminal
A security service control method and a WLAN terminal are provided, and the method includes: stopping a WPI service between a WLAN terminal and an AP when the...
US-8,724,814 System and method of security function activation for a mobile electronic device
A system and a method are provided for activating one or more security functions of a mobile electronic device. The system and method provide for the activation...
US-8,724,811 Broadcast encryption based security system
Provided are techniques for providing a home or business security system that relies upon data encryption for both communication and the storage of content. The...
US-8,724,808 Method for secure distribution of digital data representing a multimedia content
A content server maintains a database of different content files, these files being scrambled by control words that are stored in a database. The control words...
US-8,724,807 Method for etching and secure distribution of digital data, access device and writer
The invention relates to a method of receiving and securely recording digital data comprising a step for recording said digital data on a secured disk by a...
US-8,724,778 Systems and methods for secure recording in a customer center environment
Systems and methods for secure recording in a customer center environment are provided. The system receives data related to a communication at a media...
US-8,724,639 Smart home hub
The present invention provides a method and device for an integrated smart hub. The method and device for an integrated smart hub provides for a simultaneously...
US-8,724,312 Mobile computer stand with integrated keyboard
A device for use with a portable computer includes a base, a stand having an upper portion and an adjustable linkage, and a connection mechanism. The base is...
US-8,724,137 Information processing apparatus and memory management technique for secure print data
State information about whether a printing apparatus can store print data for confidential printing is acquired. When the print data can be stored, secure...
US-8,723,952 Tamper-resistant video surveillance network
A network of surveillance digital video cameras is provided. Each camera records video data and provides the video recordings to other networked cameras as well...
US-8,723,831 Graphical authentication for a portable device and methods for use therewith
A portable device includes a touch screen that includes a display screen and that generates touch screen data in response to a user's interaction with the touch...
US-8,723,701 Methods for encoding and decoding data
The transmission of broadcast data, such as financial data and news feeds, is accelerated over a communication channel using data compression and decompression...
US-8,723,692 Secure terminal data loader apparatus and method for a mobile platform
A terminal data loading device on a mobile platform includes a media unit for receiving a transportable media element containing media data and outputting a...
US-8,723,675 Smartcard connector
A smartcard connector for connecting a smartcard within a card holder to an electronic device. The smartcard connector includes a card holder having a card...
US-8,723,671 Alarm monitoring telecommunications line condition detection and automatic calibration
A method at an alarm monitoring station and security system arrangement for detecting alarm signals originating at security systems on incoming calls carried by...
US-8,723,574 Semiconductor integrated circuit
According to one embodiment, a semiconductor integrated circuit is provided, which has mounted thereto a flip-flop circuit including a latch portion that takes...
US-8,721,738 System and method for ensuring security of data stored on data storage devices
Systems and methods for limiting access to data in a portable data storage device. An exemplary method may use an electronic computing device to prevent access...
US-8,721,346 Signal transmission module
A signal transmission module is provided. The signal transmission module includes an electrical connector, a linked unit, a data connector, a sliding block, a...
US-8,720,786 Card security activation label and method
Card security apparatus and methods are provided. An obstruction layer (e.g., a hot-stamped scratch off foil label) may be provided in at least partially...
US-8,719,954 Method and system for secure distribution of selected content to be protected on an appliance-specific basis...
The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related...
US-8,719,947 Protection of audio or video data in a playback device
Method and apparatus to prevent hacking of encrypted audio or video content during playback. Hackers, using a debugging attachment or other tools, can illicitly...
US-8,719,925 Content-addressable memory based enforcement of configurable policies
A monitoring device for monitoring transactions on a bus includes content-addressable memory ("CAM") and a response policy unit. The CAM includes an input...
US-8,719,923 Method and system for managing security operations of a storage server using an authenticated storage module
The present invention provides a technique, in a network storage system, for a key management module (KMM) managing security operations within the storage...
US-8,719,918 Method and device for distributed security control in communication network system
With migration of network technology and more and more requirements of user equipment for accessing to Internet, the network security faces more and more severe...
US-8,719,914 Virtual computing infrastructure
A system has a virtual overlay infrastructure mapped onto physical resources for processing, storage and network communications, the virtual infrastructure...
US-8,719,901 Secure consultation system
A secure consultation system is disclosed that enables an owner entity to securely store its most secure and private data such that designated entities of the...
US-8,719,898 Configuring and providing profiles that manage execution of mobile applications
Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user...
US-8,719,897 Access control method for tri-element peer authentication credible network connection structure
An access control method for a TePA-based TNC architecture is provided, including: 1) performing encapsulation of user authentication protocol data and platform...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.