Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,670,558 Cryptographic processing apparatus, cryptographic processing method, and computer program
To realize a common-key block cipher process configuration with increased difficulty of key analysis and improved security. In a configuration for storing in a...
US-8,670,557 Cryptographic system with modular randomization of exponentiation
Systems and/or methods that facilitate secure electronic communication of data are presented. A cryptographic component facilitates securing data associated...
US-8,670,493 Systems and/or methods of increased privacy wireless communications
Systems, methods and/or mobile devices are provided that enable a level of privacy/security in wireless communications to be increased responsive to a content...
US-8,670,019 System and method for providing enhanced eye gaze in a video conferencing environment
An apparatus is provided in one example and includes first and second cameras configured to capture image data associated with an end user involved in a video...
US-8,667,610 Portable computer and charging method thereof
A portable computer and a charging method thereof are provided. The portable computer includes a charge integrated circuit (IC), a basic input/output system...
US-8,667,607 Trusted security zone access to peripheral devices
A method of trusted data communication. The method comprises executing a data communication application in a trusted security zone of a processor, wherein the...
US-8,667,594 Securing file trust with file format conversions
Approaches for ensuring a digital file does not contain malicious code. A digital file in an original format may or may not contain malicious code. An...
US-8,667,577 Remote registration of biometric data into a computer
Systems and arrangements for permitting the transmission of fingerprint authentication data to a system remotely, while also permitting the system to employ...
US-8,667,495 Virtual resource provider with virtual control planes
Control planes of virtual resource providers may be customized in a secure, stable and efficient manner with virtual control planes. Control planes may be...
US-8,667,399 Cost tracking for virtual control planes
Control planes of virtual resource providers may be customized in a secure, stable and efficient manner with virtual control planes. Control planes may be...
US-8,667,306 Automatic security action invocation for mobile communications device
In one embodiment, there is provided a mobile communications device comprising: a processor; a communications subsystem operable to exchange signals with a...
US-8,667,304 Methods and apparatuses for secondary conditional access server
Conditional access to media content of primary security systems on a secondary networked environment. In one embodiment, a conditional access server is used to...
US-8,667,301 Obfuscating transformations on data array content and addresses
In a first computer (digital) data obfuscation process, data which is conventionally arranged in a data structure called an array (e.g., a table) and...
US-8,667,300 Image processing apparatus and method
Encrypted video data is decrypted as first image data. If a first image processing module includes an output processing to an outside of a first secure memory...
US-8,667,287 Transaction auditing for data security devices
Data security devices are provided which store user data and interact with terminal devices to provide information about the stored user data. Security device...
US-8,667,284 Detection of invalid escrow keys
A secure hash, such as a Hash-based Message Authentication Code ("HMAC"), is generated using a piece of secret information (e.g., a secret key) and a piece of...
US-8,667,273 Intelligent file encryption and secure backup system
A method and apparatus for secure transparent backup and encryption of data including compression, elimination of redundant information, all working integrated...
US-8,667,269 Efficient, secure, cloud-based identity services
An Identity Ecosystem Cloud (IEC) provides global, scalable, cloud-based, cryptographic identity services as an identity assurance mechanism for other services,...
US-8,667,173 Performing multicast communication in computer networks by using overlay routing
An overlay protocol and system for allowing multicast routing in the Internet to be performed at the application level. The overlay protocol uses "native"...
US-8,667,154 Authentication of unknown parties in secure computer communications
Authentication of an unknown party in a secure computer communication may be performed even without consulting a public whitelist of trusted parties. A digital...
US-8,667,082 System and method for targeting channels to users
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
US-8,667,036 Bonding contents on separate storage media
Local storage on player instruments provides the ability for adding further amendments and most recent supplements to the optical disc content. A problem...
US-8,667,020 Placement goal-based database instance dynamic consolidation
Models and tools for facilitating database instance consolidation are described. One approach obtains standardized database instance performance data, receives...
US-8,667,019 Placement goal-based database instance consolidation
Models and tools for facilitating database instance consolidation are described. One approach obtains standardized database instance performance data, receives...
US-8,666,940 Method and apparatus for communicating data between computer devices
A client server system uses a client subsystem, a server subsystem and an interconnecting data network. The client subsystem client application initiates a...
US-8,666,905 Anonymous online payment systems and methods
In various embodiments, a central server grants access to a plurality of anonymous one-time-usable, time-sensitive encrypted tokens that identify consumer...
US-8,666,902 System and method for accessing read only ANSI tables in an electricity meter
A utility meter implementing the ANSI C12.19 standard is able to bypass security processing using Decade4 security tables for a single data access operation....
US-8,666,893 Electronic funds transfer authentication system
Embodiments of the present invention are directed to an electronic funds transfer authentication system and method to facilitate the verification and...
US-8,666,395 System and method for speeding call originations to a variety of devices using intelligent predictive...
A mobile application gateway configured to interconnect mobile communication devices on a cellular network with an enterprise network is provided. The mobile...
US-8,666,074 Optical fiber secure communication apparatus and data encryption method therefor
An optical fiber secure communication apparatus and a data encryption method therefor are provided. The apparatus comprises a transmitter and a receiver being...
US-8,665,868 Apparatus and method for enhancing forwarding and classification of network traffic with prioritized matching...
An apparatus is described that performs prioritized matching through processing of network traffic in accordance with provisioned rules and policies. The...
US-8,665,848 Systems and methods of combined Bluetooth and WLAN signaling
Disclosed herein are systems and methods of combined Bluetooth and WLAN signaling. Such systems and methods may use a Bluetooth connection to signal WLAN...
US-8,665,330 Event-triggered security surveillance and control system, event-triggered security surveillance and control...
The present invention discloses a security surveillance system and a method thereof, a computer readable storage media and a computer program product. The...
US-8,665,084 Security system and method
A security control apparatus, system and method are provided. The security control apparatus includes a wireless communication element that supports a plurality...
US-8,665,083 System and method for providing communications for container security
A system for providing communications for container security is provided. The system includes a sensing system for monitoring the contents of the container; a...
US-8,665,064 Wireless security control system
A security control system includes a remote access control system to receive wireless information from a central access control system. The remote access...
US-8,661,554 Controlling program, image forming apparatus and print controlling method
There is described an image forming apparatus, which makes it possible to securely prevent the secret information from leaking out to unauthorized personnel....
US-8,661,540 Method and apparatus for secure credential entry without physical entry
A method and apparatus are disclosed wherein a portable memory storage device is provided for interfacing with a communications port of the computer system....
US-8,661,536 Side channel attack analysis
A method described herein includes acts of executing a cryptographic function over input data utilizing a processor on a computing device and generating a data...
US-8,661,535 Method for making secure the execution of an intermediate language software code in a portable device
A method for executing an application compiled in intermediate code on a portable digital appliance equipped with a virtual executing machine for interpreting...
US-8,661,531 System and method for secure control of resources of wireless mobile communication devices
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
US-8,661,520 Systems and methods for identification and authentication of a user
The present invention generally relates to a computer security system for use in the identification and authentication of a user prior to an on-line...
US-8,661,507 Managed peer-to-peer applications, systems and methods for distributed data access and storage
Applications, systems and methods for securely and remotely operating a remote computer from a local computer over a network while providing seamless,...
US-8,661,504 Secure social web orchestration via a security model
A method includes receiving, by a first computer, input from a first user. The method further includes creating, by the first computer, a hierarchical class...
US-8,661,498 Secure and scalable detection of preselected data embedded in electronically transmitted messages
A method and apparatus for detecting preselected data embedded in electronically transmitted messages is described. In one embodiment, the method comprises...
US-8,661,265 Processor modifications to increase computer system security
A method, an x86 processor and a computer system for processing more securely. More specifically, embodiments provide an effective and efficient mechanism for...
US-8,661,263 Meta-complete data storage
The invention described herein generally relates to systems and methods of securely storing data so that the data contains information about the data and/or the...
US-8,661,259 Deduplicated and encrypted backups
A system and method for efficiently creating deduplicated and encrypted data across a plurality of computers allows local encryption and remote storage of...
US-8,661,251 Method and device for creating a group signature and related method and device for verifying a group signature
A method for creating a group signature of a message to be implemented by a member of a group in a system, the system including a trust authority, the group...
US-8,661,249 Health keyset management
Systems and methodologies that facilitate delegation of keyset management to a platform presenting a centralized health-related data repository are provided....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.