Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,301,908 Data security in an information processing device
A device and method for data protection of inputted and stored publicly encrypted data. Publicly encrypted data can be received by a data receiver module and...
US-8,301,895 Identity based network policy enablement
Enhanced network data transmission security and individualized data transmission processing can be implemented by intermediaries in a communication path between...
US-8,301,888 System and method for generating secured authentication image files for use in device authentication
A secure authentication image file is generated for use in authenticating a device. The device performs a secure authentication algorithm on the secure...
US-8,301,856 Restricting memory areas for an instruction read in dependence upon a hardware mode and a security flag
An apparatus for processing data 2 includes a processor 8, a memory 6 and memory control circuitry 12. The processor 8 operates in a plurality of hardware modes...
US-8,301,834 System for determining allocation of tape drive resources for a secure data erase process
A system is provided to ensure a timely secure data erase by determining whether allocating an additional tape drive would improve secure data erase performance...
US-8,301,785 Data transferring method and content transferring method
In a method of transferring data in a data interoperable environment, a secure authenticated channel is established with a receiving entity corresponding to...
US-8,301,572 Cryptographic module for secure processing of value-bearing items
An on-line value bearing item (VBI) printing system that includes one or more cryptographic modules and a central database is disclosed. The cryptographic...
US-8,301,570 Method and system for data security in an IMS network
A method and system to enhance the protection of the data in an user equipment and secure real time streaming of the data in the user equipment is disclosed....
US-8,301,548 Methods and systems related to securities trading
One exemplary aspect comprises: (a) receiving data describing an executed trading order in a market traded security and related trade execution data; (b)...
US-8,301,527 Systems and methods for improving investment performance
Methods for a data processor implemented system monitor for enabling persons to turn over the allocation their investment assets, and/or receive assistance...
US-8,301,494 Method and system for managing inventory and promotions campaign based on redemption data
Provided is a method and system for the management of inventory and/or promotional campaigns associated with electronic distribution of secure money saving or...
US-8,301,386 Classification and web-based presentation of oil and gas SCADA data
Disclosed are techniques for acquiring, processing and presenting data produced by one or more devices and meters in the field. One or more servers, such as...
US-8,301,300 System and method for smart card personalization
A smart card personalization system maintains a database containing card issuer data format templates, card applications, card operating system commands, and...
US-8,301,032 Wide field-of-view amplified fiber-retro for secure high data rate communications and remote data transfer
An optical system for remotely optical communications at a high data rate between a base station and a remote station under atmospheric turbulence conditions is...
US-8,300,890 Person/object image and screening
A first set of unknown pixels is determined for which being located in the foreground portion does not in-and-of-itself determine the pixel to be part of the...
US-8,300,828 System and method for a derivation function for key per page
Disclosed herein are systems, methods and computer-readable media to perform data encryption and decryption using a derivation function to obtain a key per page...
US-8,300,822 System for secure packet communication
A system for processing a communication data item. The communication data item is divided into at least two unencrypted packets to be encrypted. Each encrypted...
US-8,300,794 Communication control method, communication system and communication controller
The same number is redundantly set as the extension number associated to a fourth telephone number in different data tables associated to different second...
US-8,300,470 Two terminal programmable hot channel electron non-volatile memory
A programmable two terminal non-volatile device uses a floating gate that can be programed by a hot electron injection induced by a potential between a source...
US-8,299,914 Method and system for providing tracking services to locate an asset
In a method of asset location data is received from a cellular transmitter associated with a selected asset, which location data includes data representative of...
US-8,297,523 Secure barcode
A graphically represented, machine-readable code having a first abstract part and a second part comprises a contrived code having pre-associated data, wherein...
US-8,297,308 Cartridge
The invention relates to a cartridge (1) for insertion into a receptacle of a motor vehicle handling facility having an interior chamber (2) which receives a...
US-8,296,851 System and method for ensuring security of data stored on electronic computing devices
A system and method for using a host electronic computing device to prevent access to data in a preselected memory portion of an electronic computing device...
US-8,296,846 Apparatus and method for associating categorization information with network traffic to facilitate application...
An apparatus is described that associates categorization information with network traffic to facilitate application level processing through processing of...
US-8,296,834 Secure single-sign-on portal system
A computer-implemented portal system facilitates access to secure data and multiple secure-access internet sites. The system authenticates a user based on a...
US-8,296,828 Transforming claim based identities to credential based identities
Claim based identities are transformed to a set of credentials and securely stored in a secure data store using a number of encryption schemes. The credentials...
US-8,296,757 Copy protection of software and/or data
Autorun functionality is incorporated into a portable device such as a flash drive, a wireless adapter, a communication adapter, or any USB peripheral device....
US-8,296,584 Storage and retrieval of encrypted data blocks with in-line message authentication codes
Techniques are disclosed for in-line storage of message authentication codes with respective encrypted data blocks. In one aspect, a given data block is...
US-8,296,570 Flexible method of user authentication
A method of authorizing a user in communication with a workstation is disclosed. According to the method, a system automatically determines a plurality of...
US-8,296,538 Storing secure mode page table data in secure and non-secure regions of memory
Apparatus for data processing 2 is provided with processing circuitry 8 which operates in one or more secure modes 40 and one or more non-secure modes 42. When...
US-8,296,477 Secure data transfer using legitimate QR codes wherein a warning message is given to the user if data transfer...
User data is securely transferred from a client device to a mobile device. Data transfer activities at the client are monitored to detect a request to transfer...
US-8,296,462 Header-based network API
A method and apparatus for communicating with entities outside of a secure network by intercepting and modifying messages is provided. Techniques for...
US-8,296,323 Personal data subscriber systems and methods
Methods and systems for facilitating the propagation of personal data include a Personal Data Propagation Environment ("PDP environment") that facilitates the...
US-8,296,301 Systems and methods for probabilistic data classification
A system for performing data classification operations. In one embodiment, the system comprises a filesystem configured to store a plurality of computer files...
US-8,296,269 Apparatus and method for read consistency in a log mining system
A computer readable storage medium includes executable instructions to receive a specification for requested data in a log based replication system where data...
US-8,296,244 Method and system for standards guidance
A method and system for guiding end-users with respect to payment card data security standards. The system uses guidance questions that are worded simply and...
US-8,296,221 Methods and systems related to securities trading
At least one exemplary aspect comprises a method comprising: (a) receiving electronic data describing a trading order for a market-traded security; (b) checking...
US-8,295,851 Realtime, interactive and geographically defined computerized personal matching systems and methods
A system and method of interactive and live computerized matching in which a first user is provided with a personal data device including a wireless...
US-8,295,808 Secure remote subscription module access
Disclosed is a method of granting a client communications terminal access to a subscription module of a server communications terminal, the method comprising...
US-8,295,773 Communication apparatus and communication system
Remote control data is securely transmitted to a device under control. A remote control device transmits an acknowledge request for A ch to the device under...
US-8,295,484 System and method for securing data from a remote input device
An input device with an integrated security module communicates with a processing component over an insecure medium. The insecure medium may be a wireless...
US-8,295,306 Layer-4 transparent secure transport protocol for end-to-end application protection
Techniques for providing layer 4 transparent secure transport for end-to-end application protection are described herein. According to one embodiment, a packet...
US-8,295,273 Standard telephone equipment (STE) based deployable secure communication system
Sensitive, Standard Telephone Equipment (STE) data is encapsulated into IP packets in a remotely deployed, secure communication system. The IP packets are...
US-8,295,168 Security groups
Methods and devices are provided for implementing security groups in an enterprise network. The security groups include first network nodes that are subject to...
US-8,295,149 Recording medium, method and apparatus for reproducing data on the recording medium, and method and apparatus...
A recording medium on which data is recorded in units of clusters, a method and apparatus for reproducing data on the recording medium, and a method and...
US-8,294,881 Security system using LADAR-based sensors
A security sensor system comprises one or more laser detection and ranging (LADAR) sensors configured for accumulation of three-dimensional image data. In one...
US-8,294,574 Security device comprising a plurality of interfaces
A security device comprising interfacing means incorporating a speaker (50) and a microphone (49) for interfacing with a person; a mobile network transmitter;...
US-8,294,549 Apparatus for access control and processing
The present invention relates to methods and systems for providing secure access control to a facility. An access control system comprises a scanner located...
US-8,294,302 System for providing power and data transmission between a door and a frame
A system for providing wire-free and contact free electric power and communication connection in a security installation between a door and a frame. The cores,...
US-8,291,490 Tenant life cycle management for a software as a service platform
Managing user access to application-specific capabilities of a system includes maintaining data correlating application-specific capabilities for each of the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.