Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,724,807 Method for etching and secure distribution of digital data, access device and writer
The invention relates to a method of receiving and securely recording digital data comprising a step for recording said digital data on a secured disk by a...
US-8,724,778 Systems and methods for secure recording in a customer center environment
Systems and methods for secure recording in a customer center environment are provided. The system receives data related to a communication at a media...
US-8,724,639 Smart home hub
The present invention provides a method and device for an integrated smart hub. The method and device for an integrated smart hub provides for a simultaneously...
US-8,724,312 Mobile computer stand with integrated keyboard
A device for use with a portable computer includes a base, a stand having an upper portion and an adjustable linkage, and a connection mechanism. The base is...
US-8,724,137 Information processing apparatus and memory management technique for secure print data
State information about whether a printing apparatus can store print data for confidential printing is acquired. When the print data can be stored, secure...
US-8,723,952 Tamper-resistant video surveillance network
A network of surveillance digital video cameras is provided. Each camera records video data and provides the video recordings to other networked cameras as well...
US-8,723,831 Graphical authentication for a portable device and methods for use therewith
A portable device includes a touch screen that includes a display screen and that generates touch screen data in response to a user's interaction with the touch...
US-8,723,701 Methods for encoding and decoding data
The transmission of broadcast data, such as financial data and news feeds, is accelerated over a communication channel using data compression and decompression...
US-8,723,692 Secure terminal data loader apparatus and method for a mobile platform
A terminal data loading device on a mobile platform includes a media unit for receiving a transportable media element containing media data and outputting a...
US-8,723,675 Smartcard connector
A smartcard connector for connecting a smartcard within a card holder to an electronic device. The smartcard connector includes a card holder having a card...
US-8,723,671 Alarm monitoring telecommunications line condition detection and automatic calibration
A method at an alarm monitoring station and security system arrangement for detecting alarm signals originating at security systems on incoming calls carried by...
US-8,723,574 Semiconductor integrated circuit
According to one embodiment, a semiconductor integrated circuit is provided, which has mounted thereto a flip-flop circuit including a latch portion that takes...
US-8,721,738 System and method for ensuring security of data stored on data storage devices
Systems and methods for limiting access to data in a portable data storage device. An exemplary method may use an electronic computing device to prevent access...
US-8,721,346 Signal transmission module
A signal transmission module is provided. The signal transmission module includes an electrical connector, a linked unit, a data connector, a sliding block, a...
US-8,720,786 Card security activation label and method
Card security apparatus and methods are provided. An obstruction layer (e.g., a hot-stamped scratch off foil label) may be provided in at least partially...
US-8,719,954 Method and system for secure distribution of selected content to be protected on an appliance-specific basis...
The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related...
US-8,719,947 Protection of audio or video data in a playback device
Method and apparatus to prevent hacking of encrypted audio or video content during playback. Hackers, using a debugging attachment or other tools, can illicitly...
US-8,719,925 Content-addressable memory based enforcement of configurable policies
A monitoring device for monitoring transactions on a bus includes content-addressable memory ("CAM") and a response policy unit. The CAM includes an input...
US-8,719,923 Method and system for managing security operations of a storage server using an authenticated storage module
The present invention provides a technique, in a network storage system, for a key management module (KMM) managing security operations within the storage...
US-8,719,918 Method and device for distributed security control in communication network system
With migration of network technology and more and more requirements of user equipment for accessing to Internet, the network security faces more and more severe...
US-8,719,914 Virtual computing infrastructure
A system has a virtual overlay infrastructure mapped onto physical resources for processing, storage and network communications, the virtual infrastructure...
US-8,719,901 Secure consultation system
A secure consultation system is disclosed that enables an owner entity to securely store its most secure and private data such that designated entities of the...
US-8,719,898 Configuring and providing profiles that manage execution of mobile applications
Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user...
US-8,719,897 Access control method for tri-element peer authentication credible network connection structure
An access control method for a TePA-based TNC architecture is provided, including: 1) performing encapsulation of user authentication protocol data and platform...
US-8,719,595 Semiconductor device including encryption section, semiconductor device including external interface, and...
A secure LSI device 1 includes an encryption section 2 for encrypting a program, and an external I/F 50 for inputting/outputting a program or data from/to an...
US-8,719,594 Storage availability using cryptographic splitting
Methods and systems for maintaining data connectivity in a secure data storage network are disclosed. In one aspect, a method includes assigning a volume to a...
US-8,719,593 Secure processing device with keystream cache and related methods
A secure processing device may include an external memory storing encrypted data, and a processor cooperating with the external memory. The processor is...
US-8,719,591 Secure data entry
In some embodiments, techniques for secure data entry comprise presenting a data field in a spoof-resistant manner, receiving field data, and securing field data.
US-8,719,584 Mobile, wireless hand-held biometric capture, processing and communication system and method for biometric...
A mobile, wireless biometric identification system includes a biometric capture device, associated software and processes which enable a commercially available...
US-8,719,575 Method of secure broadcasting of digital data to an authorized third party
The invention relates to a method of secure broadcasting of encrypted digital data of a proprietary entity, these data being stored in a storage module (6) of a...
US-8,719,568 Secure delivery of sensitive information from a non-communicative actor
An electronic storage in a network accessible server securely stores sensitive user data. Technologies disclosed enable secure user access to the sensitive data...
US-8,719,445 System and method for load balancing multiple file transfer protocol (FTP) servers to service FTP connections...
System and method for load balancing multiple file transfer protocol (FTP) servers to service secure FTP sessions having encrypted signals are disclosed. In one...
US-8,719,436 Tunneling non-HTTP traffic through a reverse proxy
A method, system and apparatus for tunneling non-hypertext transfer protocol (HTTP) data streams through a reverse proxy. The method can include soliciting a...
US-8,719,414 Multi-source broadband aggregation router
A router has one or more wired connections to a remote computer network and one or more wireless connections to the remote computer network for managing a...
US-8,719,397 Method and system for email and PIM synchronization and updating
A system for sending data from at least one computing device, which may be an email server, located at a user location, to a plurality of handsets. The system...
US-8,719,335 Framework for development of integration adapters that surface non-static, type-safe service contracts to LOB...
The claimed subject matter provides a system and/or a method that facilitates integrating two or more applications for secure sharing of data. A line of...
US-8,719,157 System and method for investing public deposits
A method, system and program product for operating an exchange method for municipal and/or state funds from banking institutions, comprising: accessing, one or...
US-8,718,820 Method and system for planning/guiding alterations to a bone
A computer-assisted surgery system for guiding alterations to a bone, comprises a trackable member secured to the bone. The trackable member has a first...
US-8,718,282 Apparatus and method for enabling a transfer of data
Secure data transfer apparatus comprising a first device to be mounted in a housing in a predetermined normal configuration for normal operation wherein secure...
US-8,718,281 Rekey scheme on high speed links
In one embodiment, apparatus and methods for a rekey process are disclosed. In certain rekey embodiments, when a key-generation protocol exchange is executed,...
US-8,718,236 Systems and methods for secure on-line repositories
A permanent, secure, on-line electronic repository (i.e., electronic safety deposit box or virtual safety deposit box) where a member/customer can store...
US-8,718,078 Multi-homed communication apparatus, and control method and storage medium therefor
A communication apparatus able to maintain and improve the security at the time of retransmission of stored data to a network even in a network environment...
US-8,717,932 Method and system for determining and securing proximity information over a network
Aspects of a method and system for determining and securing proximity information over a network are provided. In this regard, data transmitted over a network...
US-8,717,593 Maintaining security of scanned documents
A method for maintaining security of scanned documents which monitors read operations and output operations of documents containing proprietary or confidential...
US-8,717,204 Methods for encoding and decoding data
The transmission of broadcast data, such as financial data and news feeds, is accelerated over a communication channel using data compression and decompression...
US-8,717,164 Integrated security system for warning of dangerous substances that are dispersed by winds
An integrated security system for oil-field and gas-field sites is disclosed. The system utilizes state-of-the-art technologies including "logical QR emblems"...
US-8,717,163 System and method for monitoring a closed container
A system for providing communications for container security is provided. The system includes a sensing system for monitoring the contents of the container; a...
US-8,715,080 Game system, game controller
A first game controller that can be used by both a first game apparatus and a second game apparatus transmits its operation data by using a data format having a...
US-8,714,494 Railway train critical systems having control system redundancy and asymmetric communications capability
A railway vital or critical application system substitutes commercial off-the-shelf (COTS) hardware and/or software for railway-domain specific product...
US-8,714,449 Method and device for arming and disarming status in a facility monitoring system
Security systems and methods are implemented using a variety of devices and methods. According to one such implementation, a controller arms or disarms a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.