Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,601,536 Bus monitor for enhancing SOC system security and realization method thereof
The present invention discloses a bus monitor for enhancing SOC system security and a realization method thereof. The bus monitor disposed between a system bus...
US-8,601,532 Method and system for provisioning portable desktops
A method is disclosed for provisioning of a peripheral portable desktop device. The peripheral portable desktop device is coupled with a workstation. A data...
US-8,601,498 Accelerator system for use with secure data storage
Data processing and an accelerator system therefore are described. An embodiment relates generally to a data processing system. In such an embodiment, a bus and...
US-8,601,309 Computer architectures using shared storage
A method includes providing a persistent common view of data, services, and infrastructure functions accessible via one or more shared storage systems of a...
US-8,601,281 Method for operating a sensor apparatus and sensor apparatus
A sensor apparatus includes a housing with a security device, a secure first computation device, a second computation device and a sensor element. The sensor...
US-8,601,265 Method and system for improving storage security in a cloud computing environment
A method of improving storage security in a cloud environment includes interfacing a secure microcontroller with a storage controller associated with a client...
US-8,601,261 System and method of accessing keys for secure messaging
Methods and systems for handling on an electronic device a secure message to be sent to a recipient. Data is accessed about a security key associate with the...
US-8,601,259 Securing data in a dispersed storage network using security sentinel value
A sentinel value is combined with a data segment, and encrypted. A digest of the encrypted combined data segment is calculated, and used in conjunction with an...
US-8,601,152 In-band security protocol decryptor and scanner
An in-band decryptor and scanner (IBDS) for monitoring data packets or frames of an encrypted communication session. The IBDS may reroute or process the data...
US-8,601,124 Secure publishing of data to DMZ using virtual hard drives
A secure DMZ-resident computer that cannot connect to the internal network while allowing data to be transferred to and from the DMZ-resident computer is...
US-8,601,086 TCP/IP processor and engine using RDMA
A TCP/IP processor and data processing engines for use in the TCP/IP processor is disclosed. The TCP/IP processor can transport data payloads of Internet...
US-8,601,077 Server apparatus, mail server apparatus and fax server apparatus
A memory section of a server apparatus stores a security information table storing a plurality of pieces of destination management information, a trust...
US-8,601,028 Crawling secure data sources
It is desirable to provide a secure search mechanism to provide for searching over any and all content, such as across an enterprise. A secure search, however,...
US-8,600,958 Security policy management device, security policy management system, and storage medium
Policy information stores policy setting information and identification information of a policy in correlation with each other, the policy setting information...
US-8,600,894 Three-stage, double blind credit rating of securities
Disclosed is a computer-implemented system and method for rating an asset, and, in embodiments, a system and method for performing a double-blind, three stage...
US-8,600,885 Account contribution management
An ability to expose and display a current billing amount associated with a billing account in a billing system to one or more third parties, and to link one or...
US-8,600,820 Method and system for labeling and managing the sale of manufactured concrete blocks
In a method for identifying manufactured concrete or masonry blocks and managing the sale thereof to a customer in a retail establishment, the retail...
US-8,600,526 Marking device docking stations having mechanical docking and methods of using same
Docking stations and docking methods are provided for use with marking devices used for marking the presence or absence of an underground facility in a dig...
US-8,600,405 Location-based recovery device and risk management system for portable computing devices and data
A device and software utilizing Global Positioning Satellite (GPS) technologies for monitoring and recovering portable computing devices and, a method and...
US-8,600,355 Systems and methods for authenticating applications for access to secure data using identity modules
A mobile station is configured to authenticate applications running thereon in order to control access by the authenticated applications to secure data stored...
US-8,600,060 Telecommunications device security
A mobile terminal for use with a cellular or mobile telecommunications network includes a normal execution environment (operating system) (30) and a secure...
US-8,600,056 Method and system for controlling the locking/unlocking of the network access functions of a multifunction terminal
A method and system of controlling the locking/unlocking of the network access functions of a terminal including a security processor, like a mobile telephone...
US-8,600,050 Encrypting a data transmission using multiple channels
A method, system, and media are provided for securely communicating data. One embodiment of the method includes encrypting a data stream by way of a first...
US-8,600,014 Enhancing messaging services using translation gateways
In one embodiment, a translation gateway is for use between a network of a messaging service provider and a hostile data network. The gateway is to forward...
US-8,599,916 Reliable and non-manipulatable processing of data streams in a receiver
The invention provides a solution for secure and non-manipulatable processing of a data stream in a receiver, possibly in conjunction with a smartcard. A packet...
US-8,599,697 Overlay network
Methods and apparatus are disclosed for dynamically discovering and utilizing an optimized network path through overlay routing for the transmission of data. A...
US-8,599,641 Semiconductor memory device, method of adjusting the same and information processing system including the same
Each of the core chips includes a data output circuit that outputs read data to the interface chip in response to a read command, and an output timing...
US-8,599,612 Method of operating integrated circuit embedded with non-volatile programmable memory having variable coupling...
A programmable non-volatile device is operated with a floating gate that functions as a FET gate that overlaps a portion of a source/drain region and allows for...
US-8,599,402 Secure cloud based printing
A printing apparatus includes a first memory, a second memory, a first obtaining section, a second obtaining section, and a retrieving section. The first memory...
US-8,599,399 Image forming apparatus, control method thereof and computer-readable storage medium
This invention provides an image forming apparatus capable of reliably printing security information even when image data of an original document that is...
US-8,599,228 Image processing apparatus, display apparatus, and image displaying system
An image processing apparatus, a display apparatus and an image displaying system wherein both secure and public images can be efficiently displayed with high...
US-8,597,116 Virtual player tracking and related services
Various gaming-related services are provided, including but not limited to security services, harm minimization services, player identification services,...
US-8,595,850 System for protecting sensitive data with distributed tokenization
A token generating organization may include distributed tokenization systems for generating tokens corresponding to sensitive information. Sensitive information...
US-8,595,837 Security event management apparatus, systems, and methods
Apparatus, systems, and methods may operate to receive multiple security event data streams from a plurality of hardware processing nodes, the multiple security...
US-8,595,831 Method and system for cyber security management of industrial control systems
A method and system for cyber security management of Supervisory Control And Data Acquisition (SCADA) systems is provided to enhance situational awareness and...
US-8,595,819 System and method for distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server based on...
US-8,595,817 Dynamic authenticated perimeter defense
Techniques for dynamically configuring security mechanisms in a network can construct security perimeters that satisfy security needs at any given time while...
US-8,595,813 IC card for encryption or decryption process and encrypted communication system and encrypted communication...
It is possible to perform encrypted communication between members of a group while assuring a sufficient security compatible with a change of the members. An IC...
US-8,595,812 Tokenized data security
Provided are devices, methods, systems, computer readable storage media for tokenizing data. In some examples, credit card numbers are tokenized using a...
US-8,595,809 Reusable authentication experience tool
A reusable authentication component may be integrated into a web page to communicate with an authentication server and authenticate a user to the web page. The...
US-8,595,808 Methods and systems for increasing the security of network-based transactions
A method for enhancing the security of systems and resources involved in conducting network-based transactions on mobile communications devices includes...
US-8,595,804 System and method for device security with a plurality of authentication modes
A security processing element stores authentication data corresponding to a plurality of possible authentication modes. At a time of activation, the security...
US-8,595,799 Access authorization
Methods, systems, and computer-readable media with executable instructions stored thereon for managing access authorization to hardware and data resources. A...
US-8,595,790 Devices, systems, and methods for providing increased security when multiplexing one or more services at a...
Systems, devices, and methods are disclosed for providing increased security when multiplexing one or more services at customer premises. Such systems and...
US-8,595,717 Memory controller that includes support for autorun of software or data
An integrated circuit microcontroller supporting Autorun of software or data is disclosed. The integrated circuit microcontroller can be included in a memory...
US-8,595,616 Data conversion environment
Converting data from a first format to a second format may be used to merge two databases having different formatting. Conversion maps may be defined for pairs...
US-8,595,514 Secure point of sale terminal
A data entry device including a housing formed of at least two portions, data entry circuitry located within the housing, at least one case-open switch assembly...
US-8,595,512 Data control method of cloud storage
The present application relates to the field of technology of cloud storage data security, and in particular, relates to a data control method of cloud storage....
US-8,595,510 Methods, apparatus and systems to improve security in computer systems
In one implementation a computer system stores a software program that contains some instructions organized in blocks wherein each block contains a first part...
US-8,595,495 System and method for secure communications
A method for secure data communications in fax transmissions and computer network communications comprising a. Allowing the sender to receive confirmation that...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.