Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,683,218 System and method for N-dimensional encryption
A system and method is directed to providing an n-dimensional entity for encoding and storing data securely. A user provides a cursor position within the...
US-8,683,215 Programmable security platform
A dynamically programmable security device. The device includes: a secure nonvolatile read only memory (NVMROM) for securely storing a unique device cipher key;...
US-8,683,214 Method and device that verifies application program modules
The present invention aims to perform tamper detection on a protection control module without having detection modules come to know the key data and functions...
US-8,683,212 Method and system for securely loading code in a security processor
Securely loading code in a security processor may include autonomous fetching an encrypted security data set, which may comprise security code and/or root keys,...
US-8,683,208 Information processing device, program developing device, program verifying method, and program product
According to one embodiment, an information processing device stores a program list and plural types of security functions each defining therein protection...
US-8,683,189 On-chip security method and apparatus
A boot method an apparatus are described which reduce the likelihood of a security breach in a mobile device, preferably in a situation where a reset has been...
US-8,683,059 Method, apparatus, and computer program product for enhancing computer network security
A security management approach that combines network security management with application layer or software service security to address the threat of internal...
US-8,682,986 Communication device having the capability of performing information exchange between a facsimile medium and an...
A communication device allows a user to get access from the outside via an external public line to obtain e-mail data stored in a device connected to an...
US-8,682,934 Metadata generating apparatus, information processing apparatus, imaging apparatus, video conference system,...
A metadata generating apparatus generating metadata associated with content data continuously generated in real time includes an additional information...
US-8,682,912 Providing secure access to data with user defined table functions
Methods, systems and articles of manufacture are disclosed for providing secure access to data. Public UDTFs, private UDTFs and a metadata processor are...
US-8,682,868 Removal of data remanence in deduplicated storage clouds
A method implemented in a computer infrastructure including a combination of hardware and software includes receiving from a local computing device a request to...
US-8,682,845 Secure high performance multi-level security database systems and methods
In accordance with one or more embodiments of the present disclosure, systems and methods described herein provide for transferring data over one or more...
US-8,682,801 Method and arrangement for provision of security relevant services via a security module of a franking machine
In a method and an arrangement for provision of at least one secured service via a security module of a franking machine for at least one procedure for data...
US-8,682,770 Using commercial share of wallet in private equity investments
Commercial size of spending wallet ("CSoSW") is the total business spend of a business including cash but excluding bartered items. Commercial share of wallet...
US-8,682,767 System and method for accessing and displaying data relating to financial securities
A computer system for furnishing data relating to investments has a processor and one or more memory storage devices in communication with the processor. Data...
US-8,682,763 Apparatus and method for component analysis of pooled securities
A system for valuation of pooled financial products contracts comprises receiving or extracting or generating data elements regarding financial products...
US-8,682,750 Method and apparatus for enabling purchase of or information requests for objects in digital content
A client computing system renders digital content (such as, for example, a movie or TV program) for a user. Based on the user's interest, the user may select an...
US-8,682,309 Decision support
Decision support information is exchanged over a secure wireless network among mobile computing devices, and also optionally a central command computer. Each of...
US-8,682,043 Method of merging anatomical data and surface data of a patient's dentition
A method of obtaining and merging volumetric data and surface data of a patient's dentition for use in designing and/or manufacturing a prosthodontic component,...
US-8,682,034 System for automated screening of security cameras
The present invention involves a system for automatically screening closed circuit television (CCTV) cameras for large and small scale security systems, as used...
US-8,681,989 WCDMA 3G voice communication protection method and terminal using the same
A WCDMA 3G voice communication protection method and a terminal using the method are provided. The method is performed by a terminal operating in conjunction...
US-8,681,988 Encoding a connection between a base and a mobile part
A method for encoding a connection between a base (2) and a mobile part (1), and a computer program product is povided. The method comprises generating a key...
US-8,681,977 Enabling/disabling display data channel access to enable/ disable high-bandwidth digital content protection
A switcher device comprises a multiplexer coupled in-between at least one input and output cards. The multiplexer detects the presence of an event signal from...
US-8,681,740 LTE network call correlation during User Equipment mobility
A network monitoring system captures data packet from LTE/SAE network interfaces using passive probes. The monitoring system identifies context data associated...
US-8,681,116 Medical mounting system and method
A bedside controller includes an integrally formed housing and self-contained mounting structure disposed on the housing. The mounting structure includes a...
US-8,677,510 System, method, and device for communicating and storing and delivering data
A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller, executable sensors, and a virtual...
US-8,677,505 Security system with extraction, reconstruction and secure recovery and storage of data
The method for securing data includes establishing a group of security sensitive items, filtering data and extracting and separating the security items from...
US-8,677,498 Apparatus and method of managing security data
An apparatus and method are provided for securely managing security data between a host device and a secure multimedia card. A host device includes an access...
US-8,677,490 Method for inferring maliciousness of email and detecting a virus pattern
Provided is a method of distinguishing an abnormal e-mail and determining whether an e-mail is affected with a virus. The method includes the steps of: decoding...
US-8,677,476 Providing remotely defined security data to a local application extension
Systems and methods, including computer software adapted to perform certain operations, can be implemented for providing remotely defined security data to an...
US-8,677,475 Security in networks
A communication system may be configured to provide multiple levels of security for a communication link between a first node and a second node of a network....
US-8,677,472 Multi-point collection of behavioral data relating to a virtualized browsing session with a secure server
A method of operating a VM server (VMS) is described, including (a) executing a VM instance (VMI) at the VMS, the VMI having a remote display within a terminal...
US-8,677,461 Method to provide chip based security for I/O packets in an array using dynamic topology
An apparatus comprising a controller circuit and an array. The controller circuit may be configured to read/write data in response to one or more input/output...
US-8,677,459 Secure zero-touch provisioning of remote management controller
Embodiments enable secure zero-touch remote provisioning/management of a computer system. A computer system is shipped to end customers with its remote...
US-8,677,148 Systems and methods for securing data
Systems and methods are provided for securing data. A processing device receives a data set and identifies a first subset of data from a first dimension of a...
US-8,677,141 Enhanced security and performance of web applications
A client-side enforcement mechanism may allow application security policies to be specified at a server in a programmatic manner. Servers may specify security...
US-8,677,131 Method of securing data in 2D bar codes using SSL
Methods and apparatus authenticate a printed document associated with a source entity. The printed document includes a two-dimensional code (2-D code) that...
US-8,677,127 Method and apparatus for secure setup of an encrypted connection between two communication devices
An electronic device includes a first connection interface and a second connection interface. The first connection interface is operable to exchange security...
US-8,677,124 Method and device for securing data transfers
The method of securing data transfer comprises: a step of attempting to transmit a document from a document sender to at least one document recipient, by...
US-8,677,123 Method for accelerating security and management operations on data segments
A method for improving the performance of data storage and transmission systems involves applying a transformation to one or a plurality of aligned data...
US-8,677,122 Method for processing a secure system manager
Method and apparatus for secure processing. The method includes detecting communication among secure and non-secure data entities, prohibiting execution of...
US-8,677,119 Remote data viewer
A medical image and data application service provider system provides a way of remotely viewing and manipulating medical images and data for diagnostic and...
US-8,677,092 Secure memory devices and methods of managing secure memory devices
A computing device and method for managing security of a memory or storage device without the need for administer privileges. To access the secure memory, a...
US-8,677,001 Streaming transmission method system, data processing apparatus and computer readable storage medium for making...
A data processing apparatus edits an actual data portion excluding a header from data transmitted by streaming transmission from a first information processing...
US-8,676,992 Systems and methods for cooperative data exchange
Various systems and methods for financial analysis are provided. A system is provided comprising a first node comprising a public facing data store in...
US-8,676,988 Systems and methods for secure data exchange in a distributed collaborative application
A collaborative communication system that includes a plurality of endpoints and interconnecting nodes configured to communicate via messages over...
US-8,676,916 Method and apparatus for connection to virtual private networks for secure transactions
A system and method are provided for use in establishing secure end-to-end communication links over a VPN gateway via a network interface unit. Illustrative...
US-8,676,884 Security configuration
An example embodiment of the present invention provides an apparatus including at least one processor; and at least one memory including executable...
US-8,676,694 Secure and efficient payment processing system
A method of processing commercial transactions carried out over the Internet (50) between account holders (30) and participating merchants (20) includes...
US-8,676,689 Financial status measurement and management tool
A system, method and software tool to measure and manage financial status. The tool produces a spreadsheet that summarizes the position of an individual or...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.