Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,600,958 Security policy management device, security policy management system, and storage medium
Policy information stores policy setting information and identification information of a policy in correlation with each other, the policy setting information...
US-8,600,894 Three-stage, double blind credit rating of securities
Disclosed is a computer-implemented system and method for rating an asset, and, in embodiments, a system and method for performing a double-blind, three stage...
US-8,600,885 Account contribution management
An ability to expose and display a current billing amount associated with a billing account in a billing system to one or more third parties, and to link one or...
US-8,600,820 Method and system for labeling and managing the sale of manufactured concrete blocks
In a method for identifying manufactured concrete or masonry blocks and managing the sale thereof to a customer in a retail establishment, the retail...
US-8,600,526 Marking device docking stations having mechanical docking and methods of using same
Docking stations and docking methods are provided for use with marking devices used for marking the presence or absence of an underground facility in a dig...
US-8,600,405 Location-based recovery device and risk management system for portable computing devices and data
A device and software utilizing Global Positioning Satellite (GPS) technologies for monitoring and recovering portable computing devices and, a method and...
US-8,600,355 Systems and methods for authenticating applications for access to secure data using identity modules
A mobile station is configured to authenticate applications running thereon in order to control access by the authenticated applications to secure data stored...
US-8,600,060 Telecommunications device security
A mobile terminal for use with a cellular or mobile telecommunications network includes a normal execution environment (operating system) (30) and a secure...
US-8,600,056 Method and system for controlling the locking/unlocking of the network access functions of a multifunction terminal
A method and system of controlling the locking/unlocking of the network access functions of a terminal including a security processor, like a mobile telephone...
US-8,600,050 Encrypting a data transmission using multiple channels
A method, system, and media are provided for securely communicating data. One embodiment of the method includes encrypting a data stream by way of a first...
US-8,600,014 Enhancing messaging services using translation gateways
In one embodiment, a translation gateway is for use between a network of a messaging service provider and a hostile data network. The gateway is to forward...
US-8,599,916 Reliable and non-manipulatable processing of data streams in a receiver
The invention provides a solution for secure and non-manipulatable processing of a data stream in a receiver, possibly in conjunction with a smartcard. A packet...
US-8,599,697 Overlay network
Methods and apparatus are disclosed for dynamically discovering and utilizing an optimized network path through overlay routing for the transmission of data. A...
US-8,599,641 Semiconductor memory device, method of adjusting the same and information processing system including the same
Each of the core chips includes a data output circuit that outputs read data to the interface chip in response to a read command, and an output timing...
US-8,599,612 Method of operating integrated circuit embedded with non-volatile programmable memory having variable coupling...
A programmable non-volatile device is operated with a floating gate that functions as a FET gate that overlaps a portion of a source/drain region and allows for...
US-8,599,402 Secure cloud based printing
A printing apparatus includes a first memory, a second memory, a first obtaining section, a second obtaining section, and a retrieving section. The first memory...
US-8,599,399 Image forming apparatus, control method thereof and computer-readable storage medium
This invention provides an image forming apparatus capable of reliably printing security information even when image data of an original document that is...
US-8,599,228 Image processing apparatus, display apparatus, and image displaying system
An image processing apparatus, a display apparatus and an image displaying system wherein both secure and public images can be efficiently displayed with high...
US-8,597,116 Virtual player tracking and related services
Various gaming-related services are provided, including but not limited to security services, harm minimization services, player identification services,...
US-8,595,850 System for protecting sensitive data with distributed tokenization
A token generating organization may include distributed tokenization systems for generating tokens corresponding to sensitive information. Sensitive information...
US-8,595,837 Security event management apparatus, systems, and methods
Apparatus, systems, and methods may operate to receive multiple security event data streams from a plurality of hardware processing nodes, the multiple security...
US-8,595,831 Method and system for cyber security management of industrial control systems
A method and system for cyber security management of Supervisory Control And Data Acquisition (SCADA) systems is provided to enhance situational awareness and...
US-8,595,819 System and method for distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server based on...
US-8,595,817 Dynamic authenticated perimeter defense
Techniques for dynamically configuring security mechanisms in a network can construct security perimeters that satisfy security needs at any given time while...
US-8,595,813 IC card for encryption or decryption process and encrypted communication system and encrypted communication...
It is possible to perform encrypted communication between members of a group while assuring a sufficient security compatible with a change of the members. An IC...
US-8,595,812 Tokenized data security
Provided are devices, methods, systems, computer readable storage media for tokenizing data. In some examples, credit card numbers are tokenized using a...
US-8,595,809 Reusable authentication experience tool
A reusable authentication component may be integrated into a web page to communicate with an authentication server and authenticate a user to the web page. The...
US-8,595,808 Methods and systems for increasing the security of network-based transactions
A method for enhancing the security of systems and resources involved in conducting network-based transactions on mobile communications devices includes...
US-8,595,804 System and method for device security with a plurality of authentication modes
A security processing element stores authentication data corresponding to a plurality of possible authentication modes. At a time of activation, the security...
US-8,595,799 Access authorization
Methods, systems, and computer-readable media with executable instructions stored thereon for managing access authorization to hardware and data resources. A...
US-8,595,790 Devices, systems, and methods for providing increased security when multiplexing one or more services at a...
Systems, devices, and methods are disclosed for providing increased security when multiplexing one or more services at customer premises. Such systems and...
US-8,595,717 Memory controller that includes support for autorun of software or data
An integrated circuit microcontroller supporting Autorun of software or data is disclosed. The integrated circuit microcontroller can be included in a memory...
US-8,595,616 Data conversion environment
Converting data from a first format to a second format may be used to merge two databases having different formatting. Conversion maps may be defined for pairs...
US-8,595,514 Secure point of sale terminal
A data entry device including a housing formed of at least two portions, data entry circuitry located within the housing, at least one case-open switch assembly...
US-8,595,512 Data control method of cloud storage
The present application relates to the field of technology of cloud storage data security, and in particular, relates to a data control method of cloud storage....
US-8,595,510 Methods, apparatus and systems to improve security in computer systems
In one implementation a computer system stores a software program that contains some instructions organized in blocks wherein each block contains a first part...
US-8,595,495 System and method for secure communications
A method for secure data communications in fax transmissions and computer network communications comprising a. Allowing the sender to receive confirmation that...
US-8,595,491 Combining a mobile device and computer to create a secure personalized environment
A mobile device, such as a mobile phone, smart phone, personal music player, handheld game device, and the like, when operatively combined with a PC, creates a...
US-8,595,490 System and method for secure transaction
Systems and methods for performing a secure transaction provided. In one embodiment, the method includes: reading data on a command token, reading data on a...
US-8,595,488 Apparatus, system and method for securing digital documents in a digital appliance
Various embodiments include an apparatus and a method to secure protected digital document content from tampering by their user, such as unauthenticated use or...
US-8,595,451 Managing a storage cache utilizing externally assigned cache priority tags
A method for caching data in a storage medium implementing tiered data structures may include storing a first portion of critical data at the instruction of a...
US-8,595,409 Apparatus and method for reorganization of mapping information in flash memory
An apparatus and method for reorganizing mapping information in a flash memory are provided. The apparatus includes a sector-managing module that secures a...
US-8,595,387 SMM-dependent GPIO lock for enhanced computer security
Computer security is enhanced by creating an environment in which changing the state of a general-purpose input/output (GPIO) output or changing the...
US-8,595,355 System and method for optimizing and processing electronic pages in multiple languages
A web page processing system that processes users requests using predefined, flexible templates and corresponding logic. Main processing handles...
US-8,595,131 Method for paying for a service offered by means of a data network
A method is proposed for acquiring a service sold over a data network (20) against presentation of a transaction medium (2). The service is ordered by a user...
US-8,595,110 Integrated investment management system with network datafeed and incremental database refresh
An investment management computer system is configured to communicate with data vendors or electronic accounting systems. The system may include an electronic...
US-8,594,979 Handheld and imbedded devices to detect sticky devices using magnets
Apparatus and methods for detecting concealed personal security threats may comprise conventional mirrors and less conventional arrays of Hall-effect sensors,...
US-8,594,886 Car-mounted information apparatus and information transfer system for electric car
To securely prevent from battery depletion and enable transfer data without troubling a user, a communication address data storage unit stores a communication...
US-8,594,730 Secure smart card system
A smart card usable in magnetic stripe swipe transactions with a transaction terminal configured to read transaction information encoded on a magnetic stripe of...
US-8,594,563 Security for wireless communication
A mobile terminal is disclosed which includes a near field or RFID tag (41). The mobile terminal (1) communicates with the mobile telecommunications network and...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.