Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,712,031 Visual physician office systems and methods
Methods and systems are disclosed for enabling a virtual physician office (VPO) that uses a network-based physician practice application and leverages the...
US-8,711,890 Method and system for modularized configurable connector system for ethernet applications
A first modular Ethernet connector and a coupled corresponding second modular Ethernet connector may communicate data based on Ethernet standards. The Ethernet...
US-8,711,818 High performance data transport system and method
System and method for providing data transport Quality of Service (QoS) assurances in homogeneous and heterogeneous communication networks consisting of one or...
US-8,711,626 Flash memory apparatus and method for generating read voltage thereof
A flash memory apparatus includes: a cell array including a plurality of main blocks, a code addressable memory (CAM) block, and a security block; a control...
US-8,711,606 Data security for dynamic random access memory using body bias to clear data at power-up
A circuit and method erase at power-up all data stored in a DRAM chip for increased data security. All the DRAM memory cells are erased by turning on the...
US-8,711,474 Modular microscope construction
A system, apparatus and method for using modular microscopes is disclosed. Connecting the housings of the individual microscope modules provide the structural...
US-8,711,393 Printing device, printing system, program, and printing method for printing based on print data from a user...
There are provided a printing device, a printing system, a program, and a printing method capable of improving security and user-friendliness. The printing...
US-8,710,987 Secure data entry device
A secure data entry device including a housing, tamper sensitive circuitry located within the housing and tampering alarm indication circuitry arranged to...
US-8,710,851 Method of measuring specific absorption rate of electromagnetic waves
Disclosed is an SAR measurement method that is capable of securing sufficient power within a short period of time and always maintaining the intensity of...
US-8,708,582 Camera enclosure assembly
An enclosure assembly for a camera is designed to be mounted on the frame of an optical inspection apparatus for scanning the profile of a surface of an article...
US-8,707,457 Methods and systems for forcing an application to store data in a secure storage location
The present application is directed to methods and systems for redirecting write requests issued by trusted applications to a secure storage. Upon redirecting...
US-8,707,452 Secure data management device
Methods, devices, and systems for managing sensitive data are provided. The management tool may be provided on a user input device, as opposed to being provided...
US-8,707,448 Secure distribution of media data
A technique for distributing media data in a secured fashion that mitigates unwanted or illegal copying/distribution of such data. An initial, degraded version...
US-8,707,406 Always-on virtual private network access
An application processor is electrically and logically decoupled from a wireless data network module so that it may go to sleep independently. A security...
US-8,707,392 Systems and methods for disease management
A computer-implemented diabetes management system is provided that supports enhanced security between a diabetes care manager in data communication with a...
US-8,707,387 Secure network computing
A host based security system for a computer network includes in communication with the network a credential host that is operative in concert with a local...
US-8,707,383 Computer workload management with security policy enforcement
A computer implemented method, data processing system, and computer program product for managing computer workloads with security policy enforcement. When a...
US-8,707,090 Storage system
In a storage system which supports a redundant disk configuration, while securing fault tolerance, a longer drive access time as well as a drop in I/O...
US-8,707,056 Security provision for a subject image displayed in a non-secure domain
A data processing device is provided with a processor core 8 that can operate in either a secure domain or a non-secure domain. Data stored within a secure...
US-8,707,054 Establishing a secure memory path in a unitary memory architecture
A functional unit of a device is associated with a secret. Data stored in a memory location of the device is encrypted using the secret. The memory location of...
US-8,707,052 Cryptographic device with resistance to differential power analysis and other external monitoring attacks
Techniques usable by devices to encrypt and decrypt sensitive data to in a manner that provides security from external monitoring attacks. The encrypting device...
US-8,707,051 Method and system for embedded high performance reconfigurable firmware cipher
A firmware cipher component is provided which can be configured and programmed to efficiently implement a broad range of cryptographic ciphers while...
US-8,707,040 Establishing secure communication between an implantable medical device and an external device
Establishing secure communication between an implantable medical device and an external device includes: accessing, at the implantable medical device,...
US-8,707,023 Secure transfer of business data to a hosted system
A system and method for uploading data from a customer system to a hosted system is disclosed. A stub is integrated with a firewall between the customer system...
US-8,706,893 Multimedia communication control unit as a secure device for multimedia communication between LAN users and...
A system and method for providing multimedia communication between a firewall protected, LAN based endpoint and an endpoint that is external to the LAN. A...
US-8,706,817 Sender managed message privacy
Embodiments of the present invention address deficiencies of the art in respect to securing the privacy of messages and provide a method, system and computer...
US-8,706,800 Client device systems and methods for providing secure access to application services and associated client...
An extensible servicing hosting platform is provided that supports the design, build and concurrent deployment of multiple web accessible services on a services...
US-8,706,630 System and method for securely authorizing and distributing stored-value card data
A computerized system and method for securely authorizing and distributing stored-value card data over a communications network is provided. The method allows...
US-8,706,610 Systems and methods for electronically initiating and executing securities lending transactions
Systems and methods are provided for conducting securities lending transactions using an electronic trading platform. In accordance with an implementation, the...
US-8,706,608 Dynamic aggressive/passive pegged trading
A computer-implemented system and method for executing trades of financial securities according to a combination passive/aggressive trading strategy that...
US-8,706,593 System for access to and exchange of market data
A system and method for real-time access to information and for information exchange regarding securities markets. The system allows access to securities data...
US-8,706,251 Secure long-range telemetry for implantable medical device
A method and system for enabling secure communications between an implantable medical device (IMD) and an external device (ED) over a telemetry channel. A...
US-8,705,873 Secure item identification and authentication system and method based on unclonable features
The present invention is a method and apparatus for protection of various items against counterfeiting using physical unclonable features of item microstructure...
US-8,705,823 Software product for breast examination result mapping, recording, comparing, and/or tracking
A breast examination system is disclosed that facilitates normalized quantitative comparison of results from multiple examinations performed under differing...
US-8,705,805 Secure portable token and systems and methods for identification and authentication of the same
A portable token and systems and methods for identification and authentication of the same are disclosed. The portable token may be utilized for a variety of...
US-8,705,791 Method and system for utilizing GPS information to secure digital media
A device such as a set-top-box, digital TV, DVD player, multi-media player, cellular telephone or digital cinema player that may handle data such as multimedia...
US-8,705,746 Data security in an off-premise environment
A system that enables a cloud-based data repository to function as a secure `drop-box` for data that corresponds to a user is provided. The `drop box` can be...
US-8,705,743 Communication security
The current IMS security architecture only protects data transmitted in the IMS control plane. Embodiments are described which provide end-to-end encryption of...
US-8,705,741 Subchannel security at the optical layer
The present invention includes various novel techniques, apparatus, and systems for optical WDM communications that involve dynamically modifying certain...
US-8,705,738 Selective security termination in next generation mobile networks
Systems and/or methods of selectively terminating security in mobile networks are presented. User equipment (UE) can specify cipher termination location...
US-8,705,735 Implicit certificate scheme
A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. The trusted...
US-8,705,733 Unique identifier per chip for digital audio/video data encryption/decryption in personal video recorders
The invention provides techniques to implement unique identifier for an integrated chip and how this ID can be employed to enhance the security of content in...
US-8,705,732 Generating a session key for authentication and secure data transfer
A device for generating a session key which is known to a first communication partner and a second communication partner, for the first communication partner,...
US-8,705,348 Use of metadata for time based anti-replay
A system and method for facilitating anti-replay protection with multi-sender traffic is disclosed. The system employs time-based anti-replay protection wherein...
US-8,705,200 Magazine latch for a storage library
Embodiments include systems and methods for securing a magazine in a housing using a latching system. Embodiments operate in context of a storage library having...
US-8,705,075 Image processing device having erase control
An image processing device comprises an image data input means 2, an image data storage means 12 for storing the image data being input, an image data...
US-8,705,064 Broadcast secure printing system
A secure printing method includes providing a user terminal with a user interface. The user terminal and interface enable a user to select a secure printing...
US-8,704,873 Receiving stream data which may be used to implement both two-dimensional display and three-dimensional display
There is provided a stream receiving device including an information receiving unit for receiving stream control information for a 3D stream to be distributed...
US-8,704,821 System and method for managing virtual world environments based upon existing physical environments
In general, the present invention provides a system and method for creating, managing and utilizing virtual worlds for enhanced management of an Information...
US-8,702,812 Remote disablement of a computer system
Methods and arrangements for ensuring that, when a computer system is stolen or otherwise misplaced, the system is rendered unusable (i.e., locked down)....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.