Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,665,064 Wireless security control system
A security control system includes a remote access control system to receive wireless information from a central access control system. The remote access...
US-8,661,554 Controlling program, image forming apparatus and print controlling method
There is described an image forming apparatus, which makes it possible to securely prevent the secret information from leaking out to unauthorized personnel....
US-8,661,540 Method and apparatus for secure credential entry without physical entry
A method and apparatus are disclosed wherein a portable memory storage device is provided for interfacing with a communications port of the computer system....
US-8,661,536 Side channel attack analysis
A method described herein includes acts of executing a cryptographic function over input data utilizing a processor on a computing device and generating a data...
US-8,661,535 Method for making secure the execution of an intermediate language software code in a portable device
A method for executing an application compiled in intermediate code on a portable digital appliance equipped with a virtual executing machine for interpreting...
US-8,661,531 System and method for secure control of resources of wireless mobile communication devices
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
US-8,661,520 Systems and methods for identification and authentication of a user
The present invention generally relates to a computer security system for use in the identification and authentication of a user prior to an on-line...
US-8,661,507 Managed peer-to-peer applications, systems and methods for distributed data access and storage
Applications, systems and methods for securely and remotely operating a remote computer from a local computer over a network while providing seamless,...
US-8,661,504 Secure social web orchestration via a security model
A method includes receiving, by a first computer, input from a first user. The method further includes creating, by the first computer, a hierarchical class...
US-8,661,498 Secure and scalable detection of preselected data embedded in electronically transmitted messages
A method and apparatus for detecting preselected data embedded in electronically transmitted messages is described. In one embodiment, the method comprises...
US-8,661,265 Processor modifications to increase computer system security
A method, an x86 processor and a computer system for processing more securely. More specifically, embodiments provide an effective and efficient mechanism for...
US-8,661,263 Meta-complete data storage
The invention described herein generally relates to systems and methods of securely storing data so that the data contains information about the data and/or the...
US-8,661,259 Deduplicated and encrypted backups
A system and method for efficiently creating deduplicated and encrypted data across a plurality of computers allows local encryption and remote storage of...
US-8,661,251 Method and device for creating a group signature and related method and device for verifying a group signature
A method for creating a group signature of a message to be implemented by a member of a group in a system, the system including a trust authority, the group...
US-8,661,249 Health keyset management
Systems and methodologies that facilitate delegation of keyset management to a platform presenting a centralized health-related data repository are provided....
US-8,661,248 Method, apparatus, and system for sending and receiving security policy of multicast sessions
A method, apparatus, and system for sending and receiving a security policy of multicast sessions are provided. The method for sending the security policy of...
US-8,661,195 Reallocation of tape drive resources associated with a secure data erase process
A method according to one embodiment includes determining whether to reallocate one or more of a plurality of tape drives that are presently allocated for a...
US-8,661,148 System and method for enabling industry based channels in an IP marketplace
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
US-8,661,062 Managing analysis of activity data
A method is used in managing analysis of activity data. Activity data is analyzed for a security investigation by using a content bundle. The content bundle...
US-8,660,269 Method and system for securing data utilizing redundant secure key storage
A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations,...
US-8,660,266 Method of delivering direct proof private keys to devices using an on-line service
Delivering a Direct Proof private key to a device installed in a client computer system in the field may be accomplished in a secure manner without requiring...
US-8,660,078 Data radio bearer (DRB) enhancements for small data transmissions apparatus, systems, and methods
A method of transmitting data packets with a wireless communication device includes requesting a preconfigured data radio bearer (DRB) from a base station...
US-8,659,890 eUSB duplication system
An eUSB duplication system allows for digital data copy from a master eUSB storage device to target eUSB storage devices and includes a duplicator chassis with...
US-8,659,650 Portable apparatus for biometric and biographic data collection, storage and delivery, and method therefor
The present disclosure relates to a method and apparatus for biometric and biographic data capture. The apparatus includes a main unit, a display monitor having...
US-8,659,433 Locking mechanism based on unnatural movement of head-mounted display
A wearable computer determines unnatural movements of a head-mounted display (HMD) and triggers a locking mechanism. In one embodiment, the wearable computer...
US-8,659,389 Secure inventory control systems and methods for high-value goods
Embodiments of the present invention include methods and systems for tracking and monitoring high-value goods by scanning RFID tags associated with the goods. A...
US-8,657,196 Systems and methods of capturing security images in an automated data reader
The present disclosure is directed to systems and methods for detecting and handling exception situations in an automated data reading system. In one...
US-8,656,488 Method and apparatus for securing a computer network by multi-layer protocol scanning
In one embodiment, a network security appliance includes a logic circuit, a network processing unit, and a general purpose processor to protect a computer...
US-8,656,484 System and method for mutually authenticated cryptographic key exchange using matrices
Two parties can establish a cryptographic key using a matrix based key exchange protocol, for secure communications without any prior distribution of secret...
US-8,656,482 Secure communication using a trusted virtual machine
A client system, such as a computer or a smartphone, securely exchanges sensitive information with a remote service provider computer system such as a bank or...
US-8,656,478 String based detection of proxy communications
Systems, methods and apparatus for a distributed security system that detects proxied resource requests. The system can search data communications, such as HTTP...
US-8,656,450 Security policy switching device, security policy management system, and storage medium
A security policy switching device includes a policy information storage that stores policy setting information and identification information of a policy in...
US-8,656,446 System and method for internet access to a personal television service
A communication system and a family of methods for remote access to personal television service are disclosed. According to this invention, a remote personal TV...
US-8,656,191 Secure system-on-chip
A secure system-on-chip for processing data, the system-on-chip comprising at least a central processing unit (CPU), an input and an output channel, an...
US-8,656,189 Systems and methods for secure multi-tenant data storage
Systems and methods are provided for transmitting data for secure storage. For each of two or more data sets, a plurality of shares are generated containing a...
US-8,656,187 Dispersed storage secure data decoding
A method operating on a computer begins by generating a read command to read at least some of a plurality of data slices from a dispersed storage network. The...
US-8,656,167 Systems and methods for secure workgroup management and communication
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser may split...
US-8,656,162 Aeronautical security management over broadband air/ground network
A method to facilitate securing of air-to-ground communications for an aircraft is provided. The method includes receiving security management information at...
US-8,656,152 Image forming apparatus, host apparatus and encryption method of job object document thereof
An image forming apparatus, a host apparatus, and an encryption method for print data, the method of encrypting the print data of the host apparatus connected...
US-8,656,095 Digital forensic acquisition kit and methods of use thereof
Disclosed are compositions, methods, and kits, for issuing and conducting automated imaging and preservation for obtaining digital forensic data from active...
US-8,656,035 System and method for enabling user requested channels in an IP marketplace
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
US-8,655,990 Access device routing device and method thereof supporting stateless address configuration communication network
The present invention relates to an IPv6-based access device, edge router and method for stainless address configuration for IPv6 user equipment in an Ethernet...
US-8,655,939 Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure...
A method and system processes data in a distributed computing system to survive an electromagnetic pulse (EMP) attack. The computing system has proximal select...
US-8,655,917 Custom web services data link layer
A data interface efficiently transports, manages, and provides data transfer. The data transfer may happen between a data storage layer and a presentation...
US-8,655,914 System and method for storage operation access security
A method and system for controlling access to stored data is provided. The storage access control system leverages a preexisting security infrastructure of a...
US-8,655,785 Computer data product license installation / update confirmation
An authenticated digital confirmation of an installation or an update of a licensed computer data product, for providing the licensor with a validation that the...
US-8,655,767 Embedded hardware based system which provides real-time pre-trade risk assessments for multiple parties and...
A risk assessment system and method are provided that may be implemented as an embedded hardware based system and method that provide real-time pre-trade risk...
US-8,655,378 Method and apparatus for tracking a transported item while accommodating communication gaps
A method and apparatus is provided for minimizing potential security problems and battery power usage in a tracking device used in tracking an associated...
US-8,655,155 Recording apparatus, recording method, and recording program, and image capturing apparatus, image capturing...
Management information for video data and audio data that are created after their recording is started until it is stopped and that are recorded as a stream...
US-8,654,976 Apparatus and method for a random wave envelope for generating a sequence of encryption keys for communication...
A random wave envelope is created from a set of bounded random numbers by additively combining a triangle, a square and a sine wave. The random wave envelope is...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.