Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,570,375 Method and apparatus for random-access review of point of sale transactional video
The present disclosure includes a system in which a video displayer, having access to video surveillance data and point-of-sale transaction data, provides...
US-8,568,864 Data carrier with see-through window and method for producing it
A data carrier is provided having a see-through portion (24) that allows revealing security features (36) with a different appearance on each of its sides (S1,...
US-8,568,224 Wireless wagering system
A casino game is implemented on the basis of a wireless mobile player unit adapted to play poker, slots, bingo and other casino games. The unit obtains random...
US-8,567,757 Wireless fluid shut-off valve
A low-cost safety valve for gas lines and similar supply lines that can be remotely activated via a secure wireless link employing a low leakage sealing...
US-8,566,951 Apparatus and methods for setting security to storage unit and computer
Methods and apparatus are provided for inhibiting data writing to an optical disc drive connected to a computer. A BIOS confirms presence of a security function...
US-8,566,950 Method and apparatus for detecting potentially misleading visual representation objects to secure a computer
A method and apparatus for detecting potentially misleading visual representation objects to secure a computer is described. In one embodiment, the method...
US-8,566,935 Balancing malware rootkit detection with power consumption on mobile devices
The subject disclosure presents a novel technique for balancing the tradeoff between security monitoring and energy consumption on mobile devices....
US-8,566,934 Apparatus and method for enhancing security of data on a host computing device and a peripheral device
A method is provided of enhancing security of at least one of a host computing device and a peripheral device. In the method, the host computing device is...
US-8,566,932 Enforcing good network hygiene using reputation-based automatic remediation
Reputation-based automatic remediation is applied for enforcing good network hygiene of a client. A scanning module scans the client to detect files on the...
US-8,566,929 Integrity check failure detection and recovery in radio communications system
In a packet-based communication between a mobile radio and a base station in a radio communication system, an authenticity of a packet based on authentication...
US-8,566,922 System for isolating a secured data communication network
A system for isolating a data communication network has been developed. The system includes an internal computer system with an internal computer that is in...
US-8,566,920 Application gateway system and method for maintaining security in a packet-switched information network
A method and apparatuses are disclosed for handling digital data packets at a logical borderline that separates an untrusted packet-switched information network...
US-8,566,914 Triple authentication: mobile hardware, mobile user, and user account
Enhanced network security is provided by requiring three types of information to be authenticated: user information identifying a user, security information...
US-8,566,909 Row-level security with expression data type
Systems, methods, and other embodiments associated with row level security for a database table are described. One example method includes detecting an access...
US-8,566,894 Method and system for distribution of media
A system for the distribution of media is disclosed. The system comprises a network center; a delivery system for receiving data from and transmitting data to...
US-8,566,791 Retrofitting authentication onto firmware
The present invention provides an inexpensive, software-based security-retrofit solution to verify the integrity of program code in embedded systems, or...
US-8,566,651 Apparatus and method for a networked power management system for security and life safety applications
An apparatus includes a data manager and interface logic with a plurality of interface ports including at least one network interface port. The data manager and...
US-8,566,617 System and method for securely storing cryptographic keys with encrypted data
The payload of a set of storage devices is encrypted using a payload key that is stored within the set of storage devices itself. However, the payload key is...
US-8,566,612 System and method for a secure I/O interface
A security processor performs all or substantially all security and network processing to provide a secure I/O interface system to protect computing hardware...
US-8,566,595 Managing secure communications with software environments
A method and system for use in managing secure communications with software environments is disclosed. In at least one embodiment, the method and system...
US-8,566,588 Method of authentication and secure exchange of data between a personalised chip and a dedicated server, and...
Authentication and secure wireless data exchange is provided between a chip with an identification code and a dedicated server via a read unit, which carries...
US-8,566,577 Method and device for storing secured sent message data
Methods and devices for storing sent message data are described. The sent message data corresponds to a message sent to a destination by a communication device...
US-8,566,545 Storage apparatus mounting frame, storage extension apparatus, and method of controlling storage apparatus
By having a storage apparatus attachment portion that secures a storage apparatus; a data read prevention processing unit that makes at least a part of data...
US-8,566,444 Methods and system for simultaneous multiple rules checking
A method and system for checking data against a plurality of rules simultaneously. A data string having keywords in the data string is received. All of the...
US-8,566,437 Systems and methods for improved multisite management of converged communication systems and computer systems
An improved systems and methods for multisite management of computer server systems and in particular converged communication systems based on a decentralized...
US-8,566,392 Method and apparatus for implementing serialized state data management for network applications
Disclosed is a system and technique for the consumption and management of persistent data (application "state" data) for use with any computer application...
US-8,566,373 Probabilistic fingerprint checking for preventing data leakage
A data-leakage prevention capability is presented herein. The data-leakage prevention capability prevents leakage of data, of a file set having a plurality of...
US-8,566,302 Website submission security monitor
Consumer data that is submitted through a company's website is tagged and then monitored to assure that the consumer data is not used for unauthorized purposes....
US-8,566,250 Biometric identification device and methods for secure transactions
The invention is directed towards methods, systems and apparatuses, see FIG. 1, (100) for providing secure and private interactions. The invention provides...
US-8,566,247 System and method for secure communications involving an intermediary
A system and method for communicating information or a cryptographic key therefore between a first party and a second party, comprising the steps of receiving,...
US-8,566,195 Obtaining consent for electronic delivery of compliance information
A method and related system obtains consent from an individual for computer-aided delivery of compliance information. Initially, a computer-readable data...
US-8,566,168 Electronic payment using a proxy account number stored in a secure element
A near field communication payment method using a proxy account number. The method comprises transmitting a proxy account number from a secure element of a...
US-8,565,725 Secure control system for opening locking devices by encrypted acoustic accreditations
The invention relates to a system implements a mobile phone (20) available to a user (18) authorized to open a lock (22). A remote management site (10) includes...
US-8,565,436 Secure self managed data (SSMD)
A system, according to one embodiment, includes a master key for encryption of data; an encryption key site accessible by computer and storing a first piece of...
US-8,565,427 Enforcing software independent content protection in an electronic device
A Set Top Box (STB) or client computer includes a communication interface operable to receive digital messages and digital content, memory operable, and...
US-8,565,422 Method and system for enryption key versioning and key rotation in a multi-tenant environment
Various techniques and procedures related to encryption key versioning and rotation in a multi-tenant environment are presented here. One approach employs a...
US-8,565,336 Data transmission apparatus and method, and data reconstitution apparatus and method
Disclosed are data transmission/reception apparatus and method that may be applied to a case where additional data is to be transmitted in a CE-OFDM...
US-8,565,227 Mobile IP data communication system comprising a mobile router that detects a change in connection status
The present invention provides a data communication technology which is capable of securing flexibly a bandwidth for a traffic that is generated and which...
US-8,565,093 Packet classification in a network security device
Methods and apparatuses are described for inspecting data packets in a computer network. One or more data packets through the network have associated header...
US-8,565,035 Data retention kill function
Various data protection techniques are provided. In one embodiment, a memory device is provided. The memory device may initiate a security measure upon...
US-8,564,809 Printing system for maintaining confidentiality of print jobs
A printing apparatus to process a print job is provided. The printing apparatus includes a printing unit to form an image according to print data, a displaying...
US-8,562,431 Gaming device and secure interface
An improved gaming device with a secure interface has been developed. The invention includes an electronic gaming device with internal components, software and...
US-8,562,025 Secure data protection optically variable labels and foils
An optical security label for security and anti-counterfeit applications comprises a first layer having an optically variable portion (diffractive, holographic...
US-8,561,307 Method and apparatus for vehicle service system optical target assembly
A method and apparatus for determining the alignment of a vehicle wheel using an optical target assembly secured to the vehicle wheel in a non-determined...
US-D691,871 Lock
US-8,561,208 Secure user interface content
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for handling secure user interface content. In one aspect, a...
US-8,561,189 Method and apparatus for distributed intrusion protection system for ultra high bandwidth networks
A method for providing security to a network having a data stream with a plurality of portions of data, each having differing levels of sensitivity. The data...
US-8,561,183 Native code module security for arm instruction set architectures
Some embodiments provide a system that executes a native code module. During operation, the system obtains the native code module. Next, the system loads the...
US-8,561,169 Data processing apparatus and method for managing access to a display buffer
A data processing apparatus and method are provided for managing access to a display buffer. The data processing apparatus has a display buffer for storing an...
US-8,561,168 Access point, terminal, encryption key configuration system, encryption key configuration method, and program
Configuration tasks needed to form a wireless LAN are performed using a simple method while increasing security during configuration. In a wireless network...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.