Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,533,466 Electronic file access control system and method
A digital file is associated with a header in which identification data for a physical key is stored. The digital file content is encrypted, and may not be...
US-8,533,460 Key camouflaging method using a machine identifier
A method is provided for generating a human readable passcode to an authorized user including providing a control access datum and a PIN, and generating a...
US-8,533,457 Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols
The disclosure provides a method and apparatus for transmitting data securely using an unreliable communication protocol, such as User Datagram Protocol. In one...
US-8,533,452 System and method for securing wireless data
Systems and methods for operation upon a data processing device for handling secure data stored on the device. The device is configurable to communicate over a...
US-8,533,242 File management method in web storage system
The present invention relates to a file management method in a web storage system, and more specifically, to a file management method in a web storage system,...
US-8,533,144 Automation and security application store suggestions based on usage data
A method, system, and computer-readable medium that facilitate the reception of usage data about the utilization of an intelligent home system and recommend...
US-8,533,116 Internet payment, authentication and loading system using virtual smart card
A system loads, authenticates and uses a virtual smart card for payment of goods and/or services purchased on-line over the Internet. An online purchase and...
US-8,532,978 Natural language interface, compiler and de-compiler for security policies
A method and system for enabling non-programmers to create certifiable Extensible Access Control Markup Language (XACML) policies. The graphical user interface...
US-8,532,498 Secure orthogonal frequency multiplexed optical communications
The invention provides a system and method for secure communication that involve encoding and transmitting an optical orthogonal frequency division multiplexed...
US-8,532,330 Security printing analysis system and method for enhancing security printing
A method for enhancing security printing includes generating data for a region of interest (14), where the data includes information for at least one of...
US-8,532,301 Key distribution method and system
This invention discloses a key distribution method and system. The method includes: notifying, by an application provider management platform, a supplementary...
US-8,532,295 Method for the secure loading in a NFC chipset of data allowing access to a service
A method for the secured loading of data into a first secured host processor of an NFC system comprising an NFC interface circuit for sending and receiving...
US-8,532,294 Just in time delivery of entitlement control messages (ECMs) and other essential data elements for television...
Essential data elements, particularly entitlement control messages (ECMs), are inserted in a manner that reduces the overhead bit rate without effecting overall...
US-8,532,290 Content playback APIS using encrypted streams
One embodiment of the present invention sets forth a technique for decrypting digital content in a secure environment. The technique includes the steps of...
US-8,532,220 Methods and apparatus for secure distribution and storage of data using N channels
Methods and apparatus are provided for secure distribution and storage of data using N channels. An input data sequence, X, is distributed using a plurality, N,...
US-8,532,115 Negotiated secure fast table lookups for protocols with bidirectional identifiers
During connection establishments for a protocol with bidirectional identifiers, connection data is allocated, the locally selected identifier is a pointer to...
US-8,532,075 Transitioning to secure IP communications for encoding, encapsulating, and encrypting data
An apparatus, system, and method is directed to transcoding broadcast content, such as in a DVB, ATSC, and MPEG based network, to secure content suitable for an...
US-8,531,953 System and method for network traffic splitting
A system is described where a routing server is configured to receive data packets from one or more servers on a computer network. Data packets may contain...
US-8,531,292 Composite anti-tamper container with embedded devices
A design and manufacturing methods for reusable, stackable shipping containers made from composite materials is described. The composite material is embedded...
US-8,531,286 System and method for monitoring security at a premises using line card with secondary communications channel
A security system includes at least one audio sensor and an alarm panel that transmits alarm report data through a communications network to at least one alarm...
US-D689,357 Lock
US-8,528,108 Protecting secret information in a programmed electronic device
A way for securely protecting secret information--for example, a secret key--in a programmed electronic device is provided. A technique is disclosed for...
US-8,528,106 Process for matching a number N of reception terminals with a number M of conditional access control cards
The invention relates to a method for matching a number N of reception equipment with a number M of external security modules, each reception equipment being...
US-8,528,105 System and method for ensuring security of data stored on electronic computing devices
A system and method for using a host electronic computing device to prevent access to data in a preselected memory portion of an electronic computing device...
US-8,528,101 Integrated physical security control system for computing resources
A computing data center that contains a set of physically isolatable units of computing resources for which a physical security exception action plan is to be...
US-8,528,097 Trusted and secure techniques for item delivery and execution
Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a...
US-8,528,096 Secure universal serial bus (USB) storage device and method
A secure Universal Serial Bus (USB) storage device includes a memory controller capable of storing data in and retrieving data from a memory. The secure USB...
US-8,528,093 Apparatus and method for performing dynamic security testing using static analysis data
A computer readable storage medium includes executable instructions to perform a static analysis of a set of target code to identify a first set of security...
US-8,528,082 Security disposing method and device for input data
A security disposing method and device for the input data involves generating an interference data according to a predefined rule when inputting the data, and...
US-8,528,069 Trustworthy device claims for enterprise applications
Embodiments of the invention enable a client device to procure trustworthy device claims describing one or more attributes of the client device, have those...
US-8,528,045 Methods and systems for secure key entry via communication networks
According to some embodiments, a member authentication request is received at a security server from a client server. The member authentication request may be...
US-8,528,043 Systems and methods for generating trust federation data from BPMN choreography
In practice, collaborative processes using web services present complex information security requirements, as a domain security model needs to conditionally...
US-8,527,835 Method for secure data transfer
A method of securely transferring data. The source data stored in a source memory (NV_MEM) is compared with the transferred data (COPY_ELT_X_V_MEM) that has...
US-8,527,780 Removable drive with data encryption
A removable drive such as a USB drive or key is provided for connecting to computer devices to provide secure and portable data storage. The drive includes a...
US-8,527,765 Shared secret verification method and system
Method for shared secret verification in secure data exchange, in which at least two parties, indicated as Alice and Bob, each have a secret and seek to...
US-8,527,754 Authorizing information flows based on a sensitivity of an information object
A system, apparatus, computer program product and method for authorizing information flows between devices of a data processing system are provided. In one...
US-8,527,749 User device, computer program product and computer system for system for secure network storage
A technique for providing secure network storage by a user device that includes one or multiple network interfaces, a driver configuration component comprising...
US-8,527,730 Data updating method, memory system and memory device
A data updating method, a memory system and a memory device in which the memory device is connectable to a host device and has a memory section and a memory...
US-8,527,714 Secure avionics equipment and associated method of making secure
This invention relates, according to a first aspect, to electronic equipment comprising a processor (2), a memory (11) and a communication module (3) ensuring...
US-8,527,675 System and method for implementing a secure processor data bus
System and method for implementing a secure processor data bus are described. One embodiment is a circuit comprising a processor disposed in a processor...
US-8,527,632 Secure transfer of data files
The secure transfer of data files between secure environments (202, 211) is disclosed. At a source environment (202) a user issues a request via a first local...
US-8,527,549 Cloud based operating and virtual file system
A method for managing a virtual distributed file system includes maintaining by a master device located in a cloud computing environment, a metadata data...
US-8,527,472 Method and apparatus of securely processing data for file backup, de-duplication, and restoration
Disclosed are an apparatus and method of restoring at least one data file. The method may include retrieving the at least one data file to be restored from a...
US-8,527,306 Automation and security application store suggestions based on claims data
A method, system, and computer-readable medium that facilitate the reception of usage data about the utilization of an intelligent home system and insurance...
US-8,527,299 System and method for managing pedigree information
Methods and systems are provided for managing and transmitting pedigree information. The methods and systems allow a user to access a pedigree information...
US-8,526,620 Method and system for secure data collection and distribution
A data provider generates a data encryption key and an identifier, uses the data encryption key to encrypt data, sends the encrypted data and the identifier to...
US-8,526,616 Method for payload encryption of digital voice or data communications
A process using code segment which is installed over a transport medium, using a device, such as a network, for transmitting real-time end-to-end encrypted...
US-8,526,608 Printing system and printer with electronic signature capability and method thereof
A printing system and printer with an electronic signature capability, and a method thereof are provided. To print security documents using an electronic...
US-8,526,605 Data encryption to provide data security and memory cell bit wear leveling
Method and apparatus for encrypting and storing data to provide data security and memory cell bit wear leveling. In accordance with various embodiments, input...
US-8,525,880 Security system including modular ring housing
A modular building system arrangement includes a plurality of electrical building systems. Each electrical building system has a housing with a mechanical...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.