Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,474,698 Banking system controlled responsive to data bearing records
An automated banking machine operates to cause financial transfers responsive to data read from data bearing records. The automated banking machine includes a...
US-RE44,336 Teleradiology systems for rendering and visualizing remotely-located volume data sets
A teleradiology system provides the capability of rendering and studying of a remotely located volume data without requiring transmission of the entire data to...
US-8,474,053 Data security in a multi-nodal environment
A data security manager in a multi-nodal environment enforces processing constraints stored as security relationships that control how different pieces of a...
US-8,474,046 Systems and methods for identifying the spreading of sensitive data by a suspicious application
A computer-implemented method to identify the spreading of sensitive data from a suspicious application is described. At least one security attribute for an...
US-8,474,032 Firewall+ storage apparatus, method and system
A storage firewall architecture, method and system that works in parallel with existing security technologies and, inter alia, provides application software...
US-8,474,031 Access control method and apparatus
A method of controlling access to computing resources, comprising providing a first computing device with access to a database containing data indicative of...
US-8,474,021 Security system and method for computers
A computer security device comprising a processor that is independent of the host CPU for controlling access between the host CPU and the storage device. A...
US-8,474,004 System for implementing security on telecommunications terminals
A system includes at least one telecommunications terminal having data processing capabilities, the telecommunications terminal being susceptible of having...
US-8,473,810 Memory chip having a security function and for which reading and writing of data is controlled by an...
According to one embodiment, a memory chip, which is connected to a controller that controls reading and writing of data in response to a request from an...
US-8,473,756 Systems and methods for securing data using multi-factor or keyed dispersal
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-8,473,754 Hardware-facilitated secure software execution environment
A hardware-facilitated secure software execution environment provides protection of both program instructions and data against unauthorized access and/or...
US-8,473,752 Apparatus, system, and method for auditing access to secure data
An apparatus, system, and method are disclosed for auditing access to secure data. A detection module detects an access to the secure data. A record module...
US-8,473,736 Method for making security mechanisms available in wireless mesh networks
A method for making safety mechanisms available in wireless mesh networks which have a plurality of nodes that are interconnected by multi-hop communication in...
US-8,473,732 Method and system for secure block acknowledgment (block ACK) with protected MAC sequence number
Aspects of a method and system for protected MAC sequence numbers, as well as secure block acknowledgment (block ACK) with protected MAC sequence number are...
US-8,473,701 Storage media to storage drive centric security
A secure data system employs a storage media and a storage drive. A storage media identification key is embedded in a non-user modifiable area of the storage...
US-8,473,675 Memory system and information processing device
A memory system includes a first memory that is used as a main memory of a target device, a second memory that has an access speed lower than that of the first...
US-8,473,569 Apparatus and method for consumer-oriented distribution of information processing capability
In order to provide a home user with cost-effective PC processing capability, the home user is provided with a terminal which has only sufficient processing...
US-8,473,516 Computer storage apparatus for multi-tiered data security
A computer storage apparatus. In one embodiment, the apparatus includes: (1) primary file storage, (2) a controller coupled to said primary file storage and...
US-8,473,418 Sensitive data aliasing for transaction-card and other applications
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing retail transaction information are...
US-8,473,415 System and method for identifying a point of compromise in a payment transaction processing system
A system, apparatus, and method for reducing fraud in payment transactions by identifying a potential point of compromise (POC) that may lead to subsequent...
US-8,473,334 System and method for issuing and redeeming incentives on electronic data cards
A system for issuing, redeeming and monitoring incentive offers generated in response to qualifying on-line and off-line non-purchase activities. For example,...
US-8,473,312 Diagnostic image security system
A method for restricting unauthorised access to a patient's diagnostic images. Patient identification data is stored in a first database and diagnostic images...
US-8,472,980 Flexible architecture for location based crowdsourcing of contextual data
A system for the collection, aggregation and analysis of location based crowdsourcing data includes a server that server that controls the distribution of...
US-8,472,874 Method and system for pairing of wireless devices using physical presence
Techniques that facilitate pairing of wireless devices with other wireless devices are disclosed. Once paired, the wireless devices can exchange data in a...
US-8,471,899 System and method for documenting patient procedures
The local surveillance sub-system recognizes that a patient medical procedure has or will soon commence by sensing the presence of a healthcare professional in...
US-8,471,818 Flexible data entry device
A data entry device includes a flexible base, a receiving module, a rolling mechanism, and a stop mechanism. The receiving module includes a sleeve and a...
US-8,471,700 Global positioning systems and methods for asset and infrastructure protection
Security systems may include sensing, networked communications, stealth, alarms, and countermeasures, any or all of which may adapt to threats. These systems...
US-8,469,282 Optically readable identification security tag or stamp
The invention relates to a security tag made by randomly distributing a mixture of large numbers of multicolored objects into a unique, non-reproducible...
US-8,469,266 Banking system controlled responsive to data bearing records
An automated banking machine operates to cause financial transfers responsive to data read from data bearing records. The automated banking machine includes a...
US-8,468,609 Authenticating use of a dispersed storage network
At least one dispersed storage (DS) processing unit (14), at least one dispersed storage managing unit (18), and at least one dispersed storage unit (44)...
US-8,468,591 Client authentication and data management system
Methods and systems for performing an authenticated boot (310); performing a continuous data protection (350); performing automatic protection and optionally a...
US-8,468,366 Method for securely storing a programmable identifier in a communication station
Disclosed is a method for storing an identifier in a first station having a secure non-volatile data store protected by cryptographic data, an identifier flag...
US-8,468,364 Secure processor
A secure hardware comprises a secure pipe, a secure DMA, a secure assist and a secure bus, which connects between those blocks. The secure pipe stores a common...
US-8,468,361 System and method for securely provisioning and generating one-time-passwords in a remote device
A secure processor such as a TPM generates one-time-passwords used to authenticate a communication device to a service provider. In some embodiments the TPM...
US-8,468,339 Efficient security information distribution
Methods and software for distributing several data objects containing status information about security certificates, and a directory of the data objects,...
US-8,468,337 Secure data transfer over a network
A system and method are described for secure data transfer over a network. According to an exemplary embodiment a system for secure data transfer over a network...
US-8,468,256 Automatically configuring a computer firewall based on network connection
A method, system, and policy file data structure stored on computer-readable medium comprise reading a policy identifier field containing data representing an...
US-8,468,244 Digital information infrastructure and method for security designated data and with granular data stores
Distributed computer system processes data having select content (SC) represented by one or more predetermined words, characters, etc. The system has a...
US-8,468,167 Automatic data validation and correction
Techniques disclosed herein include systems and methods for data validation and correction. Such systems and methods can reduce costs, improve productivity,...
US-8,468,113 Method and system for management of security rule set
There are provided a method of automated managing two or more security rule-sets and a system thereof. The method comprises: obtaining data characterizing a...
US-8,468,089 Method of improving security in electronic transactions
A computerized method (10) is provided which improves data security in electronic transactions in an insecure network (12). This is accomplished when the method...
US-8,468,080 System and method for administering invested funds
A computer system for administering investment funds holding shares of funds includes a processor and a memory storage device in communication with the...
US-8,467,779 Decision support
Decision support information is exchanged over a secure wireless network among mobile computing devices, and also optionally a central command computer. Each of...
US-8,467,770 System for securing a mobile terminal
A method and apparatus for securing user data on a mobile device using a Bluetooth fob. The method and apparatus enables robust access security, issues alerts...
US-8,467,768 System and method for remotely securing or recovering a mobile device
The present invention provides a system and method for remotely securing, accessing, and managing a mobile device or group of mobile devices. The invention...
US-8,467,536 Binding keys to secure media streams
A key message can include a key-encryption-key (KEK) associated with a KeyDomainID and a KeyGroupID. A session description message can describe streaming media...
US-8,467,534 Method and system for secure access and processing of an encryption/decryption key
Secure access and processing of an encryption/decryption key may include generating one or more keys within a key controller block of a chip. The generated keys...
US-8,467,532 System and method for secure transaction of data between a wireless communication device and a server
The present invention provides a system and method for a set of Extensible Authentication Protocols (EAPs) that can serve Confidentiality, Authentication,...
US-8,467,527 Efficient key derivation for end-to-end network security with traffic visibility
Both end-to-end security and traffic visibility may be achieved by a system using a controller that derives a cryptographic key that is different for each...
US-8,467,230 Data security for dynamic random access memory using body bias to clear data at power-up
A circuit and method erase at power-up all data stored in a DRAM chip for increased data security. All the DRAM memory cells are erased by turning on the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.