Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,599,697 Overlay network
Methods and apparatus are disclosed for dynamically discovering and utilizing an optimized network path through overlay routing for the transmission of data. A...
US-8,599,641 Semiconductor memory device, method of adjusting the same and information processing system including the same
Each of the core chips includes a data output circuit that outputs read data to the interface chip in response to a read command, and an output timing...
US-8,599,612 Method of operating integrated circuit embedded with non-volatile programmable memory having variable coupling...
A programmable non-volatile device is operated with a floating gate that functions as a FET gate that overlaps a portion of a source/drain region and allows for...
US-8,599,402 Secure cloud based printing
A printing apparatus includes a first memory, a second memory, a first obtaining section, a second obtaining section, and a retrieving section. The first memory...
US-8,599,399 Image forming apparatus, control method thereof and computer-readable storage medium
This invention provides an image forming apparatus capable of reliably printing security information even when image data of an original document that is...
US-8,599,228 Image processing apparatus, display apparatus, and image displaying system
An image processing apparatus, a display apparatus and an image displaying system wherein both secure and public images can be efficiently displayed with high...
US-8,597,116 Virtual player tracking and related services
Various gaming-related services are provided, including but not limited to security services, harm minimization services, player identification services,...
US-8,595,850 System for protecting sensitive data with distributed tokenization
A token generating organization may include distributed tokenization systems for generating tokens corresponding to sensitive information. Sensitive information...
US-8,595,837 Security event management apparatus, systems, and methods
Apparatus, systems, and methods may operate to receive multiple security event data streams from a plurality of hardware processing nodes, the multiple security...
US-8,595,831 Method and system for cyber security management of industrial control systems
A method and system for cyber security management of Supervisory Control And Data Acquisition (SCADA) systems is provided to enhance situational awareness and...
US-8,595,819 System and method for distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server based on...
US-8,595,817 Dynamic authenticated perimeter defense
Techniques for dynamically configuring security mechanisms in a network can construct security perimeters that satisfy security needs at any given time while...
US-8,595,813 IC card for encryption or decryption process and encrypted communication system and encrypted communication...
It is possible to perform encrypted communication between members of a group while assuring a sufficient security compatible with a change of the members. An IC...
US-8,595,812 Tokenized data security
Provided are devices, methods, systems, computer readable storage media for tokenizing data. In some examples, credit card numbers are tokenized using a...
US-8,595,809 Reusable authentication experience tool
A reusable authentication component may be integrated into a web page to communicate with an authentication server and authenticate a user to the web page. The...
US-8,595,808 Methods and systems for increasing the security of network-based transactions
A method for enhancing the security of systems and resources involved in conducting network-based transactions on mobile communications devices includes...
US-8,595,804 System and method for device security with a plurality of authentication modes
A security processing element stores authentication data corresponding to a plurality of possible authentication modes. At a time of activation, the security...
US-8,595,799 Access authorization
Methods, systems, and computer-readable media with executable instructions stored thereon for managing access authorization to hardware and data resources. A...
US-8,595,790 Devices, systems, and methods for providing increased security when multiplexing one or more services at a...
Systems, devices, and methods are disclosed for providing increased security when multiplexing one or more services at customer premises. Such systems and...
US-8,595,717 Memory controller that includes support for autorun of software or data
An integrated circuit microcontroller supporting Autorun of software or data is disclosed. The integrated circuit microcontroller can be included in a memory...
US-8,595,616 Data conversion environment
Converting data from a first format to a second format may be used to merge two databases having different formatting. Conversion maps may be defined for pairs...
US-8,595,514 Secure point of sale terminal
A data entry device including a housing formed of at least two portions, data entry circuitry located within the housing, at least one case-open switch assembly...
US-8,595,512 Data control method of cloud storage
The present application relates to the field of technology of cloud storage data security, and in particular, relates to a data control method of cloud storage....
US-8,595,510 Methods, apparatus and systems to improve security in computer systems
In one implementation a computer system stores a software program that contains some instructions organized in blocks wherein each block contains a first part...
US-8,595,495 System and method for secure communications
A method for secure data communications in fax transmissions and computer network communications comprising a. Allowing the sender to receive confirmation that...
US-8,595,491 Combining a mobile device and computer to create a secure personalized environment
A mobile device, such as a mobile phone, smart phone, personal music player, handheld game device, and the like, when operatively combined with a PC, creates a...
US-8,595,490 System and method for secure transaction
Systems and methods for performing a secure transaction provided. In one embodiment, the method includes: reading data on a command token, reading data on a...
US-8,595,488 Apparatus, system and method for securing digital documents in a digital appliance
Various embodiments include an apparatus and a method to secure protected digital document content from tampering by their user, such as unauthenticated use or...
US-8,595,451 Managing a storage cache utilizing externally assigned cache priority tags
A method for caching data in a storage medium implementing tiered data structures may include storing a first portion of critical data at the instruction of a...
US-8,595,409 Apparatus and method for reorganization of mapping information in flash memory
An apparatus and method for reorganizing mapping information in a flash memory are provided. The apparatus includes a sector-managing module that secures a...
US-8,595,387 SMM-dependent GPIO lock for enhanced computer security
Computer security is enhanced by creating an environment in which changing the state of a general-purpose input/output (GPIO) output or changing the...
US-8,595,355 System and method for optimizing and processing electronic pages in multiple languages
A web page processing system that processes users requests using predefined, flexible templates and corresponding logic. Main processing handles...
US-8,595,131 Method for paying for a service offered by means of a data network
A method is proposed for acquiring a service sold over a data network (20) against presentation of a transaction medium (2). The service is ordered by a user...
US-8,595,110 Integrated investment management system with network datafeed and incremental database refresh
An investment management computer system is configured to communicate with data vendors or electronic accounting systems. The system may include an electronic...
US-8,594,979 Handheld and imbedded devices to detect sticky devices using magnets
Apparatus and methods for detecting concealed personal security threats may comprise conventional mirrors and less conventional arrays of Hall-effect sensors,...
US-8,594,886 Car-mounted information apparatus and information transfer system for electric car
To securely prevent from battery depletion and enable transfer data without troubling a user, a communication address data storage unit stores a communication...
US-8,594,730 Secure smart card system
A smart card usable in magnetic stripe swipe transactions with a transaction terminal configured to read transaction information encoded on a magnetic stripe of...
US-8,594,563 Security for wireless communication
A mobile terminal is disclosed which includes a near field or RFID tag (41). The mobile terminal (1) communicates with the mobile telecommunications network and...
US-8,594,509 Apparatus and method for arranging communication links in visible light communication
A method and apparatus for arranging communication links in visible light communication increases the user visibility of the system. The method includes the...
US-8,594,081 Systems and methods for resetting a network device
A network device includes a data store with first and second parameters, the first parameter affecting a communication operation of the network device and the...
US-8,594,039 Reference signal multiplexing and resource allocation
A reference signal of a user equipment to which a resource (LB#1) is allocated for a L1/L2 control signal, is allocated a resource (SB#1) that is closer on the...
US-8,593,688 Method for enhancing security printing
A method for enhancing security printing includes determining fields associated with print job variability. Physical security information is entered, and a...
US-8,593,296 System and method for turbine bucket tip shroud deflection measurement
A measurement system measures a gap between a plurality of rotating bucket tips and a stationary shroud surface. The system includes a sensor secured to the...
US-8,593,250 Access control device
The invention relates to an access control device (1) having at least one access barrier element, to which at least one read unit and/or sensor unit for...
US-8,593,172 Secure reconfiguration of programmable logic
An integrated circuit having secure configuration includes configuration memory, programmable logic resources coupled to the configuration memory, programmable...
US-8,590,940 Ubiquitous imaging device based check image capture
A method or corresponding apparatus for remote transmission of a negotiable instrument. In an example embodiment, the process provides a carrier that secures a...
US-8,590,799 Systems, methods, apparatus of a secure RFID record
Systems, methods and apparatus of a secure RFID record are described herein. In one aspect, an apparatus of a RFID wristband comprises three layers: the top...
US-8,590,798 Secure authentication feature
A security tag comprising at least one overt data carrier (10), and at least one covert data carrier (25), the covert data carrier comprising a ring (25) that...
US-8,590,050 Security compliant data storage management
An embodiment of the invention is a program for dynamically managing files to comply with security requirements. In one embodiment, changing security...
US-8,590,035 Network firewall host application identification and authentication
Systems for providing information on network firewall host application identification and authentication include an identifying and transmitting agent on a host...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.