Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,526,605 Data encryption to provide data security and memory cell bit wear leveling
Method and apparatus for encrypting and storing data to provide data security and memory cell bit wear leveling. In accordance with various embodiments, input...
US-8,525,880 Security system including modular ring housing
A modular building system arrangement includes a plurality of electrical building systems. Each electrical building system has a housing with a mechanical...
US-8,525,670 Tracking device for hospitals, nursing homes, and private use
A tracking system including a tracking device and external transceivers for tracking a patient and providing patient data is presented. The device features a...
US-8,525,664 System and method for minimizing the amount of data being sent on a network for supervised security systems
A system and method are disclosed for communicating heartbeat signals representative of the condition of a security system to a monitoring station. A controller...
US-8,523,663 Transporting and using wagering game data
A wagering game system and its operations are described herein. In embodiments, the operations can include determining a connection of a portable wagering game...
US-8,522,355 System and method to force a mobile device into a secure state
Embodiments relate to systems and methods for implementation on a mobile device to force the mobile device into a secure state upon detection or determination...
US-8,522,352 Key device with external storage and the using method thereof
A key device with external storage and its method of use, which relates to the computer security technology field, is disclosed herein. The key device with...
US-8,522,351 Production security control apparatus for software products and control method thereof
The present invention relates to a production security control apparatus for software products and the control method thereof. The present invention uses...
US-8,522,337 Selecting a security format conversion for wired and wireless devices
A selection system and method to receive an indication of a security format from a network and to select one of a plurality of security format conversions based...
US-8,522,335 Token mediation service in a data management system
A method and system for mediating security tokens to authorization data transactions in a data management system. The methods and systems intercept a data...
US-8,522,326 System and method for authenticating a smart card using an authentication token transmitted to a smart card reader
A system for authentication comprises a mobile unit and a smart card reader. The mobile unit includes a security application that prevents access to...
US-8,522,316 Connector and method for providing access to a data-processing network for a data-processing device
The invention relates to a connector and also to a method for providing access to a data-processing network for a data-processing device, wherein an individual,...
US-8,522,115 Flash memory device and memory system comprising same
A flash memory device provided here comprises a user data area storing user data; and a security data area storing security data. The security data area stores...
US-8,522,069 Process for secure backspacing to a first data center after failover through a second data center and a network...
A method (100) is proposed for safely switching back to a first computer center (DC1) following failover by a second computer center (DC2), where at least one...
US-8,522,050 Systems and methods for securing information in an electronic file
A computer-implemented method for securing information in an electronic file is described. Data in the electronic file is automatically scanned. Sensitive...
US-8,522,046 Method, apparatus and system for acquiring service by portable device
The disclosure provides a method, an apparatus and a system for acquiring a service by a portable device, in order to solve the problem that the security of the...
US-8,522,044 Mechanism to handle events in a machine with isolated execution
A platform and method for secure handling of events in an isolated environment. A processor executing in isolated execution "IsoX" mode may leak data when an...
US-8,522,043 Hardware-based computer theft deterrence
A hardware-based security module is used to protect an electronic device, especially a portable electronic device. The security module may determine either via...
US-8,522,037 Motion-detecting device user authentication
Systems, methods, and computer program products are provided for user authentication required for conducting online financial institution transactions. The...
US-8,522,028 Method for secure data exchange between two devices
This invention concerns a safe data exchange method between two devices locally connected to one another. In a preferred embodiment, the first device (10) is a...
US-8,522,016 On-the-fly data masking
Described are methods, systems, and apparatus, including computer program products for securing data of a production server. The invention, in one ...
US-8,522,008 Portable security device and methods of user authentication
Disclosed a portable security device and methods for secure user authentication. The security device stores operating system agents that enable communication...
US-8,521,949 Data deleting method and apparatus
A data deleting method and apparatus is provided in embodiments of this application. The method comprises: when a file system detects a delete request for a...
US-8,521,808 Uploading and executing command line scripts
A mechanism is provided for a non-root-level user to execute command line script files via a generic command line interface. A command line interface in the...
US-8,521,637 Systems, methods, and computer program products for providing real time analytic widgets in a financial trading...
Methods, systems, and computer program products are provided for providing real time analytics and monitoring to a user of a securities trading system. In one...
US-8,521,130 System and method of secure message processing
A system and method for handling message indicator processing on a wireless mobile communications device. Message state data is stored in a cache for use in...
US-8,520,905 Data security system
A data security system comprises a host processor, and a plurality of remote computers. Each remote computer provides biometric authentication of a user prior...
US-8,520,851 Wireless communication device with securely added randomness and related method
A wireless communication system which employs cryptographic functions requiring random data input in a mobile wireless device includes provisions for securely...
US-8,520,850 Downloadable security and protection methods and apparatus
Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional...
US-8,520,843 Method and apparatus for encrypting a discrete signal, and method and apparatus for decrypting
In an inventive method for encrypting a discrete signal consisting of successive samples the successive samples are subdivided into successive time blocks, and...
US-8,520,839 Data transmitter with a secure and efficient signature
An encryption device encrypts a first block of user data to obtain a first encryption result and encrypts a second block of user data, which follows the first...
US-8,520,670 Automated operation and security system for virtual private networks
A node device provides secure communication services over a data network, such as the Internet or another public or private packet switched network, to multiple...
US-8,520,558 Quality of service securing method and apparatus
A quality of service (QoS) securing apparatus and method using a communication protocol is provided. The QoS securing method is performed by a reception side...
US-8,518,779 Semiconductor device and method for fabricating the same
A semiconductor device includes a step-type recess pattern formed in a substrate, a gate electrode buried in the recess pattern and having a gap disposed...
US-8,517,262 Automated banking machine that operates responsive to data bearing records
An automated banking machine operates to cause financial transfers responsive at least in part to data read from data bearing records. The automated banking...
US-RE44,468 Data security method and device for computer modules
A security method for an attached computer module in a computer system. The security method reads a security identification number in an attached computer...
US-8,516,592 Wireless hotspot with lightweight anti-malware
A mobile computing device, such as a mobile phone, serves as a wireless hotspot for other mobile computing devices. The other mobile computing devices connect...
US-8,516,576 Network intrusion detection with distributed correlation
A network security system employing multiple levels of processing to identify security threats. Multiple host machines may each contain an agent that detects...
US-8,516,575 Systems, methods, and media for enforcing a security policy in a network including a plurality of components
Systems, methods, and media for enforcing a security policy in a network are provided, including, for example, receiving a plurality of events describing...
US-8,516,564 Secure user interaction using virtualization
A first virtualization layer is inserted between (i) an operating system of a computer system, and (ii) at least first and second hardware devices of the...
US-8,516,560 Secure remote authentication through an untrusted network
A method for securely authenticating a user of a portable consumer device at an access device comprising the following steps. First, a dynamic data element and...
US-8,516,539 System and method for inferring access policies from access event records
A method of security gateway policy definition to quickly infer a new policy based on event data extracted and analyzed using business logic and workflow from a...
US-8,516,538 Providing security for queries to electronic product code information services
Methods and apparatus, including computer program products, implementing and using techniques for protecting data residing in a repository of an electronic...
US-8,516,272 Secure dynamically reconfigurable logic
A mechanism for securely and dynamically reconfiguring reconfigurable logic is provided. A state machine within a data processing system establishes a hardware...
US-8,516,268 Secure field-programmable gate array (FPGA) architecture
A method and system for configuring a field-programmable gate array (FPGA) includes receiving an encrypted FPGA load-decryption key at an FPGA from a remote...
US-8,516,257 Secure media peripheral association in a media exchange network
A method for establishing secure access to a media peripheral in a home via a node in a communication network includes acquiring by the node, security data...
US-8,516,255 Methods and apparatus for peer-to-peer transfer of secure data using near field communications
The present invention discloses an apparatus and method of transferring data from a first device to a second device. The method includes transmitting a request...
US-8,516,241 Zone-based firewall policy model for a virtualized data center
Techniques are provided for implementing a zone-based firewall policy. At a virtual network device, information is defined and stored that represents a security...
US-8,516,211 Secure storage management system and method
A storage management system and method for managing access between a plurality of processes and a common store. In one embodiment, each individual process...
US-8,516,131 System and method employing an agile network protocol for secure communications using secure domain names
A network device comprises a storage device storing an application program for a secure communications service; and at least one processor configured to execute...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.