Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,566,909 Row-level security with expression data type
Systems, methods, and other embodiments associated with row level security for a database table are described. One example method includes detecting an access...
US-8,566,894 Method and system for distribution of media
A system for the distribution of media is disclosed. The system comprises a network center; a delivery system for receiving data from and transmitting data to...
US-8,566,791 Retrofitting authentication onto firmware
The present invention provides an inexpensive, software-based security-retrofit solution to verify the integrity of program code in embedded systems, or...
US-8,566,651 Apparatus and method for a networked power management system for security and life safety applications
An apparatus includes a data manager and interface logic with a plurality of interface ports including at least one network interface port. The data manager and...
US-8,566,617 System and method for securely storing cryptographic keys with encrypted data
The payload of a set of storage devices is encrypted using a payload key that is stored within the set of storage devices itself. However, the payload key is...
US-8,566,612 System and method for a secure I/O interface
A security processor performs all or substantially all security and network processing to provide a secure I/O interface system to protect computing hardware...
US-8,566,595 Managing secure communications with software environments
A method and system for use in managing secure communications with software environments is disclosed. In at least one embodiment, the method and system...
US-8,566,588 Method of authentication and secure exchange of data between a personalised chip and a dedicated server, and...
Authentication and secure wireless data exchange is provided between a chip with an identification code and a dedicated server via a read unit, which carries...
US-8,566,577 Method and device for storing secured sent message data
Methods and devices for storing sent message data are described. The sent message data corresponds to a message sent to a destination by a communication device...
US-8,566,545 Storage apparatus mounting frame, storage extension apparatus, and method of controlling storage apparatus
By having a storage apparatus attachment portion that secures a storage apparatus; a data read prevention processing unit that makes at least a part of data...
US-8,566,444 Methods and system for simultaneous multiple rules checking
A method and system for checking data against a plurality of rules simultaneously. A data string having keywords in the data string is received. All of the...
US-8,566,437 Systems and methods for improved multisite management of converged communication systems and computer systems
An improved systems and methods for multisite management of computer server systems and in particular converged communication systems based on a decentralized...
US-8,566,392 Method and apparatus for implementing serialized state data management for network applications
Disclosed is a system and technique for the consumption and management of persistent data (application "state" data) for use with any computer application...
US-8,566,373 Probabilistic fingerprint checking for preventing data leakage
A data-leakage prevention capability is presented herein. The data-leakage prevention capability prevents leakage of data, of a file set having a plurality of...
US-8,566,302 Website submission security monitor
Consumer data that is submitted through a company's website is tagged and then monitored to assure that the consumer data is not used for unauthorized purposes....
US-8,566,250 Biometric identification device and methods for secure transactions
The invention is directed towards methods, systems and apparatuses, see FIG. 1, (100) for providing secure and private interactions. The invention provides...
US-8,566,247 System and method for secure communications involving an intermediary
A system and method for communicating information or a cryptographic key therefore between a first party and a second party, comprising the steps of receiving,...
US-8,566,195 Obtaining consent for electronic delivery of compliance information
A method and related system obtains consent from an individual for computer-aided delivery of compliance information. Initially, a computer-readable data...
US-8,566,168 Electronic payment using a proxy account number stored in a secure element
A near field communication payment method using a proxy account number. The method comprises transmitting a proxy account number from a secure element of a...
US-8,565,725 Secure control system for opening locking devices by encrypted acoustic accreditations
The invention relates to a system implements a mobile phone (20) available to a user (18) authorized to open a lock (22). A remote management site (10) includes...
US-8,565,436 Secure self managed data (SSMD)
A system, according to one embodiment, includes a master key for encryption of data; an encryption key site accessible by computer and storing a first piece of...
US-8,565,427 Enforcing software independent content protection in an electronic device
A Set Top Box (STB) or client computer includes a communication interface operable to receive digital messages and digital content, memory operable, and...
US-8,565,422 Method and system for enryption key versioning and key rotation in a multi-tenant environment
Various techniques and procedures related to encryption key versioning and rotation in a multi-tenant environment are presented here. One approach employs a...
US-8,565,336 Data transmission apparatus and method, and data reconstitution apparatus and method
Disclosed are data transmission/reception apparatus and method that may be applied to a case where additional data is to be transmitted in a CE-OFDM...
US-8,565,227 Mobile IP data communication system comprising a mobile router that detects a change in connection status
The present invention provides a data communication technology which is capable of securing flexibly a bandwidth for a traffic that is generated and which...
US-8,565,093 Packet classification in a network security device
Methods and apparatuses are described for inspecting data packets in a computer network. One or more data packets through the network have associated header...
US-8,565,035 Data retention kill function
Various data protection techniques are provided. In one embodiment, a memory device is provided. The memory device may initiate a security measure upon...
US-8,564,809 Printing system for maintaining confidentiality of print jobs
A printing apparatus to process a print job is provided. The printing apparatus includes a printing unit to form an image according to print data, a displaying...
US-8,562,431 Gaming device and secure interface
An improved gaming device with a secure interface has been developed. The invention includes an electronic gaming device with internal components, software and...
US-8,562,025 Secure data protection optically variable labels and foils
An optical security label for security and anti-counterfeit applications comprises a first layer having an optically variable portion (diffractive, holographic...
US-8,561,307 Method and apparatus for vehicle service system optical target assembly
A method and apparatus for determining the alignment of a vehicle wheel using an optical target assembly secured to the vehicle wheel in a non-determined...
US-D691,871 Lock
US-8,561,208 Secure user interface content
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for handling secure user interface content. In one aspect, a...
US-8,561,189 Method and apparatus for distributed intrusion protection system for ultra high bandwidth networks
A method for providing security to a network having a data stream with a plurality of portions of data, each having differing levels of sensitivity. The data...
US-8,561,183 Native code module security for arm instruction set architectures
Some embodiments provide a system that executes a native code module. During operation, the system obtains the native code module. Next, the system loads the...
US-8,561,169 Data processing apparatus and method for managing access to a display buffer
A data processing apparatus and method are provided for managing access to a display buffer. The data processing apparatus has a display buffer for storing an...
US-8,561,168 Access point, terminal, encryption key configuration system, encryption key configuration method, and program
Configuration tasks needed to form a wireless LAN are performed using a simple method while increasing security during configuration. In a wireless network...
US-8,561,154 Method for providing network perimeter security assessment
A method for providing network perimeter security assessment that involves a combination of perimeter security assessment disciplines is disclosed. A security...
US-8,561,144 Enforcing security based on a security state assessment of a mobile device
Security data generated by an application running on a mobile communications device is stored in a database. The security data is processed to assess a current...
US-8,561,143 Proxy registration and authentication for personal electronic devices
Communication systems, media, and methods for authenticating and registering unauthenticated electronic devices are provided. The communication systems include...
US-8,561,139 Method and appartus for network security using a router based authentication
A router based authentication system provides packet level authentication of incoming data packets and eliminates the risk of having data packets come in to the...
US-8,561,138 System and method to provide added security to a platform using locality-based data
In some embodiments, the invention involves protecting a platform using locality-based data and, more specifically, to using the locality-based data to ensure...
US-8,561,078 Task switching and inter-task communications for multi-core processors
The invention provides hardware based techniques for switching processing tasks of software programs for execution on a multi-core processor. Invented...
US-8,560,864 Firewall for removable mass storage devices
A firewall device comprising a first connection device for connecting with a data device supporting transfer data with a removable mass storage device; second...
US-8,560,863 Systems and techniques for datapath security in a system-on-a-chip device
Various embodiments for providing datapath security in a system-on-a-chip (SOC) device are described. In one embodiment, an apparatus may comprise a security...
US-8,560,858 Secure session identifiers
An apparatus and a method for an authentication protocol. In one embodiment, a server generates a sequence number, and a server message authentication code...
US-8,560,839 Tamper proof location services
A secure location system is described herein that leverages location-based services and hardware to make access decisions. Many mobile computers have location...
US-8,560,835 Method and apparatus for machine-to-machine communication
According to a first aspect of the present invention there is provided a method of at least partly delegating processing of data in a machine-to-machine system...
US-8,560,826 Secure virtualization environment bootable from an external media device
Methods and systems for creating a secure virtualization environment on a host device, without modifying the host device, the secure virtualization environment...
US-8,560,823 Trusted modular firmware update using digital certificate
An over-the-air firmware update is accomplished in a secure manner using a two-step process. The first step uses an initial boot using a fixed boot program and...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.