Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,528,105 System and method for ensuring security of data stored on electronic computing devices
A system and method for using a host electronic computing device to prevent access to data in a preselected memory portion of an electronic computing device...
US-8,528,101 Integrated physical security control system for computing resources
A computing data center that contains a set of physically isolatable units of computing resources for which a physical security exception action plan is to be...
US-8,528,097 Trusted and secure techniques for item delivery and execution
Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a...
US-8,528,096 Secure universal serial bus (USB) storage device and method
A secure Universal Serial Bus (USB) storage device includes a memory controller capable of storing data in and retrieving data from a memory. The secure USB...
US-8,528,093 Apparatus and method for performing dynamic security testing using static analysis data
A computer readable storage medium includes executable instructions to perform a static analysis of a set of target code to identify a first set of security...
US-8,528,082 Security disposing method and device for input data
A security disposing method and device for the input data involves generating an interference data according to a predefined rule when inputting the data, and...
US-8,528,069 Trustworthy device claims for enterprise applications
Embodiments of the invention enable a client device to procure trustworthy device claims describing one or more attributes of the client device, have those...
US-8,528,045 Methods and systems for secure key entry via communication networks
According to some embodiments, a member authentication request is received at a security server from a client server. The member authentication request may be...
US-8,528,043 Systems and methods for generating trust federation data from BPMN choreography
In practice, collaborative processes using web services present complex information security requirements, as a domain security model needs to conditionally...
US-8,527,835 Method for secure data transfer
A method of securely transferring data. The source data stored in a source memory (NV_MEM) is compared with the transferred data (COPY_ELT_X_V_MEM) that has...
US-8,527,780 Removable drive with data encryption
A removable drive such as a USB drive or key is provided for connecting to computer devices to provide secure and portable data storage. The drive includes a...
US-8,527,765 Shared secret verification method and system
Method for shared secret verification in secure data exchange, in which at least two parties, indicated as Alice and Bob, each have a secret and seek to...
US-8,527,754 Authorizing information flows based on a sensitivity of an information object
A system, apparatus, computer program product and method for authorizing information flows between devices of a data processing system are provided. In one...
US-8,527,749 User device, computer program product and computer system for system for secure network storage
A technique for providing secure network storage by a user device that includes one or multiple network interfaces, a driver configuration component comprising...
US-8,527,730 Data updating method, memory system and memory device
A data updating method, a memory system and a memory device in which the memory device is connectable to a host device and has a memory section and a memory...
US-8,527,714 Secure avionics equipment and associated method of making secure
This invention relates, according to a first aspect, to electronic equipment comprising a processor (2), a memory (11) and a communication module (3) ensuring...
US-8,527,675 System and method for implementing a secure processor data bus
System and method for implementing a secure processor data bus are described. One embodiment is a circuit comprising a processor disposed in a processor...
US-8,527,632 Secure transfer of data files
The secure transfer of data files between secure environments (202, 211) is disclosed. At a source environment (202) a user issues a request via a first local...
US-8,527,549 Cloud based operating and virtual file system
A method for managing a virtual distributed file system includes maintaining by a master device located in a cloud computing environment, a metadata data...
US-8,527,472 Method and apparatus of securely processing data for file backup, de-duplication, and restoration
Disclosed are an apparatus and method of restoring at least one data file. The method may include retrieving the at least one data file to be restored from a...
US-8,527,306 Automation and security application store suggestions based on claims data
A method, system, and computer-readable medium that facilitate the reception of usage data about the utilization of an intelligent home system and insurance...
US-8,527,299 System and method for managing pedigree information
Methods and systems are provided for managing and transmitting pedigree information. The methods and systems allow a user to access a pedigree information...
US-8,526,620 Method and system for secure data collection and distribution
A data provider generates a data encryption key and an identifier, uses the data encryption key to encrypt data, sends the encrypted data and the identifier to...
US-8,526,616 Method for payload encryption of digital voice or data communications
A process using code segment which is installed over a transport medium, using a device, such as a network, for transmitting real-time end-to-end encrypted...
US-8,526,608 Printing system and printer with electronic signature capability and method thereof
A printing system and printer with an electronic signature capability, and a method thereof are provided. To print security documents using an electronic...
US-8,526,605 Data encryption to provide data security and memory cell bit wear leveling
Method and apparatus for encrypting and storing data to provide data security and memory cell bit wear leveling. In accordance with various embodiments, input...
US-8,525,880 Security system including modular ring housing
A modular building system arrangement includes a plurality of electrical building systems. Each electrical building system has a housing with a mechanical...
US-8,525,670 Tracking device for hospitals, nursing homes, and private use
A tracking system including a tracking device and external transceivers for tracking a patient and providing patient data is presented. The device features a...
US-8,525,664 System and method for minimizing the amount of data being sent on a network for supervised security systems
A system and method are disclosed for communicating heartbeat signals representative of the condition of a security system to a monitoring station. A controller...
US-8,523,663 Transporting and using wagering game data
A wagering game system and its operations are described herein. In embodiments, the operations can include determining a connection of a portable wagering game...
US-8,522,355 System and method to force a mobile device into a secure state
Embodiments relate to systems and methods for implementation on a mobile device to force the mobile device into a secure state upon detection or determination...
US-8,522,352 Key device with external storage and the using method thereof
A key device with external storage and its method of use, which relates to the computer security technology field, is disclosed herein. The key device with...
US-8,522,351 Production security control apparatus for software products and control method thereof
The present invention relates to a production security control apparatus for software products and the control method thereof. The present invention uses...
US-8,522,337 Selecting a security format conversion for wired and wireless devices
A selection system and method to receive an indication of a security format from a network and to select one of a plurality of security format conversions based...
US-8,522,335 Token mediation service in a data management system
A method and system for mediating security tokens to authorization data transactions in a data management system. The methods and systems intercept a data...
US-8,522,326 System and method for authenticating a smart card using an authentication token transmitted to a smart card reader
A system for authentication comprises a mobile unit and a smart card reader. The mobile unit includes a security application that prevents access to...
US-8,522,316 Connector and method for providing access to a data-processing network for a data-processing device
The invention relates to a connector and also to a method for providing access to a data-processing network for a data-processing device, wherein an individual,...
US-8,522,115 Flash memory device and memory system comprising same
A flash memory device provided here comprises a user data area storing user data; and a security data area storing security data. The security data area stores...
US-8,522,069 Process for secure backspacing to a first data center after failover through a second data center and a network...
A method (100) is proposed for safely switching back to a first computer center (DC1) following failover by a second computer center (DC2), where at least one...
US-8,522,050 Systems and methods for securing information in an electronic file
A computer-implemented method for securing information in an electronic file is described. Data in the electronic file is automatically scanned. Sensitive...
US-8,522,046 Method, apparatus and system for acquiring service by portable device
The disclosure provides a method, an apparatus and a system for acquiring a service by a portable device, in order to solve the problem that the security of the...
US-8,522,044 Mechanism to handle events in a machine with isolated execution
A platform and method for secure handling of events in an isolated environment. A processor executing in isolated execution "IsoX" mode may leak data when an...
US-8,522,043 Hardware-based computer theft deterrence
A hardware-based security module is used to protect an electronic device, especially a portable electronic device. The security module may determine either via...
US-8,522,037 Motion-detecting device user authentication
Systems, methods, and computer program products are provided for user authentication required for conducting online financial institution transactions. The...
US-8,522,028 Method for secure data exchange between two devices
This invention concerns a safe data exchange method between two devices locally connected to one another. In a preferred embodiment, the first device (10) is a...
US-8,522,016 On-the-fly data masking
Described are methods, systems, and apparatus, including computer program products for securing data of a production server. The invention, in one ...
US-8,522,008 Portable security device and methods of user authentication
Disclosed a portable security device and methods for secure user authentication. The security device stores operating system agents that enable communication...
US-8,521,949 Data deleting method and apparatus
A data deleting method and apparatus is provided in embodiments of this application. The method comprises: when a file system detects a delete request for a...
US-8,521,808 Uploading and executing command line scripts
A mechanism is provided for a non-root-level user to execute command line script files via a generic command line interface. A command line interface in the...
US-8,521,637 Systems, methods, and computer program products for providing real time analytic widgets in a financial trading...
Methods, systems, and computer program products are provided for providing real time analytics and monitoring to a user of a securities trading system. In one...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.