Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,401,933 Secure, differentiated reading of sensors and RFID tags
Secure access to inventory data concerning a supplier's product located at a seller's premises is provided by tagging units of product with a supplier...
US-8,401,875 Secured personal data handling and management system
A system, method and personal apparatus for managing highly secured personal data is provided. The system and the personal apparatus are complementary, both...
US-8,401,710 Wide-area, real-time monitoring and visualization system
A real-time performance monitoring system for monitoring an electric power grid. The electric power grid has a plurality of grid portions, each grid portion...
US-8,401,678 Mobile control and monitoring system
An HMI system with a mobile control and monitoring device for automation components of a technical system is provided. The HMI system includes means for a...
US-8,401,244 Method and system for securely authenticating user identity information
Systems and methods for providing secure identity authentication amongst devices using identity information contained therein to facilitate data synchronization...
US-8,401,190 Portable security module pairing
A method for pairing a first element and a second element, wherein the first element and the second element form a first decoding system among a plurality of...
US-8,401,186 Cloud storage data access method, apparatus and system based on OTP
The present application relates to cloud storage technology and especially relates to a cloud storage data access method, apparatus and system based on OTP....
US-8,401,185 Systems and methods for securely deduplicating data owned by multiple entities
A computer-implemented method for securely deduplicating data owned by multiple entities may include identifying a plurality of data segments to store on a...
US-8,401,183 Method and system for keying and securely storing data
An approach is provided for securely storing sensitive data. A system is provided that includes a central device configured to receive a key from a requester,...
US-8,401,155 Systems and methods for secure recording in a customer center environment
Systems and methods for secure recording in a customer center environment are provided. The system receives data related to a communication at a media...
US-8,400,671 System and method for selectively disabling document rendering
The subject application is directed to a system and method for selectively disabling document rendering. An electronic document is first generated having a...
US-8,400,295 Human tracking device for hospitals, nursing homes, and private use
A tracking device for tracking a patient and providing patient data. The device features a base ring for securing around a patient's wrist or ankle, the base...
US-8,400,260 System and method for securing authorized access by a mobile data device of a document processing device
The subject application is directed to securing authorized access to a document processing device. Address information data associated with each mobile data...
US-8,399,973 Data storage and stackable configurations
A first memory device and second memory device have a same input/output layout configuration. To form a stack, the second memory device is secured to the first...
US-D678,653 Drive-up financial transaction machine
US-D678,084 Thermostat housing
US-RE44,098 Using accounting data based indexing to create a portfolio of assets
A system, method and computer program product creates an index based on accounting based data, as well as a portfolio of financial objects based on the index...
US-8,397,306 Security domain in virtual environment
A system, method and computer program product for an isolated security domain which is a bounded area of the VM for protected objects. The objects are software...
US-8,397,302 System and method for analyzing a process
A system for analyzing a process, comprising a model engine to generate a model of the environment using multiple components defining adjustable elements of the...
US-8,397,301 System and method for identifying and assessing vulnerabilities on a mobile communication device
The invention is a system and method for identifying, assessing, and responding to vulnerabilities on a mobile communication device. Information about the...
US-8,397,300 Detecting security vulnerabilities relating to cryptographically-sensitive information carriers when testing...
A system for detecting security vulnerabilities in computer software, including a cryptographic API identifier configured to identify a cryptographic API among...
US-8,397,294 Apparatus, system and method for preventing data loss
A device and method are provided for a device that communicates security information to a user entering content into the device. In an aspect, the device may...
US-8,397,288 System and method for operation of open connections for secure network communications
In one embodiment, a system for extending IPSec communication over a wireless mesh network is disclosed. A VPN appliance is operative to establish an end-to-end...
US-8,397,286 Bidirectional gateway with enhanced security level
A bidirectional gateway with enhanced security level between a high-security communication network and a low-security communication network. The return pathway...
US-8,397,084 Single instance storage of encrypted data
Described is a technology by which data is efficiently and securely stored in a single instance store. A hash value is computed from data in its unencrypted...
US-8,397,083 System and method for efficiently deleting a file from secure storage served by a storage system
A system and method efficiently deletes a file from secure storage, i.e., a cryptainer, served by a storage system. The cryptainer is configured to store a...
US-8,397,079 Method and apparatus for securing digital information on an integrated circuit read only memory during test...
The embodiments protect an IC against Design-For-Test (DFT) or other test mode attack. Secrets in ROM or PROM are secured. One embodiment for securing...
US-8,397,069 Methods and systems for protecting media content
Various embodiments provide methods and systems that utilize a protocol which enables media content protection by establishing a secure communication channel...
US-8,397,065 Secure content based routing in mobile ad hoc networks
Methods and systems for information dissemination in mobile ad hoc networks founded on Content Based Routing. The method comprises encoding, via an encoding...
US-8,397,057 Generic hub to increase security when accessing business systems
In a method and system for increasing security when accessing a business system, a generic hub receives a request having a first transfer protocol from a user...
US-8,397,042 Secure memory interface
A secure memory interface includes a reader block, a writer block, and a mode selector for detecting fault injection into a memory device when a secure mode is...
US-8,396,985 Packet sequence number tracking for an anti-replay window
Described embodiments provide a network processor that includes a security sub-processor to prevent replay attacks on the network processor. A memory stores an...
US-8,396,803 Medical data encryption for communication over a vulnerable system
A system for securing patient medical information for communication over a potentially vulnerable system includes separating patient's medical file into a...
US-8,396,423 Wireless communications system providing wireless message data delivery through intermediary wireless...
A wireless communications system may include a plurality of wireless communications devices (WCDs). A source WCD from among the plurality of WCDs may be...
US-8,395,963 Data security for dynamic random access memory at power-up
A circuit and method erase at power-up all data stored in a DRAM chip for increased data security. All the DRAM memory cells are erased by turning on the...
US-8,395,509 RFID tag assembly and method of managing a race
A race management system which includes an RFID tag located between an inner and outer layer and is removably secured to a participant's bib through a mounting...
US-8,395,506 Method and system for identifying missing items
A system for identifying a lost or stolen device includes a transmitter, a receiver and a computer. The transmitter is coupled to the device and transmits...
US-8,395,498 Wireless patient communicator employing security information management
A portable patient communicator (PPC) includes a portable housing supporting a processor, memory for storing medical and wireless radio firmware, first and...
US-8,395,478 Secure profile setting in a shared device
There is provided a system for secure profile setting that includes at least one shared device and an RFID reader module embedded in the at least one shared...
US-8,393,535 ID theft-reducing device to virtualize ID/transaction cards
One embodiment of a device to virtualize a multitude of identification and transaction cards comprises a programmable card, approximately the size of a standard...
US-8,393,070 Method and production line for laminate assembly
The production line according to the present invention is provided with a pressurization measurement apparatus adjacent to a press-working apparatus, a...
US-8,393,008 Hardware-based output protection of multiple video streams
Computer-readable media, computerized methods, and computer systems for managing dynamic allocation of one or more protected memory segments for storing content...
US-8,393,004 Systems and methods for protecting information used by mobile devices
The present disclosure generally pertains to systems and methods for protecting information for use by mobile devices. In one exemplary embodiment, a system...
US-8,393,001 Secure signature server system and associated method
A system, method and computer program product are provided for securely generating signatures. Initially received is a request to generate a signature at a...
US-8,392,969 Method and apparatus for hosting multiple tenants in the same database securely and with a variety of access modes
A method for managing multi-tenancy database access, including receiving credentials from a user associated with a first organization and a second organization,...
US-8,392,968 Stateless cryptographic protocol-based hardware acceleration
According to one embodiment of the invention, a method comprises an operation of commencing a first phrase and transfer processing of an authentication...
US-8,392,963 Techniques for tracking actual users in web application security systems
A method for tracking and identifying an identity of a user accessing a web application. An application normal behavior profile (NBP), wherein said NBP includes...
US-8,392,824 Method and apparatus for hardware XML acceleration
A method and apparatus for accelerating processing of a structured document. A hardware XML accelerator includes one or more processors (e.g., CMT processors),...
US-8,392,727 System and method for transparent disk encryption
A data storage system providing transparent encryption. The data storage system has a hardware encryption/decryption engine and a register coupled to the...
US-8,392,724 Information terminal, security device, data protection method, and data protection program
An information terminal that decrypts sealed data without returning program data after update to the state before update. The information terminal includes...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.