Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,400,295 Human tracking device for hospitals, nursing homes, and private use
A tracking device for tracking a patient and providing patient data. The device features a base ring for securing around a patient's wrist or ankle, the base...
US-8,400,260 System and method for securing authorized access by a mobile data device of a document processing device
The subject application is directed to securing authorized access to a document processing device. Address information data associated with each mobile data...
US-8,399,973 Data storage and stackable configurations
A first memory device and second memory device have a same input/output layout configuration. To form a stack, the second memory device is secured to the first...
US-D678,653 Drive-up financial transaction machine
US-D678,084 Thermostat housing
US-RE44,098 Using accounting data based indexing to create a portfolio of assets
A system, method and computer program product creates an index based on accounting based data, as well as a portfolio of financial objects based on the index...
US-8,397,306 Security domain in virtual environment
A system, method and computer program product for an isolated security domain which is a bounded area of the VM for protected objects. The objects are software...
US-8,397,302 System and method for analyzing a process
A system for analyzing a process, comprising a model engine to generate a model of the environment using multiple components defining adjustable elements of the...
US-8,397,301 System and method for identifying and assessing vulnerabilities on a mobile communication device
The invention is a system and method for identifying, assessing, and responding to vulnerabilities on a mobile communication device. Information about the...
US-8,397,300 Detecting security vulnerabilities relating to cryptographically-sensitive information carriers when testing...
A system for detecting security vulnerabilities in computer software, including a cryptographic API identifier configured to identify a cryptographic API among...
US-8,397,294 Apparatus, system and method for preventing data loss
A device and method are provided for a device that communicates security information to a user entering content into the device. In an aspect, the device may...
US-8,397,288 System and method for operation of open connections for secure network communications
In one embodiment, a system for extending IPSec communication over a wireless mesh network is disclosed. A VPN appliance is operative to establish an end-to-end...
US-8,397,286 Bidirectional gateway with enhanced security level
A bidirectional gateway with enhanced security level between a high-security communication network and a low-security communication network. The return pathway...
US-8,397,084 Single instance storage of encrypted data
Described is a technology by which data is efficiently and securely stored in a single instance store. A hash value is computed from data in its unencrypted...
US-8,397,083 System and method for efficiently deleting a file from secure storage served by a storage system
A system and method efficiently deletes a file from secure storage, i.e., a cryptainer, served by a storage system. The cryptainer is configured to store a...
US-8,397,079 Method and apparatus for securing digital information on an integrated circuit read only memory during test...
The embodiments protect an IC against Design-For-Test (DFT) or other test mode attack. Secrets in ROM or PROM are secured. One embodiment for securing...
US-8,397,069 Methods and systems for protecting media content
Various embodiments provide methods and systems that utilize a protocol which enables media content protection by establishing a secure communication channel...
US-8,397,065 Secure content based routing in mobile ad hoc networks
Methods and systems for information dissemination in mobile ad hoc networks founded on Content Based Routing. The method comprises encoding, via an encoding...
US-8,397,057 Generic hub to increase security when accessing business systems
In a method and system for increasing security when accessing a business system, a generic hub receives a request having a first transfer protocol from a user...
US-8,397,042 Secure memory interface
A secure memory interface includes a reader block, a writer block, and a mode selector for detecting fault injection into a memory device when a secure mode is...
US-8,396,985 Packet sequence number tracking for an anti-replay window
Described embodiments provide a network processor that includes a security sub-processor to prevent replay attacks on the network processor. A memory stores an...
US-8,396,803 Medical data encryption for communication over a vulnerable system
A system for securing patient medical information for communication over a potentially vulnerable system includes separating patient's medical file into a...
US-8,396,423 Wireless communications system providing wireless message data delivery through intermediary wireless...
A wireless communications system may include a plurality of wireless communications devices (WCDs). A source WCD from among the plurality of WCDs may be...
US-8,395,963 Data security for dynamic random access memory at power-up
A circuit and method erase at power-up all data stored in a DRAM chip for increased data security. All the DRAM memory cells are erased by turning on the...
US-8,395,509 RFID tag assembly and method of managing a race
A race management system which includes an RFID tag located between an inner and outer layer and is removably secured to a participant's bib through a mounting...
US-8,395,506 Method and system for identifying missing items
A system for identifying a lost or stolen device includes a transmitter, a receiver and a computer. The transmitter is coupled to the device and transmits...
US-8,395,498 Wireless patient communicator employing security information management
A portable patient communicator (PPC) includes a portable housing supporting a processor, memory for storing medical and wireless radio firmware, first and...
US-8,395,478 Secure profile setting in a shared device
There is provided a system for secure profile setting that includes at least one shared device and an RFID reader module embedded in the at least one shared...
US-8,393,535 ID theft-reducing device to virtualize ID/transaction cards
One embodiment of a device to virtualize a multitude of identification and transaction cards comprises a programmable card, approximately the size of a standard...
US-8,393,070 Method and production line for laminate assembly
The production line according to the present invention is provided with a pressurization measurement apparatus adjacent to a press-working apparatus, a...
US-8,393,008 Hardware-based output protection of multiple video streams
Computer-readable media, computerized methods, and computer systems for managing dynamic allocation of one or more protected memory segments for storing content...
US-8,393,004 Systems and methods for protecting information used by mobile devices
The present disclosure generally pertains to systems and methods for protecting information for use by mobile devices. In one exemplary embodiment, a system...
US-8,393,001 Secure signature server system and associated method
A system, method and computer program product are provided for securely generating signatures. Initially received is a request to generate a signature at a...
US-8,392,969 Method and apparatus for hosting multiple tenants in the same database securely and with a variety of access modes
A method for managing multi-tenancy database access, including receiving credentials from a user associated with a first organization and a second organization,...
US-8,392,968 Stateless cryptographic protocol-based hardware acceleration
According to one embodiment of the invention, a method comprises an operation of commencing a first phrase and transfer processing of an authentication...
US-8,392,963 Techniques for tracking actual users in web application security systems
A method for tracking and identifying an identity of a user accessing a web application. An application normal behavior profile (NBP), wherein said NBP includes...
US-8,392,824 Method and apparatus for hardware XML acceleration
A method and apparatus for accelerating processing of a structured document. A hardware XML accelerator includes one or more processors (e.g., CMT processors),...
US-8,392,727 System and method for transparent disk encryption
A data storage system providing transparent encryption. The data storage system has a hardware encryption/decryption engine and a register coupled to the...
US-8,392,724 Information terminal, security device, data protection method, and data protection program
An information terminal that decrypts sealed data without returning program data after update to the state before update. The information terminal includes...
US-8,392,721 Method and system to electronically identify and verify an individual presenting himself for such...
A method and a system of electronically identifying and verifying an individual utilizing at least one biometric features of the individual is disclosed. The...
US-8,392,720 Security of data over a network
A method for securing data transmitted over a network to an image display device. In one embodiment, the method may include identifying at least one image...
US-8,392,714 Secure overlay manager protection
A method for protection of data includes maintaining a control parameter indicative of a current version of the data. The data is partitioned into multiple...
US-8,392,700 Apparatus and system for asymmetric security
An apparatus and system are disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications...
US-8,392,682 Storage security using cryptographic splitting
Methods and systems for administrative management of a secure data storage network are disclosed. One system includes a secure storage appliance configured to...
US-8,392,625 Methods and systems to implement a physical device to differentiate amongst multiple virtual machines of a host...
Methods and systems to implement a physical device to differentiate amongst multiple virtual machines (VM) of a computer system. The device may include a...
US-8,392,552 System and method for providing configurable security monitoring utilizing an integrated information system
A system and method for implementing an integrated information system are provided. A premises server is in communication with a variety of information sources...
US-8,392,496 Cluster architecture for network security processing
A computing device may be joined to a cluster by discovering the device, determining whether the device is eligible to join the cluster, configuring the device,...
US-8,392,344 Systems, devices, and methods for providing multiple services to premises over communication networks
Methods, systems, and devices for providing one or more virtual networks for a plurality of services are disclosed. The device may include a secure access node...
US-8,392,322 Transformation of a multi-leg security definition for calculation of implied orders in an electronic trading system
An electronic trading system utilizes a Match Engine that receives orders, stores them internally, calculates tradable combinations and advertises the...
US-8,392,318 Beehive planet method: collective property buying and mass securitization of real estate through a real estate...
Beehive Planet Method is a computerized method spanning Real Estate and Finance fields. It creates an investment avenue for the registered investor base of a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.