Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,341,719 Secure transmitting method, a system, a firewall, and a router using the method
Data packets are transmitted in a secure manner from an external network to a secure network. The secure network and the external network are interconnected via...
US-8,341,714 Security token and method for authentication of a user with the security token
A security token includes (a) a personal data memory configured to store digital identity credentials related to personal data of a user; (b) an input appliance...
US-8,341,713 Device, system and method of performing an administrative operation on a security token
Some demonstrative embodiments of the invention include a method, device and/or system of performing an administrative operation on a user token. The method may...
US-8,341,693 Enterprise-wide security system for computer devices
A system and method for securing data in mobile devices (104) includes a computing mode (102) and a plurality of mobile devices (104). A node security program...
US-8,341,642 Information processing apparatus, information processing method, program and information processing system
An IC chip in which secure information is recorded is mounted on an information processing apparatus. The information processing apparatus is connected to a...
US-8,341,475 Microprocessor comprising signature means for detecting an attack by error injection
A method for monitoring the execution of a sequence of instruction codes in an integrated circuit comprising a central processing unit provided for executing...
US-8,341,423 Machine, machine management apparatus, system, and method, and recording medium
A machine management method includes installing software in a machine including a security device that holds a secret key unextractable from the security device...
US-8,341,408 System and method for providing variable security level in a wireless communication system
A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of...
US-8,341,407 Method and system for protecting electronic data in enterprise environment
Even with proper access privilege, when a secured file is classified, at least security clearance (e.g. a clearance key) is needed to ensure those who have the...
US-8,341,404 System and method for intelligence based security
Included in the present disclosure are a system, method and program of instructions operable to protect vital information by combining information about a user...
US-8,341,397 Security system for handheld wireless devices using-time variable encryption keys
In one embodiment, the invention provides a portable wireless personal communication system for cooperating with a remote certification authority to employ time...
US-8,341,389 Device, systems, and method for securely starting up a computer installation
A device for the secured start-up of a computer installation comprising a first connection interface to the computer installation and a second connection...
US-8,341,356 Protected cache architecture and secure programming paradigm to protect applications
Embodiments of the present invention provide a secure programming paradigm, and a protected cache that enable a processor to handle secret/private information...
US-8,341,275 Access and control system for network-enabled devices
Systems and methods for remote access of network-enabled devices that provide seamless, firewall-compliant connectivity between multiple users and multiple...
US-8,341,087 Method for implementing and application of a secure processor stick (SPS)
Systems and methods for implementing a secure processor stick are described. In one aspect, the system for implementing a secure processor stick with a...
US-8,341,086 End-to-end secure payment processes
Systems and method for performing secure electronic payment transactions to allow merchants to perform payment processing such that the merchant payment system...
US-8,341,043 Dynamic prepayment risk management
A system and method are disclosed for monitoring, managing and reporting credit card prepayment risk for an issuing bank. Sales data, corresponding payment data...
US-8,340,299 Key management system and method
Methods and systems are disclosed for providing secured data transmission and for managing cryptographic keys. One embodiment of the invention provides secure...
US-8,340,298 Key management and user authentication for quantum cryptography networks
Key management and user authentication systems and methods for quantum cryptography networks that allow for users securely communicate over a traditional...
US-8,340,291 Systems and processes of automatic verification and protection of paper documents against falsification,...
Protection of documents printed in paper is provided by processes for detection, immediately and clearly, of different types of falsification, adulteration,...
US-8,340,282 Information processing apparatus
A high-security cryptanalysis-resistant cryptographic processing apparatus and a cryptographic processing method are provided. A Feistel common key block cipher...
US-8,340,266 Online reporting tool for conferencing customers
Embodiments consistent with the present invention provide an integrated system for conferencing services reporting to support customer billing needs. Systems...
US-8,340,103 System and method for creating a secure tunnel for communications over a network
A system and method for establishing a virtual local area network (LAN) between a local device and a remote device are provided. The local device and the remote...
US-8,339,632 Fiscal printer
A fiscal printer reliably stores and holds, using a simple configuration, the date and time that a fiscal control circuit board is removed from the printer, and...
US-8,339,455 System for monitoring persons by using cameras
According to one embodiment, a monitoring system is provided, which has a personal authentication unit and a camera. The personal authentication unit is...
US-8,339,282 Security systems
A vehicle detection system for detecting the presence of at least part of a vehicle in image data, the system comprising: an interface configured to receive...
US-8,339,244 Asset tag power optimization
A technique for saving power in a tag that is operationally connected to an asset involves using telemetry data to enter an appropriate power state. An asset...
US-8,336,766 Banking system controlled responsive to data read from data bearing records
An automated banking machine is part of a banking system that operates to cause financial transfers responsive to data read from data bearing records. The...
US-D673,164 Data accessing device
US-8,336,111 Communication device and method for securing data
A communication device and method for securing data include connecting a processor and at least one storage device via active pins of a switch in the...
US-8,336,102 Delivering malformed data for fuzz testing to software applications
Systems and methods to deliver malformed data for software application fuzzing are described. In one aspect, a fuzzing engine receives well-formed valid input...
US-8,336,100 Systems and methods for using reputation data to detect packed malware
A computer-implemented method for using reputation data to detect packed malware may include: 1) identifying a file downloaded from a portal, 2) determining...
US-8,336,099 Methods, hardware products, and computer program products for implementing introspection data comparison...
Introspection data comparison is implemented utilizing hypervisor guest introspection data. A hypervisor shim on a hypervisor is used to construct one or more...
US-8,336,093 Abnormal IPSec packet control system using IPSec configuration and session data, and method thereof
An abnormal Internet Protocol Security (IPSec) packet control system and method utilizes IPSec configuration and session data to detect whether or not packets...
US-8,336,092 Communication control device and communication control system
The present invention provides a technique for improving the security of access to contents. A virus/phishing site list contains a list of URLs of phishing...
US-8,336,085 Tuning product policy using observed evidence of customer behavior
A computer adapted for pay-as-you go or other metered use has a policy for determined what measurements to take to detect fraud as well as steps to take when...
US-8,336,077 System and method for internet access to a personal television service
A communication system and a family of methods for remote access to personal television service are disclosed. According to this invention, a remote personal TV...
US-8,335,933 Two-party storage of encrypted sensitive information
A secure storage system secures information of a client by first encrypting the information with a first key to generate first-key encrypted data. The secure...
US-8,335,932 Local trusted services manager for a contactless smart card
Systems, methods, computer programs, and devices are disclosed herein for deploying a local trusted service manager within a secure element of a contactless...
US-8,335,931 Interconnectable personal computer architectures that provide secure, portable, and persistent computing...
Disclosed are interconnectable personal computer architectures comprising secure, portable and persistent computing environments that provide secure computing...
US-8,335,925 Method and arrangement for secure authentication
A method and arrangement for utilising a generally available personal data terminal as a secure and reliable authentication factor for user authentication is...
US-8,335,921 Writing application data to a secure element
Systems, methods, computer programs, and devices are disclosed herein for partitioning the namespace of a secure element in contactless smart card devices and...
US-8,335,920 Recovery of data access for a locked secure storage device
A system for recovery of data access of a locked secure storage device can comprise a keystore module and an authorization module. The keystore module may be...
US-8,335,918 MAC frame provision method and apparatus capable of establishing security in IEEE 802.15.4 network
A medium access control (MAC) frame provision method establishes security in an IEEE 802.15.4 network. A MAC frame is generated, which includes a MAC header, a...
US-8,335,916 Secure request handling using a kernel level cache
The present invention discloses a system, method, apparatus, and computer usable product code for handling requests. The invention can include a kernel level...
US-8,335,915 Encryption based security system for network storage
The presently preferred embodiment of the invention provides an encryption based security system for network storage that separates the ability to access...
US-8,335,762 Resource tracking
Clients may subscribe to resources for the purpose of receiving notifications of changes in the resource (e.g., a file is added to a shared folder). Storing...
US-8,335,314 Adaptive and secure modular connection
A method and system to increase the security of messages transmitted over an otherwise unsecured network. A secure channel is established in a normal manner...
US-8,335,189 Operation of control protocol data units in packet data convergence protocol
A method and apparatus reports packet data control protocol (PDCP) status and PDCP resets in a wireless communication, using control PDUs that may have security...
US-8,332,953 Receiving policy data from a server to address theft and unauthorized access of a client
Techniques for securing a client. When a client, such as a portable computer, undergoes a change in operational state, an operating system agent sends a state...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.