Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,347,398 Selected text obfuscation and encryption in a local, network and cloud computing environment
A keyboarded a mix of private and public text composing a source-text document is submitted through an encryption adapter intersituated in a data signal link...
US-8,347,387 Addressing security in writes to memory
A computer includes a processor. When an instruction to be executed by the processor involves writing to memory, the write can be redirected to a temporary area...
US-8,347,115 System and method for transparent disk encryption
A data storage system providing transparent encryption. The data storage system has a hardware encryption/decryption engine and a register coupled to the...
US-8,347,111 Data processing apparatus
A data processing apparatus comprises a monolithic integrated circuit having a data processor, a non-volatile memory storing at least one security code, and at...
US-8,347,105 Method and system for obtaining a PIN validation signal in a data processing unit
The present invention relates to a method for obtaining a PIN validation signal in a data processing unit, the method including the steps of receiving a PIN in...
US-8,347,104 Security interface for a mobile device
A method and device are described which provide a security interface, preferably for a mobile device. The security interface provides user-selectable non-secure...
US-8,347,094 Securing wireless body sensor networks using physiological data
A password protocol for establishing secure communications between sensor nodes in a network using secure environmental values (SEV). A first sensor sends a...
US-8,347,088 Security systems and methods for use with structured and unstructured data
Disclosed herein are systems and methods including hardware, software and electronic service components and systems to provide large-scale, reliable, and secure...
US-8,347,085 Integrating security protection tools with computer device integrity and privacy policy
At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and...
US-8,347,073 Inspection and rewriting of cryptographically protected data from group VPNs
Systems, methods, and other embodiments associated with processing secure network traffic are described. One example method includes determining whether a...
US-8,347,072 Method and apparatus for secure execution using a secure memory partition
A processor capable of secure execution. The processor contains an execution unit and secure partition logic that secures a partition in memory. The processor...
US-8,346,969 Scalable network apparatus for content based switching or validation acceleration
A network apparatus is provided that may include one or more security accelerators. The network apparatus also includes a plurality of network units cascaded...
US-8,346,925 Apparatus for providing security over untrusted networks
A network security apparatus adapted to provide for secure communications across data networks, including untrusted networks. In one embodiment, the security...
US-8,346,918 Apparatus and method for biased and weighted sampling of network traffic to facilitate network monitoring
An apparatus is described that performs biased and weighted sampling of network traffic to facilitate network monitoring. One embodiment of the apparatus...
US-8,346,849 Security and support for flexible conferencing topologies spanning proxies, firewalls and gateways
A method and system for setting up and managing secure data/audio/video conferences with a wide range of topologies is described. The disclosed method and...
US-8,346,646 Financial market replicator and simulator
A financial market replicator, simulator, and trainer/annotator (FMRS) intermixes and records data streams of real time financial market data from a variety of...
US-8,346,645 Integrated investment management system with network datafeed and incremental database refresh
An investment management computer system is configured to communicate with data vendors or electronic accounting systems. The system may include an electronic...
US-8,346,636 Processing system for acquiring and reporting compliance with data security requirements
Methods, systems, and machine-readable media are disclosed for tracking and reporting information related to compliance with a set of security requirements by...
US-8,346,215 Retrospective implementation of SIM capabilities in a security module
The invention relates to a method for subsequently implementing a SIM functionality, with the help of which a mobile telephone (1) is enabled to use a mobile...
US-8,346,186 Method and apparatus for dynamic configuration of multiprocessor system
A multiprocessor system used in a car, home, or office environment includes multiple processors that run different real-time applications. A dynamic...
US-8,346,056 Graphical bookmarking of video data with user inputs in video surveillance
A method and apparatus are provided for processing video. The method includes the steps of a security system providing video of a secured area, a security...
US-8,345,993 Electronic coding system for security of identification
A multi-level data encoding system is provided that is operable on a computer. The encoding system includes a data input device adapted to input a data set and...
US-8,345,923 System for automated screening of security cameras
The present invention involves a system for automatically screening closed circuit television (CCTV) cameras for large and small scale security systems, as used...
US-8,345,879 Securing wireless body sensor networks using physiological data
A computer implemented method, apparatus, and computer program product for securing wireless body sensor networks with a three party password protocol. The...
US-8,345,866 Secure data transfer on a handheld communications device
A handheld communications device comprises a display device, and a data processor that is in communication with the display device. The data processor is...
US-8,345,692 Virtual switching overlay for cloud computing
In one embodiment, a method includes receiving data at a virtual switch located at a network device in a cloud network. The data is received from an external...
US-8,345,604 Effectuating establishment of internet protocol security tunnels for utilization in a wireless communication...
Systems and methodologies are described that effectuate establishment of an IPSec tunnel for utilization in a wireless communication environment. IPSec...
US-8,345,316 Layered security in digital watermarking
A media object authentication system uses layers of security features based on digital watermarks embedded in media objects. The system generates a first...
US-8,345,309 Secure printing-out using color toner and particular toner
An image processing apparatus forming an image with color toners used for full color printing and a particular toner is provided. The apparatus comprises a...
US-8,344,958 Secured document with a contactless chip with protection of date against unauthorized access
The invention relates to a secured document in the form of a booklet of at least one sheet which may be folded about a folding axis, the document having a...
US-8,344,853 Secure RFID system and method
The present invention relates to a system and method for providing security in an RFID system and provides a secure active RFID architecture that uses a...
US-8,341,848 Method and apparatus for vehicle service system optical target assembly
A method and apparatus for determining the alignment of a vehicle wheel using an optical target assembly secured to the vehicle wheel in a non-determined...
US-RE43,906 Method and apparatus for securing digital assets
Digital assets are in a secured form that only those with granted access rights can access. Even with the proper access privilege, when a secured file is...
US-8,341,758 Secure device and method for preventing side channel attack
Provided are a secure device and method for preventing a side channel attack. The secure device includes a secure module converting plaintext data received from...
US-8,341,756 Securing data in a networked environment
Apparatus for securing data, comprising: an isolated processing environment having a boundary across which data cannot cross and a channel for allowing data to...
US-8,341,723 Filtering kernel-mode network communications
Some embodiments of the invention are directed to techniques for determining whether a process on a computer system that is sending or receiving data, or is...
US-8,341,719 Secure transmitting method, a system, a firewall, and a router using the method
Data packets are transmitted in a secure manner from an external network to a secure network. The secure network and the external network are interconnected via...
US-8,341,714 Security token and method for authentication of a user with the security token
A security token includes (a) a personal data memory configured to store digital identity credentials related to personal data of a user; (b) an input appliance...
US-8,341,713 Device, system and method of performing an administrative operation on a security token
Some demonstrative embodiments of the invention include a method, device and/or system of performing an administrative operation on a user token. The method may...
US-8,341,693 Enterprise-wide security system for computer devices
A system and method for securing data in mobile devices (104) includes a computing mode (102) and a plurality of mobile devices (104). A node security program...
US-8,341,642 Information processing apparatus, information processing method, program and information processing system
An IC chip in which secure information is recorded is mounted on an information processing apparatus. The information processing apparatus is connected to a...
US-8,341,475 Microprocessor comprising signature means for detecting an attack by error injection
A method for monitoring the execution of a sequence of instruction codes in an integrated circuit comprising a central processing unit provided for executing...
US-8,341,423 Machine, machine management apparatus, system, and method, and recording medium
A machine management method includes installing software in a machine including a security device that holds a secret key unextractable from the security device...
US-8,341,408 System and method for providing variable security level in a wireless communication system
A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of...
US-8,341,407 Method and system for protecting electronic data in enterprise environment
Even with proper access privilege, when a secured file is classified, at least security clearance (e.g. a clearance key) is needed to ensure those who have the...
US-8,341,404 System and method for intelligence based security
Included in the present disclosure are a system, method and program of instructions operable to protect vital information by combining information about a user...
US-8,341,397 Security system for handheld wireless devices using-time variable encryption keys
In one embodiment, the invention provides a portable wireless personal communication system for cooperating with a remote certification authority to employ time...
US-8,341,389 Device, systems, and method for securely starting up a computer installation
A device for the secured start-up of a computer installation comprising a first connection interface to the computer installation and a second connection...
US-8,341,356 Protected cache architecture and secure programming paradigm to protect applications
Embodiments of the present invention provide a secure programming paradigm, and a protected cache that enable a processor to handle secret/private information...
US-8,341,275 Access and control system for network-enabled devices
Systems and methods for remote access of network-enabled devices that provide seamless, firewall-compliant connectivity between multiple users and multiple...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.