Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,340,282 Information processing apparatus
A high-security cryptanalysis-resistant cryptographic processing apparatus and a cryptographic processing method are provided. A Feistel common key block cipher...
US-8,340,266 Online reporting tool for conferencing customers
Embodiments consistent with the present invention provide an integrated system for conferencing services reporting to support customer billing needs. Systems...
US-8,340,103 System and method for creating a secure tunnel for communications over a network
A system and method for establishing a virtual local area network (LAN) between a local device and a remote device are provided. The local device and the remote...
US-8,339,632 Fiscal printer
A fiscal printer reliably stores and holds, using a simple configuration, the date and time that a fiscal control circuit board is removed from the printer, and...
US-8,339,455 System for monitoring persons by using cameras
According to one embodiment, a monitoring system is provided, which has a personal authentication unit and a camera. The personal authentication unit is...
US-8,339,282 Security systems
A vehicle detection system for detecting the presence of at least part of a vehicle in image data, the system comprising: an interface configured to receive...
US-8,339,244 Asset tag power optimization
A technique for saving power in a tag that is operationally connected to an asset involves using telemetry data to enter an appropriate power state. An asset...
US-8,336,766 Banking system controlled responsive to data read from data bearing records
An automated banking machine is part of a banking system that operates to cause financial transfers responsive to data read from data bearing records. The...
US-D673,164 Data accessing device
US-8,336,111 Communication device and method for securing data
A communication device and method for securing data include connecting a processor and at least one storage device via active pins of a switch in the...
US-8,336,102 Delivering malformed data for fuzz testing to software applications
Systems and methods to deliver malformed data for software application fuzzing are described. In one aspect, a fuzzing engine receives well-formed valid input...
US-8,336,100 Systems and methods for using reputation data to detect packed malware
A computer-implemented method for using reputation data to detect packed malware may include: 1) identifying a file downloaded from a portal, 2) determining...
US-8,336,099 Methods, hardware products, and computer program products for implementing introspection data comparison...
Introspection data comparison is implemented utilizing hypervisor guest introspection data. A hypervisor shim on a hypervisor is used to construct one or more...
US-8,336,093 Abnormal IPSec packet control system using IPSec configuration and session data, and method thereof
An abnormal Internet Protocol Security (IPSec) packet control system and method utilizes IPSec configuration and session data to detect whether or not packets...
US-8,336,092 Communication control device and communication control system
The present invention provides a technique for improving the security of access to contents. A virus/phishing site list contains a list of URLs of phishing...
US-8,336,085 Tuning product policy using observed evidence of customer behavior
A computer adapted for pay-as-you go or other metered use has a policy for determined what measurements to take to detect fraud as well as steps to take when...
US-8,336,077 System and method for internet access to a personal television service
A communication system and a family of methods for remote access to personal television service are disclosed. According to this invention, a remote personal TV...
US-8,335,933 Two-party storage of encrypted sensitive information
A secure storage system secures information of a client by first encrypting the information with a first key to generate first-key encrypted data. The secure...
US-8,335,932 Local trusted services manager for a contactless smart card
Systems, methods, computer programs, and devices are disclosed herein for deploying a local trusted service manager within a secure element of a contactless...
US-8,335,931 Interconnectable personal computer architectures that provide secure, portable, and persistent computing...
Disclosed are interconnectable personal computer architectures comprising secure, portable and persistent computing environments that provide secure computing...
US-8,335,925 Method and arrangement for secure authentication
A method and arrangement for utilising a generally available personal data terminal as a secure and reliable authentication factor for user authentication is...
US-8,335,921 Writing application data to a secure element
Systems, methods, computer programs, and devices are disclosed herein for partitioning the namespace of a secure element in contactless smart card devices and...
US-8,335,920 Recovery of data access for a locked secure storage device
A system for recovery of data access of a locked secure storage device can comprise a keystore module and an authorization module. The keystore module may be...
US-8,335,918 MAC frame provision method and apparatus capable of establishing security in IEEE 802.15.4 network
A medium access control (MAC) frame provision method establishes security in an IEEE 802.15.4 network. A MAC frame is generated, which includes a MAC header, a...
US-8,335,916 Secure request handling using a kernel level cache
The present invention discloses a system, method, apparatus, and computer usable product code for handling requests. The invention can include a kernel level...
US-8,335,915 Encryption based security system for network storage
The presently preferred embodiment of the invention provides an encryption based security system for network storage that separates the ability to access...
US-8,335,762 Resource tracking
Clients may subscribe to resources for the purpose of receiving notifications of changes in the resource (e.g., a file is added to a shared folder). Storing...
US-8,335,314 Adaptive and secure modular connection
A method and system to increase the security of messages transmitted over an otherwise unsecured network. A secure channel is established in a normal manner...
US-8,335,189 Operation of control protocol data units in packet data convergence protocol
A method and apparatus reports packet data control protocol (PDCP) status and PDCP resets in a wireless communication, using control PDUs that may have security...
US-8,332,953 Receiving policy data from a server to address theft and unauthorized access of a client
Techniques for securing a client. When a client, such as a portable computer, undergoes a change in operational state, an operating system agent sends a state...
US-8,332,948 Intelligent integrated network security device
Methods, computer program products and apparatus for processing data packets are described. Methods include receiving the data packet, examining the data...
US-8,332,934 Unit using operating system and image forming apparatus using the same
A chip mountable on a customer replaceable unit monitoring memory (CRUM) unit used in an image forming job includes a central processing unit (CPU) with an...
US-8,332,925 System and method for distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server based on...
US-8,332,922 Transferable restricted security tokens
In a web-based service environment, third party providers need to have varying degrees of access to user data for their complementary services. To prevent third...
US-8,332,917 Providing secure dynamic role selection and managing privileged user access from a client device
An approach is provided that receives a first role selection from a client device. Each of the roles includes various user accounts provisioned to access...
US-8,332,834 Generation of a program code in a load format and provision of an executable program code
In a method for generating program code in a load format for a portable data carrier, a pseudo library is used, which differs from the library located on the...
US-8,332,821 Using encoding to detect security bugs
A system that facilitates detecting security flaws in a web site that receives and transmits untrusted content is described herein. The system includes a...
US-8,332,660 Providing secure services to a non-secure application
A data processor for processing data in a secure mode having access to secure data that is not accessible to the data processor when processing data in the...
US-8,332,655 Method for order invariant correlated encrypting of data and SQL queries for maintaining data privacy and...
According to one embodiment of the present invention, a method for debugging a computer system is provided. According to one embodiment of the invention, a...
US-8,332,654 Secure framework for invoking server-side APIs using AJAX
Techniques for securely invoking a server-side API from client-side Web application code using AJAX. In one set of embodiments, a request to invoke a...
US-8,332,653 Secure processing environment
Secure operations and components may be integrated into a conventional processing system executing a standard operating system. A secure processing environment...
US-8,332,638 Secure data parser method and system
The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention...
US-8,332,636 Secure policy differentiation by secure kernel design
A method, computer program product, and data processing system are disclosed for ensuring that applications executed in the data processing system originate...
US-8,332,635 Updateable secure kernel extensions
A method, computer program product, and data processing system provide an updateable encrypted operating kernel. Secure initialization hardware decrypts a...
US-8,332,633 Encryption processing for streaming media
A method of securing transmission of streaming media by encrypting each packet in the stream with a packet key using a fast encryption algorithm. The packet key...
US-8,332,599 Method for determining allocation of tape drive resources for a secure data erase process
A method and computer program product are provided to ensure a timely secure data erase by determining whether allocating an additional tape drive would improve...
US-8,332,526 Data communication protocol including negotiation and command compounding
Described is a data communication protocol, in which a client and server negotiate in a manner that does not require the client to retry negotiation when...
US-8,332,524 Information on demand process framework to generate, manage, secure, and deploy browsers and application...
Disclosure is a method and system for delivering a reusable framework. The disclosure invokes an interface to define an information service within the reusable...
US-8,332,511 System and method for providing a script-based collection for devices in a network environment
A method is provided in one example and includes verifying a storage capacity of a network element coupled to an end device over a network connection. The...
US-8,332,325 Encryption switch processing
A method for delivering non-financial electronic data through a secure communications channel between a payment processing network and an access device is...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.