Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,305,647 Printing device and printing method
The present invention provides an information printing method and a printing device, which assure a higher level of security when outputting printed matter. The...
US-8,304,776 Thin film transistor substrate and method for fabricating the same
The present invention relates to a thin film transistor substrate and method for fabricating the same which can secure an alignment margin and reduce the number...
US-8,302,600 Battery management for a breathing assistance system
A method for providing battery security in a breathing assistance system configured to provide breathing assistance to a patient is provided. A battery security...
US-8,302,201 Security and licensing with application aware storage
Described are techniques for processing a data storage configuration request for an application. The data storage configuration request is received from a...
US-8,302,197 Identifying data associated with security issue attributes
A method for identifying data related to a software security issue is provided. The method includes accessing a software security issue and determining one or...
US-8,302,196 Combining assessment models and client targeting to identify network security vulnerabilities
Described is a technology for managing network security by having network clients that are capable of self-assessment assess themselves for security risks...
US-8,302,189 Methods, devices, systems, and computer program products for edge driven communications network security monitoring
An edge monitoring approach can be utilized to detect an attack which includes a plurality of relatively low bandwidth attacks, which are aggregated at a victim...
US-8,302,171 System and method for privilege delegation and control
This invention provides a privilege delegation mechanism, which allows a privilege and associated control attributes to be delegated from a security token to...
US-8,302,170 Method for enhancing network application security
A method for securing communications between a server and an application downloaded over a network onto a client of the server is disclosed. A first request is...
US-8,301,911 Key storage administration
The present invention relates to a method and a system for allowing multiple applications to manage their respective data in a device (100, 200) having a secure...
US-8,301,908 Data security in an information processing device
A device and method for data protection of inputted and stored publicly encrypted data. Publicly encrypted data can be received by a data receiver module and...
US-8,301,895 Identity based network policy enablement
Enhanced network data transmission security and individualized data transmission processing can be implemented by intermediaries in a communication path between...
US-8,301,888 System and method for generating secured authentication image files for use in device authentication
A secure authentication image file is generated for use in authenticating a device. The device performs a secure authentication algorithm on the secure...
US-8,301,856 Restricting memory areas for an instruction read in dependence upon a hardware mode and a security flag
An apparatus for processing data 2 includes a processor 8, a memory 6 and memory control circuitry 12. The processor 8 operates in a plurality of hardware modes...
US-8,301,834 System for determining allocation of tape drive resources for a secure data erase process
A system is provided to ensure a timely secure data erase by determining whether allocating an additional tape drive would improve secure data erase performance...
US-8,301,785 Data transferring method and content transferring method
In a method of transferring data in a data interoperable environment, a secure authenticated channel is established with a receiving entity corresponding to...
US-8,301,572 Cryptographic module for secure processing of value-bearing items
An on-line value bearing item (VBI) printing system that includes one or more cryptographic modules and a central database is disclosed. The cryptographic...
US-8,301,570 Method and system for data security in an IMS network
A method and system to enhance the protection of the data in an user equipment and secure real time streaming of the data in the user equipment is disclosed....
US-8,301,548 Methods and systems related to securities trading
One exemplary aspect comprises: (a) receiving data describing an executed trading order in a market traded security and related trade execution data; (b)...
US-8,301,527 Systems and methods for improving investment performance
Methods for a data processor implemented system monitor for enabling persons to turn over the allocation their investment assets, and/or receive assistance...
US-8,301,494 Method and system for managing inventory and promotions campaign based on redemption data
Provided is a method and system for the management of inventory and/or promotional campaigns associated with electronic distribution of secure money saving or...
US-8,301,386 Classification and web-based presentation of oil and gas SCADA data
Disclosed are techniques for acquiring, processing and presenting data produced by one or more devices and meters in the field. One or more servers, such as...
US-8,301,300 System and method for smart card personalization
A smart card personalization system maintains a database containing card issuer data format templates, card applications, card operating system commands, and...
US-8,301,032 Wide field-of-view amplified fiber-retro for secure high data rate communications and remote data transfer
An optical system for remotely optical communications at a high data rate between a base station and a remote station under atmospheric turbulence conditions is...
US-8,300,890 Person/object image and screening
A first set of unknown pixels is determined for which being located in the foreground portion does not in-and-of-itself determine the pixel to be part of the...
US-8,300,828 System and method for a derivation function for key per page
Disclosed herein are systems, methods and computer-readable media to perform data encryption and decryption using a derivation function to obtain a key per page...
US-8,300,822 System for secure packet communication
A system for processing a communication data item. The communication data item is divided into at least two unencrypted packets to be encrypted. Each encrypted...
US-8,300,794 Communication control method, communication system and communication controller
The same number is redundantly set as the extension number associated to a fourth telephone number in different data tables associated to different second...
US-8,300,470 Two terminal programmable hot channel electron non-volatile memory
A programmable two terminal non-volatile device uses a floating gate that can be programed by a hot electron injection induced by a potential between a source...
US-8,299,914 Method and system for providing tracking services to locate an asset
In a method of asset location data is received from a cellular transmitter associated with a selected asset, which location data includes data representative of...
US-8,297,523 Secure barcode
A graphically represented, machine-readable code having a first abstract part and a second part comprises a contrived code having pre-associated data, wherein...
US-8,297,308 Cartridge
The invention relates to a cartridge (1) for insertion into a receptacle of a motor vehicle handling facility having an interior chamber (2) which receives a...
US-8,296,851 System and method for ensuring security of data stored on electronic computing devices
A system and method for using a host electronic computing device to prevent access to data in a preselected memory portion of an electronic computing device...
US-8,296,846 Apparatus and method for associating categorization information with network traffic to facilitate application...
An apparatus is described that associates categorization information with network traffic to facilitate application level processing through processing of...
US-8,296,834 Secure single-sign-on portal system
A computer-implemented portal system facilitates access to secure data and multiple secure-access internet sites. The system authenticates a user based on a...
US-8,296,828 Transforming claim based identities to credential based identities
Claim based identities are transformed to a set of credentials and securely stored in a secure data store using a number of encryption schemes. The credentials...
US-8,296,757 Copy protection of software and/or data
Autorun functionality is incorporated into a portable device such as a flash drive, a wireless adapter, a communication adapter, or any USB peripheral device....
US-8,296,584 Storage and retrieval of encrypted data blocks with in-line message authentication codes
Techniques are disclosed for in-line storage of message authentication codes with respective encrypted data blocks. In one aspect, a given data block is...
US-8,296,570 Flexible method of user authentication
A method of authorizing a user in communication with a workstation is disclosed. According to the method, a system automatically determines a plurality of...
US-8,296,538 Storing secure mode page table data in secure and non-secure regions of memory
Apparatus for data processing 2 is provided with processing circuitry 8 which operates in one or more secure modes 40 and one or more non-secure modes 42. When...
US-8,296,477 Secure data transfer using legitimate QR codes wherein a warning message is given to the user if data transfer...
User data is securely transferred from a client device to a mobile device. Data transfer activities at the client are monitored to detect a request to transfer...
US-8,296,462 Header-based network API
A method and apparatus for communicating with entities outside of a secure network by intercepting and modifying messages is provided. Techniques for...
US-8,296,323 Personal data subscriber systems and methods
Methods and systems for facilitating the propagation of personal data include a Personal Data Propagation Environment ("PDP environment") that facilitates the...
US-8,296,301 Systems and methods for probabilistic data classification
A system for performing data classification operations. In one embodiment, the system comprises a filesystem configured to store a plurality of computer files...
US-8,296,269 Apparatus and method for read consistency in a log mining system
A computer readable storage medium includes executable instructions to receive a specification for requested data in a log based replication system where data...
US-8,296,244 Method and system for standards guidance
A method and system for guiding end-users with respect to payment card data security standards. The system uses guidance questions that are worded simply and...
US-8,296,221 Methods and systems related to securities trading
At least one exemplary aspect comprises a method comprising: (a) receiving electronic data describing a trading order for a market-traded security; (b) checking...
US-8,295,851 Realtime, interactive and geographically defined computerized personal matching systems and methods
A system and method of interactive and live computerized matching in which a first user is provided with a personal data device including a wireless...
US-8,295,808 Secure remote subscription module access
Disclosed is a method of granting a client communications terminal access to a subscription module of a server communications terminal, the method comprising...
US-8,295,773 Communication apparatus and communication system
Remote control data is securely transmitted to a device under control. A remote control device transmits an acknowledge request for A ch to the device under...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.