Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,280,057 Method and apparatus for providing security in wireless communication networks
A method includes receiving data at a first wireless node in a wireless network, where the data is associated with an industrial control and automation system....
US-8,280,054 Scrambling and descrambling systems for secure communication
Various embodiments of the present invention are directed to scrambling-descrambling systems for encrypting and decrypting electromagnetic signals transmitted...
US-8,280,051 Secure presentation of media streams in response to encrypted content
Secure presentation of media streams includes encoding the media streams into digital content, encrypting a portion of that digital content, the portion being...
US-8,280,047 Method and system for securing data utilizing redundant secure key storage
A data processing device and method adapted for key management are provided. A first encryption key associated with a first password is generated, and at least...
US-8,280,043 System and method for protecting data in a secure system
A system for protecting data in a security system generates and encodes a backup key for encoding long-lived secrets. The system generates a distribution plan...
US-8,280,041 Chinese remainder theorem-based computation method for cryptosystems
A computer hardware implemented cryptography method computes a modular exponentiation, M :=Cd (mod pq), upon a message data value C using a Chinese Remainder...
US-8,276,845 Advanced aircraft cockpit
An aircraft cockpit that includes comfort and/or security adjustable equipment in which the adjustments are controlled by an adjustment management system so...
US-8,276,202 Cloud-based gateway security scanning
Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway...
US-8,276,200 Systems and methods for securely processing sensitive streams in a mixed infrastructure
A system and method for securely processing sensitive streams in a mixed infrastructure includes analyzing a stream to determine data sensitivity. A likelihood...
US-8,276,186 System and method for synchronizing security settings of control systems
A method for communicating data between a first and second control system (FCS and SCS). FCS (202) controls a first process (FP) having first security data...
US-8,276,185 Enhanced security memory access method and architecture
A memory device includes: at least one storage area for storing data; a protection control structure adapted to selectively allow an external device access to...
US-8,275,995 Identity authentication and secured access systems, components, and methods
Security tokens contain data that is each uniquely encrypted based on a unique biometric identifier of an authorized user of that token. Decoders receive the...
US-8,275,989 Method of negotiating security parameters and authenticating users interconnected to a network
A method for authenticating and negotiating security parameters among two or more network devices is disclosed. The method has a plurality of modes including a...
US-8,275,984 TLS key and CGI session ID pairing
The prevention of impersonation attacks based on hijacked common gateway interface (CGI) session IDs is disclosed. In accordance with one embodiment, a secured...
US-8,275,969 Storage with persistent user data
A data storage area of a data storage device is partitioned logically between a user storage area and a device storage area. Source data stored securely in the...
US-8,275,961 Secure delivery of digital media via flash device
A flash device for secure delivery of media content is provided. The flash device can include a controller module and a memory module. The controller module can...
US-8,275,960 Method for protecting data in the hard disk
A method for protecting data in the hard disk is provided. The method is suitable for a computer system and includes the following steps. First, a plurality of...
US-8,275,875 Security camera for a network
A method for processing data from a communication line. Data is received from the communication line (802) and segregated into packets (803). Packets are...
US-8,275,745 Secure incremental updates to hierarchicaly structured information
Techniques for performing an incremental update to a set of hierarchically structured information that do not expose the structure and content of the...
US-8,275,743 Method and apparatus for securing data volumes to a remote computer using journal volumes
A method and apparatus for securing data volumes to a remote computer using journal volumes is provided. In one embodiment, a method for securing data volumes...
US-8,275,718 System and method for secure and/or interactive dissemination of information
An interactive information dissemination system includes a media server (210) for receiving a plurality of media elements and storing the media elements in a...
US-8,275,403 Security in a mobile communication system
When a mobile terminal (10), having a basic identity module (12) operative according to a first security standard, initiates a service access, the home network...
US-8,275,312 Induction triggered transactions using an external NFC device
A method for configuring a mobile communication device to perform transactions using a second communication channel that is different from a first communication...
US-8,275,220 Image processing apparatus, image processing method, and storage medium storing computer program for image area...
An image processing apparatus includes an image area separation device, a compression device, an image storage device, an image area storage device, a data...
US-8,275,134 Method for guaranteeing security of critical data, terminal and secured chip
A method for guaranteeing the security of critical data, which is used in a terminal including a secured chip and includes the steps of: activating the secured...
US-8,275,126 Apparatus and method for hash cryptography
An apparatus for hash cryptography has a hardware structure that is capable of providing both secure hash algorithm (SHA)-1 hash calculation and SHA-256 hash...
US-8,275,115 System and method for securing data exchanged during a telephone call
A system and method for receiving information from a caller without the information being accessed by an agent handling the call. A call is received and routed...
US-8,275,020 Secure communication using a non-differentiable waveform
A transmitter system includes a processor that synthesizes a randomly varying, non-differentiable waveform by applying independent, pseudo-random variations to...
US-8,274,979 Method and system for secure communication between a public network and a local network
A method for secure communication between a local area network and a wide area network includes integrating a NAT functionality in a firewall associated with...
US-8,274,563 Mobile security monitoring system and associated method
The portable security monitoring system may include a mechanism for automatically capturing real-time audio and video information of the detected dynamic...
US-8,274,401 Secure data transfer in a communication system including portable meters
The invention relates to a method of performing measurements with a portable meter and reporting measurement data from the portable meter to a central office...
US-8,274,377 Information collecting and decision making via tiered information network systems
Techniques, apparatus and systems for information collecting and decision making based on one or more tiered networks of sensors and communication nodes for...
US-8,273,998 Dual voltage electrical floor box
An outlet box assembly for separating and insulating higher voltage power conductors from lower voltage data conductors. The assembly includes a housing, a...
US-8,272,884 Signal transmission device
A signal transmission device is provided. The signal transmission device comprises a linked unit, a data connector, a sliding block, a link and a lock block....
US-8,272,050 Data managing device equipped with various authentication functions
A data managing device with a single chip that includes: first hardware that authenticates security of communication performed by a data processing apparatus...
US-8,272,028 Approach for managing access to electronic documents on network devices using document retention policies and...
An approach for managing access to electronic documents uses document retention and document security policies. In response to detecting a request to access a...
US-8,271,979 Storage system comprising microprocessor load distribution function
Among a plurality of microprocessors 12, 32, when the load on a microprocessor 12 which performs I/O task processing of received I/O requests is equal to or...
US-8,271,805 Methods and apparatus for providing a secure buffer
The present invention provides a secure buffer for use in data storage and encryption processing. Blocks or packets of data are passed to a secure buffer within...
US-8,271,802 Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-8,271,795 Security based on subliminal and supraliminal channels for data objects
This invention relates to security for data objects; more particularly, the present invention relates to improved security based on subliminal and supraliminal...
US-8,271,790 Method and system for securely identifying computer storage devices
In a private network setting in which various computers can be attached, the confidential or sensitive data within the various devices on the private network is...
US-8,271,786 Method and system for providing secure communications between a first and a second peer device
A method and system for providing secure communications between a first and second peer device is disclosed. The invention includes allowing the first and...
US-8,271,782 System and method for accessing keys for secure messaging
Methods and systems for handling on an electronic device a secure message to be sent to a recipient. Data is accessed about a security key associated with the...
US-8,271,778 System and method for monitoring secure data on a network
A system and method for monitoring secure digital data on a network are provided. An exemplary network monitoring system may include a network device in...
US-8,271,613 Asynchronous hypertext messaging
An asynchronous hypertext messaging system and method are disclosed. The system and method use existing hypertext transfer protocols and is capable of...
US-8,270,839 Method and an apparatus to convert a light signal emitted by a display into digital signals
The present invention provides a method and a device to convert a time varying optical pattern emitted by a display into a digital data signal. More...
US-8,270,720 Method and system for secure data entry
The present invention includes a method of secure data entry that enables complex data entry work to be performed by unskilled workers that results in data...
US-8,270,664 Method and system for utilizing GPS information to secure digital media
A device such as a set-top-box, digital TV, DVD player, multi-media player, cellular telephone or digital cinema player that may handle data such as multimedia...
US-8,270,601 Implicit certificate scheme
A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. For each entity...
US-8,270,402 Process and device for securing the transmission, recording and viewing of digital audiovisual packetized streams
A process for secure distribution of original digital audiovisual streams including audio, video components or other data, including packetizing the original...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.