Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,214,654 Method and system for loading a secure firmware update on an adapter device of a computer system
One embodiment of the present invention sets forth a method for loading a secure firmware update onto an adapter device in a computer system. The method...
US-8,214,652 Biometric identification network security
Systems and methods for regulating user access in the context of a biometric security system are disclosed. One method disclosed includes receiving a remotely...
US-8,214,645 Systems, devices, and methods for securely transmitting a security parameter to a computing device
Embodiments of the systems, devices, and methods described herein generally facilitate the secure transmittal of security parameters. In accordance with at...
US-8,214,584 Secure virtual tape management system with early read support options
A secure virtual tape management system with early read support options. The system includes at least two mainframe hosts having a catalog storing tape related...
US-8,214,355 Small table: multitenancy for lots of small tables on a cloud database
Methods and apparatus are described for partitioning native tables in a database cluster into logical tables. Each logical table is mapped into a unique portion...
US-8,214,231 System and method for identifying data streams associated with medical equipment
A system and method for uniquely identifying data streams associated with medical equipment are described. The system may be implemented in a variety of ways,...
US-8,213,926 Method and apparatus for providing multiservice testing
An approach is provided for a multiservice tester. A connection over an access link providing a customer premise with connectivity to a plurality of...
US-8,213,923 Product update via voice call in mobile security
Methods and apparatus for updating security software products on mobile telephones are described. When an update is available for a security software product...
US-8,213,769 Frame indexing technique to improve personal video recording functionality and security of transmitted video
One or more methods and systems of efficiently indexing a digitized video stream is presented. In one embodiment, the method comprises receiving a coded video...
US-8,213,612 Secure software download
Software can be downloaded securely using a multi-encryption method, where the decryption is completed when the software is executed. In one aspect, a...
US-8,213,607 Method for securely extending key stream to encrypt high-entropy data
A stream stretcher is provided for securely expanding a key stream to match the length of a data block to be encrypted and/or decrypted. A key stream is...
US-8,213,601 Font level encryption method and apparatus
This invention improves upon the existing art by implementing encryption at the "font level," thereby, in affect, protecting each independent small portion of a...
US-8,213,589 Data security seeding system
In one aspect of the invention there is provided a system for tracking seed data that has been inserted into a secured private information database listing. The...
US-8,213,413 Real-time packet processing system and method
In some embodiments, the invention may include a combination of real-time packet detection, processing and routing. When implemented in a distributed...
US-8,213,326 Method and apparatus for the classification of ports on a data communication network node
A method and apparatus for classifying a port on a node in a data communications network, such as a router. The node, itself or in some embodiments though...
US-8,213,115 Secure data storage
A hard disk drive includes a chassis which supports a "sealed" housing containing a data storage magnetic disk, and read/write heads and actuator. The housing...
US-8,212,833 Secure computer screen entry system and method
A method for entering secure data at an input device includes displaying a graphical input region having input elements, such as a number keypad, and receiving...
US-8,211,490 Double layer UV variable data text
A method and system are provided for including a double layer security mark in digital document data defining an image of a document to be printed and in the...
US-8,209,764 Sensitive data aliasing
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed...
US-8,209,762 Approach for printing locked print data using user and print data authentication
An approach is provided for printing locked print data using user and print data authentication. The approach is applicable to a wide variety of contexts and...
US-8,209,759 Security incident manager
A security incident manger includes events and network flows in the analysis of an attack to better identify the magnitude of the attack and how to handle the...
US-8,209,750 Encryption of voice and data in a single data stream in a deployable, secure communication system
Separate IP data streams, including both voice (VoIP) and data sources, are routed over a single network data stream, encrypted by a single KIV encryption unit,...
US-8,209,608 Method and system for presenting structured information in an interactive multimedia environment
The present invention provides an interactive multimedia system for providing structured information systems, for example help systems for desktop and network...
US-8,209,551 Security for RAID systems
Methods and apparatus for accessing a redundant array of independent drives (RAID) storage device are disclosed. In some embodiments file data is broken into...
US-8,209,550 Method and apparatus for protecting SIMLock information in an electronic device
The teachings herein present a method and apparatus for protecting usage restriction data that governs usage of an electronic device. A cryptographic circuit...
US-8,209,546 Data-securing method of program tool
A program tool with a data-securing function includes a flow control center and a plurality of processing units for performing respective processing steps. The...
US-8,209,544 Trusted storage systems and methods
Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of...
US-8,209,540 Incremental secure backup and restore of user settings and data
A data processing device receives a manifest from a previous backup operation and determines what files have changed by comparing the files to be backed up to...
US-8,209,532 System and method for implementing security of multi-party-communication
A system and method for implementing security of multi-party communication is disclosed in the disclosure. The system mainly includes a group key management...
US-8,209,400 System for data routing in networks
An integrated security system integrates broadband and mobile access and control with conventional security systems and premise devices to provide a tri-mode...
US-8,209,194 Method and system for providing a healthcare expense donation network
A method and system for providing a healthcare expense donation network whereby a third party provided healthcare management system, such as a computing system...
US-8,208,955 Voice-over-IP (VoIP) systems, components and methods for providing enhanced location information to emergency...
Disclosed are systems and techniques for identifying VoIP phone connector locations whereby an emergency call request can be specifically located on a VoIP...
US-8,208,932 System for mobile broadband networking using dynamic quality of service provisioning
A wireless networking system uses mobile and fixed transceivers to achieve a network with changing topology. A routing process includes quality-of-service...
US-8,208,897 Portable wireless terminal and its security system
The present invention relates to a portable wireless terminal, and in particular, a portable wireless terminal such as a cellular phone, etc., and its security...
US-8,208,637 Migration of computer secrets
Described is a technology by which computer data secrets sealed by a trusted platform module (TPM) or like device may be securely migrated from a physical...
US-8,208,635 Wireless mesh network with secure automatic key loads to wireless devices
A wireless mesh network provides secure communication by encrypting data using one or more encryption keys. A configuration device in communication with a...
US-8,208,633 Method and system for securing communications in a metering device
A method and system for securing the communication link between the accounting device and printer of a metering system by authenticating the data being sent via...
US-8,208,629 Video monitoring system with video signal encrypted and the method for the same
Techniques pertaining to a security system are disclosed. According to one aspect of the techniques, secured communication of video data between a monitoring...
US-8,208,628 Systems and methods for key generation in wireless communication systems
A system and a method for providing a secure wireless ad-hoc network in a wireless communication system having at least two transceivers coupled by a wireless...
US-8,208,485 Routing method and wireless network system
A routing method of a wireless network system is provided. Paths of the wireless network system are divided into down-stream and up-stream paths. The up-stream...
US-8,208,299 Integrated circuit embedded with non-volatile programmable memory having variable coupling and separate...
A multi-programmable non-volatile device is operated with a floating gate that functions as a FET gate that overlaps a portion of a source/drain region and...
US-8,208,185 Method and apparatus for the production of polarization holograms
The present invention relates to a method for the production of polarization holograms, an apparatus for the production of polarization holograms and the use of...
US-8,208,019 Wireless video surveillance system and method with external removable recording
A surveillance system and method with wireless communication between components for providing an external removable data storage device capable of recording...
US-8,207,854 Shipping container integrity device and system
Disclosed is a remotely monitorable shipping container security and integrity system and radio frequency identification device. The system permits remote...
US-8,207,814 Kit and system for providing security access to a door using power over ethernet with data persistence and fire...
The present disclosure describes embodiments of a power-over-ethernet ("POE") controller and an access control system comprising the same. In an embodiment, the...
US-8,205,249 Method for carrying out a secure electronic transaction using a portable data support
A method for effecting a secure electronic transaction on a terminal using a portable data carrier is proposed. According to the method a user (30) first...
US-8,205,242 System and method for data mining and security policy management
A system and method to generate and maintain controlled growth DAG are described. The controlled growth DAG conveys information about objects captured by a...
US-8,205,238 Platform posture and policy information exchange method and apparatus
Transport agnostic, secure communication protocol for transmitting host platform posture information to the Network Access Control Server or PDP (Policy...
US-8,205,091 System and method for securing wireless data
Systems and methods for operation upon a data processing device for handling secure data stored on the device. The device is configurable to communicate over a...
US-8,205,088 Method for the authenticated transmission of a personalized data set or program to a hardware security module...
In a method and arrangement for authenticated transmission of a personalized data set or program to a hardware security module in a device such as a franking...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.