Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,281,390 Remotely defining security data for authorization of local application activity
Systems and methods, including computer software adapted to perform certain operations, can be implemented for remotely defining security data for authorizing...
US-8,281,388 Hardware secured portable storage
A portable storage device contains a real time clock, an onboard power source and secure storage. These components enable the device to securely store data and...
US-8,281,387 Method and apparatus for supporting a virtual private network architecture on a partitioned platform
A computer system includes a service partition, not directly accessible to a user, having a security agent to inspect data entering and exiting the computer...
US-8,281,383 Secured IPv6 traffic preemption
In one embodiment, a method includes receiving, by an access router, an Internet Protocol version 6 (IPv6) packet that specifies a request for executing a...
US-8,281,359 System and method for media transcoding and presentation
A method and apparatus for presenting a media data stream complying with a broadcast encryption standard is disclosed. A dongle is removably coupleable to a...
US-8,281,331 Data storage medium support member, chucking device, brushless motor, and disc drive apparatus
A data storage medium support member is produced by resin molding. The data storage medium support member includes an accommodating portion, a guide portion,...
US-8,281,148 Securely computing a similarity measure
The present invention relates to a method and a system of securely computing a measure of similarity for at least two sets of data. A basic idea of the present...
US-8,281,142 Notarizable electronic paper
A system and method helps to control "read" and/or "write" access to electronic paper (e-paper). Informational data may be on a restricted portion of e-paper...
US-8,281,136 Techniques for key distribution for use in encrypted communications
Techniques for key distribution used with encrypted communications are provided. A shared secret associated with a principal is maintained securely and...
US-8,281,132 Method and apparatus for security over multiple interfaces
A secure digital system including a number of ICs that exchange data among each other. Each of the ICs includes a key generator for generating a cipher key; a...
US-8,281,126 Out of band encryption
Embodiments of the invention relate to systems and methods for securing data transmission in networks. Embodiments of the invention further relate to encryption...
US-8,281,122 Generation and/or reception, at least in part, of packet including encrypted payload
An embodiment may include circuitry to generate, at least in part, and/or receive, at least in part, a packet. The packet may include at least one field and an...
US-8,281,115 Security method using self-generated encryption key, and security apparatus using the same
A security method and a security apparatus are disclosed which use a self-generated encryption key. The security method includes the steps of: generating an...
US-8,281,029 System and method for acceleration of a secure transmission over satellite
A broadband communication system with improved latency is disclosed. The system employs acceleration of secure web-based communications over a satellite...
US-8,281,010 System and method for providing network support services and premises gateway support infrastructure
A disclosed, service management system (50) communicates via wide area network (99) with gateway devices (10), located at respective user premises. The service...
US-8,280,537 Editing lifecycle and deployment of objects in an industrial automation environment
An editor in an industrial automation environment comprises an input component that receives modification data relating to at least one of lifecycle and...
US-8,280,466 Four frequency band single GSM antenna
A reach back secure communications terminal capable of GSM network connectivity includes a GSM fixed cellular terminal, and a single whip antenna adapted for...
US-8,280,057 Method and apparatus for providing security in wireless communication networks
A method includes receiving data at a first wireless node in a wireless network, where the data is associated with an industrial control and automation system....
US-8,280,054 Scrambling and descrambling systems for secure communication
Various embodiments of the present invention are directed to scrambling-descrambling systems for encrypting and decrypting electromagnetic signals transmitted...
US-8,280,051 Secure presentation of media streams in response to encrypted content
Secure presentation of media streams includes encoding the media streams into digital content, encrypting a portion of that digital content, the portion being...
US-8,280,047 Method and system for securing data utilizing redundant secure key storage
A data processing device and method adapted for key management are provided. A first encryption key associated with a first password is generated, and at least...
US-8,280,043 System and method for protecting data in a secure system
A system for protecting data in a security system generates and encodes a backup key for encoding long-lived secrets. The system generates a distribution plan...
US-8,280,041 Chinese remainder theorem-based computation method for cryptosystems
A computer hardware implemented cryptography method computes a modular exponentiation, M :=Cd (mod pq), upon a message data value C using a Chinese Remainder...
US-8,276,845 Advanced aircraft cockpit
An aircraft cockpit that includes comfort and/or security adjustable equipment in which the adjustments are controlled by an adjustment management system so...
US-8,276,202 Cloud-based gateway security scanning
Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway...
US-8,276,200 Systems and methods for securely processing sensitive streams in a mixed infrastructure
A system and method for securely processing sensitive streams in a mixed infrastructure includes analyzing a stream to determine data sensitivity. A likelihood...
US-8,276,186 System and method for synchronizing security settings of control systems
A method for communicating data between a first and second control system (FCS and SCS). FCS (202) controls a first process (FP) having first security data...
US-8,276,185 Enhanced security memory access method and architecture
A memory device includes: at least one storage area for storing data; a protection control structure adapted to selectively allow an external device access to...
US-8,275,995 Identity authentication and secured access systems, components, and methods
Security tokens contain data that is each uniquely encrypted based on a unique biometric identifier of an authorized user of that token. Decoders receive the...
US-8,275,989 Method of negotiating security parameters and authenticating users interconnected to a network
A method for authenticating and negotiating security parameters among two or more network devices is disclosed. The method has a plurality of modes including a...
US-8,275,984 TLS key and CGI session ID pairing
The prevention of impersonation attacks based on hijacked common gateway interface (CGI) session IDs is disclosed. In accordance with one embodiment, a secured...
US-8,275,969 Storage with persistent user data
A data storage area of a data storage device is partitioned logically between a user storage area and a device storage area. Source data stored securely in the...
US-8,275,961 Secure delivery of digital media via flash device
A flash device for secure delivery of media content is provided. The flash device can include a controller module and a memory module. The controller module can...
US-8,275,960 Method for protecting data in the hard disk
A method for protecting data in the hard disk is provided. The method is suitable for a computer system and includes the following steps. First, a plurality of...
US-8,275,875 Security camera for a network
A method for processing data from a communication line. Data is received from the communication line (802) and segregated into packets (803). Packets are...
US-8,275,745 Secure incremental updates to hierarchicaly structured information
Techniques for performing an incremental update to a set of hierarchically structured information that do not expose the structure and content of the...
US-8,275,743 Method and apparatus for securing data volumes to a remote computer using journal volumes
A method and apparatus for securing data volumes to a remote computer using journal volumes is provided. In one embodiment, a method for securing data volumes...
US-8,275,718 System and method for secure and/or interactive dissemination of information
An interactive information dissemination system includes a media server (210) for receiving a plurality of media elements and storing the media elements in a...
US-8,275,403 Security in a mobile communication system
When a mobile terminal (10), having a basic identity module (12) operative according to a first security standard, initiates a service access, the home network...
US-8,275,312 Induction triggered transactions using an external NFC device
A method for configuring a mobile communication device to perform transactions using a second communication channel that is different from a first communication...
US-8,275,220 Image processing apparatus, image processing method, and storage medium storing computer program for image area...
An image processing apparatus includes an image area separation device, a compression device, an image storage device, an image area storage device, a data...
US-8,275,134 Method for guaranteeing security of critical data, terminal and secured chip
A method for guaranteeing the security of critical data, which is used in a terminal including a secured chip and includes the steps of: activating the secured...
US-8,275,126 Apparatus and method for hash cryptography
An apparatus for hash cryptography has a hardware structure that is capable of providing both secure hash algorithm (SHA)-1 hash calculation and SHA-256 hash...
US-8,275,115 System and method for securing data exchanged during a telephone call
A system and method for receiving information from a caller without the information being accessed by an agent handling the call. A call is received and routed...
US-8,275,020 Secure communication using a non-differentiable waveform
A transmitter system includes a processor that synthesizes a randomly varying, non-differentiable waveform by applying independent, pseudo-random variations to...
US-8,274,979 Method and system for secure communication between a public network and a local network
A method for secure communication between a local area network and a wide area network includes integrating a NAT functionality in a firewall associated with...
US-8,274,563 Mobile security monitoring system and associated method
The portable security monitoring system may include a mechanism for automatically capturing real-time audio and video information of the detected dynamic...
US-8,274,401 Secure data transfer in a communication system including portable meters
The invention relates to a method of performing measurements with a portable meter and reporting measurement data from the portable meter to a central office...
US-8,274,377 Information collecting and decision making via tiered information network systems
Techniques, apparatus and systems for information collecting and decision making based on one or more tiered networks of sensors and communication nodes for...
US-8,273,998 Dual voltage electrical floor box
An outlet box assembly for separating and insulating higher voltage power conductors from lower voltage data conductors. The assembly includes a housing, a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.