Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,213,326 Method and apparatus for the classification of ports on a data communication network node
A method and apparatus for classifying a port on a node in a data communications network, such as a router. The node, itself or in some embodiments though...
US-8,213,115 Secure data storage
A hard disk drive includes a chassis which supports a "sealed" housing containing a data storage magnetic disk, and read/write heads and actuator. The housing...
US-8,212,833 Secure computer screen entry system and method
A method for entering secure data at an input device includes displaying a graphical input region having input elements, such as a number keypad, and receiving...
US-8,211,490 Double layer UV variable data text
A method and system are provided for including a double layer security mark in digital document data defining an image of a document to be printed and in the...
US-8,209,764 Sensitive data aliasing
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed...
US-8,209,762 Approach for printing locked print data using user and print data authentication
An approach is provided for printing locked print data using user and print data authentication. The approach is applicable to a wide variety of contexts and...
US-8,209,759 Security incident manager
A security incident manger includes events and network flows in the analysis of an attack to better identify the magnitude of the attack and how to handle the...
US-8,209,750 Encryption of voice and data in a single data stream in a deployable, secure communication system
Separate IP data streams, including both voice (VoIP) and data sources, are routed over a single network data stream, encrypted by a single KIV encryption unit,...
US-8,209,608 Method and system for presenting structured information in an interactive multimedia environment
The present invention provides an interactive multimedia system for providing structured information systems, for example help systems for desktop and network...
US-8,209,551 Security for RAID systems
Methods and apparatus for accessing a redundant array of independent drives (RAID) storage device are disclosed. In some embodiments file data is broken into...
US-8,209,550 Method and apparatus for protecting SIMLock information in an electronic device
The teachings herein present a method and apparatus for protecting usage restriction data that governs usage of an electronic device. A cryptographic circuit...
US-8,209,546 Data-securing method of program tool
A program tool with a data-securing function includes a flow control center and a plurality of processing units for performing respective processing steps. The...
US-8,209,544 Trusted storage systems and methods
Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of...
US-8,209,540 Incremental secure backup and restore of user settings and data
A data processing device receives a manifest from a previous backup operation and determines what files have changed by comparing the files to be backed up to...
US-8,209,532 System and method for implementing security of multi-party-communication
A system and method for implementing security of multi-party communication is disclosed in the disclosure. The system mainly includes a group key management...
US-8,209,400 System for data routing in networks
An integrated security system integrates broadband and mobile access and control with conventional security systems and premise devices to provide a tri-mode...
US-8,209,194 Method and system for providing a healthcare expense donation network
A method and system for providing a healthcare expense donation network whereby a third party provided healthcare management system, such as a computing system...
US-8,208,955 Voice-over-IP (VoIP) systems, components and methods for providing enhanced location information to emergency...
Disclosed are systems and techniques for identifying VoIP phone connector locations whereby an emergency call request can be specifically located on a VoIP...
US-8,208,932 System for mobile broadband networking using dynamic quality of service provisioning
A wireless networking system uses mobile and fixed transceivers to achieve a network with changing topology. A routing process includes quality-of-service...
US-8,208,897 Portable wireless terminal and its security system
The present invention relates to a portable wireless terminal, and in particular, a portable wireless terminal such as a cellular phone, etc., and its security...
US-8,208,637 Migration of computer secrets
Described is a technology by which computer data secrets sealed by a trusted platform module (TPM) or like device may be securely migrated from a physical...
US-8,208,635 Wireless mesh network with secure automatic key loads to wireless devices
A wireless mesh network provides secure communication by encrypting data using one or more encryption keys. A configuration device in communication with a...
US-8,208,633 Method and system for securing communications in a metering device
A method and system for securing the communication link between the accounting device and printer of a metering system by authenticating the data being sent via...
US-8,208,629 Video monitoring system with video signal encrypted and the method for the same
Techniques pertaining to a security system are disclosed. According to one aspect of the techniques, secured communication of video data between a monitoring...
US-8,208,628 Systems and methods for key generation in wireless communication systems
A system and a method for providing a secure wireless ad-hoc network in a wireless communication system having at least two transceivers coupled by a wireless...
US-8,208,485 Routing method and wireless network system
A routing method of a wireless network system is provided. Paths of the wireless network system are divided into down-stream and up-stream paths. The up-stream...
US-8,208,299 Integrated circuit embedded with non-volatile programmable memory having variable coupling and separate...
A multi-programmable non-volatile device is operated with a floating gate that functions as a FET gate that overlaps a portion of a source/drain region and...
US-8,208,185 Method and apparatus for the production of polarization holograms
The present invention relates to a method for the production of polarization holograms, an apparatus for the production of polarization holograms and the use of...
US-8,208,019 Wireless video surveillance system and method with external removable recording
A surveillance system and method with wireless communication between components for providing an external removable data storage device capable of recording...
US-8,207,854 Shipping container integrity device and system
Disclosed is a remotely monitorable shipping container security and integrity system and radio frequency identification device. The system permits remote...
US-8,207,814 Kit and system for providing security access to a door using power over ethernet with data persistence and fire...
The present disclosure describes embodiments of a power-over-ethernet ("POE") controller and an access control system comprising the same. In an embodiment, the...
US-8,205,249 Method for carrying out a secure electronic transaction using a portable data support
A method for effecting a secure electronic transaction on a terminal using a portable data carrier is proposed. According to the method a user (30) first...
US-8,205,242 System and method for data mining and security policy management
A system and method to generate and maintain controlled growth DAG are described. The controlled growth DAG conveys information about objects captured by a...
US-8,205,238 Platform posture and policy information exchange method and apparatus
Transport agnostic, secure communication protocol for transmitting host platform posture information to the Network Access Control Server or PDP (Policy...
US-8,205,091 System and method for securing wireless data
Systems and methods for operation upon a data processing device for handling secure data stored on the device. The device is configurable to communicate over a...
US-8,205,088 Method for the authenticated transmission of a personalized data set or program to a hardware security module...
In a method and arrangement for authenticated transmission of a personalized data set or program to a hardware security module in a device such as a franking...
US-8,205,073 Access point, terminal, encryption key configuration system, encryption key configuration method, and program
An object of the present invention is to enable the configuration tasks needed to form a wireless LAN to be performed using a simple method while increasing...
US-8,205,072 Method and apparatus for electronically configuring a secured user desktop
A method of providing endpoint security for a session on an untrusted computer accessing data on a networked server is disclosed. A virtual secure desktop is...
US-8,204,929 Hiding sensitive information
An improved methodology and implementing computer system are provided in which sensitive information is selectively masked in order to enable such information...
US-8,204,906 Abstraction based audit and security log model for increased role and security enforcement
Embodiments of the invention store log event records in a secure database log by encrypting information in a query, or in query results, that would otherwise be...
US-8,204,815 Open end mutual fund securitization process
A computer implemented system is provided for exchanging shares in an exchange traded product. A display is provided for displaying data representing shares of...
US-8,204,180 Systems and methods for preventing sensitive information from being communicated into a non-secure environment
A telecommunication system is arranged between a trusted automated interactive system and a non-secure agent. The trusted automated interactive portion is...
US-8,203,449 RF-ID tag reading system for using password and method thereof
Provided is a RFID tag with enhanced security. The tag includes a tag memory to store thereto pre-determined password information and tag data, an antenna to...
US-8,203,423 Portable access device
Portable devices, methods, and systems for controlling access to computers and other secure systems such as systems protecting secure premises, by processing...
US-8,201,266 Security system to prevent tampering with a server blade
Method, computer program product and apparatus for physically securing a server in response to detecting an unauthorized intrusion event. The method comprises...
US-8,201,261 Secure data storage system and method
A system and method for the secure storage of data in a network. Data stored on a primary server connected to the network is initially encrypted. The IP address...
US-8,201,257 System and method of managing network security risks
A security risk management system comprises a vulnerability database, an asset database, a local threat intelligence database and a threat correlation module....
US-8,201,234 Multi-profile interface specific network security policies
Computer-readable medium having a data structure stored thereon for defining a schema for expressing a network security policy. The data structure includes a...
US-8,201,218 Strategies for securely applying connection policies via a gateway
A strategy is described for securely applying connection policies in a system that includes a first entity (e.g., a TS client) connected to a second entity...
US-8,201,009 Computer management and power backup system and device
A computer power backup system and device are provided. When power to a computer system is lost, a battery backup unit provides power to the computer system for...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.