Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,164,458 Transportation security system and associated methods
A security system for monitoring at least one shipping container being transported by at least one cargo transport vehicle has a Container Security Device (CSD)...
US-8,164,436 Power over data cable system and method
A power over data cable system has a power controller. The power controller receives alarm signals from alarm systems such as fire alarms and security alarms....
US-8,164,419 Electronic lock box with time-related data encryption based on user-selected pin
An electronic lock box contains a secure compartment for storing keys to a structure. A linear actuator moves in one direction opening the door to the secure...
US-8,163,035 Interference management for an electronic device security and tracking system and method
This disclosure relates to interference management for a security and tracking system of an electronic device. In one embodiment, during a startup process, an...
US-8,162,227 Intelligent controller system and method for smart card memory modules
A storage device contains a smart-card device and a memory device, both of which are accessed though a controller. The storage device may be used in the same...
US-8,161,539 IPSec network adapter verifier
A data processing system that supports verifiable IPSec network communication. The data processing system comprises an IPSec network adapter that connects the...
US-8,161,537 Forensic toolkit and method for accessing data stored on electronic smart cards
A tool kit for accessing data stored on an electronic SMART card is provided, the kit comprising a SMART card reader and recorder, at least one storage card,...
US-8,161,532 Operating system independent architecture for subscription computing
A system for managing a subscription-based computer independent of an operating system of the computer may include a security module that accesses, decrements,...
US-8,161,529 High-assurance architecture for routing of information between networks of differing security level
The present invention is directed to routing information between networks of differing security level. Communication to/from each network is handled by a...
US-8,161,527 Security Enhanced Data Platform
The security enhanced data platform is comprised of two primary subsystems and a host of supporting subsystems. The first primary subsystem is a document...
US-8,161,524 Method and portable storage device for allocating secure area in insecure area
A method for extending a secure area in a portable storage device and the portable storage device therefore are provided. The method includes allocating a...
US-8,161,395 Method for secure data entry in an application
A method and device for entering data in an application is disclosed. The method may comprise displaying a graphical user interface (GUI) keyboard within the...
US-8,161,288 Secure user access subsystem for use in a computer information database system
A user access security subsystem of a computer information database system utilizes computer grouping criteria and user type criteria to control user access to...
US-8,161,287 Method and system for memory protection and security using credentials
A computer-implemented system and method for protecting a memory are provided. The system includes a memory section with privileged and non-privileged sections,...
US-8,161,282 System and method for requesting and issuing an authorization document
A device and method for supporting the issuing of an authorization document (6) to an applicant; the said device comprising: a computer (10(i)) comprising a...
US-8,161,168 JMS provider with plug-able business logic
The invention provides plug-in framework, enabling embedding of content-based processes to in a messaging paradigm provider service. In the preferred...
US-8,161,123 Certified electronic messaging
A system whereby a first user can post messages securely to a central data server, which date stamps the messages and permanently records their content and...
US-8,160,950 Method and apparatus for trading assets
Method and apparatus for trading financial assets, such as foreign exchange and money market instruments, commodities and securities. The invention, which may...
US-8,160,548 Distributed access control and authentication
Presented are apparatus and method for distributed authentication and control of an electronic security device. The method includes prompting an authority for...
US-8,160,495 Wireless portable device for sharing digital content items
A portable wireless communications subscriber audio and/or video player apparatus and system and method for selecting, requesting, downloading, and playing...
US-8,160,494 Methods and apparatus for use in switching user account data and operations between two different mobile...
Methods and apparatus for use in switching communications associated with a user account from a first ("source") mobile communication device to a second...
US-8,160,307 Recoverable biometric identity system and method
A method for identifying persons based on biometric data achieves enhanced security and increased accuracy compared with other systems by distorting one or more...
US-8,160,257 Tape failover across a cluster
A security appliance that encrypts and decrypts information is installed in each of redundant multi-paths between a host system and a back up tape storage...
US-8,160,255 System and method for encrypted group network communication with point-to-point privacy
Various embodiments of the disclosed subject matter provide methods and systems for improved efficiency and security in secure gateway-to-secure gateway network...
US-8,160,250 Monitoring usage of encrypted broadcast services
Embodiments include a method and system for monitoring usage of an encrypted broadcast service, such as an encrypted television program, in a secure client...
US-8,160,249 Utilizing data reduction in steganographic and cryptographic system
The present invention relates to methods for protecting a data signal using the following techniques: applying a data reduction technique to reduce the data...
US-8,160,244 Stateless hardware security module
Stateless hardware security modules facilitate securing data transfers between devices in a data communication system. The stateless hardware security module...
US-8,160,243 System, apparatus, and method for the secure storing of bulk data using one-time pad encryption
A present novel and non-trivial decryption system and methods are disclosed for the secure storing of bulk data using one-time pad ("OTP") encryption. A storage...
US-8,156,901 Pet restraint system
A pet restraint system includes a collar having first and second ends and a fastener to selectively secure the first and second collar ends about a pet. A radio...
US-8,156,565 Hardware-based protection of secure data
Computer-readable media, computerized methods, and computer systems for protecting secure data by writing content of the secure data to a protected memory...
US-8,156,550 Establishing secure data transmission using unsecured E-mail
In one embodiment, a host entity may create a trusted connection with a guest entity. The host entity may encrypt a trusted connection invitation for an...
US-8,156,549 Device independent authentication system and method
A system is disclosed which facilitates authentication processes with web-enabled wireless devices, including those that do not support the use of cookie files....
US-8,156,548 Identification and authentication system and method
An identification system 1 used for authenticating a user at a user station 30 requesting access to secure information at a base station 20, wherein the system...
US-8,156,438 System for object-oriented data management of securities trends
A system for processing electronic data which is transmitted from a host computer to a client computer is provided. The system converts the electronic data into...
US-8,156,416 Securing printed output
A notary processor can be dedicated to performing the security-based variable information printing. A method resolves the availability of resources required by...
US-8,156,346 Keyboard-input information-security apparatus and method
A keyboard-input information-security apparatus and method are provided. The apparatus includes an interrupt-descriptor table for storing a list of addresses of...
US-8,156,345 Method and system for memory attack protection to achieve a secure interface
A slave device may receive commands from a host device communicatively coupled to the slave device, via a secure interface configured between the slave device...
US-8,156,341 Pattern recognition method and apparatus for data protection
Provided a secure pattern recognition method. The method includes: receiving data and generating a probe by converting the received data into a template for...
US-8,156,340 System and method for securing system content by automated device authentication
A system is provided for securely downloading content to a mobile telecommunications device. The system includes a mobile application to enable the mobile...
US-8,156,337 Systems and methods for authenticating communications in a network medium
Pre-authentication information of devices is used to securely authenticate arbitrary peer-to-peer ad-hoc interactions. In one embodiment, public key...
US-8,156,332 Peer-to-peer security authentication protocol
A salt transmitted by a second node is received at a first node. The received salt is used to decrypt encrypted data. Optionally, authorization to access a...
US-8,156,322 Critical security parameter generation and exchange system and method for smart-card memory modules
A storage device contains a smart-card device and a memory device, which is connected to a controller. The storage device may be used in the same manner as a...
US-8,156,318 Storing a device management encryption key in a network interface controller
A device management system for securely storing an encryption key associated with a device management session. The device management system includes an...
US-8,156,298 Virtualization-based security apparatuses, methods, and systems
Apparatuses, devices, and methods for protecting content on a computer are disclosed that employ a novel hypervisor configured to segregate, or partition,...
US-8,156,255 Portable mass storage device with virtual machine activation
A portable mass storage device is used to store large files such as digital pictures, movies and music. The mass storage device has firmware with security...
US-8,156,168 Method and system for data security
A method, system and apparatus that advantageously provide a security protocol for data security. The apparatus includes a random number generator for...
US-8,156,034 Method and system for enhanced distribution of financial instruments
An issuer models financial instruments (e.g., proposed securities) with initial financial parameters to facilitate defining a financial instrument with final...
US-8,156,027 Fair-value pricing of a financial asset
An exemplary embodiment comprises a method for determining at an effective valuation time a fair value of an exchange traded fund comprising securities, at...
US-8,156,020 Charge managing system, image forming apparatus, charge managing server, and image forming method
A charge managing system including an image forming apparatus and a charge managing server is provided. The image forming apparatus includes plural applications...
US-8,155,322 Systems and methods for distributing and securing data
A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.