Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,194,858 Chaotic cipher system and method for secure communication
The present invention provides a method for a data encryption device to perform network communications, the method comprising obtaining an indexed array of...
US-8,194,827 Secure voice transaction method and system
A security method and system. The method includes receiving by a computing system, a telephone call from a user. The computing system comprises an existing...
US-8,194,658 Transmitting and receiving method and apparatus in real-time system
A method and apparatus transmitting and receiving in a real-time system are disclosed. The method of transmitting in a real-time system includes scheduling a...
US-8,194,519 Method for transmitting content with copy control information, content identification information and content...
A content transmitting apparatus and the like which execute copy control of content more securely than conventional, and can count copy number correctly...
US-8,194,289 Image processing device, method and program product processing barcodes with link information corresponding to...
In a copy generation management on paper, the present invention aims to detect a falsification in embedded information and increase the capacity of embedded...
US-8,194,140 Image pickup apparatus for performing a desirable self timer shooting and an automatic shooting method using...
An image pickup apparatus includes a system controller and a face detector, and can register face data of a photographer for a self-timer shooting mode in...
US-8,192,286 System for secure transfer of online privileges
Methods and apparatus for transferring privileges in a computer system. In one implementation, a system for transferring online privileges includes: a game...
US-8,191,167 Secure system and method for processing data between a first device and at least one second device provided...
A secure system (1) for processing data includes a first device (2), and at least one second device (3) is characterized in that--each second device (3)...
US-8,191,162 System and method for securing and tracking files
A method, system and computer program product for securing and tracking restricted files stored in a data processing system is provided. The data processing...
US-8,191,159 Data security for digital data storage
A computing system includes data encryption in the data path between a data source and data storage devices. The data storage devices may be local or they may...
US-8,191,152 Methods systems and articles of manufacture for generating and displaying video related to financial application
Systems, methods and articles of manufacture for generating a video such that when another person views the video, the other person can view non-private...
US-8,191,139 Intrusion detection report correlator and analyzer
A computer/computer network security alert management system aggregates information from multiple intrusion detectors. Utilizing reports from multiple intrusion...
US-8,191,135 Secured web based access of failed flows in an integration server
A method for accessing failed events in an integrated server environment is disclosed. The method comprises providing a thin client in an application server...
US-8,191,134 Lockless distributed IPsec processing
According to one embodiment of the invention, a plurality of IPsec packets belonging to a single IPsec tunnel are received. Different ones of the plurality of...
US-8,191,128 Systems and methods for controlling access to a public data network from a visited access provider
To allow a user to access a public data network from a region of service operated by a visited access provider, the visited provider is supplied with an...
US-8,191,113 Trusted network connect system based on tri-element peer authentication
A trusted network connect (TNC) system based on tri-element peer authentication (TePA) is provided. An network access requestor (NAR) of an access requestor...
US-8,191,109 Application verification
A device that is configured for wireless communication and for execution of at least one client application is disclosed. The device comprises an integrated...
US-8,191,079 Data transfer across a network
Requests for retrieval of data items from another data processing apparatus include embedded objects having executable class functions for performing operations...
US-8,190,921 Methodology for vaulting data encryption keys with encrypted storage
A method is provided to allow for encryption keys to be safely vaulted and for restarts after system failures, even when an external key server is not...
US-8,190,913 System and method for content protection on a computing device
Systems and methods for handling user interface field data. A system and method can be configured to receive input which indicates that the mobile device is to...
US-8,190,910 Information processing apparatus, information recording medium manufacturing apparatus, and information...
A configuration is provided for enabling a process in which appropriate content code corresponding to apparatuses and applications of various model types and...
US-8,190,908 Secure data verification via biometric input
An architecture is presented that controls access to secure data via biometric verification. The system comprises a memory module that communicates with...
US-8,190,903 Method and apparatus for verifying authenticity of digital data using trusted computing
A method and apparatus for authenticity and origin of Digital data such as recorded voice samples, video clips or still picture images etc. is provided. The...
US-8,190,901 Layered security in digital watermarking
A media object authentication system uses layers of security features based on digital watermarks embedded in media objects. The system generates a first...
US-8,190,900 Secure telemetric link
A communications protocol is used to provide data privacy, message integrity, message freshness, and user authentication to telemetric traffic, such as to and...
US-8,190,898 Portable electronic entity and communication method
The pocket portable electronic entity (400) with connection element (420) for removable connection to a host station (300), having first members (460, 470, 471)...
US-8,190,897 Method and system for secure exchange of data in a network
A first network device implements a method for the secure exchange of data in a network. The network also includes a second network device and a remote device....
US-8,190,893 Portable security transaction protocol
A technique for providing message authenticity includes accepting transaction information, accepting a first data item used for authenticating an originating...
US-8,190,888 System and methodology providing multi-tier security for network data with industrial control components
The present invention relates to a system and methodology facilitating network security and data access in an industrial control environment. An industrial...
US-8,190,887 Cable network system and method for controlling security in cable network encrypted dynamic multicast session
A security control method in a cable network dynamic multicast session, and more particularly, a method of controlling forward secrecy and backward secrecy in a...
US-8,190,885 Non-volatile memory sub-system integrated with security for storing near field transactions
An architecture is presented that facilitates maintaining a log of near field transactions in a memory module that includes security functionalities and near...
US-8,190,875 Reducing processing load in proxies for secure communications
In one embodiment, a method for providing secure communications using a proxy is provided. The proxy negotiates with a client and a server to determine a...
US-8,190,840 Memory devices with data protection
A memory device comprises a memory array, a status register, a status-register write-protect bit and a security register. The memory array contains a number of...
US-8,190,767 Data structures and state tracking for network protocol processing
Described are data structures, and methodology for forming same, for network protocol processing. A method for creating data structures for firewalling and...
US-8,190,764 Method and system for an intercept chain of custody protocol
Techniques for establishing a chain of custody for intercepted electronic information are disclosed. In one particular exemplary embodiment, the techniques may...
US-8,190,716 Method and system for managing bluetooth communication using software or firmware filtering
Aspects of method and system for managing secure Bluetooth communication using software or firmware filtering are provided. In this regard, the IT or system...
US-8,190,635 Method and system for storing and retrieving information
A method of storing and retrieving a utilization data associated to a sensitive information which requires to be secured in an environment including a plurality...
US-8,190,631 Query-time and view-time security for semantic layer
Aspects may include determination of a first security profile associated with a user and an information space, the information space comprising metadata...
US-8,190,304 Automatic configuration-tracking apparatus, and a method and a system for such tracking
An automatic configuration-tracking apparatus for tracking the configuration of a vehicle having a multitude of components for which it is desired to consult...
US-8,189,794 System and method for effectively performing data restore/migration procedures
A system and method for effectively supporting data transfer procedures includes a source device that registers with an account server to participate in a data...
US-8,189,778 Adaptive generation of a pseudo random number generator seed
A seed for use in a cryptographic operation for an electronic device is determined by estimating the number of entropy data bits needed to satisfy a...
US-8,189,572 Systems and methods for resetting a network device
A network device includes a data store with first and second parameters, the first parameter affecting a communication operation of the network device and the...
US-8,189,238 Integrated and centralized method and system for managing delivered fax data
A method and system for managing facsimile (fax) data in an integrated manner. The system includes an integrated fax server, and a fax terminal configured to...
US-8,189,235 Apparatus, method and program product that calculates a color blending ratio so security dots reproduced in a...
The invention provides an image processing apparatus, an image processing method, a recording medium and a program capable of suppressing security dots from...
US-8,189,213 Image forming apparatus capable of using security code for communication
On receiving FAX image data, an image forming apparatus determines whether or not a security code is superimposed on the image data. If superimposed, the image...
US-8,189,208 Image processing apparatus, controlling method of image processing apparatus, program and storage medium
The present invention provides an image processing apparatus, a method of controlling the image processing apparatus, a program and a storage medium that can...
US-8,188,860 Secure sensor/actuator systems
A chip module including a sensor/actuator, an input/output interface, a data processing circuit connected between the input/output interface and the...
US-8,185,944 High-assurance file-driven content filtering for secure network server
A server for transferring data between networks. The server is programmed to perform the following steps: (a) creating a receiving process, a filtering process...
US-8,185,942 Client-server opaque token passing apparatus and method
In the computer client-server context, typically used in the Internet for communicating between a central server and user computers (clients), a method is...
US-8,185,935 Method and apparatus for dynamic home address assignment by home agent in multiple network interworking
A method and apparatus for dynamic home address assignment by a home agent in multiple network interworking. The invention provides a method and apparatus send...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.