Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,166,565 Encryption and access method and system for peer-to-peer distributed file storage
A system for secure distributed data storage that uses a network, where the system includes a file stored on a plurality of storage elements that are accessible...
US-8,166,561 Security device, secure memory system and method using a security device
A security device including a first external interface; a second external interface; and a security controller connected to said first external interface and...
US-8,166,558 System and method for upgrading the functionality of a controlling device in a secure manner
Secure access to a database of upgrade data is provided by storing an encryption key value in a cable used to interconnect a first device and a second device...
US-8,166,554 Secure enterprise network
What is proposed is a method of implementing a security system (Packet Sentry) addressing the internal security problem of enterprises having a generalized...
US-8,166,552 Adaptive configuration management system
An automated configuration management system (ACMS) oversees resources of a virtualized ecosystem by establishing a baseline configuration (including, e.g.,...
US-8,166,551 Automated security manager
Systems, methods, media, and other embodiments associated with automated security management are described. One example system embodiment includes logic to...
US-8,166,541 Information processing apparatus and data management system
It is an object to provide an information processing apparatus and a data management system which can access data and maintain security even in an environment...
US-8,166,498 Security monitoring using a multimedia processing device
A system includes a multimedia data interface to receive data representative of one or more multimedia channels and a display interface to a display device, the...
US-8,166,471 Implementing portable content protection to secure secrets
A source-level compiler may randomly select compilation conventions to implement portable content protection, securing the secrets embedded in a program by...
US-8,166,357 Implementing logic security feature for disabling integrated circuit test ports ability to scanout data
A method and apparatus for implementing integrated circuit security features are provided to selectively disable testability features on an integrated circuit...
US-8,166,312 Method of individually fitting a hearing device or hearing aid
The present invention provides a method of providing parameters for the fitting process of individually shaped or customized hearing devices by collecting and...
US-8,166,304 Support for multiple security policies on a unified authentication architecture
A method, computer program product, and data processing system are disclosed for ensuring that applications executed in the data processing system originate...
US-8,166,303 Method for transmitting data among components of the system electronics of mobile systems, and such components
A method for transmitting data among components of the system electronics of mobile systems, where, to increase the security of the information exchange, it is...
US-8,166,266 Securing non volatile data in an embedded memory device
The various embodiments of the invention relate generally to semiconductors and memory technology. More specifically, the various embodiment and examples of the...
US-8,166,122 Method and apparatus for generating a figure of merit for use in transmission of messages in a multi-level...
A method and apparatus that generate a figure of merit for use in transmission of messages in a multi-level secure environment. The method may include receiving...
US-8,166,118 Secure communication architecture, protocols, and methods
A trusted network system includes a data center, a gateway, and a trusted sender registry that provide a secure network to allow one or more user clients to...
US-8,166,071 System and method for efficiently securing enterprise data resources
Some embodiments provide a system and method that secures access to data objects of an enterprise that includes multiple data objects and multiple user...
US-8,165,730 Flight recorder having integral reserve power supply within form factor of enclosure and method therefor
A flight recorder includes an enclosure having a notch formed on one side or corner of the enclosure. An electronic interface is disposed within the enclosure....
US-8,165,525 Automatic data encryption and access control based on bluetooth device proximity
A method, apparatus, and system for using Bluetooth devices to secure sensitive data on other Bluetooth devices is described. A Bluetooth device is paired with...
US-8,165,338 Image processing apparatus and control method thereof
Even when multiple document-data images are imposed on a sheet, a paper fingerprint registration can be performed securely with single processing and collation...
US-8,165,305 Enhanced relational database security through encryption of table indices
A system (108) for securing a database including a first and second tables is provided, where the first table includes a first key field and a first data field...
US-8,165,302 Key table and authorization table management
In certain embodiments, a player device that receives and plays content stored on packaged media, the player device has a media reader that receives a packaged...
US-8,165,301 Input-output device and storage controller handshake protocol using key exchange for data security
A protocol for providing secured IO device and storage controller handshake protocol; IO device controlled cipher settings, and secured data storage and access...
US-8,165,300 System and method for generalized authentication
A system, method, and program product is provided that uses environments to control access to encryption keys. A request for an encryption key and an...
US-8,165,292 Method and system for secure distribution of audiovisual data encapsulated according to a plurality of...
Methods and systems for secure distribution of an original audiovisual stream constituted of a set of transport packets encapsulated according to a plurality of...
US-8,165,279 Management server for teleconference system and computer program
Provided is a teleconference system enabling easy participation in a conference from a place geographically apart, securing active proceeding by individual...
US-8,165,254 Apparatus and method for receiving signal for extent limitation of timing synchronization in MB-OFDM UWB system
The present invention relates to an apparatus and a method for receiving signal for extent of timing synchronization in MB-OFDM UWB System. The invention...
US-8,165,023 Methods for the secured interconnection of VNET sites over WAN
One embodiment provides a method to interconnect virtual network segments (VNETs) defined for a local-area network (LAN) infrastructure separated by a wide-area...
US-8,164,768 Printers and print methods for image data with security settings
A printer which has a direct-printing function for reading and printing information stored in a storage device and which includes: an interface unit which...
US-8,164,767 Print driver with processed print data management capability
A print driver is configured to store, retrieve and re-print processed print data that has been generated by the print driver. Processed print data may be...
US-8,164,458 Transportation security system and associated methods
A security system for monitoring at least one shipping container being transported by at least one cargo transport vehicle has a Container Security Device (CSD)...
US-8,164,436 Power over data cable system and method
A power over data cable system has a power controller. The power controller receives alarm signals from alarm systems such as fire alarms and security alarms....
US-8,164,419 Electronic lock box with time-related data encryption based on user-selected pin
An electronic lock box contains a secure compartment for storing keys to a structure. A linear actuator moves in one direction opening the door to the secure...
US-8,163,035 Interference management for an electronic device security and tracking system and method
This disclosure relates to interference management for a security and tracking system of an electronic device. In one embodiment, during a startup process, an...
US-8,162,227 Intelligent controller system and method for smart card memory modules
A storage device contains a smart-card device and a memory device, both of which are accessed though a controller. The storage device may be used in the same...
US-8,161,539 IPSec network adapter verifier
A data processing system that supports verifiable IPSec network communication. The data processing system comprises an IPSec network adapter that connects the...
US-8,161,537 Forensic toolkit and method for accessing data stored on electronic smart cards
A tool kit for accessing data stored on an electronic SMART card is provided, the kit comprising a SMART card reader and recorder, at least one storage card,...
US-8,161,532 Operating system independent architecture for subscription computing
A system for managing a subscription-based computer independent of an operating system of the computer may include a security module that accesses, decrements,...
US-8,161,529 High-assurance architecture for routing of information between networks of differing security level
The present invention is directed to routing information between networks of differing security level. Communication to/from each network is handled by a...
US-8,161,527 Security Enhanced Data Platform
The security enhanced data platform is comprised of two primary subsystems and a host of supporting subsystems. The first primary subsystem is a document...
US-8,161,524 Method and portable storage device for allocating secure area in insecure area
A method for extending a secure area in a portable storage device and the portable storage device therefore are provided. The method includes allocating a...
US-8,161,395 Method for secure data entry in an application
A method and device for entering data in an application is disclosed. The method may comprise displaying a graphical user interface (GUI) keyboard within the...
US-8,161,288 Secure user access subsystem for use in a computer information database system
A user access security subsystem of a computer information database system utilizes computer grouping criteria and user type criteria to control user access to...
US-8,161,287 Method and system for memory protection and security using credentials
A computer-implemented system and method for protecting a memory are provided. The system includes a memory section with privileged and non-privileged sections,...
US-8,161,282 System and method for requesting and issuing an authorization document
A device and method for supporting the issuing of an authorization document (6) to an applicant; the said device comprising: a computer (10(i)) comprising a...
US-8,161,168 JMS provider with plug-able business logic
The invention provides plug-in framework, enabling embedding of content-based processes to in a messaging paradigm provider service. In the preferred...
US-8,161,123 Certified electronic messaging
A system whereby a first user can post messages securely to a central data server, which date stamps the messages and permanently records their content and...
US-8,160,950 Method and apparatus for trading assets
Method and apparatus for trading financial assets, such as foreign exchange and money market instruments, commodities and securities. The invention, which may...
US-8,160,548 Distributed access control and authentication
Presented are apparatus and method for distributed authentication and control of an electronic security device. The method includes prompting an authority for...
US-8,160,495 Wireless portable device for sharing digital content items
A portable wireless communications subscriber audio and/or video player apparatus and system and method for selecting, requesting, downloading, and playing...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.