Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,286,228 Secure streaming container
A system and method for securely streaming encrypted digital media content out of a digital container to a user's media player. This streaming occurs after the...
US-8,286,171 Methods and systems to fingerprint textual information using word runs
The present invention provides methods and systems to enable fast, efficient, and scalable means for fingerprinting textual information using word runs. The...
US-8,286,164 Secure recursive virtualization
A mechanism is provided for performing secure recursive virtualization of a computer system. A portion of memory is allocated by a virtual machine monitor (VMM)...
US-8,285,997 Backup apparatus with higher security and lower network bandwidth consumption
A system for more secure, more efficient, more widely applicable backup, retention, and retrieval of data. An apparatus comprising improved means for...
US-8,285,996 Verification of identity based signatures
A database management system (1) comprises up to fifty or more workstations (2), each for a user. The environment may, for example, be a hospital and the system...
US-8,285,986 Apparatus and method for data packet security in a wireless sensor network
An apparatus and method for providing data packet security in a wireless sensor network including a plurality of sensor nodes. The apparatus includes a memory...
US-8,285,748 Proactive information security management
A method and apparatus for proactive information security management is described. In one embodiment, for example, a computer-implemented method for controlling...
US-8,285,746 Securing data from a shared device
A method for securing the use of data on a first device where the data is sent from a second device, the method including registering at least a first...
US-8,285,731 Smart road-toll-system
A road pricing smart client and method for a road pricing system enabling the removal of information from the positioning data describing the itinerary which...
US-8,285,211 Method and system for improving client server transmission over fading channel with wireless location and...
Wireless personal area network (Zigbee, Bluetooth, UWB) and wireless identification technologies (Near Field Communication (NFC), Radio Frequency Identification...
US-8,284,938 Techniques for data encryption and decryption
Techniques for securing data access are presented. A sender encrypts data into a first integer value. A first knot is selected along with first and second keys....
US-8,284,934 Systems and methods for shared secret data generation
Disclosed examples of secure communications involve generating, by a mobile communication network device, a shared secret data having a length of M units. A...
US-8,284,666 Method and apparatus for controlling packet flow in a packet-switched network
A method and apparatus for controlling data packet flooding in a data-communication network to promote network security and provide for more efficient...
US-8,284,108 Method of measuring radiation characteristic of antenna
Disclosed is a method of measuring the radiation characteristic of an antenna, where sufficient power is secured within a short period of time and supplied in a...
US-8,281,408 Secure telemetric link
A communications protocol is used to provide data privacy, message integrity, message freshness, and user authentication to telemetric traffic, such as to and...
US-8,281,407 In-line decryption device for securely printing documents
A media content printing method that includes storing encrypted media content data representing media content in a computing device, generating a file of print...
US-8,281,405 System, method, and computer program product for securing data on a server based on a heuristic analysis
A system, method, and computer program product are provided for securing data on a server based on a heuristic analysis. In use, information associated with...
US-8,281,401 System for detecting vulnerabilities in web applications using client-side application interfaces
An improved method and apparatus for client-side web application analysis is provided. Client-side web application analysis involves determining and testing,...
US-8,281,396 System and method for performing remote security assessment of firewalled computer
Methods and systems for scanning an endpoint terminal across an open computer network are disclosed. An exemplary method includes providing a scanner engine in...
US-8,281,390 Remotely defining security data for authorization of local application activity
Systems and methods, including computer software adapted to perform certain operations, can be implemented for remotely defining security data for authorizing...
US-8,281,388 Hardware secured portable storage
A portable storage device contains a real time clock, an onboard power source and secure storage. These components enable the device to securely store data and...
US-8,281,387 Method and apparatus for supporting a virtual private network architecture on a partitioned platform
A computer system includes a service partition, not directly accessible to a user, having a security agent to inspect data entering and exiting the computer...
US-8,281,383 Secured IPv6 traffic preemption
In one embodiment, a method includes receiving, by an access router, an Internet Protocol version 6 (IPv6) packet that specifies a request for executing a...
US-8,281,359 System and method for media transcoding and presentation
A method and apparatus for presenting a media data stream complying with a broadcast encryption standard is disclosed. A dongle is removably coupleable to a...
US-8,281,331 Data storage medium support member, chucking device, brushless motor, and disc drive apparatus
A data storage medium support member is produced by resin molding. The data storage medium support member includes an accommodating portion, a guide portion,...
US-8,281,148 Securely computing a similarity measure
The present invention relates to a method and a system of securely computing a measure of similarity for at least two sets of data. A basic idea of the present...
US-8,281,142 Notarizable electronic paper
A system and method helps to control "read" and/or "write" access to electronic paper (e-paper). Informational data may be on a restricted portion of e-paper...
US-8,281,136 Techniques for key distribution for use in encrypted communications
Techniques for key distribution used with encrypted communications are provided. A shared secret associated with a principal is maintained securely and...
US-8,281,132 Method and apparatus for security over multiple interfaces
A secure digital system including a number of ICs that exchange data among each other. Each of the ICs includes a key generator for generating a cipher key; a...
US-8,281,126 Out of band encryption
Embodiments of the invention relate to systems and methods for securing data transmission in networks. Embodiments of the invention further relate to encryption...
US-8,281,122 Generation and/or reception, at least in part, of packet including encrypted payload
An embodiment may include circuitry to generate, at least in part, and/or receive, at least in part, a packet. The packet may include at least one field and an...
US-8,281,115 Security method using self-generated encryption key, and security apparatus using the same
A security method and a security apparatus are disclosed which use a self-generated encryption key. The security method includes the steps of: generating an...
US-8,281,029 System and method for acceleration of a secure transmission over satellite
A broadband communication system with improved latency is disclosed. The system employs acceleration of secure web-based communications over a satellite...
US-8,281,010 System and method for providing network support services and premises gateway support infrastructure
A disclosed, service management system (50) communicates via wide area network (99) with gateway devices (10), located at respective user premises. The service...
US-8,280,537 Editing lifecycle and deployment of objects in an industrial automation environment
An editor in an industrial automation environment comprises an input component that receives modification data relating to at least one of lifecycle and...
US-8,280,466 Four frequency band single GSM antenna
A reach back secure communications terminal capable of GSM network connectivity includes a GSM fixed cellular terminal, and a single whip antenna adapted for...
US-8,280,057 Method and apparatus for providing security in wireless communication networks
A method includes receiving data at a first wireless node in a wireless network, where the data is associated with an industrial control and automation system....
US-8,280,054 Scrambling and descrambling systems for secure communication
Various embodiments of the present invention are directed to scrambling-descrambling systems for encrypting and decrypting electromagnetic signals transmitted...
US-8,280,051 Secure presentation of media streams in response to encrypted content
Secure presentation of media streams includes encoding the media streams into digital content, encrypting a portion of that digital content, the portion being...
US-8,280,047 Method and system for securing data utilizing redundant secure key storage
A data processing device and method adapted for key management are provided. A first encryption key associated with a first password is generated, and at least...
US-8,280,043 System and method for protecting data in a secure system
A system for protecting data in a security system generates and encodes a backup key for encoding long-lived secrets. The system generates a distribution plan...
US-8,280,041 Chinese remainder theorem-based computation method for cryptosystems
A computer hardware implemented cryptography method computes a modular exponentiation, M :=Cd (mod pq), upon a message data value C using a Chinese Remainder...
US-8,276,845 Advanced aircraft cockpit
An aircraft cockpit that includes comfort and/or security adjustable equipment in which the adjustments are controlled by an adjustment management system so...
US-8,276,202 Cloud-based gateway security scanning
Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway...
US-8,276,200 Systems and methods for securely processing sensitive streams in a mixed infrastructure
A system and method for securely processing sensitive streams in a mixed infrastructure includes analyzing a stream to determine data sensitivity. A likelihood...
US-8,276,186 System and method for synchronizing security settings of control systems
A method for communicating data between a first and second control system (FCS and SCS). FCS (202) controls a first process (FP) having first security data...
US-8,276,185 Enhanced security memory access method and architecture
A memory device includes: at least one storage area for storing data; a protection control structure adapted to selectively allow an external device access to...
US-8,275,995 Identity authentication and secured access systems, components, and methods
Security tokens contain data that is each uniquely encrypted based on a unique biometric identifier of an authorized user of that token. Decoders receive the...
US-8,275,989 Method of negotiating security parameters and authenticating users interconnected to a network
A method for authenticating and negotiating security parameters among two or more network devices is disclosed. The method has a plurality of modes including a...
US-8,275,984 TLS key and CGI session ID pairing
The prevention of impersonation attacks based on hijacked common gateway interface (CGI) session IDs is disclosed. In accordance with one embodiment, a secured...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.