Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,151,351 Apparatus, method and computer program product for detection of a security breach in a network
A method for detecting a security breach in a network comprises at one of a plurality of transceivers each having a different media access control address,...
US-8,151,342 Contents execution device equipped with independent authentication means and contents re-distribution method
The present invention particularly relates to a digital content providing service method and a content execution device for the same, for maximizing user...
US-8,151,340 Data relay device and data relay method
A data relay device has a plurality of security functions sequentially executes security functions on inputted data based on a predetermined rule, to determine...
US-8,151,329 Secure handling of stored-value data objects
An approach to managing stored-value data objects, such as electronic tickets, comprises secure systems and procedures for ticket issuing, storage, and...
US-8,151,322 Systems and methods for user access authentication based on network access point
Systems and methods of authenticating user access based on an access point to a secure data network include a secure data network having a plurality of a...
US-8,151,169 Method and device for securing the memory of a computer against errors due to radiation
The method is for hardening a computer based on off-the-shelf components so that it resists bombardment by particles of cosmic origin encountered at high...
US-8,151,121 Secure data storage
Securely storing data to an optical disc has been described, including generating write data that includes the data and overhead data that facilitates reading...
US-8,151,119 Method and apparatus for secure data mirroring a storage system
A secure data mirroring capability in a storage system includes encrypting data blocks in a primary volume in preparation for a data mirroring operation. The...
US-8,151,110 Methods and apparatuses for configuring products
Methods and apparatuses for configuring products for security. In one aspect, a method of manufacturing a device, includes: determining a first executable code...
US-8,150,984 Enhanced data security through file access control of processes in a data processing system
A software system for controlling the unauthorized transfer of data from a data processing system to a network is provided. A file monitor module monitors...
US-8,150,783 Security system for and method of detecting and responding to cyber attacks on large network systems
An improved security system for and method of detecting and responding to cyber attacks on a network or network element. The system comprises: (a) an...
US-8,150,772 Biometric authentication of mobile financial transactions by trusted service managers
A method for authenticating a financial transaction at a point of sale (POS) includes storing an application program in a first secure element of a mobile...
US-8,150,766 System and method for investing public deposits
A method, system and program product for operating an exchange method for municipal and/or state funds from banking institutions, comprising: (A) accessing, by...
US-8,150,374 System and method for remotely assigning and revoking access credentials using a near field communication...
The present invention is generally directed toward a mobile device that can be used in a secure access system. More specifically, the mobile device can have...
US-8,150,371 Interactive control of access to services and capabilities of a mobile device
A system device and method are provided which determine authorization for access to one or more services grouped together as a package of services without...
US-8,150,329 Wireless communication device and method for switching modulation system thereof
A further secure channel is ensured after switching of a modulation system at the time of deterioration channel quality. A wireless communication device...
US-8,150,033 Optical security system using fourier plane encoding
A method of encrypting a set of data is disclosed. The method may include encoding a set of data with a first encryption key, and transforming the set of data...
US-8,150,011 Apparatus, method, and computer program product for geographic call center status and security
An apparatus, method, system, and computer program product are provided for producing a geographical mapping of the status, activity, security, work-force, and...
US-8,149,685 Covert OFDM transmission using cyclic prefix
Methods for secure OFDM communications include changing the length of OFDM symbols in a pseudo-random fashion by appending a totally random signal to some of...
US-8,149,119 Utility meter tamper monitoring system and method
A method includes activating a tamper monitoring circuit of a security seal configured to securely lock a utility meter. The method also includes wirelessly...
US-8,149,118 Device and method for registering the opening of closures of spaces to be secured
In a device and a method for registering the opening of closures of spaces to be secured, a sealing module, which includes a sensor, a microprocessor, a memory,...
US-8,149,114 Utility meter tamper monitoring system and method
A method includes activating a tamper monitoring circuit of a security seal configured to securely lock a utility meter. The method also includes wirelessly...
US-8,149,092 Device and method for managing equipment maintenance
The subject of the invention is a device for managing equipment maintenance. It relates to a device for managing maintenance of a number N of items of equipment...
US-8,146,803 Automated banking machine with noncontact reading of card data
An automated banking machine can receive user card data from a cell phone. The phone stores the card data of several selectable cards, including electronic...
US-8,146,802 Automated banking machine with noncontact reading of card data
An automated banking machine can receive user card data from a cell phone. The phone stores the card data of several selectable cards, including electronic...
US-8,146,800 Apparatus for recognizing security code having electromagnetic band-gap pattern
In an apparatus for recognizing a security code having an electromagnetic band gap (EBG) pattern which uses reflection and transmission characteristics of the...
US-8,146,448 Apparatus for mobile collection of atmospheric sample for chemical analysis
Portable devices and related methods for collecting and storing atmospheric samples for subsequent chemical analysis are provided. A sample cartridge according...
US-8,146,163 Method and system for securing personal computing devices from unauthorized data copying and removal
A method for securing personal computing devices from unauthorized data copying and removal includes detecting an attachment of a device to a client included...
US-8,146,157 Method and apparatus for secure transport and storage of surveillance video
Security information such as fixed or dynamically received camera location information, laser signature information, timestamp information, and network...
US-8,146,150 Security management in multi-node, multi-processor platforms
Multi-node and multi-processor security management is described in this application. Data may be secured in a TPM of any one of a plurality of nodes, each node...
US-8,146,134 Scalable firewall policy management platform
Securing large networks having heterogeneous computing resources including provision of multiple services both to clients within and outside of the network,...
US-8,145,915 System and method for platform-independent biometrically secure information transfer and access control
The inventive data processing system and method enable verifiable secure transfer of information between two or more parties, each having access to at least one...
US-8,145,907 Secure data transfer
The invention concerns secure data transfer from a first radio communication device of a first party to a second radio communication device. A random first...
US-8,145,902 Methods and apparatus for secure processor collaboration in a multi-processor system
In a multi-processor system including a plurality of processors capable of being operatively coupled to the main memory and each processor including an...
US-8,145,900 Crypto-pointers for secure data storage
This disclosure relates to pairing of a different cryptographic key with each pointer in a data structure to form a crypto-pointer. The cryptographic key is...
US-8,145,862 Arrangement for exchange of customer data of a franking machine
In a method and an apparatus for exchanging customer data of a franking machine, a data processing device is in communication with a first memory that is...
US-8,145,771 Name system in communication network, and naming method
A name system and method in a communication network, includes a technique for implementing naming in which security is ensured in an Internet environment and a...
US-8,145,552 System and method for computer implemented collateral management
A computer-implemented method for managing collateral risk associated with financial instrument trading and a data processing system includes a processor and...
US-8,145,234 Secure user plane location (SUPL) roaming
A geographic cell identification (cell ID) database is updated on the fly as, for example, roaming user equipment (UE) reports its location during Assisted...
US-8,145,194 Wireless device monitoring system including unauthorized apparatus and authentication apparatus with security...
In a wireless device monitoring system including a mobile telephone and an authentication apparatus, a controller of the authentication apparatus repeatedly...
US-8,145,131 Wireless ad hoc network security
Providing network security includes detecting network traffic associated with an ad hoc network that includes a first station and a second station, and...
US-8,144,867 Duration computing method in a security module
Example embodiments are directed to a duration computing method in a security module inserted into an apparatus including an internal clock. The apparatus may...
US-8,144,866 Method and system for securing data utilizing redundant secure key storage
A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations,...
US-8,144,790 Broadcast receiver and method of processing data
A broadcast receiver, and a method of processing data are disclosed. The broadcast receiver includes a receiving unit, a RS frame decoder, a decoding unit, and...
US-8,144,704 IP communication apparatus and IP communication method of such apparatus
An IP terminal apparatus has a SIP controller, a UDP packet controller, and an RTP controller. The SIP controller transmits and receives a call control message...
US-8,144,678 Mobile device handoff while maintaining connectivity with multiple access points
A method, system, and computer-readable media are provided for allowing a mobile device to maintain communication connectivity during a handoff between wireless...
US-8,144,354 Method for transforming and transporting printer data over the internet in a secure and reliable manner
A method, apparatus, and computer-readable medium are provided. The method, for example, can--in certain embodiments--include transforming printer data into an...
US-8,144,185 Communication control method, computer system, conference management server, communication method and portable...
A computer system has a presence server having a presence management unit that carries out a processing associated with presence data; and a conference...
US-8,144,138 Liquid crystal display device
A liquid crystal display device capable of controlling a viewing angle is disclosed. The liquid crystal display device includes: a liquid crystal panel...
US-8,143,602 High-volume manufacturing massive e-beam maskless lithography system
The present disclosure provides a maskless lithography apparatus. The apparatus includes a plurality of writing chambers, each including: a wafer stage operable...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.