Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,135,953 System and method for providing variable security level in a wireless communication system
A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of...
US-8,135,952 Method and system for secure position determination
A system and method of security for navigation, positioning, and localization systems, and applications of cryptography thereto are provided. The security can...
US-8,135,931 Information equipment, method for supporting operation thereof, and computer-readable storage medium for...
Information equipment having a memory area for which access restrictions are set is provided. The information equipment makes a determination, in response to...
US-8,135,825 Method for loading and managing an application on mobile equipment
A method for loading and managing a software application in a mobile equipment intended to receive digital data of mobile television services broadcasted via a...
US-8,135,657 Systems and methods for processing data flows
A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and...
US-8,135,656 Online management service for identification documents which prompts a user for a category of an official document
An online identification document management service includes a host server having a web-based interface adapted to facilitate secure customer access to the...
US-8,135,135 Secure data protection during disasters
In situations, such as disasters, where the physical protection of data may be compromised, algorithmic protection of such data can be increased in anticipation...
US-8,135,134 Systems and methods for managing cryptographic keys
A common interface for managing cryptographic keys is provided. A request to manage a cryptographic key may be received in a first interface format, translated...
US-8,135,007 Method and mechanism for port redirects in a network switch
A method for selectively redirecting a data packet to a port on a switching device which is associated with a corresponding network service. In one embodiment,...
US-8,134,462 Self-contained sensor package for water security and safety
Disclosed is a floating sensor system having a casing that encloses a microcontroller. The microcontroller includes a digital processor and a non-volatile...
US-8,132,252 System and method for securely transmitting data using video validation
A system and method is disclosed for secure transmission of electronic information between two parties. A first data communication session between a first...
US-8,132,236 System and method for providing secured access to mobile devices
A system and method for providing secured access of a mobile device is disclosed herein. Access to data included in the mobile device is permitted when the...
US-8,132,025 Management method for archive system security
Creating a plaintext index from a text that is extracted from a file presents the risk of a leak of confidential information from the created index. To address...
US-8,132,015 Method and system for loading a secure firmware update on an adapter device of a computer system
One embodiment of the present invention sets forth a method for loading a secure firmware update onto an adapter device in a computer system. The method...
US-8,132,004 Multiple independent levels of security containing multi-level security interface
Methods and systems for enabling security in transferring data from a single level MILS partition to the multiple level LAN. When a frame is received from an...
US-8,131,995 Processing feature revocation and reinvocation
A method includes storing, at a storage location of a system, a first security value and utilizing, at the system, a first security certificate compatible with...
US-8,131,988 Secure boot device
An electronic device includes a power supply unit, a control unit, a first boot circuit, and a data encryption unit. The control unit outputs a boot signal for...
US-8,131,959 Method and arrangement for securing user-definable data of a franking machine
In a method for data backup of a franking machine in which, in a data backup step, a connection is established between the franking machine and a remote data...
US-8,131,942 Control data modification within a cache memory
A data processing system is provided with at least one processor 4, 6, a main memory 18 and a cache memory 14. Cache data within the cache memory 14 has...
US-8,131,822 Access of elements for a secure web page through a non-secure channel
Particular embodiments generally relate to allowing access of non-secure elements through a non-secure channel when a top-level page was accessed through a...
US-8,131,738 Search engine service utilizing hash algorithms
A secure search method of securing searches by a user through a hash provider using a search engine. The user registers with the hash provider. The hash...
US-8,131,672 System and method for synchronizing data records between multiple databases
A system and method for synchronizing data records between multiple databases is provided. Each database includes data records that are modified to include at...
US-8,131,646 Reprogrammable security for controlling piracy and enabling interactive content using revocation status
Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic...
US-8,131,401 Real-time stability indexing for intelligent energy monitoring and management of electrical power network system
A system and method for intelligent monitoring and management of an electrical system is disclosed. The system includes a data acquisition component, a power...
US-8,131,145 Lightweight cordless security camera
The present invention is a lightweight, cordless security camera comprising a lightweight stand or tripod, a video camera with pan, tilt, and zoom articulation...
US-8,130,957 System and method for securing data
In accordance with the teachings described herein, systems and methods are provided for securing data for transmission to a wireless device. The disclosed...
US-8,130,956 Efficient and low power encrypting and decrypting of data
The present invention relates to the field of computer data encrypting and decrypting, especially for mobile equipments like PDA, mobile phones, smart cards and...
US-8,130,955 Random number generation through use of memory cell activity
Systems and/or methods that facilitate security of data are presented. A random number generation component generates random numbers based in part on electron...
US-8,130,954 Methods and apparatus for authenticating data as originating from a storage and processing device and for...
Techniques are described for using unique features of a storage medium for authentication of data as originating from the storage medium, and also for...
US-8,130,953 Security protection for data communication
Authentication of an electronic communication apparatus capable of communicating data messages with a server according to a synchronization protocol includes...
US-8,130,890 Semiconductor memory device having data clock training circuit
A data clock frequency divider circuit includes a training decoder and a frequency divider. The training decoder outputs a clock alignment training signal,...
US-8,130,768 Enhanced gateway for routing between networks
A network gateway is disclosed, wherein for a received communication, the gateway determines a network component to which information for the communication is...
US-8,130,704 Multi-tier wireless home mesh network with a secure network discovery protocol
An apparatus and method for a multi-tier wireless home mesh network is described. The method may include formation of an infrastructure-less wireless home mesh...
US-8,130,645 Method and architecture for a scalable application and security switch using multi-level load balancing
A switch architecture and method provides scaling through multi-level load balancing of flows across data and application processing planes. An input/output...
US-8,130,554 Securely erasing flash-based memory
A method is used in securely erasing flash-based memory. A new version of data is received for a logical location of a flash-based memory. An old version of the...
US-8,130,490 Detachable hard drive with an electromagnetic switch
A detachable hard drive with an electromagnetic switch comprises a tray, a fastening unit and an electromagnetic switch. The electromagnetic switch is powered...
US-8,130,432 Space scanner for self-control moving object
Provided is a space scanner for a self-control moving object. The space scanner has a structure in which a reflective mirror is rotated and tilted. Thus, the...
US-8,130,419 Embedding authentication data to create a secure identity document using combined identity-linked images
Techniques for creating an identity document are provided. The techniques include obtaining two or more identity-linked images, deriving one or more at least...
US-8,127,984 Emulated radio frequency identification
A mobile communication device is equipped with hardware and/or software components to enable the device to output a data in a form of a radio frequency signal,...
US-RE43,221 Structured cabling system and method
A structured cabling system includes a plurality of data cables (6A-6F), one end of each cable being secured to a jack of a multiple jack assembly (1) and the...
US-8,127,360 Method and apparatus for detecting leakage of sensitive information
A method and apparatus for preventing leakage of sensitive information from a computer is described. The method includes identifying data entered into the...
US-8,127,346 Network security system and method
In a security system for network communications with client devices, each client device has a communication module for communicating with at least one server...
US-8,127,344 Rapid archivable WORM memory system based on a hard disc
A process is described which permits particularly rapid writing and reading of small files, such as e-mails and scanned documents, for legally relevant WORM...
US-8,127,314 Method for using information in another domain, program for using information in another domain, and...
To use data in another domain while executing a script language based on a security limit of an HTTP client. A main program provided to an HTTP client from a...
US-8,127,150 Data security
In one embodiment, a method is provided that may include encrypting, based least in part upon at least one key, one or more respective portions of input data to...
US-8,127,147 Method and apparatus for securing data storage while insuring control by logical roles
A storage device with hardened security features has a storage medium, an interface, and a controller. The interface is adapted to communicatively couple the...
US-8,127,145 Computer architecture for an electronic device providing a secure file system
A secure file service includes a cryptographic processor (302, 602) and a secure file system (301, 601). The cryptographic processor is comprised of a trusted...
US-8,127,131 System and method for efficient security domain translation and data transfer
A mobile UE includes a CPU, a secure DMA module, a secure cryptographic module, secure memory, and non-secure memory. The secure cryptographic module and secure...
US-8,127,130 Method and system for securing data utilizing reconfigurable logic
A method is provided for securing data sets by dynamically hopping amongst a variety of data encryption and/or manipulation protocols. Such dynamic protocol...
US-8,127,094 Data migration and copying in a storage system with dynamically expansible volumes
When migrating data stored in a storage region assigned to a volume to another storage region, the connection status of the host computer and volume is...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.