Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,205,073 Access point, terminal, encryption key configuration system, encryption key configuration method, and program
An object of the present invention is to enable the configuration tasks needed to form a wireless LAN to be performed using a simple method while increasing...
US-8,205,072 Method and apparatus for electronically configuring a secured user desktop
A method of providing endpoint security for a session on an untrusted computer accessing data on a networked server is disclosed. A virtual secure desktop is...
US-8,204,929 Hiding sensitive information
An improved methodology and implementing computer system are provided in which sensitive information is selectively masked in order to enable such information...
US-8,204,906 Abstraction based audit and security log model for increased role and security enforcement
Embodiments of the invention store log event records in a secure database log by encrypting information in a query, or in query results, that would otherwise be...
US-8,204,815 Open end mutual fund securitization process
A computer implemented system is provided for exchanging shares in an exchange traded product. A display is provided for displaying data representing shares of...
US-8,204,180 Systems and methods for preventing sensitive information from being communicated into a non-secure environment
A telecommunication system is arranged between a trusted automated interactive system and a non-secure agent. The trusted automated interactive portion is...
US-8,203,449 RF-ID tag reading system for using password and method thereof
Provided is a RFID tag with enhanced security. The tag includes a tag memory to store thereto pre-determined password information and tag data, an antenna to...
US-8,203,423 Portable access device
Portable devices, methods, and systems for controlling access to computers and other secure systems such as systems protecting secure premises, by processing...
US-8,201,266 Security system to prevent tampering with a server blade
Method, computer program product and apparatus for physically securing a server in response to detecting an unauthorized intrusion event. The method comprises...
US-8,201,261 Secure data storage system and method
A system and method for the secure storage of data in a network. Data stored on a primary server connected to the network is initially encrypted. The IP address...
US-8,201,257 System and method of managing network security risks
A security risk management system comprises a vulnerability database, an asset database, a local threat intelligence database and a threat correlation module....
US-8,201,234 Multi-profile interface specific network security policies
Computer-readable medium having a data structure stored thereon for defining a schema for expressing a network security policy. The data structure includes a...
US-8,201,218 Strategies for securely applying connection policies via a gateway
A strategy is described for securely applying connection policies in a system that includes a first entity (e.g., a TS client) connected to a second entity...
US-8,201,009 Computer management and power backup system and device
A computer power backup system and device are provided. When power to a computer system is lost, a battery backup unit provides power to the computer system for...
US-8,200,989 External memory access device and method of accessing external memory
An external memory access device and a method of accessing an external memory are provided. The external memory access device includes an internal memory unit...
US-8,200,981 Data transmission device and data transmission system
A data transmission device for secure biometric transmission includes first and second input-output units, and a biometric identification apparatus. The...
US-8,200,974 Method and system for securely exchanging encryption key determination information
A system and method for securely exchanging plurality of information items used to generate a plurality of encryption keys used in a public key-and-private key...
US-8,200,972 Encryption of security-sensitive data by re-using a connection
Techniques are provided for processing data. Connections having different security properties are stored, wherein each of the connections allows applications at...
US-8,200,968 Method and apparatus for communicating between a requestor and a user receiving device using a user device...
A system and method for communicating between a user device locator module and a user receiving device includes forming a secure connection with a user device...
US-8,200,961 Securing a flash memory block in a secure device system and method
A technique for securing a flash memory block in a secure device system involves cryptographic techniques including the generation of a Message Authentication...
US-8,200,833 Security mode based management of cookie data stores
The subject technology provides a cookie data store with a unique identifier that is implemented for one or more web clients. Each browser can have different...
US-8,200,778 Method for integrating plug-in security panel module with network interface middleware
A security system is provided. The security system includes a security processor having a plurality of inputs that receive signals from security sensors in a...
US-8,200,775 Enhanced syndication
A variety of tools and techniques are disclosed for managing, viewing, publishing, searching, clustering, and otherwise manipulating data streams. Data streams...
US-8,200,761 Method and apparatus for improving security in a data processing system
Methods and Apparatuses for processing data are described herein. In one aspect of the invention, an exemplary method receives data which may include an...
US-8,200,700 Systems and methods for use of structured and unstructured distributed data
The invention relates to hardware, software and electronic service components and systems to provide large-scale, reliable, and secure foundations for...
US-8,200,639 Secure data scrubbing utility
A software method and utility for performing a user-controlled data shredding operation for overwriting an entire file structure inclusive of all black-shaded...
US-8,200,599 100Gbps security and search architecture using programmable intelligent search memory
Memory architecture provides capabilities for high performance content search. The architecture creates an innovative memory that can be programmed with content...
US-8,200,566 Fair value model based system, method, and computer program product for valuing foreign-based securities in a...
A system and method for determining fair value prices of financial securities of international markets includes steps of selecting a universe of securities of a...
US-8,200,556 Issuer support services
A process, residing on a server, provides issuer support services to a financial market. A compliance process reviews issue and issuer data and filing and...
US-8,200,510 Method for secure diagnostic screening, servicing, treatment, and compliance monitoring for sleep apnea for...
A secure method for delivering sleep apnea diagnostic services on an at least one operator of a transport vehicle to a transport company. The sleep apnea...
US-8,200,377 System for securing an aircraft flight plan
The system for securing an aircraft flight plan has a flight management system delivering: a flight plan and points comprising passage setpoints in terms of...
US-8,200,281 Secure removable card and a mobile wireless communication device
A removable card for use with a mobile wireless communication device has a processor and a non-volatile memory, connected to the processor. The removable card...
US-8,200,193 Detection of anomalies in traffic transmitted by a mobile terminal within a radiocommunication network
To detect an anomaly in traffic sent by at least one mobile terminal (TM) in a radiocommunication network, a device capable of communicating with a ...
US-8,200,184 Evacuation route obtaining system, mobile terminal apparatus, evacuation directive apparatus, evacuation route...
In an evacuation route obtaining system according to the present invention, a mobile terminal apparatus and a plurality of display apparatuses are connected to...
US-8,199,922 Ethernet isolator for microphonics security and method thereof
A system and method for providing microphonic isolation on a transmission line. The transmission line has a first part and a second part. The first part of...
US-8,199,916 Selectively loading security enforcement points with security association information
A method, network element, and computer storage program product, are provided for selectively loading a communication network security enforcement point ("SEP")...
US-8,199,912 Security storage of electronic keys within volatile memories
It is described a method for providing an electronic key within an integrated circuit (100) including both a volatile memory (102) and a non-volatile memory...
US-8,199,911 Secure encryption algorithm for data deduplication on untrusted storage
Various methods and systems for performing data deduplication when encrypting data for storage on an untrusted storage system are disclosed. One method involves...
US-8,199,440 Transducer positioning apparatus with magnetically preloaded linear guide
A transducer positioning apparatus is provided that supports a read/write head on a data storage machine and biases the head against rotation. The transducer...
US-8,199,339 Printing system and method for securely producing self-authenticating documents
There is provided a printing system including a reading unit that reads paper identification information of a paper sheet, a first controller that implements...
US-8,199,195 Wireless video surveillance system and method with security key
A surveillance system and method having at least one wireless input capture device ICD(s) and a corresponding digital input recorder (DIR) and/or another ICD,...
US-8,199,174 Method and system for generating documents having stored electrostatic pattern information
A method and apparatus for generating documents having stored electrostatic pattern information provides security with respect to the authenticity of documents....
US-8,198,988 Secure link between controller and device
In certain embodiments consistent with the invention, a method of associating a controlled device with a remote controller device involves providing a...
US-8,198,984 Method, RFID reader, RFID tag and RFID system for secure communication
In an RFID system a method for communication between a reader (1) and a tag (2) comprises: at the reader (1), switching on an electromagnetic signal (SS) for...
US-8,198,142 General purpose ball grid array security cap
A general purpose BGA security cap includes a substrate, an integrated circuit die, and an array of bond balls. The substrate includes an anti-tamper security...
US-8,197,389 Exercising apparatus
An apparatus is disclosed for enabling an operator to exercise comprising a frame having a body, a base and a top. A load is positioned on the frame for...
US-8,197,344 Gaming terminal data monitoring network
A method of storing data serially transmitted between a gaming terminal and a computer on one or more servers in a network. The gaming terminal and computer are...
US-8,196,815 Secure card terminal using keypad scanning sequence determined by card
To provide alphanumeric data, such as a PIN code, to a smart card (2) a terminal (1) is used which is capable of communicating with the smart card. The terminal...
US-8,196,543 Defect repairing apparatus, defect repairing method, program, and computer-readable recording medium
A defect repairing apparatus (1) capable of efficiently repairing defects includes: a substrate-mounting plate (3) for securing a substrate conveyed; a...
US-8,196,202 Mobile network security system
A security system for a mobile network (1) has a gateway (3) for receiving messages from outside the network and a HLR (10) storing mobile terminal location...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.