Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,209,550 Method and apparatus for protecting SIMLock information in an electronic device
The teachings herein present a method and apparatus for protecting usage restriction data that governs usage of an electronic device. A cryptographic circuit...
US-8,209,546 Data-securing method of program tool
A program tool with a data-securing function includes a flow control center and a plurality of processing units for performing respective processing steps. The...
US-8,209,544 Trusted storage systems and methods
Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of...
US-8,209,540 Incremental secure backup and restore of user settings and data
A data processing device receives a manifest from a previous backup operation and determines what files have changed by comparing the files to be backed up to...
US-8,209,532 System and method for implementing security of multi-party-communication
A system and method for implementing security of multi-party communication is disclosed in the disclosure. The system mainly includes a group key management...
US-8,209,400 System for data routing in networks
An integrated security system integrates broadband and mobile access and control with conventional security systems and premise devices to provide a tri-mode...
US-8,209,194 Method and system for providing a healthcare expense donation network
A method and system for providing a healthcare expense donation network whereby a third party provided healthcare management system, such as a computing system...
US-8,208,955 Voice-over-IP (VoIP) systems, components and methods for providing enhanced location information to emergency...
Disclosed are systems and techniques for identifying VoIP phone connector locations whereby an emergency call request can be specifically located on a VoIP...
US-8,208,932 System for mobile broadband networking using dynamic quality of service provisioning
A wireless networking system uses mobile and fixed transceivers to achieve a network with changing topology. A routing process includes quality-of-service...
US-8,208,897 Portable wireless terminal and its security system
The present invention relates to a portable wireless terminal, and in particular, a portable wireless terminal such as a cellular phone, etc., and its security...
US-8,208,637 Migration of computer secrets
Described is a technology by which computer data secrets sealed by a trusted platform module (TPM) or like device may be securely migrated from a physical...
US-8,208,635 Wireless mesh network with secure automatic key loads to wireless devices
A wireless mesh network provides secure communication by encrypting data using one or more encryption keys. A configuration device in communication with a...
US-8,208,633 Method and system for securing communications in a metering device
A method and system for securing the communication link between the accounting device and printer of a metering system by authenticating the data being sent via...
US-8,208,629 Video monitoring system with video signal encrypted and the method for the same
Techniques pertaining to a security system are disclosed. According to one aspect of the techniques, secured communication of video data between a monitoring...
US-8,208,628 Systems and methods for key generation in wireless communication systems
A system and a method for providing a secure wireless ad-hoc network in a wireless communication system having at least two transceivers coupled by a wireless...
US-8,208,485 Routing method and wireless network system
A routing method of a wireless network system is provided. Paths of the wireless network system are divided into down-stream and up-stream paths. The up-stream...
US-8,208,299 Integrated circuit embedded with non-volatile programmable memory having variable coupling and separate...
A multi-programmable non-volatile device is operated with a floating gate that functions as a FET gate that overlaps a portion of a source/drain region and...
US-8,208,185 Method and apparatus for the production of polarization holograms
The present invention relates to a method for the production of polarization holograms, an apparatus for the production of polarization holograms and the use of...
US-8,208,019 Wireless video surveillance system and method with external removable recording
A surveillance system and method with wireless communication between components for providing an external removable data storage device capable of recording...
US-8,207,854 Shipping container integrity device and system
Disclosed is a remotely monitorable shipping container security and integrity system and radio frequency identification device. The system permits remote...
US-8,207,814 Kit and system for providing security access to a door using power over ethernet with data persistence and fire...
The present disclosure describes embodiments of a power-over-ethernet ("POE") controller and an access control system comprising the same. In an embodiment, the...
US-8,205,249 Method for carrying out a secure electronic transaction using a portable data support
A method for effecting a secure electronic transaction on a terminal using a portable data carrier is proposed. According to the method a user (30) first...
US-8,205,242 System and method for data mining and security policy management
A system and method to generate and maintain controlled growth DAG are described. The controlled growth DAG conveys information about objects captured by a...
US-8,205,238 Platform posture and policy information exchange method and apparatus
Transport agnostic, secure communication protocol for transmitting host platform posture information to the Network Access Control Server or PDP (Policy...
US-8,205,091 System and method for securing wireless data
Systems and methods for operation upon a data processing device for handling secure data stored on the device. The device is configurable to communicate over a...
US-8,205,088 Method for the authenticated transmission of a personalized data set or program to a hardware security module...
In a method and arrangement for authenticated transmission of a personalized data set or program to a hardware security module in a device such as a franking...
US-8,205,073 Access point, terminal, encryption key configuration system, encryption key configuration method, and program
An object of the present invention is to enable the configuration tasks needed to form a wireless LAN to be performed using a simple method while increasing...
US-8,205,072 Method and apparatus for electronically configuring a secured user desktop
A method of providing endpoint security for a session on an untrusted computer accessing data on a networked server is disclosed. A virtual secure desktop is...
US-8,204,929 Hiding sensitive information
An improved methodology and implementing computer system are provided in which sensitive information is selectively masked in order to enable such information...
US-8,204,906 Abstraction based audit and security log model for increased role and security enforcement
Embodiments of the invention store log event records in a secure database log by encrypting information in a query, or in query results, that would otherwise be...
US-8,204,815 Open end mutual fund securitization process
A computer implemented system is provided for exchanging shares in an exchange traded product. A display is provided for displaying data representing shares of...
US-8,204,180 Systems and methods for preventing sensitive information from being communicated into a non-secure environment
A telecommunication system is arranged between a trusted automated interactive system and a non-secure agent. The trusted automated interactive portion is...
US-8,203,449 RF-ID tag reading system for using password and method thereof
Provided is a RFID tag with enhanced security. The tag includes a tag memory to store thereto pre-determined password information and tag data, an antenna to...
US-8,203,423 Portable access device
Portable devices, methods, and systems for controlling access to computers and other secure systems such as systems protecting secure premises, by processing...
US-8,201,266 Security system to prevent tampering with a server blade
Method, computer program product and apparatus for physically securing a server in response to detecting an unauthorized intrusion event. The method comprises...
US-8,201,261 Secure data storage system and method
A system and method for the secure storage of data in a network. Data stored on a primary server connected to the network is initially encrypted. The IP address...
US-8,201,257 System and method of managing network security risks
A security risk management system comprises a vulnerability database, an asset database, a local threat intelligence database and a threat correlation module....
US-8,201,234 Multi-profile interface specific network security policies
Computer-readable medium having a data structure stored thereon for defining a schema for expressing a network security policy. The data structure includes a...
US-8,201,218 Strategies for securely applying connection policies via a gateway
A strategy is described for securely applying connection policies in a system that includes a first entity (e.g., a TS client) connected to a second entity...
US-8,201,009 Computer management and power backup system and device
A computer power backup system and device are provided. When power to a computer system is lost, a battery backup unit provides power to the computer system for...
US-8,200,989 External memory access device and method of accessing external memory
An external memory access device and a method of accessing an external memory are provided. The external memory access device includes an internal memory unit...
US-8,200,981 Data transmission device and data transmission system
A data transmission device for secure biometric transmission includes first and second input-output units, and a biometric identification apparatus. The...
US-8,200,974 Method and system for securely exchanging encryption key determination information
A system and method for securely exchanging plurality of information items used to generate a plurality of encryption keys used in a public key-and-private key...
US-8,200,972 Encryption of security-sensitive data by re-using a connection
Techniques are provided for processing data. Connections having different security properties are stored, wherein each of the connections allows applications at...
US-8,200,968 Method and apparatus for communicating between a requestor and a user receiving device using a user device...
A system and method for communicating between a user device locator module and a user receiving device includes forming a secure connection with a user device...
US-8,200,961 Securing a flash memory block in a secure device system and method
A technique for securing a flash memory block in a secure device system involves cryptographic techniques including the generation of a Message Authentication...
US-8,200,833 Security mode based management of cookie data stores
The subject technology provides a cookie data store with a unique identifier that is implemented for one or more web clients. Each browser can have different...
US-8,200,778 Method for integrating plug-in security panel module with network interface middleware
A security system is provided. The security system includes a security processor having a plurality of inputs that receive signals from security sensors in a...
US-8,200,775 Enhanced syndication
A variety of tools and techniques are disclosed for managing, viewing, publishing, searching, clustering, and otherwise manipulating data streams. Data streams...
US-8,200,761 Method and apparatus for improving security in a data processing system
Methods and Apparatuses for processing data are described herein. In one aspect of the invention, an exemplary method receives data which may include an...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.