Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,122,490 Transfer server of a secure system for unattended remote file and message transfer
A method for automatically transferring a data file from a network drive of a client controlled local area network to a transfer server over the Internet...
US-8,122,489 Secure handling of stored-value data objects
An approach to managing stored-value data objects, such as electronic tickets, comprises secure systems and procedures for ticket issuing, storage, and...
US-8,122,486 Method and system for secure management of co-located customer premises equipment
A method, system, and apparatus for managing customer premise equipment according to one embodiment includes establishing a secure connection between a first...
US-8,122,262 Semiconductor device including encryption section, semiconductor device including external interface, and...
A secure LSI device 1 includes an encryption section 2 for encrypting a program, and an external I/F 50 for inputting/outputting a program or data from/to an...
US-8,122,254 Information processing apparatus and method thereof
It is simpler to manage an electronic signature on a It is simpler to manage an electronic signature on a server. On the contrary, authentication in a paper is...
US-8,122,244 Secure management of configuration parameters in a computing platform
A computing platform (10) protects system firmware (30) using a manufacturer certificate (36). The manufacturer certificate binds the system firmware (30) to...
US-8,122,196 System and procedure for rapid decompression and/or decryption of securely stored data
A procedure and system reduces latency in restoring encrypted or compressed and encrypted data through a security appliance. The security appliance is coupled...
US-8,122,172 Portable information security device
The invention discloses a portable information security device in the security field. In order to solve the problem that the USB Key transfers data at low speed...
US-8,122,135 System, computer program product and method for managing and controlling a local network of electronic devices...
A system method and computer program product for setting up a wireless electronic device to join a wireless local area network (LAN). The method upon which the...
US-8,122,131 Takeover processes in security network integrated with premise security system
An integrated security system is described comprising a gateway located at a first location. The gateway includes a takeover component that establishes a...
US-8,122,075 Pseudorandom number generator and encryption device using the same
A pseudorandom number generator reduced in size while maintaining high security is disclosed. The generator has a state storage unit of 2 blocks (n bits per...
US-8,121,946 System and method for modular electronic signature block
Method and system are directed to capturing consumer agreement to the terms of a transaction conducted online. The method/system uses a modular electronic...
US-8,121,908 Data collection method and report generation apparatus including an automatch function for generating a report...
A system is disclosed for storing and maintaining a plurality of field orders and a corresponding plurality of invoices. This system allows a supplier and a...
US-8,121,296 Method and apparatus for security in a data processing system
Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration...
US-8,121,295 Method, apparatus, and system for controlling playout of media
To manage playout of digital media by a media player, a wireless communication device (WCD) will include partitioned data storage including discrete partitions...
US-8,121,294 System and method for a derivation function for key per page
Disclosed herein are systems, methods and computer-readable media to perform data encryption and decryption using a derivation function to obtain a key per page...
US-8,121,288 Encrypting and decrypting a data stream
The present invention provides methods, systems and apparatus for encrypting and for decrypting a data stream, for securely sending a data stream and for...
US-8,121,249 Multi-parameter X-ray computed tomography
The present invention relates to the field of x-ray imaging. More particularly, embodiments of the invention relate to methods, systems, and apparatus for...
US-8,121,070 Security system for portable computer
A portable computer searches for preprogrammed wireless stations when it boots, and if it does not recognize any, stops booting the O.S. so that data cannot be...
US-8,121,037 Fixed mobile convergence (FMC) with PDIF and SIP gateway
Apparatus and methods are described for establishing a connection to a wireless subscriber network over a wireless LAN. A secure tunnel is established between a...
US-8,120,513 Vehicle identification, tracking and enforcement system
A system for monitoring and tracking vehicles in parking locations, public roadways and highway entrances and exits and other public vehicle access areas is...
US-8,117,662 Smartcard system
A programmable smartcard device (10) carries a file system (22, 24) and operating software enabling the on-device file system to interface with at least one...
US-8,117,648 Secure information storage and delivery system and method
A system for secure information storage and delivery includes a vault repository that includes a secure vault associated with a user, wherein the secure vault...
US-8,117,464 Sub-volume level security for deduplicated data
A network storage server receives write requests from clients via a network and internally buffers data blocks written by the write requests. At a consistency...
US-8,117,450 System and method for secure data transmission
A system for secure data transmission comprises a processor, a memory coupled to the processor, and a string generator stored in the memory and executable by...
US-8,117,446 Method and system for secured real time protocol in scalable distributed conference applications
A method of providing secured teleconference in a distributed teleconference system including providing one or more servers interconnected in a distributed...
US-8,117,445 Near field communication, security and non-volatile memory integrated sub-system for embedded portable applications
An architecture is presented that facilitates integrating memory, security functionalities and near field communication (NFC) capabilities in a mobile device. A...
US-8,117,441 Integrating security protection tools with computer device integrity and privacy policy
At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and...
US-8,117,412 Securing safety-critical variables
A system comprises a general-purpose memory, a lockable memory, a memory management unit, and a processor. The general-purpose memory includes data for a first...
US-8,117,377 Flash memory device having secure file deletion function and method for securely deleting flash file
Disclosed is a flash memory device having a secure flash file deletion function and a method for securely deleting a flash file. Data and object headers as...
US-8,117,293 Method of receiving, storing, and providing device management parameters and firmware updates to application...
A method for the efficient persistent storage of Device Management (DM) information on a mobile device is provided. More specifically, the present design...
US-8,116,889 Method, system, and computer program product for managing controlled residential or non-residential environments
A control server, or similar central processor, manages the distribution of data (including audio and video), voice, and control signals among a plurality of...
US-8,116,723 Network server emergency information accessing method
A Means and Methods for providing a PSAP with means for tracking the real time location of a wireless telephone that connects to an Internet server upon...
US-8,116,453 Gaming console-specific user authentication
Systems, methods, and computer program products are provided for user authentication required for conducting online financial institution transactions. The...
US-8,115,656 Vehicle security and monitoring system
A vehicle monitoring system includes a communication subsystem configured to provide two-way wireless communication, and a controller mounted in a vehicle and...
US-8,115,609 Multi function bluetooth apparatus
A method and apparatus for secure access to data, to application and to systems and for providing an alarm to users upon detecting that a monitored device is...
US-8,115,255 Method for manufacturing semiconductor device
A method for manufacturing a semiconductor device comprises including a insulating pattern and a silicon film over a SOI substrate, thereby increasing a reduced...
US-8,112,817 User-centric authentication system and method
A system for authenticating a user in a network. The authentication system includes a computer resource having secure data, an authentication computing system...
US-8,112,813 Interactive image-based document for secured data access
The present invention is directed to a method and system for verifying a user for copying or printing a limited portion of digital content while allowing the...
US-8,112,808 Server apparatus and installation information making method
A license server generates USB serial IDs for USB memory secured in a multi-function machine and then makes electronic signature files using the USB serial IDs...
US-8,112,796 Secure federation of data communications networks
Techniques for secure federation of data communications networks are provided. The techniques employ an edge proxy server to route messages depending on a...
US-8,112,638 Secure backup system and method in a mobile telecommunication network
The secure backup system is in a mobile telecommunication network and has at least one mobile station with data, a backup entity for storing a backup file of...
US-8,112,634 Security-enhanced storage devices using media location factor in encryption of hidden and non-hidden partitions
Methods and devices for increasing or hardening the security of data stored in a storage device, such as a hard disk drive, are described. A storage device...
US-8,112,632 Security devices, systems and computer program products
A security device having a knowledge input module obtaining knowledge data and a user data storage module storing user-specific data. A processor performs at...
US-8,112,631 Password input device, computer security system using the same and method thereof
A password input device includes a detection module, a recognition module, and an output module. The detection module is configured for detecting angular...
US-8,112,627 System for self-service recharging and method for the same
The present invention discloses a method for self-service recharging and a system for the same, relating to the security communications of online banking. The...
US-8,112,624 Method and system for certificate revocation list compression
Embodiments of the present invention provide a compression capability for compressing a CRL, such as an X.509 CRL, stored as a file, data structure or data...
US-8,112,622 Chaining port scheme for network security
A networking method, microchip, and device are described in which a first security engine may be associated with a chaining port and configured to perform an...
US-8,112,601 Data storage device with security feature
A data storage device is disclosed with at least two partitions and a set of switches to separately enable and disable read and write operations to each of the...
US-8,112,536 System and method for dynamic security provisioning of computing resources
The present invention facilitates the dynamic provisioning of computing and data assets in a commodity computing environment. The invention provides a system...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.