Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,095,983 Platform for analyzing the security of communication protocols and channels
A security analyzer tests the security of a device by attacking the device and observing the device's response. Attacking the device includes sending one or...
US-8,095,965 Secure authentication for authorization for transaction processing
A method and apparatus for authenticating and authorizing online transactions. An authentication cookie is transmitted to a client system. The authentication...
US-8,095,805 Security flash memory, data encryption device and method for accessing security flash memory
The present invention discloses a security flash memory which includes a flash memory chip with a plurality of data transmission terminals, and a data...
US-8,095,802 System and method for securely saving a program context to a shared memory
A system, method and program product for securely saving a program context to a shared memory is presented. A secured program running on an special purpose...
US-8,095,801 Method of protecting microcomputer system against manipulation of data stored in a memory assembly of the...
A method of protecting a microcomputer system against manipulation of data stored in a memory assembly of the microcomputer system is provided. The method may...
US-8,095,791 Distributed processing system, distributed processing method and image processing apparatus
A distributed storage system implements high-speed data reconstitution processing while ensuring a high security level. Devices (63) in a device group (51) with...
US-8,095,786 Application-specific network-layer virtual private network connections
Techniques are described for providing secure communication of network traffic from specific applications operating on a client device to a server device using...
US-8,095,687 Systems and methods for managing state in a cluster of servers
The present invention provides systems and methods that can be used to manage state on a cluster comprising a plurality of application servers. A system...
US-8,095,683 Method and system for mirroring dropped packets
A system for mirroring dropped packets by extending port mirroring. Networking devices, such as firewalls and routers drop some packets during data transmission...
US-8,095,656 Geo-positionally based data access security
Methods, systems, and computer program products for implementing geo-positionally based data access security is provided. A method includes receiving a request...
US-8,095,592 Aggregation system clearing a security response
Machine, method for use and method for making, and corresponding products produced thereby, as well as data structures, computer-readable media tangibly...
US-8,095,531 Methods and systems for controlling access to custom objects in a database
In embodiments, methods and systems for controlling access to custom objects are provided. These techniques for controlling access to custom objects can enable...
US-8,095,519 Multifactor authentication with changing unique values
A method of authentication includes the steps of providing a transaction service provider having a secure server; providing a user; requesting access...
US-8,095,509 Techniques for retaining security restrictions with file versioning
Techniques are presented for retaining security restrictions with file versioning. Files are versioned in such a manner that metadata including full directory...
US-8,095,475 System and method for prepay account management system
A prepay account management system comprises a secure data link operable to transmit a prepay customer account and meter data, a prepay server operable to...
US-8,095,408 System and method for facilitating network connectivity based on user characteristics
A computer system for facilitating user connectivity in a computer network includes an attention manager, an identity manager, and an introduction manager. The...
US-8,095,390 Medical treatment system with a device for supplying patient-related data
The invention relates to a medical treatment system, which has at least one device for carrying out a medical treatment, in particular dialysis treatment and a...
US-8,095,381 Remote patient support and care by relatives
A telemonitoring central server 12 supports secure data exchange between a number of users, such as a patient, family and friends, medical personnel, suppliers,...
US-8,095,267 Door-lock control system, door-lock control method
A door-lock control system includes: a door lock device; a current position detection unit; a data recording unit; a public security situation determination...
US-8,094,977 Intrusion detection system for use on single mode optical fiber using a simplified polarimeter
A telecommunications optical fiber is secured against intrusion by detecting manipulation of the optical fiber prior to an intrusion event. This can be used in...
US-8,094,953 Adaptive and progressive protection of fixed images encoded in wavelets
A process for secured distribution of fixed numerical images according to a nominal format resulting from numerical encoding in wavelets, represented by a...
US-8,094,813 System and method for modulus obfuscation
Disclosed herein are methods for obfuscating data on a client, on a server, and on a client and a server. The method on a client device includes receiving input...
US-8,091,791 Method and device for coding articles
The invention is about a marking method and a corresponding coding center device for the marking of individual items (1), such as security documents, currency,...
US-8,091,117 System and method for interfacing with heterogeneous network data gathering tools
A prevention-based network auditing system includes a plurality of heterogeneous information sources gathering information about the network. An audit server...
US-8,090,987 Imaging apparatus having automatic backup function and method for controlling the same
An imaging apparatus having an automatic backup function and a method for controlling the same are disclosed which can more securely store particular data,...
US-8,090,958 Semiconductor memory and method of testing semiconductor memory
A memory-specific tester has a buffer storing input pattern data and output expectation data. An address included in the input pattern data read from the buffer...
US-8,090,953 Information storage system
A system for storing information having a predetermined use which requires the information to be secured. The information may comprise credit card details used...
US-8,090,948 Image formation system having authentication function
Image data is transmitted from a client PC to an image formation apparatus. Upon printing, an external server conducts an authentication process. A certificate...
US-8,090,942 Method and system for asymmetrically encrypting .ZIP files
The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data...
US-8,090,941 Deployable secure communication system
A secure Voice-Over-IP (VOIP), video and data network functionality in a single, small size deployable case, for a remote user. While capable of secure...
US-8,090,934 Systems and methods for providing security for computer systems
Hardware and/or software countermeasures are provided to reduce or eliminate vulnerabilities due to the observable and/or predictable states and state...
US-8,090,677 Method and system for altering the configuration of a data warehouse
Disclosed are methods usable by non-experts for altering a configuration of a data warehouse. The initial configuration of the data warehouse is represented in...
US-8,090,650 Secure payment service and system for interactive voice response (IVR) systems
A secure payment method, system or computer readable medium for a merchant's interactive voice response system are disclosed. The merchant's interactive voice...
US-8,090,646 Investment company that issues a class of conventional shares and a class of exchange-traded shares in the same...
An automated method is provided for administering a single investment company that issues one or more classes of shares that are bought from and redeemed with...
US-8,090,504 Feedback loop system for passenger safety
Methods, systems and apparatus for automatically ensuring passenger safety by identifying article(s) in need of securing in a vehicle and attaching at least one...
US-8,090,108 Secure debug interface and memory of a media security circuit and method
A method, system and apparatus of a secure debug interface and memory of a media security circuit and method are disclosed. In one embodiment, a host processor,...
US-8,090,106 Multi-level data encryption and decryption system and method thereof
A multi-level data encryption and decryption system and a method thereof are provided. The method includes dividing a data into a plurality of sub-data blocks...
US-8,090,097 Device, system and method for cryptographic key exchange
A method is disclosed whereby two parties can establish a cryptographic key for secure communications without any prior distribution of secret keys or other...
US-8,089,980 Method for protection switching of geographically separate switching systems
A protocol is provided being executed with a redundancy of 1:1. As a result, an identical clone, with identical hardware, identical software and an identical...
US-8,088,011 Dynamic debugging dump for game console
An error data dumping process on a game console is described, in which a request for an error data dump may be initiated using commands mapped to a handheld...
US-8,087,087 Management of computer security events across distributed systems
A computer receives a system event initiated by an initiating client associated with a user. The system event comprises a plurality of data elements associated...
US-8,087,079 Byte-distribution analysis of file security
A method for scanning files for security, including receiving an unfamiliar file for scanning, if the determining indicates that the mime type is suitable for...
US-8,087,078 Communication device
With regard to data, stored in mobile phone 40, whose a security level is high and contents whose copyrights are protected, mobile phone 40 encapsulates data...
US-8,087,067 Secure mobile platform system
The present invention is directed toward a secure platform which enables mobile devices, such as a cell phones, smartphones, or PDAs, to have relationships with...
US-8,086,911 Method and apparatus for distributed reconstruct in a raid system
Embodiments of the present invention provide techniques for distributing the reconstruction process of a failed storage device in an array of storage devices to...
US-8,086,908 Apparatus and a method for reporting the error of each level of the tunnel data packet in a communication network
The invention provides methods and devices for reporting and parsing the errors of a packet based on IPSec protocol family in a communication network....
US-8,086,867 Secure identity and privilege system
A process for generating a unique, secure and printable identity document, for authenticating the use of the document, and for granting privileges based on the...
US-8,086,863 Method and a system for protecting path and data of a mobile agent within a network system
Secure message transfer of at least one message from a sender to a receiver within a network system may be provided. For example, a message structure...
US-8,086,858 Secure method of termination of service notification
A method for notifying a client device of termination of at least one service provided to the client device by a server system within an enterprise network is...
US-8,086,847 Computer program product and computer system for peer-to-peer communications
An encrypted request for peer-to-peer communication includes a requesting peer encrypting a requested peer identification using a public key of a security...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.