Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,219,829 Scheme for securing locally generated data with authenticated write operations
A scheme for securing a locally generated data on a system using authenticated write operations is disclosed. According to an embodiment of the present...
US-8,219,824 Storage apparatus, memory card accessing apparatus and method of reading/writing the same
A storage apparatus having a non-volatile memory and a controller is provided, wherein the non-volatile memory includes a root directory area and a data area,...
US-8,219,821 System and method for signature based data container recognition
A system and method for signature based data container recognition is provided. When a new data container, such as a lun, is created, a security appliance...
US-8,219,811 Secure software execution such as for use with a cell phone or mobile device
A method and system for securely executing software or securely loading data generates a secret value at a destination device based on a value transmitted to...
US-8,219,804 Approach for managing device usage data
Techniques are provided for securely managing, using smart cards, the usage of a peripheral device. In one embodiment, both the peripheral device and the smart...
US-8,219,799 Secure communication system
A secure communication system that includes a communication processor, an internet protocol converter that converts data to and from its original protocol to...
US-8,219,771 Portable device for storing private information such as medical, financial or emergency information
A portable housing capable of being carried by a certain person includes a circuit. The circuit includes a memory for storing private data concerning that...
US-8,219,656 System and method for wireless data terminal management using telecommunication signaling network
A method, system, and computer program product that provides the capability to manage, control, and reconfigure wireless devices remotely over a wireless...
US-8,219,648 Generalized credential and protocol management of infrastructure
To provide a more cost effective way to manage the infrastructure while addressing the security needs of a computerized data center, a technique for credential...
US-8,219,418 Controlled substance tracking system and method
A method for tracking prescriptive medications is provided whereby a complete prescriptive medication history including active and inactive prescriptive...
US-8,219,022 Communication method, communication system and communication device
The present invention relates to a data communication method, a data communication system and a communication device. In particular, the present invention...
US-8,218,966 Technique for securing transmission of data along an optical communication line
A technique for securing data transmission via an optical communication line comprising an optical fiber extending between a first network element and a second...
US-8,218,770 Method and apparatus for secure key management and protection
Described embodiments provide a server for transferring data packets of streaming data sessions between devices. The server includes an accelerator that, for...
US-8,218,577 Secure mechanism for transmitting counter value in the context of transmission of a synchronizing signal in a...
An apparatus for transmitting and receiving packets in a packet switching network that includes at least two stations. The apparatus includes a phase-locked...
US-8,218,484 Methods and apparatus for sending data packets to and from mobile nodes in a data network
Methods for transmitting packets using a Mobile IP protocol between a mobile node and a first node in a data network after the mobile node has transmitted data...
US-8,217,912 Graphical authentication for a portable device and methods for use therewith
A portable device includes a touch screen that includes a display screen and that generates touch screen data in response to a user's interaction with the touch...
US-8,215,563 Method and system for facilitating memory and application management on a secured token
A system for facilitating memory and application management on a smartcard the system includes a client having a number of applications and a smartcard having...
US-8,215,547 Data communicating apparatus and method for managing memory of data communicating apparatus
An IC card has a mechanism to securely manage information for each of a plurality of service providers in a memory area of the IC card. The IC card is shared by...
US-8,215,023 Method and apparatus for vehicle service system optical target assembly
A machine vision vehicle wheel alignment system for acquiring measurements associated with a vehicle. The system includes at least one imaging sensor having a...
US-8,214,906 System, method and program product to determine security risk of an application
A system, method and program product for evaluating a security risk of an application. A determination is made whether unauthorized access or loss of data...
US-8,214,896 Method of securing USB keyboard
Provided is a method of securing a Universal Serial Bus (USB) keyboard. According to the method, a keyboard security operation is performed at a host controller...
US-8,214,888 Two-factor USB authentication token
The present patent application discloses a USB token that advantageously mimics a human interface device such as a keyboard in interacting with a host computer,...
US-8,214,887 Method and system for providing user access to a secure application
A method and system for providing remote user access to secure applications by deployment of SSO software to client workstations, including navigating to a...
US-8,214,885 Managing network components using USB keys
Devices and methods for managing a communications network include using USB keys to provision and management components in the network by having the network...
US-8,214,881 Security key with instructions
There is described an automation system comprising at least one programmable logic controller with integrated web server, user interface means, and security...
US-8,214,654 Method and system for loading a secure firmware update on an adapter device of a computer system
One embodiment of the present invention sets forth a method for loading a secure firmware update onto an adapter device in a computer system. The method...
US-8,214,652 Biometric identification network security
Systems and methods for regulating user access in the context of a biometric security system are disclosed. One method disclosed includes receiving a remotely...
US-8,214,645 Systems, devices, and methods for securely transmitting a security parameter to a computing device
Embodiments of the systems, devices, and methods described herein generally facilitate the secure transmittal of security parameters. In accordance with at...
US-8,214,584 Secure virtual tape management system with early read support options
A secure virtual tape management system with early read support options. The system includes at least two mainframe hosts having a catalog storing tape related...
US-8,214,355 Small table: multitenancy for lots of small tables on a cloud database
Methods and apparatus are described for partitioning native tables in a database cluster into logical tables. Each logical table is mapped into a unique portion...
US-8,214,231 System and method for identifying data streams associated with medical equipment
A system and method for uniquely identifying data streams associated with medical equipment are described. The system may be implemented in a variety of ways,...
US-8,213,926 Method and apparatus for providing multiservice testing
An approach is provided for a multiservice tester. A connection over an access link providing a customer premise with connectivity to a plurality of...
US-8,213,923 Product update via voice call in mobile security
Methods and apparatus for updating security software products on mobile telephones are described. When an update is available for a security software product...
US-8,213,769 Frame indexing technique to improve personal video recording functionality and security of transmitted video
One or more methods and systems of efficiently indexing a digitized video stream is presented. In one embodiment, the method comprises receiving a coded video...
US-8,213,612 Secure software download
Software can be downloaded securely using a multi-encryption method, where the decryption is completed when the software is executed. In one aspect, a...
US-8,213,607 Method for securely extending key stream to encrypt high-entropy data
A stream stretcher is provided for securely expanding a key stream to match the length of a data block to be encrypted and/or decrypted. A key stream is...
US-8,213,601 Font level encryption method and apparatus
This invention improves upon the existing art by implementing encryption at the "font level," thereby, in affect, protecting each independent small portion of a...
US-8,213,589 Data security seeding system
In one aspect of the invention there is provided a system for tracking seed data that has been inserted into a secured private information database listing. The...
US-8,213,413 Real-time packet processing system and method
In some embodiments, the invention may include a combination of real-time packet detection, processing and routing. When implemented in a distributed...
US-8,213,326 Method and apparatus for the classification of ports on a data communication network node
A method and apparatus for classifying a port on a node in a data communications network, such as a router. The node, itself or in some embodiments though...
US-8,213,115 Secure data storage
A hard disk drive includes a chassis which supports a "sealed" housing containing a data storage magnetic disk, and read/write heads and actuator. The housing...
US-8,212,833 Secure computer screen entry system and method
A method for entering secure data at an input device includes displaying a graphical input region having input elements, such as a number keypad, and receiving...
US-8,211,490 Double layer UV variable data text
A method and system are provided for including a double layer security mark in digital document data defining an image of a document to be printed and in the...
US-8,209,764 Sensitive data aliasing
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed...
US-8,209,762 Approach for printing locked print data using user and print data authentication
An approach is provided for printing locked print data using user and print data authentication. The approach is applicable to a wide variety of contexts and...
US-8,209,759 Security incident manager
A security incident manger includes events and network flows in the analysis of an attack to better identify the magnitude of the attack and how to handle the...
US-8,209,750 Encryption of voice and data in a single data stream in a deployable, secure communication system
Separate IP data streams, including both voice (VoIP) and data sources, are routed over a single network data stream, encrypted by a single KIV encryption unit,...
US-8,209,608 Method and system for presenting structured information in an interactive multimedia environment
The present invention provides an interactive multimedia system for providing structured information systems, for example help systems for desktop and network...
US-8,209,551 Security for RAID systems
Methods and apparatus for accessing a redundant array of independent drives (RAID) storage device are disclosed. In some embodiments file data is broken into...
US-8,209,550 Method and apparatus for protecting SIMLock information in an electronic device
The teachings herein present a method and apparatus for protecting usage restriction data that governs usage of an electronic device. A cryptographic circuit...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.