Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,131,401 Real-time stability indexing for intelligent energy monitoring and management of electrical power network system
A system and method for intelligent monitoring and management of an electrical system is disclosed. The system includes a data acquisition component, a power...
US-8,131,145 Lightweight cordless security camera
The present invention is a lightweight, cordless security camera comprising a lightweight stand or tripod, a video camera with pan, tilt, and zoom articulation...
US-8,130,957 System and method for securing data
In accordance with the teachings described herein, systems and methods are provided for securing data for transmission to a wireless device. The disclosed...
US-8,130,956 Efficient and low power encrypting and decrypting of data
The present invention relates to the field of computer data encrypting and decrypting, especially for mobile equipments like PDA, mobile phones, smart cards and...
US-8,130,955 Random number generation through use of memory cell activity
Systems and/or methods that facilitate security of data are presented. A random number generation component generates random numbers based in part on electron...
US-8,130,954 Methods and apparatus for authenticating data as originating from a storage and processing device and for...
Techniques are described for using unique features of a storage medium for authentication of data as originating from the storage medium, and also for...
US-8,130,953 Security protection for data communication
Authentication of an electronic communication apparatus capable of communicating data messages with a server according to a synchronization protocol includes...
US-8,130,890 Semiconductor memory device having data clock training circuit
A data clock frequency divider circuit includes a training decoder and a frequency divider. The training decoder outputs a clock alignment training signal,...
US-8,130,768 Enhanced gateway for routing between networks
A network gateway is disclosed, wherein for a received communication, the gateway determines a network component to which information for the communication is...
US-8,130,704 Multi-tier wireless home mesh network with a secure network discovery protocol
An apparatus and method for a multi-tier wireless home mesh network is described. The method may include formation of an infrastructure-less wireless home mesh...
US-8,130,645 Method and architecture for a scalable application and security switch using multi-level load balancing
A switch architecture and method provides scaling through multi-level load balancing of flows across data and application processing planes. An input/output...
US-8,130,554 Securely erasing flash-based memory
A method is used in securely erasing flash-based memory. A new version of data is received for a logical location of a flash-based memory. An old version of the...
US-8,130,490 Detachable hard drive with an electromagnetic switch
A detachable hard drive with an electromagnetic switch comprises a tray, a fastening unit and an electromagnetic switch. The electromagnetic switch is powered...
US-8,130,432 Space scanner for self-control moving object
Provided is a space scanner for a self-control moving object. The space scanner has a structure in which a reflective mirror is rotated and tilted. Thus, the...
US-8,130,419 Embedding authentication data to create a secure identity document using combined identity-linked images
Techniques for creating an identity document are provided. The techniques include obtaining two or more identity-linked images, deriving one or more at least...
US-8,127,984 Emulated radio frequency identification
A mobile communication device is equipped with hardware and/or software components to enable the device to output a data in a form of a radio frequency signal,...
US-RE43,221 Structured cabling system and method
A structured cabling system includes a plurality of data cables (6A-6F), one end of each cable being secured to a jack of a multiple jack assembly (1) and the...
US-8,127,360 Method and apparatus for detecting leakage of sensitive information
A method and apparatus for preventing leakage of sensitive information from a computer is described. The method includes identifying data entered into the...
US-8,127,346 Network security system and method
In a security system for network communications with client devices, each client device has a communication module for communicating with at least one server...
US-8,127,344 Rapid archivable WORM memory system based on a hard disc
A process is described which permits particularly rapid writing and reading of small files, such as e-mails and scanned documents, for legally relevant WORM...
US-8,127,314 Method for using information in another domain, program for using information in another domain, and...
To use data in another domain while executing a script language based on a security limit of an HTTP client. A main program provided to an HTTP client from a...
US-8,127,150 Data security
In one embodiment, a method is provided that may include encrypting, based least in part upon at least one key, one or more respective portions of input data to...
US-8,127,147 Method and apparatus for securing data storage while insuring control by logical roles
A storage device with hardened security features has a storage medium, an interface, and a controller. The interface is adapted to communicatively couple the...
US-8,127,145 Computer architecture for an electronic device providing a secure file system
A secure file service includes a cryptographic processor (302, 602) and a secure file system (301, 601). The cryptographic processor is comprised of a trusted...
US-8,127,131 System and method for efficient security domain translation and data transfer
A mobile UE includes a CPU, a secure DMA module, a secure cryptographic module, secure memory, and non-secure memory. The secure cryptographic module and secure...
US-8,127,130 Method and system for securing data utilizing reconfigurable logic
A method is provided for securing data sets by dynamically hopping amongst a variety of data encryption and/or manipulation protocols. Such dynamic protocol...
US-8,127,094 Data migration and copying in a storage system with dynamically expansible volumes
When migrating data stored in a storage region assigned to a volume to another storage region, the connection status of the host computer and volume is...
US-8,127,048 Systems and methods for segmenting and protecting a storage subsystem
A storage subsystem comprises a set of zone definitions that uses physical block addresses to divide a memory array in the storage subsystem into zones or...
US-8,126,896 Information processing apparatus, control method therefor, and storage medium
An information processing apparatus capable of collecting electronic data efficiently and avoiding sharing highly confidential and secure electronic data with...
US-8,126,857 Proactive information monitoring systems and methods
Systems and methods for proactive information monitoring are presented. A user can define alert criteria for generating an alert through a centralized alerting...
US-8,126,506 System and method for securely managing data stored on mobile devices, such as enterprise mobility data
A system and method for managing data stored on mobile devices is described. In some cases, the system stores data, such as data under enterprise mobility...
US-8,126,147 Secure terminal data loader system and in-flight entertainment management system
A terminal data loading device on a mobile platform includes a media unit for receiving a transportable media element containing media data and outputting a...
US-8,126,142 Variable data encryption of characters printed or displayed on screen, which may be embedded in photos, images,...
It is a source of security digital characters, incomprehensible to the naked eye, which can only be identified when the transparent substrate (acrylic, plastic...
US-8,125,584 Liquid crystal display panel and liquid crystal display device
The present invention provides a liquid crystal display panel capable of providing a high contrast ratio with a storage capacitance being secured, and also...
US-8,123,255 Security device for confidential information
This security device for confidential information, mentioned in a document (D), includes an element (1, 4) forming a data storage medium and removable element...
US-8,123,124 Magnetic stripe card anti-fraud security system
To prevent fraud, a magnetic card's ID, which may be a stripe ID or security chip, is converted to an encrypted card ID, which is stored on the card and in a...
US-8,123,119 System including an electronic key for safety deposit box cover lock and key managing dock
A system for use in banking operates responsive to data included in data bearing records. The system is suitable for securing the contents in safety deposit...
US-8,122,512 Dynamic configuration of a gaming system
A method to enable dynamic configuration of gaming terminals installed in one or a plurality of gaming premises whereby certified games, certified data files...
US-8,122,510 Method for analyzing and managing unstructured data
A system and method for managing unstructured data that includes identifying at least one unstructured data environment with unstructured data, identifying...
US-8,122,503 Methods and systems for managing a potential security threat to a network
Methods, systems and computer readable mediums storing computer executable programs for managing a potential security threat to a network are disclosed. Network...
US-8,122,490 Transfer server of a secure system for unattended remote file and message transfer
A method for automatically transferring a data file from a network drive of a client controlled local area network to a transfer server over the Internet...
US-8,122,489 Secure handling of stored-value data objects
An approach to managing stored-value data objects, such as electronic tickets, comprises secure systems and procedures for ticket issuing, storage, and...
US-8,122,486 Method and system for secure management of co-located customer premises equipment
A method, system, and apparatus for managing customer premise equipment according to one embodiment includes establishing a secure connection between a first...
US-8,122,262 Semiconductor device including encryption section, semiconductor device including external interface, and...
A secure LSI device 1 includes an encryption section 2 for encrypting a program, and an external I/F 50 for inputting/outputting a program or data from/to an...
US-8,122,254 Information processing apparatus and method thereof
It is simpler to manage an electronic signature on a It is simpler to manage an electronic signature on a server. On the contrary, authentication in a paper is...
US-8,122,244 Secure management of configuration parameters in a computing platform
A computing platform (10) protects system firmware (30) using a manufacturer certificate (36). The manufacturer certificate binds the system firmware (30) to...
US-8,122,196 System and procedure for rapid decompression and/or decryption of securely stored data
A procedure and system reduces latency in restoring encrypted or compressed and encrypted data through a security appliance. The security appliance is coupled...
US-8,122,172 Portable information security device
The invention discloses a portable information security device in the security field. In order to solve the problem that the USB Key transfers data at low speed...
US-8,122,135 System, computer program product and method for managing and controlling a local network of electronic devices...
A system method and computer program product for setting up a wireless electronic device to join a wireless local area network (LAN). The method upon which the...
US-8,122,131 Takeover processes in security network integrated with premise security system
An integrated security system is described comprising a gateway located at a first location. The gateway includes a takeover component that establishes a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.