At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-8,328,007 |
Business card package A package of business cards arranged in a stack. Each card has a main body bearing data and an end tab connected to one end of the main body along a tear line,... |
US-8,327,451 |
Secure system and method for enforcement of privacy policy and protection
of confidentiality The invention includes various systems, architectures, frameworks and methodologies that can securely enforce a privacy policy. A method is included for... |
US-8,327,450 |
Digital safety deposit box A system that enables secure data storage into a third party managed electronic storage vault is disclosed. This electronic storage vault provides customers... |
US-8,327,439 |
System, method and computer program product for identifying functions in
computer code that control a behavior... A security data structure, method and computer program product are provided. In use, computer code is received. Furthermore, functions in the computer code that... |
US-8,327,437 |
Securing network traffic by distributing policies in a hierarchy over
secure tunnels A technique for securing message traffic in a data network using a protocol such as IPsec, and more particularly various methods for distributing security... |
US-8,327,419 |
System and method for efficiently securing enterprise data resources Some embodiments provide a system and method that secures access to data objects of an enterprise that includes multiple data objects and multiple user... |
US-8,327,157 |
Secure encrypted email server A computing system utilizing a local or remote secure email server that intercepts secure message that include an identifying domain extension provides secure... |
US-8,327,149 |
Efficient and secure data currentness systems Indicating data currentness includes, on any date of a sequence of dates, issuing a proof indicating the currentness status of the data during a particular time... |
US-8,327,146 |
Wireless communication using compact certificates A method and communications system for generating and using compact digital certificates for secure wireless communication. Each compact certificate includes a... |
US-8,327,142 |
System and method for facilitating secure online transactions A method and system for mutually authenticating a client and a server is provided in accordance with an aspect of the present invention. The method commences... |
US-8,327,139 |
System and method for securely exchanging sensitive information with an
implantable medical device A system and method for securely exchanging sensitive information with an implantable medical device is presented. A crypto key stored on an implantable medical... |
US-8,327,137 |
Secure computer system with service guest environment isolated driver A virtualized computer system includes at least one guest environment (guest), a service guest environment (SG) and trusted software. The at least one guest... |
US-8,327,110 |
Storage system including a virtual volume, a plurality of disk drives and
a plurality of flash memory devices The temporary area capacity required to be secured with respect to the whole permanent area is calculated in accordance with the capacity and access frequency... |
US-8,327,051 |
Portable handheld memory card and methods for use therewith In one embodiment, a portable handheld memory card may include a Universal Serial Bus (USB) port, USB controller circuitry, an input/output (I/O) port, a... |
US-8,327,038 |
Secured system for transferring data between two equipments A system, apparatus and a method to connect at least two items of equipment, a first item of equipment having a first confidentiality level and a second item of... |
US-8,327,014 |
Multi-layer hardware-based service acceleration (MHSA) Methods and apparatus for intelligent sharing and tighter integration between a service engine (SE) for network communication and a high-speed forwarding... |
US-8,326,884 |
Data storage system The present invention is directed to an archival data storage system. The archival data storage system includes write once and read many (WORM) capability, data... |
US-8,326,881 |
Detection of network security breaches based on analysis of network record
logs Computer program products and methods of inspecting a log of security records in a computer network are provided. The method includes retrieving a log record,... |
US-8,326,877 |
Region-based security The subject invention relates to systems and methods that provide region-based security to database objects having hierarchical relationships. In one aspect, a... |
US-8,326,725 |
Method and system for obtaining user data from third parties A user of a data management system agrees to allow the data management system to obtain user data associated with the user from a third party target site... |
US-8,326,648 |
System for secure mobile healthcare selection A method, system and device for secure mobile healthcare selection are presented in which a user can, from a mobile device, authorize the comparison of... |
US-8,325,926 |
Method for providing a broadcast encryption based home security system Provided is a method for providing a home or business security system that relies upon data encryption for both communication and the storage of content. The... |
US-8,325,922 |
Group key security in a multihop relay wireless network A security zone key is used to secure data traffic/control messages in a multi-hop wireless relay network. In one embodiment, the security zone key is generated... |
US-8,325,653 |
System and method for restricting network access to one or more nodes in a
wireless communications network A system and method for providing security to a wireless network by using a mobile node's location as a parameter for deciding if access is to be given to the... |
US-8,325,636 |
Local area network of serial intelligent cells A serial intelligent cell (SIC) and a connection topology for local area networks using Electrically-conducting media. A local area network can be configured... |
US-8,325,634 |
Apparatus for transceiving point to point moving signal reception high
channel using horizontal blanking... Provided are a method and apparatus for transceiving an asymmetric point-to-point moving signal and securing an uplink channel using a horizontal blanking... |
US-8,325,519 |
Method of operating integrated circuit embedded with non-volatile
programmable memory having variable coupling... A programmable non-volatile device is operated with a floating gate that functions as a FET gate that overlaps a portion of a source/drain region and allows for... |
US-8,325,150 |
Integrated overlay system for mobile devices The invention is directed to a physical overlay that can be secured to a mobile device and that covers at least a portion of the mobile device's user interface.... |
US-8,325,018 |
Method and apparatus to reduce data lost on personal mobile devices Methods and apparatus for providing security for mobile devices are disclosed. In one embodiment, a method includes maintaining responsibility for a first item... |
US-8,324,111 |
Liquid crystal display device and method for fabricating the same Disclosed are a liquid crystal display device employing an amorphous zinc oxide-based semiconductor as an active layer, and a method for fabricating the same,... |
US-8,322,848 |
Method for generating documents having stored electrostatic pattern
information A method for generating documents having stored electrostatic pattern information provides security with respect to the authenticity of documents. A liquid... |
US-8,322,610 |
Secure access module for integrated circuit card applications Mechanisms are provided for executing security-sensitive applications with a general-purpose computing device. In particular, the general-purpose computing... |
US-8,321,956 |
Remote access control of storage devices An access control device can be communicationally coupled to a storage device and can control access thereto. The access control device can comprise... |
US-8,321,953 |
Secure storage device with offline code entry A system to authorize access to secured data storage can comprise a user interface configured to receive a user code offline from a user to allow access to... |
US-8,321,944 |
Adaptive risk analysis methods and apparatus A computer system method includes receiving a network topology and associated configuration data, wherein the network topology indicates a host location and a... |
US-8,321,940 |
Systems and methods for detecting data-stealing malware A computer-implemented method for detecting data-stealing malware may include: 1) detecting an attempt by an untrusted application to access a storage location... |
US-8,321,916 |
Method, apparatus and system for remote management of mobile devices An apparatus and system for enabling users to remotely manage their devices. Specifically, in one embodiment, in the event of a theft of a device or other such... |
US-8,321,909 |
Identity mediation in enterprise service bus A system, and computer usable program product for identity mediation in an enterprise service bus are provided in the illustrative embodiments. A security... |
US-8,321,688 |
Secure and private backup storage and processing for trusted computing and
data services A digital escrow pattern is provided for backup data services including searchable encryption techniques for backup data, such as synthetic full backup data,... |
US-8,321,687 |
High speed cryptographic system with modular architecture A cryptographic system with a modular architecture. Memory modules make it possible to store information concerning authentication keys, data and commands,... |
US-8,321,686 |
Secure memory card with life cycle phases A secure memory card with encryption capabilities comprises various life cycle states that allow for testing of the hardware and software of the card in certain... |
US-8,321,685 |
Method and apparatus for managing confidential information The invention is a method and apparatus for managing the secure acquisition, storage and disclosure of confidential information using biometric keys to lock... |
US-8,321,662 |
Certificate renewal using secure handshake A method, system, and computer usable program product for certificate renewal using a secure handshake are provided in the illustrative embodiments. A... |
US-8,321,661 |
Input data security processing systems and methods therefor Methods and apparatus for implementing input data security processing on user input data are disclosed. The user input data is entered on a webpage that... |
US-8,321,638 |
Cooperative mechanism for efficient application memory allocation System, method and computer program product for allocating physical memory to processes. The method includes enabling a kernel to free memory in a physical... |
US-8,321,613 |
Method and system for secure transmission of process data to be
transmitted cyclically via a transmission... The invention relates to a method and system for secure transmission of process data to be transmitted cyclically in a cyclical data transmission to be... |
US-8,321,387 |
Restricting access to sensitive data Techniques are disclosed for managing execution of queries against databases and more particularly for restricting access to sensitive data in underlying... |
US-8,320,562 |
Methods for creating secret keys based upon one or more shared
characteristics and systems thereof A method and system for generating one or more keys includes obtaining at two or more devices data based on movement of at least one of the devices with the... |
US-8,320,560 |
Secure data parser method and system A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data... |
US-8,319,983 |
Image forming device, image forming device terminal, image forming system,
and program for confidential documents The present invention provides an image forming device capable of maintaining a security level of a document constant, and an image forming device terminal. The... |