Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,094,953 Adaptive and progressive protection of fixed images encoded in wavelets
A process for secured distribution of fixed numerical images according to a nominal format resulting from numerical encoding in wavelets, represented by a...
US-8,094,813 System and method for modulus obfuscation
Disclosed herein are methods for obfuscating data on a client, on a server, and on a client and a server. The method on a client device includes receiving input...
US-8,091,791 Method and device for coding articles
The invention is about a marking method and a corresponding coding center device for the marking of individual items (1), such as security documents, currency,...
US-8,091,117 System and method for interfacing with heterogeneous network data gathering tools
A prevention-based network auditing system includes a plurality of heterogeneous information sources gathering information about the network. An audit server...
US-8,090,987 Imaging apparatus having automatic backup function and method for controlling the same
An imaging apparatus having an automatic backup function and a method for controlling the same are disclosed which can more securely store particular data,...
US-8,090,958 Semiconductor memory and method of testing semiconductor memory
A memory-specific tester has a buffer storing input pattern data and output expectation data. An address included in the input pattern data read from the buffer...
US-8,090,953 Information storage system
A system for storing information having a predetermined use which requires the information to be secured. The information may comprise credit card details used...
US-8,090,948 Image formation system having authentication function
Image data is transmitted from a client PC to an image formation apparatus. Upon printing, an external server conducts an authentication process. A certificate...
US-8,090,942 Method and system for asymmetrically encrypting .ZIP files
The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data...
US-8,090,941 Deployable secure communication system
A secure Voice-Over-IP (VOIP), video and data network functionality in a single, small size deployable case, for a remote user. While capable of secure...
US-8,090,934 Systems and methods for providing security for computer systems
Hardware and/or software countermeasures are provided to reduce or eliminate vulnerabilities due to the observable and/or predictable states and state...
US-8,090,677 Method and system for altering the configuration of a data warehouse
Disclosed are methods usable by non-experts for altering a configuration of a data warehouse. The initial configuration of the data warehouse is represented in...
US-8,090,650 Secure payment service and system for interactive voice response (IVR) systems
A secure payment method, system or computer readable medium for a merchant's interactive voice response system are disclosed. The merchant's interactive voice...
US-8,090,646 Investment company that issues a class of conventional shares and a class of exchange-traded shares in the same...
An automated method is provided for administering a single investment company that issues one or more classes of shares that are bought from and redeemed with...
US-8,090,504 Feedback loop system for passenger safety
Methods, systems and apparatus for automatically ensuring passenger safety by identifying article(s) in need of securing in a vehicle and attaching at least one...
US-8,090,108 Secure debug interface and memory of a media security circuit and method
A method, system and apparatus of a secure debug interface and memory of a media security circuit and method are disclosed. In one embodiment, a host processor,...
US-8,090,106 Multi-level data encryption and decryption system and method thereof
A multi-level data encryption and decryption system and a method thereof are provided. The method includes dividing a data into a plurality of sub-data blocks...
US-8,090,097 Device, system and method for cryptographic key exchange
A method is disclosed whereby two parties can establish a cryptographic key for secure communications without any prior distribution of secret keys or other...
US-8,089,980 Method for protection switching of geographically separate switching systems
A protocol is provided being executed with a redundancy of 1:1. As a result, an identical clone, with identical hardware, identical software and an identical...
US-8,088,011 Dynamic debugging dump for game console
An error data dumping process on a game console is described, in which a request for an error data dump may be initiated using commands mapped to a handheld...
US-8,087,087 Management of computer security events across distributed systems
A computer receives a system event initiated by an initiating client associated with a user. The system event comprises a plurality of data elements associated...
US-8,087,079 Byte-distribution analysis of file security
A method for scanning files for security, including receiving an unfamiliar file for scanning, if the determining indicates that the mime type is suitable for...
US-8,087,078 Communication device
With regard to data, stored in mobile phone 40, whose a security level is high and contents whose copyrights are protected, mobile phone 40 encapsulates data...
US-8,087,067 Secure mobile platform system
The present invention is directed toward a secure platform which enables mobile devices, such as a cell phones, smartphones, or PDAs, to have relationships with...
US-8,086,911 Method and apparatus for distributed reconstruct in a raid system
Embodiments of the present invention provide techniques for distributing the reconstruction process of a failed storage device in an array of storage devices to...
US-8,086,908 Apparatus and a method for reporting the error of each level of the tunnel data packet in a communication network
The invention provides methods and devices for reporting and parsing the errors of a packet based on IPSec protocol family in a communication network....
US-8,086,867 Secure identity and privilege system
A process for generating a unique, secure and printable identity document, for authenticating the use of the document, and for granting privileges based on the...
US-8,086,863 Method and a system for protecting path and data of a mobile agent within a network system
Secure message transfer of at least one message from a sender to a receiver within a network system may be provided. For example, a message structure...
US-8,086,858 Secure method of termination of service notification
A method for notifying a client device of termination of at least one service provided to the client device by a server system within an enterprise network is...
US-8,086,847 Computer program product and computer system for peer-to-peer communications
An encrypted request for peer-to-peer communication includes a requesting peer encrypting a requested peer identification using a public key of a security...
US-8,086,846 Providing non-proxy TLS/SSL support in a content-based load balancer
Methods and systems for providing non-proxy Secure Sockets Layer and Transport Layer Security (SSL/TLS) support in a content-based load balancer are described....
US-8,086,703 Takeover processes in security network integrated with premise security system
An integrated security system is described comprising a gateway located at a first location. The gateway includes a takeover component that establishes a...
US-8,086,702 Takeover processes in security network integrated with premise security system
An integrated security system is described comprising a gateway located at a first location. The gateway includes a takeover component that establishes a...
US-8,086,688 Method and system for mobile data security
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and...
US-8,086,615 Security data redaction
In accordance with one embodiment of the present invention, there are provided mechanisms and methods for securing access to data. These mechanisms and methods...
US-8,086,585 Access control to block storage devices for a shared disk based file system
For enhanced access control, a client includes a token in each read or write command sent to a block storage device. The block storage device evaluates the...
US-8,086,578 Data archiving system
An encrypted file storage solution consists of a cluster of processing nodes, external data storage, and a software agent (the "File System Watcher"), which is...
US-8,086,476 Method for directed advertising and information distribution using a wireless communications network
A method of and system for directing targeted advertising or transmitting information to end users, using wireless or mobile media, including cellular media, is...
US-8,086,408 Method for positioning a wire using sensor information
A method for positioning a wire having nodes and streamers is provided herein. The wire can be secured to tow lines secured to a floating vessel for detecting...
US-8,086,088 Digital video recording method in an audio detection mode
The present invention is related to a digital video recording method, and in particular, when a recording mode is audio detection, according to an audio signal...
US-8,085,992 Methods and systems for capturing biometric data
A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an...
US-8,085,932 Secure distribution of data or content using keyless transformation
A computer enabled method and apparatus for encrypting and decrypting data using a keyless transformation cryptographic technique. Data is protected using a...
US-8,085,796 Methods, systems, and products for virtual personalized networks
Methods, systems, and apparatuses are disclosed for enabling a virtual personalized network. Communications are established with a personal digital gateway to...
US-8,085,743 Method and system for enabling rendering of electronic media content via a secure ad hoc network configuration...
An ad hoc network enabled to handle secure data may be created for a specified user via a handheld wireless communication device (HWCD) such that rightful...
US-8,085,342 Highly miniaturized, battery operated, digital wireless camera using programmable single chip active pixel...
A miniaturized camera which is programmable and provides low power consumption. An active pixel image sensor used in the highly miniaturized camera provides...
US-8,085,195 Method and apparatus for providing a global secure user plane location (SUPL) service
A method and apparatus for providing assistance data for satellite positioning system receivers utilizing a secure user plane location (SUPL) service. In one...
US-8,085,168 Electronic flight data display instrument
An electronic display instrument configured to secure in a desired position over multiple pre-existing instrument holes in a dashboard of an aircraft in place...
US-8,085,126 Identification with RFID asset locator for entry authorization
A system for controlling access at secure facilities to locations and assets contained in those locations, comprising a biometric identification device, an RFID...
US-8,083,808 Container security
A container security device includes a housing, electronic circuitry, and cabling. The electronic circuitry is disposed within the housing, and includes first...
US-8,083,589 Capture and utilization of real-world data for use in gaming systems such as video games
A portable sensor unit for capturing motion and/or other data may be securely mounted on objects such as a user's limb, a vehicle, or other items. The sensor...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.