Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,074,283 Method and system for securely protecting data during software application usage
Techniques for use in enterprise and similar computing systems securely protect data during software application use by generating private table seeds as a...
US-8,074,279 Detecting rogue access points in a computer network
Detecting an unauthorized wireless access point in a network uses a detector. A rogue access point detector receives an incoming data packet which is scanned...
US-8,074,271 Method and apparatus for making a decision on a card
Method and devices for making access decisions in a secure access network are provided. The access decisions are made by a portable credential using data and...
US-8,074,266 Memory card, data exchange system, and data exchange method
By enabling to write information which is readable only by an IC card owner on an IC card without inputting a PIN and to authenticate a creator of the written...
US-8,074,264 Secure key distribution to internet clients
A server may bridge between a wide area network, such as the Internet, and a local area network and may process authentication requests from clients on the wide...
US-8,074,263 Systems and methods for increased security during logging in to web site
A user at a computing device interacts with a networked site so that the user can log in thereto. The site receives a selection to log in and in response...
US-8,074,078 System and method for remote reset of password and encryption key
A method for securing data and resetting a password using a content protection key is provided, in which the content protection key itself is protected by a...
US-8,074,067 Member certificate acquiring device, member certificate issuing device, group signing device, and group...
It is an object of the present invention to enhance the security and reduce the data amount of data to be handled in a group signing system, in which when the...
US-8,074,012 Flash memory apparatus and method for securing a flash memory from data damage
A data backup method for a flash memory is provided. After writing of data to a plurality of written pages of a first block of a flash memory is completed, a...
US-8,073,787 System and method for mail verification
A system and method is provided for transmitting mail verification data over a wide area network, such as the Internet, in response to receiving and...
US-8,073,757 Data processing for an exchange traded fund
An accounting system allows posting transactions to a general ledger of an Exchange Traded Fund. The accounting system includes a computer-assisted process that...
US-8,073,143 Information processing device and method
A configuration is provided which enables usage management and secure data management of data newly generated or obtained that is different from data already...
US-8,072,794 Semiconductor memory device having DRAM-compatible addressing mode and data processing system including same
In synchronism with an active command, a row address and a column address are simultaneously received, and a page address is received in synchronism with a read...
US-8,072,627 Image processing apparatus, encrypted job execution method thereof, and recording medium
This is to provide an image processing apparatus and others capable of ensuring security by shortening the connecting time of an external recording medium when...
US-8,072,284 Split delay-line oscillator for secure data transmission
A split delay-line oscillator for secure data transmission is disclosed. In one embodiment, an apparatus for a split delay-line oscillator for secure data...
US-8,070,669 Wall integrated multisensory therapy device
A wall integrable multisensory therapy device for securement in a wall of a room dedicated for physiological therapeutic treatment is described. The device has...
US-8,069,481 Systems and methods for message threat management
The present invention is directed to systems and methods for detecting unsolicited and threatening communications and communicating threat information related...
US-8,069,478 Unit using OS and image forming apparatus using the same
A chip mountable on a replaceable unit used in an image forming job is disclosed. The chip includes a central processing unit (CPU) to perform at least one of...
US-8,069,477 Unit using OS and image forming apparatus using the same
A chip mountable on a customer replaceable unit monitoring memory (CRUM) unit used in an image forming job includes a central processing unit (CPU) with its own...
US-8,069,442 Computer system and method for secure installation and operation of software
A computer system provides for the secure installation and operation of software. The computer system includes a platform, such as a personal computer, having a...
US-8,069,353 Low-latency data decryption interface
Methods and apparatus for reducing the impact of latency associated with decrypting encrypted data are provided. Rather than wait until an entire packet of...
US-8,069,298 Method of storing and accessing header data from memory
Methods of storing and accessing data using a header portion of a file are disclosed. In an embodiment, a method of storing content in a non-volatile memory is...
US-8,069,256 System and method to curb identity theft
Personal identity-identifiers such as social security numbers, finger prints, and biometric identifiers are fixed for life; once disclosed they cannot reliably...
US-8,069,155 Securing DBMS event notifications
One embodiment of the present invention provides a database server for securing database event notifications. The server includes a session key creation...
US-8,069,153 Systems and methods for securing customer data in a multi-tenant environment
Network security is enhanced in a multi-tenant database network environment using a query plan detection module to continually poll the database system to...
US-8,069,123 Secure franking machine
A franking machine is described including a unit for generating franking data and a unit for printing data connected to the data generating unit and adapted to...
US-8,069,121 End-to-end secure payment processes
A method of calculating the quality of a data record having a plurality of data fields involves indentifying individual fields in the data record that are...
US-8,069,115 Method and system to process payment
Provided is a method and system for payment processing, including emailing a billing statement including an online payment hyperlink to a payer by a biller. The...
US-8,069,106 Block trading system and method providing price improvement to aggressive orders
The present invention comprises systems and methods for facilitation of electronic securities trading. A preferred system embodiment comprises a trade...
US-8,069,061 Computer software program for mental health professionals
A computer software program that will allow mental health practitioners to enter data into portable files and send information to various professional...
US-8,069,053 Systems and methods for de-identification of personal data
According to some embodiments, original data is retrieved from an original data source. The original data may be automatically searched for potential personal...
US-8,069,006 System for positioning a wire using sensor information
A system for determining coordinates for nodes on a wire secured to tow lines of a floating vessel for analyzing geological formations is provided. The system...
US-8,068,986 Methods and apparatus related to sensor signal sniffing and/or analysis
The disclosure relates to Sensor security and Business Intelligence and more particularly to detecting and capturing Sensor information of data in a network...
US-8,068,807 System for supplying container security
A system for monitoring the contents of a closed container includes one or more sensors for monitoring the container contents, a signal receiving element...
US-8,068,740 Secure optical communication system
In various embodiments, a secure optical communication system is disclosed. Such a system may include a photon-pair generation circuit configured to generate...
US-8,068,612 Security device for cryptographic communications
Cryptographic systems and methods are provided in which authentication operations, digital signature operations, and encryption operations may be performed....
US-8,068,609 Method and system for secured wireless data transmission to and from a remote device
The device tracking location adherence and route adherence technology, according to an exemplary embodiment of this invention, at least provides for secure...
US-8,068,504 One-way router
A one-way router combines benefits of a network diode and router, and thus can route data between networks of varying confidentiality and/or integrity in a...
US-8,068,487 Network security device and method
A device described herein may include an input port operable to receive data packets; a switching board operable to classify the data packets, determine whether...
US-8,068,415 Secure one-way data transfer using communication interface circuitry
Network interface circuitry for a secure one-way data transfer from a sender's computer ("Send Node") to a receiver's computer ("Receive Node") over a data...
US-8,068,305 Secure data disposal for disk drive
When a disk sector is written to, a bit for the sector is set indicating that the sector will require secure data disposal (SDD) to be run on it. To save time...
US-8,068,049 Passive detection apparatus
A passive detection device is disclosed comprising a plurality of antennas, receivers, and a digital beamformer, wherein the antennas and receivers are adapted...
US-RE42,984 Data security method and device for computer modules
A security method for an attached computer module in a computer system. The security method reads a security identification number in an attached computer...
US-8,065,725 Systems and methods for enhanced network security
Systems and methods for an information system security infrastructure are described. One embodiment of the present invention comprises global Internet-scale...
US-8,065,695 Systems and methods for increased security during logging in to web site
A user at a computing device interacts with a networked site so that the user can log in thereto. The site receives a selection to log in and in response...
US-8,065,580 Redundant transmission of data messages for information and control for HVDC transmission systems
A method for securely transmitting data messages in an HVDCT system. Each transmitting unit is connected to each receiving unit via at least two connection...
US-8,065,513 Method and apparatus for booting host
Provided are a method and a device for booting a host embodying a downloadable conditional access system (DCAS), wherein one of a plurality of pre-determined...
US-8,065,492 System and method for early detection of failure of a solid-state data storage system
Various embodiments are disclosed of a failure detection system for a solid-state data storage system that can experience difficulties, such as system failure...
US-8,065,368 Configuring templates for an application and network management system
Methods and Systems for configuring secure templates for an application and network management system to provide network security. A template for an application...
US-8,065,347 Managing protocol amendments in electronically recorded clinical trials
A clinical trial management system and associated methods are provided to manage individual clinical trials running under multiple protocols at once. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.