Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,056,140 Multifunction peripheral and method for controlling the same
A job processing apparatus that can communicate with a security server configured to manage an access right to data, executes a job for inputting data, stores...
US-8,056,056 Methods and apparatus for configuring a process control system with a configuration editor executing on a...
Methods and apparatus for configuring process, environmental, industrial and other control systems generate and/or utilize models representing configurations of...
US-8,055,983 Data writing method for flash memory and error correction encoding/decoding method thereof
A data writing method for flash memory and an error correction encoding/decoding method thereof are disclosed. In an embodiment of the data writing method, a...
US-8,055,943 Synchronous and asynchronous continuous data protection
A method, system, and computer program product for providing continuous data protection for write data supplied from a host incorporating a processor device to...
US-8,055,912 Method and system for bootstrapping a trusted server having redundant trusted platform modules
Multiple trusted platform modules within a data processing system are used in a redundant manner that provides a reliable mechanism for securely storing secret...
US-8,055,910 Reprogrammable security for controlling piracy and enabling interactive content
Technologies to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content....
US-8,055,904 Systems and methods for software application security management
Apparatus and method for managing password information associated with a service account are disclosed. In some embodiments, a service account management system...
US-8,055,895 Data path security processing
Methods and associated systems provide secured data transmission over a data network. A security device provides security processing in the data path of a...
US-8,055,894 Process and streaming server for encrypting a data stream with bandwidth based variation
There is disclosed a process for encrypting a data stream to secure the data stream for single viewing and to protect copyrights of the data stream....
US-8,055,799 Method and apparatus for providing an interface for a messaging mailbox
A method and apparatus for accessing messages from a message server. Messages are stored on the message server in their current format without transcoding. When...
US-8,055,769 Method and system for secure distribution and utilization of data over a network
A method of securely utilizing downloaded data includes the steps of opening a media player; opening a data file; requesting a portable token from and used by a...
US-8,055,767 Proxy communication string data
Systems, methods and apparatus for a distributed security that detects proxied resource requests. The system can identify proxy strings, each of the proxy...
US-8,055,574 Securities market and market maker activity tracking system and method
A method, system and computer program to monitor securities market activity to seek out imbalances in market activity that could lead to a price change in a...
US-8,055,536 Automated real-time secure user data sourcing
Profiling data for a consumer can be generated from one or more of the consumer's own financial records. The profiling data can be provided by the consumer him...
US-8,055,221 Method of providing video call service in mobile station in a weak signal environment
Improving the audio QoS of a video call service in a weak signal environment is accomplished. To do this, even if data is damaged in a weak signal environment...
US-8,052,539 Swing performance analysis device
A swing performance analysis device (10) is described. The device (10) includes a sole single axis accelerometer securable to an entity (60, 70) to be swung to...
US-8,052,047 Automated banking machine that operates responsive to data bearing records
An automated banking machine operates responsive to data read from data bearing records to cause financial transfers. The machine includes a card reader that...
US-8,052,043 Banking system controlled responsive to data bearing records
An automated banking machine is controlled responsive to data bearing records. The machine operates using data read from user cards by a card reader. The...
US-8,051,480 System and method for monitoring and analyzing multiple interfaces and multiple protocols
The present invention is a system and method for providing security for a mobile device by analyzing data being transmitted or received by multiple types of...
US-8,051,477 Security state vector for mobile network platform
State of security in a mobile communications network is communicated. Data regarding nature and severity of security events onboard at least one mobile platform...
US-8,051,476 Method and system for accessing a secure area
A system for accessing a secure area. In response to reading a plurality of security device orientations, the plurality of security device orientations are...
US-8,051,470 Consolidation of user directories
A method for automatic user authentication is described. In response to a coupling of a separate hardware security device to a data processing system,...
US-8,051,464 Method for provisioning policy on user devices in wired and wireless networks
A method for provisioning client devices securely and automatically by means of a network provisioning system is disclosed. Provisioning occurs before the...
US-8,051,303 Secure read and write access to configuration registers in computer devices
The disclosed embodiments relate to a secure configuration space for a computing device. Each of the configuration resisters in a configuration space are...
US-8,051,301 Memory management system and method providing linear address based memory access security
A memory management unit (MMU) is disclosed for managing a memory storing data arranged within a plurality of memory pages. The MMU includes a security check...
US-8,051,296 System and method for initializing secure communications with lightweight devices
System and methods for initializing secure communications with lightweight devices are described herein. In one embodiment, the method includes enabling a...
US-8,051,293 Data processing systems and methods
Various improvements to data processing systems involve enhancements to BIOS functionality, use of identifiers associated with specific instances of hardware,...
US-8,051,222 Concatenating secure digital input output (SDIO) interface
An apparatus and a process for transferring packet data includes receiving packets from a first interface such as a network interface and transferring data to a...
US-8,051,181 Method for establishing secure communication link between computers of virtual private network
A technique is disclosed for establishing a secure communication link between a first computer and a second computer over a computer network. Initially, a...
US-8,050,992 Secure card with stored biometric data and method for using the secure card
A secure card comprising biometric data of an individual for identifying or confirming authority of the individual. Prior to issuing the secure card a...
US-8,050,402 Method and related device for hardware-oriented conversion between arithmetic and boolean random masking
A method for secure conversion between two different random markings used for cryptographic functions, converts a first binary data word, masked by a binary...
US-8,049,627 Container with removable data storage mechanism
A container may be formed with a pocket to securely receive a tag, such as a radio-frequency identification tag. The tag is secured within the pocket such that...
US-8,049,617 Method and system for providing tracking services to locate an asset
The present invention is directed to a method of asset location. Location data is received from a cellular transmitter associated with a selected asset, which...
US-8,049,613 Building security system
A security system that can be used in a home, office, or other building in order to generate alarms or take other actions depending on conditions within the...
US-8,047,435 System and method for secured voting transactions
A secured electronic system and method for taking and counting votes. A database of unique ballot security codes, each ballot security code consisting of a...
US-8,047,427 Currency recycler reconcilement activity
A currency handling system, for example, a currency recycler or depository machine, may be configured to process currency transactions, including receiving one...
US-8,046,835 Distributed computer network security activity model SDI-SCAM
A distributed multi-agent system and method is implemented and employed across at least one intranet for purposes of real time collection, monitoring,...
US-8,046,831 Automating software security restrictions on system resources
Security components of managed computers are configured using inoculation data. Inoculation data can be retrieved from an inoculation data provider. The...
US-8,046,592 Method and apparatus for securing the privacy of sensitive information in a data-handling system
A data-handling system (20) is arranged to scan through data it holds for instances of sensitive information as identified by reference (35) to a set of...
US-8,046,580 Data processing apparatus and method for generation of protection compression encoded data
An encoding data processing apparatus is described which is operable to generate protected compression encoded data representative of protected media signals....
US-8,046,577 Secure IP access protocol framework and supporting network architecture
A protocol framework for a Secure IP Access (SIA) method, and supporting components deployed on IP hosts and IP networks. Using this method, an IP host can...
US-8,046,490 System and method for enhancing network security
A method of transmitting data via a network of computers comprises receiving, at a first node of the network and from a second node of the network, first...
US-8,046,380 Data storage system
The present invention is directed to an archival data storage system. The archival data storage system includes write once and read many (WORM) capability, data...
US-8,046,379 System and method for access control and for supply chain management via a shared bill of material
A system for securely uploading and downloading data from a client to a remote data storage location under control of a remote application program. The data is...
US-8,046,313 Ergonomic man-machine interface incorporating adaptive pattern recognition based control system
An adaptive interface for a programmable system, for predicting a desired user function, based on user history, as well as machine internal status and context....
US-8,046,311 Postal indicia generating system and method
A method for generating a postal indicia associated with a mailpiece is disclosed. The method includes generating an indicia data stream including a postal...
US-8,046,261 EMV transaction in mobile terminals
A mobile terminal is enabled to conduct an EMV transaction. A wireless access node in the EMV card-reader terminal is provided for connecting a mobile terminal...
US-8,045,974 Method and system for mobile IP-nodes in heterogeneous networks
A method for establishing an optimized communication link between mobile network nodes. An interface management module of a first mobile network node checks the...
US-8,045,753 Method of and system for authenticating an item
A method of authenticating the identity of an item bearing or associated with a printed security marker, the method comprising: a. printing the security marker...
US-8,045,707 System and method for securing data
Systems and systems that protect data are provided. In one embodiment, a system may include, for example, a memory and a processor. The memory may store, for...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.