Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,185,751 Achieving strong cryptographic correlation between higher level semantic units and lower level components in a...
A data storage architecture for networked access by clients includes a file server capable of communication with the clients via the network, physical storage...
US-8,185,748 Methods and apparatus for facilitating a secure processor functional transition
A processor and associated local memory are capable of operative connection to a main memory such that data may be read from the main memory for use in the...
US-8,185,747 Methods of registration for programs using verification processes with biometrics for fraud management and...
Methods for pre-registering a participant in a program database using a participant smart card and biometric data in a verification process to manage fraud and...
US-8,185,735 System and method for lost data destruction of electronic data stored on portable electronic devices
A data security system and method protects stored data from unauthorized access. According to one aspect of the invention, a client computing device...
US-8,185,709 Security system for external data storage apparatus and control method thereof
A security system for an external data storage apparatus and a control method thereof, in which a data storage is driven by reading an identification (ID),...
US-8,185,690 Memory module, memory system, and information device
A memory system including ROM and RAM in which reading and writing are enabled. A memory system includes a non-volatile memory (FLASH), DRAM, a control circuit,...
US-8,185,510 Distributed security provisioning
Systems, methods and apparatus for a distributed security that provides security processing external to a network edge. The system can include many distributed...
US-8,185,430 Supplier stratification
Provided is a method and system of assigning a level of risk presented to an enterprise by a supplier of goods or services. In at least some embodiments, a tier...
US-8,185,429 System and method of making sales calls
A database navigation system simplifies the navigation and use of sales target information in a database. The salesperson, i.e., the user, begins navigating and...
US-8,185,101 Handheld portable real-time tracking and communications device
Portable handheld real-time tracking and communications devices include; a controller module, communications module including global positioning and mesh...
US-8,185,035 Image forming system
An image forming system which realizes reliable output of an original of a finished book, while maintaining security. A sheet-unique information-reading unit...
US-8,184,972 Method and apparatus relating to secure communication
Data is encrypted onto an electromagnetic beam by providing an electromagnetic beam having a signal component having a modal state, wherein the signal component...
US-8,184,872 One time password generating method and apparatus
The invention relates to a one-time password generating method and an apparatus. The method includes steps of collecting fingerprint images, extracting...
US-8,184,867 Method and system for biometric identification or verification
The invention relates to a method for the biometric identification or verification of people. According to said method, biometric characteristics are detected...
US-8,184,810 Secure device and relay terminal
An IC card includes a tamper resistant module which has one or more applications and a card control unit for controlling an operation of the IC card, a secure...
US-8,184,808 Chaotic asymmetric encryption process for data security
Disclosed is a method and apparatus for a chaotic asymmetric encryption system that is based on a mathematically proven chaotic dynamical system, the ergodic...
US-8,184,804 Hash function using a piling-up process
In the computer data security field, a cryptographic hash function process embodied in a computer system and which is typically keyless, but is highly secure....
US-8,184,691 Managing telemetry bandwidth and security
An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of...
US-8,184,530 Providing quality of service (QOS) using multiple service set identifiers (SSID) simultaneously
Quality of Service (QoS) is provided to a secure data tunnel such an IPsec tunnel using information about the tunnel and the underlying data session to...
US-8,184,490 Self-calibration method of a reading circuit of a nonvolatile memory
A self-calibration circuit of a nonvolatile memory includes a trimming data storage module, a sense amplifier module, a logic judgment module, and a scanning...
US-8,184,324 Mobile information apparatus for wireless search and data transfer
A mobile information apparatus for wireless digital media transfer and sharing in a wireless digital home or a wireless digital enterprise are disclosed. In a...
US-8,184,006 Shipping container integrity device and system
Disclosed is a remotely monitorable shipping container security and integrity system and radio frequency identification device. The system permits remote...
US-8,183,994 Flexible, scalable, service-oriented surveillance system architecture
A surveillance architecture having applications in a wide variety of surveillance-related applications is disclosed. This architecture can be used in various...
US-8,181,869 Method for customizing customer identifier
The present invention provides a method for customizing customer identifier. To resolve the problems in customizing the identifier in the electronic device by...
US-8,181,263 Data communication system controlling available addressees for data based on preselected security level of user...
An LDAP server stores security levels individually assigned to a plurality of destinations and a plurality of users in advance. When a user is authenticated...
US-8,181,259 System and method for upgrading the functionality of a controlling device via a secure portable adapter device
Secure access to a database of upgrade data is provided by storing an encryption key value in an adapter device used to interconnect a first device to be...
US-8,181,239 Distributed network security system and a hardware processor therefor
An architecture provides capabilities to transport and process Internet Protocol (IP) packets from Layer 2 through transport protocol layer and may also provide...
US-8,181,237 Method for improving security of computer networks
A method of preventing unauthorized user access to a computer network has been developed. The method includes receiving a domain name server resolution request...
US-8,181,042 Low power mode data preservation in secure ICs
Methods, apparatus and computer program products are provided for reducing power consumption in a device. One method includes identifying a plurality of...
US-8,181,035 Methods, apparatus and systems to improve security in computer systems
According to some implementations methods, apparatus and systems are provided involving the use of processors having at least one core with a security...
US-8,181,034 Secure data utilization
A system, comprising an external memory operative to store data therein, the data including a plurality of sections, each of the sections being associated with...
US-8,181,028 Method for secure system shutdown
In one embodiment, a key list entry corresponding to a user's private key is securely deleted from a key list of a user device on shutdown of the user device....
US-8,181,023 Information processing device and information processing system
An information processing device is provided with a tamper-proof IC chip that includes a storage area and that can process data from the storage area, and with...
US-8,181,011 iSCSI name forwarding technique
An iSCSI name forwarding technique allows a security appliance to assume iSCSI names of one or more clients and one or more storage systems in a network. The...
US-8,181,008 Secure system-on-chip
The aim of the present invention is to provide a secure system-on-chip for processing data, this system-on-chip having at least a central processing unit, an...
US-8,181,006 Method and device for securely configuring a terminal by means of a startup external data storage device
Method of configuring a terminal (10a) by means of a device external to said terminal (50a) able to communicate with said terminal and comprising data storage...
US-8,180,908 Platform for standardizing vehicle communications with third-party applications
A business-to-vehicle platform functions as an information technology (IT) integration platform to support secure communication between a vehicle's onboard IT...
US-8,180,741 Methods and systems for providing data objects on a token
A computer system, method and/or computer-readable medium provide independent data objects to a token in compressed form. The independent data objects are...
US-8,180,323 Non centralized security function for a radio interface
A module dual mode device architecture and method of use is disclosed. The system architecture provides a distributed design of an IEEE 802.11i compliant...
US-8,180,060 Telemedical system
In the telemedical system securely sharing encryption keys for enabling secure exchange of the encrypted biological data between the measurement terminal and...
US-8,180,058 Encryption of the scheduled uplink message in random access procedure
Systems and methodologies are described that facilitate employing a random access procedure that leverages encrypted and/or unencrypted data in a scheduled...
US-8,180,053 Secure communications system with assured synchronization for data exchanged among system ports
A secure communications system has at least one processor and a control bus. A number of ports, each having a different fixed address, are coupled to the...
US-8,180,048 Method and system for computational transformation
The invention generally relates to computational transformation process, which has applications in cryptography, random number generation, hash code generation...
US-8,179,439 Security system
A security system includes at least first and second monitoring units, each having a motion sensor for detecting motion, a camera for obtaining visual data, a...
US-8,179,261 Identification and surveillance device, system and method for individual item level tracking
There are provided an identification and surveillance device, a system and a method using active RFID technology to accurately and automatically track inventory...
US-8,176,566 Information distribution device, method and storage medium storing program, and data signal for information...
An information distribution device including a storage section, a reception section, a selection section and a distribution section. The storage section stores,...
US-8,176,563 Data security system and method with editor
The method, program and system secures sensitive data/objects found in a data source document with an editor. The simple editor identifies and displays, in...
US-8,176,553 Secure gateway with firewall and intrusion detection capabilities
A system, method and computer program product are provided. Initially, data is received from a remote source which is destined for a target. A portion of such...
US-8,176,549 Unit using OS and image forming apparatus using the same
A chip mountable on a customer replaceable unit monitory (CRUM) unit used in an image forming job includes a central processing unit (CPU) to perform...
US-8,176,540 Resource based non-interactive entity application proxy method and system
A security method and system. The method includes retrieving configuration data associated with a non interactive entity (NIE) software application. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.