Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,107,100 Post deployment electronic document management and security solution
A method for managing deployed electronic documents that can begin when the deployed electronic document is accessed. A data probe can be automatically conveyed...
US-8,106,771 Traceability method for an electronic payment terminal in the event of a theft thereof, and corresponding...
A traceability method is provided for an electronic payment terminal, in the event of a theft thereof. The method includes the following steps: detection of a...
US-8,105,750 Optical recording medium and method of manufacturing the same
Recording and reproducing characteristics and data saving reliability are secured in a write-once two-layer recording medium. A second recording layer from a...
US-8,105,296 Automatic surgical sponge counter and blood loss determination system
A surgical sponge detection system includes a plurality of surgical sponges (2) having radio frequency identification tags (1) securely attached thereto and a...
US-8,104,683 Hand-operated document reader/imager with document retention device including manually-powered anti-skew...
A hand-operated document processor includes a base including a perforated bed for receiving a document containing magnetic ink character data to be read and...
US-8,103,987 System and method for managing the design and configuration of an integrated circuit semiconductor design
A system and methods that facilitate the design process and minimize the time and effort required to complete the design and fabrication of an integrated...
US-8,103,946 Secure data strategy for vehicle control systems
A method of providing secure data from vehicle operational variable data that includes a plurality of data message bits includes the steps of dividing the...
US-8,103,933 Method for securing data and device for implementing the same
A method and system to ensure the integrity of data in a data-processing device, a data packet is read from a memory and checked to determine whether the data...
US-8,103,882 Apparatus and method for securing data on a portable storage device
A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of...
US-8,103,881 System, method and apparatus for electronic ticketing
The present invention provides a system, method and apparatus for securely granting access to an event. For example, in one embodiment of the present invention,...
US-8,103,844 Secure direct platter access
Bulk data transfers by directly accessing a persistent and secured area on the data storage device, e.g., a disk drive having a magnetic storage medium, without...
US-8,103,797 Parameterized recursive network architecture with topological addressing
A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the...
US-8,103,783 Systems and methods of providing security and reliability to proxy caches
The present solution provides a variety of techniques for accelerating and optimizing network traffic, such as HTTP based network traffic. The solution...
US-8,103,765 Method of non-intrusive analysis of secure and non-secure web application traffic in real-time
Provided is a method and system for monitoring and analysis of networked systems, that is non-intrusive and real time. Both secure and non-secure traffic may be...
US-8,103,618 Hosted system for enabling enterprises to build and operate online communities
A system that enables enterprises to design, create integrate and operate online communities. The system operates as an on-demand hosted platform ...
US-8,103,579 Systems and methods regarding targeted dissemination
One exemplary aspect comprises a computer-implemented method comprising: (a) electronically receiving, from a first securities market participant, data...
US-8,103,001 Method for verifying rights contained in a security module
A method of verification of rights is disclosed, contained in a security module associated to an apparatus processing broadcasted digital data. The apparatus is...
US-8,102,999 Secure telemetric link
A communications protocol is used to provide data privacy, message integrity, message freshness, and user authentication to telemetric traffic, especially to...
US-8,102,988 Method and system for dynamically terminating wireless and wireline calls between carriers
A third party tandem provider that intercepts and routes voice and data traffic between telecommunications carriers, e.g., wireless carriers, local exchange...
US-8,102,863 High-speed WAN to wireless LAN gateway
A gateway interconnecting a high speed Wide Area Network (WAN) and a lower speed Wireless Local Area Network (WLAN) is provided. The high speed WAN is...
US-8,102,725 Method for controlling a pre-charge process and a respective integrated circuit
A method of controlling a pre-charge process of a data line (21, 22) in an integrated circuit (100) comprises the step of monitoring a rate of change of a...
US-8,102,557 System and method for disabling access to non-volatile storage in a multi-function peripheral
A multi-function peripheral (MFP) device having enhanced security for processed data is disclosed. The MFP includes both a non-volatile memory and a volatile...
US-8,102,263 Passive tag including volatile memory
A passive tag including a volatile memory is provided. The passive tag includes: a sensing unit which senses or measures information about environmental...
US-8,102,260 Methods, systems and devices for detecting threatening objects and for classifying magnetic data
A method for detecting threatening objects in a security screening system. The method includes a step of classifying unique features of magnetic data as...
US-8,102,240 Controller providing shared device access for access control systems
An access control system and method for controlling access to secured areas includes a plurality of local readers connected to corresponding local control...
US-8,101,434 Method for LED-module assembly
A method for LED-module assembly comprising the steps of providing a base portion with a base inner surface and a cover with a cover inner surface which...
US-8,100,436 Data support with an optically variable structure
The invention relates to a security element with an optically variable structure, which has an embossed structure and a coating, wherein the embossed structure...
US-8,100,336 Method of unblocking a locked application using a personal identification number
The invention relates to a method of securing applications on a chip card which is disposed in a digital appliance. A count is made of the number of times a...
US-8,100,323 Apparatus and method for verifying components of an ATM
An automated banking machine is provided which may comprise a trusted platform (TP) including a trusted platform module (TPM) in a computer of the machine....
US-8,099,788 Declarative data security for a rapid application development tool component
A security privilege view object instance. The security privilege view object instance provides security at the view object instance level, permitting multiple...
US-8,099,783 Security method for data protection
An integrated circuit (IC) security apparatus with complementary security traces and a method for producing such an apparatus is disclosed. The security...
US-8,099,778 Method for access control to conditional access data
A method is disclosed for access control to conditional access data in a multimedia unit comprising at least one security module. This process includes:...
US-8,099,777 High security, multi-level processor and method of operating a computing system
A computing system can be optimized for high security, reliability and/or integrity. The computing system can include a multiple instruction stream, single data...
US-8,099,771 Method for issuing IC card storing encryption key information
It is possible to issue an IC card storing unique encryption key information in such a manner that re-issuing is enabled and sufficient security can be assured....
US-8,099,769 System and method for trusted communication
A method of establishing a trusted path of data and a method of verifying the integrity of data presented for signing to a user of the personalized device in a...
US-8,099,664 Dynamic help user interface control with secured customization
A method and system is disclosed for generating a help interface to present static help content and customized help content for an application. Help content...
US-8,099,588 Method, system and computer program for configuring firewalls
A solution is proposed for distributing a software product to a set of data processing entities (such as endpoints) in a data processing system; the system...
US-8,099,489 Network monitoring method and system
A method of monitoring a network, in particular a data or telecommunication network, where the network includes a number of units to be monitored, and where...
US-8,099,378 Secure virtual private network utilizing a diagnostics policy and diagnostics engine to establish a secure...
A secure virtual private network (VPN) is described herein. The secure VPN implements standard VPN software with diagnostics to ensure a client device coupling...
US-8,099,369 Method and system for securing content in media systems
A method and system for securing transfer, storage, and playback of media content. The method and system relate to securing transfer, storage, and playback of...
US-8,099,365 Extended data collection for multi-merchant purchasing environment for downloadable products
A multi-merchant purchasing system is configured to identify downloadable products selected by a user for purchase. The identified downloadable products are...
US-8,099,358 Quantifying the output of credit research systems
A method of quantifying the value added by an internal company credit rating system is described. The method includes determining an internal company credit...
US-8,099,324 Securely providing advertising subsidized computer usage
A method and apparatus for assuring delivery of paid advertising to a user may involve asking a question about an advertisement or requiring data about the...
US-8,099,077 Customer identification and authentication procedure for online internet payments using mobile phone
This invention shows a mobile terminal device (3) having a memory unit (3a) and an interface device (3b) which is releasably connectable to a multiple partner...
US-8,099,053 Communication apparatus and communication system
Remote control data is securely transmitted to a device under control. A remote control device transmits an acknowledge request for A ch to the device under...
US-8,098,822 Secure communication system and method using shared random source for key changing
Apparatus for use by a first party for key management for secure communication with a second party, said key management being to provide at each party,...
US-8,098,819 Method, system and securing means for data archiving with automatic encryption and decryption by fragmentation...
In the method for data archiving with automatic en- and decryption data (9, 10) are exchanged between a client station (1) and an archive station (4). A...
US-8,098,815 Device, system and method for cryptographic key exchange
A method is disclosed whereby two parties can establish a cryptographic key for secure communications without any prior distribution of secret keys or other...
US-8,098,386 Image management system, image output apparatus, and computer readable medium for security enhancement
Disclosed herein is an image management system, including: an image output apparatus which outputs an image data to various types of media, and a server,...
US-8,098,147 System for monitoring the tire
This invention provides a tire monitoring system, comprising a remote tire monitoring unit installed in the tire, a central controller, a speech indicating unit...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.