Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,036,769 Method and device for compensating for positional and shape deviations
A method for compensating positional and/or shape deviations in NC-controlled cutting production machines. The method including the steps of securing a new...
US-8,036,638 Mobile banking
Systems and methods are disclosed for identifying circumstances where end-to-end security is not available to a mobile banking customer. The user may be...
US-8,036,386 System and method for providing electronic ticket, and electronic ticket vending apparatus and mobile telephone...
An electronic ticket providing system capable of distributing and browsing the information relating to a ticket can be realized while maintaining the security...
US-8,036,383 Method and apparatus for secure communication between cryptographic systems using real time clock
Provided are a method and apparatus for secure communication between cryptographic systems using a Real Time Clock (RTC). The method and apparatus allow a...
US-8,035,864 Image processing apparatus
Depending on processing to be executed, the processing is prevented from being restricted even if a particular image is included in image data. There is...
US-8,033,459 System and method for secure electronic data delivery
Electronic data is securely delivered from an issuer to a recipient, in the form of an encrypted object. Data belonging to the issuer to be delivered is first...
US-8,032,939 Method and system for providing wireless vulnerability management for local area computer networks
A Software-as-a-Service (SaaS) based method for providing wireless vulnerability management for local area computer networks. The method includes providing a...
US-8,032,934 Network security system and the method thereof
The present invention discloses a network security system including a firewall arranged between the internal network and the external network, and a trusted...
US-8,032,927 Verification engine for user authentication
Computer-implemented system and methods for authenticating the identity of a person, for example a customer (1) of an E-Commerce web site (15). The web site or...
US-8,032,765 Secure database access through partial encryption
The present invention generally is directed to systems, methods, and articles of manufacture for securing sensitive information involved in database...
US-8,032,761 Method and system for memory attack protection to achieve a secure interface
Aspects of a method and system for memory attack protection to achieve a secure interface are provided. An integrated memory within a slave device may be...
US-8,032,744 Method and apparatus for self-authenticating digital records
A method for proving the validity of a digital document digitally signed using a digital key that corresponds to a digital certificate in a chain of digital...
US-8,032,630 Method and apparatus for comprehensive network management system
In a system for managing data, voice, application and video networks and associated systems and services that comprise multiple, interconnected network...
US-8,032,569 Information management system, display system, management apparatus and program
Only the display device stores content files and a management device stores file management information. The content files are managed using the file management...
US-8,032,435 Secure transmission of money transfers
The invention relates to a method and a device for enabling a validated money transfer between a sending and a receiving person via a sending and a receiving...
US-8,032,181 Service provider activation with subscriber identity module policy
Systems and methods for activating a mobile device for use with a service provider are described. In one exemplary method, a mobile device having a currently...
US-8,032,084 Data security device
A portable data storage device is described, which includes a short range wireless communication interface. The device is configured to communicate with a...
US-8,031,903 Networked security system
The application discloses a system and methods for remote access and analysis of data collected about items under inspection. The system includes one or more...
US-8,031,875 Key distribution in unidirectional channels with applications to RFID
A technique for securing information involves encrypting raw data into encrypted data based on an initial key. The technique further involves generating a set...
US-8,031,865 Multiple level security system and method for encrypting data within documents
A multiple level security system and method for encrypting data within documents is disclosed. The method includes one or more different encryption algorithms,...
US-8,031,672 System and method for providing secure mobility and internet protocol security related services to a mobile...
A method for connection roaming a Mobile Node (MN) to a Network GateWay (NGW) for providing secure data path using Internet Protocol (IP) security procedure....
US-8,031,471 Secure transparent enclosure for communication device
An enclosure comprises first and second sections formed of a transparent material, a plurality of wall sections, a plurality of vent holes, a hinge, a cable...
US-8,031,349 Approach for securely printing electronic documents
An approach is provided for securely printing electronic documents using a portable media. The approach is applicable to a wide variety of contexts and...
US-8,031,348 Approach for securely printing electronic documents
An approach is provided for securely printing electronic documents using a portable media. The approach is applicable to a wide variety of contexts and...
US-8,031,049 Method of communicating a command for load shedding of a load control system
The present invention provides a means for secure communication between an electrical utility company and an electricity customer, such that the customer is...
US-8,030,969 Semiconductor integrated circuit
In a dynamic flip-flop circuit with a data selection function, for example, when data having an H value has been selected using a selection signal S0, a first...
US-8,029,443 Glucose measuring device integrated into a holster for a personal area network device
A glucose meter module integrated into a holster device that can securely accommodate another device such as a portable server device or an insulin pump is...
US-8,028,908 Systems and methods for the secure control of data within heterogeneous systems and networks
A system and method for managing data rights is disclosed. A label associated with a data object is received and one or more predefined rules for the conversion...
US-8,028,903 System and method of pre-approving card holders for expedited security processing using emerging countries...
The present disclosure relates generally to a system and method, and more particularly to a system and method of pre-approving card holders for expedited...
US-RE42,814 Password protected modular computer method and device
A method and device for securing a removable Attached Computer Module ("ACM") 10. ACM 10 inserts into a Computer Module Bay ("CMB") 40 within a peripheral...
US-8,028,341 Providing extended memory protection
In one embodiment, the present invention provides for extended memory protection for memory of a system. The embodiment includes a method for associating a...
US-8,028,334 Automated generation of configuration elements of an information technology system
A firewall rule generation method, a load balancing rule generation method, and a wrapper generation method, for an Information Technology (IT) system,...
US-8,028,172 Systems and methods for updating a secure boot process on a computer with a hardware security module
Systems and methods are provided for maintaining and updating a secure boot process on a computer with a trusted platform module (TPM). A boot process may be...
US-8,028,164 Practical and secure storage encryption
The present invention relates to an electronic device (301) in which acceleration of data processing operations is provided, the device comprising a secure...
US-8,028,159 Security protocols for hybrid peer-to-peer file sharing networks
In a hybrid peer-to-peer file sharing network including a receiver peer and a provider peer, the receiver sends the provider a ticket [710] obtained from a...
US-8,028,157 On-chip security method and apparatus
A boot method an apparatus are described which reduce the likelihood of a security breach in a mobile device, preferably in a situation where a reset has been...
US-8,028,146 Management of temporary and permanent areas in nonvolatile memories of a storage system
The temporary area capacity required to be secured with respect to the whole permanent area is calculated in accordance with the capacity and access frequency...
US-8,028,103 Method and apparatus for generating secure DAM transfers
In one embodiment, a direct memory access (DMA) controller comprises a transmit control circuit, an offload engine, and a receive control circuit. The transmit...
US-8,028,069 Structure for securing leased resources on a computer
A design structure embodied in a machine readable storage medium for designing, manufacturing, and/or testing a design is for securing of leased resources on a...
US-8,028,067 Methods of operating a portable communications device with enhanced security
Methods of operating a portable communications device so as to provide communications security and user identification and authentication. In one embodiment,...
US-8,027,937 Systems, devices, and methods for providing multiple services to premises over communication networks
Methods, systems, and devices for providing one or more virtual networks for a plurality of services are disclosed. The device may include a secure access node...
US-8,027,927 Cryptographic module for secure processing of value-bearing items
An on-line value bearing item (VBI) printing system that includes one or more cryptographic modules and a central database is disclosed. The cryptographic...
US-8,027,926 Secure and recoverable database for on-line value-bearing item system
An on-line value bearing item (VBI) printing system that includes one or more cryptographic modules and a secure database is disclosed. The secure database...
US-8,027,894 Modeling responsible consumer debt consolidation behavior
A request to generate a consolidation risk score that characterizes a likelihood of a change in a level of creditworthiness of an individual following a...
US-8,027,841 Centralized server obtaining security intelligence knowledge by analyzing VoIP bit-stream
Systems and methods provide security intelligence knowledge of network communications. Particularly, VoIP packetized data being communicated over the network,...
US-8,027,735 Atraumatic high-retention headpiece
A headpiece for a cochlear implant system includes a transcutaneous transmission coil that transfers power and/or data to an implantable device implanted under...
US-8,027,474 Method and system for secure data aggregation in wireless sensor networks
A method for transmitting sensed data in a wireless sensor network including multiple sensors, includes: encrypting the sensed data with an encryption key and a...
US-8,027,274 Multicast communication system and method
The present invention aims to realize a system and method of reliably performing multicast communication via a bandwidth-guaranteed network, and provides a...
US-8,027,061 Security encoding unit and image forming apparatus including same
A security encoding unit performs security encoding processing on a plurality of images simultaneously, for example, an image on a front side of the document...
US-8,027,043 Method and system for inventory control of secure stock in feeders and finishers
A method and system for auditing security stock usage including displaying one or more data on a graphical user interface (GUI); extracting a first set of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.