Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,174,393 RFID tag assembly and method of managing a race
A race management system which includes an RFID tag located between an inner and outer layer and is removably secured to a participant's bib through a mounting...
US-8,174,378 Human guard enhancing multiple site security system
Provided is a human guard enhancing multiple site security system comprising one or more human guards, peripheral equipment positioned at one or more sites,...
US-8,174,362 Methods and apparatuses to secure data transmission in RFID systems
Methods and apparatuses to secure data transmission in a radio frequency identification (RFID) system against eavesdropping, using multiple communication...
US-8,172,151 Secure use of externally stored data
A smart card reader is adapted to extract and store authentication data from a response APDU received from a smart card before generating a filtered response...
US-8,172,138 Device and method for smart card assisted digital content purchase and storage
The present invention discloses a device and a method useful for the provision of secure payment and certification of digital content access, while the devise...
US-8,171,561 Secure personal content server
A local content server system (LCS) for creating a secure environment for digital content is disclosed, which system comprises: a communications port in...
US-8,171,546 Keyboard security status check module and method
A keyboard security status check module and method are provided. The module is provided to enable a user to easily check the operating status of a keyboard...
US-8,171,537 Method of securely controlling through one or more separate private networks an internet-connected computer...
A method of securely controlling through a private network a computer protected by a hardware-based inner access barrier or firewall and configured to operate...
US-8,171,534 Two-way authentication using a combined code
An authentication process for a client and a target service to perform mutual authentication. A combined code is received that comprises a combined code hash of...
US-8,171,531 Universal authentication token
A universal authentication token is configured to securely acquire security credentials from other authentication tokens and/or devices. In this manner, a...
US-8,171,527 Method and apparatus for securing unlock password generation and distribution
A process may be utilized for securing unlock password generation and distribution. A first set of exclusive responsibilities, assigned to a trusted authority,...
US-8,171,311 Transferring data values via a data bus or storing data values using a selectable representation
Data values being stored and transferred within a data processing system 8 have a selectable representation, such as true and complement, as indicated by an...
US-8,171,309 Secure memory controlled access
Secure memory controlled access is described. In embodiment(s), memory stores encrypted data and the memory includes a secure memory partition to store...
US-8,171,293 Receiver non-repudiation via a secure device
Techniques for assuring a receiver's non repudiation of a communication are provided via cooperation with a secure device. A secure device operates within a...
US-8,171,292 Systems, devices, and methods for securely transmitting a security parameter to a computing device
Embodiments of the systems, devices, and methods described herein generally facilitate the secure transmittal of security parameters. In accordance with at...
US-8,171,291 Method for checking the integrity of data, system and mobile terminal
The invention relates to a method for checking the integrity of a message transmitted between a sender in a transmitting end and a recipient in a receiving end,...
US-8,171,209 Write protection method and device for at least one random access memory device
In a write protection method for at least one random access memory device, the inherent problems of such memory devices with regard to data integrity and...
US-8,171,204 Intelligent solid-state non-volatile memory device (NVMD) system with multi-level caching of multiple channels
A flash memory system stores blocks of data in Non-Volatile Memory Devices (NVMD) that are addressed by a logical block address (LBA). The LBA is remapped for...
US-8,171,117 Workflow manager for a distributed system
A workflow manager handles the communication between a workflow-enabled provider and a workflow-enabled client. The workflow manager maintains a directory of...
US-8,171,108 System and method for providing remote forensics capability
A system and method for performing a forensic analysis of a subject computer having a non-volatile memory with a second computer is provided. In one embodiment,...
US-8,171,083 System for enhancing the transmission security of the e-mails in the internet network
System for enhancing the security of the e-mails transmitted from a sender (10) to a receiver (12) over a data transmission network such as Internet wherein a...
US-8,171,060 Storage system and method for operating storage system
By considering a device life and time needed for data migration, data stored in a storage apparatus is securely preserved until a retention term of each of the...
US-8,171,057 Modeling party identities in computer storage systems
The present invention extends to methods, systems, and computer program products for modeling party identities in computer storage systems. A federated identity...
US-8,171,037 System and method for reference number expansion
Method and system are disclosed for expanding a reference number range without altering existing data storage length. Such reference numbers may include...
US-8,170,528 Network access control
According to one embodiment of the present invention, there is provided a method of authorizing a communication device to connect to a network. The method...
US-8,170,526 Method and apparatus for remote vehicle communications and control
Long-range remote communication and control of a vehicle is achieved with primary and secondary cellular devices provided by the vehicle user. The primary...
US-8,170,212 Device, system, and method of establishing secure wireless communication
Device, system, and method of establishing secure wireless communication. A system includes at least one wireless communication device having a sensor to...
US-8,166,565 Encryption and access method and system for peer-to-peer distributed file storage
A system for secure distributed data storage that uses a network, where the system includes a file stored on a plurality of storage elements that are accessible...
US-8,166,561 Security device, secure memory system and method using a security device
A security device including a first external interface; a second external interface; and a security controller connected to said first external interface and...
US-8,166,558 System and method for upgrading the functionality of a controlling device in a secure manner
Secure access to a database of upgrade data is provided by storing an encryption key value in a cable used to interconnect a first device and a second device...
US-8,166,554 Secure enterprise network
What is proposed is a method of implementing a security system (Packet Sentry) addressing the internal security problem of enterprises having a generalized...
US-8,166,552 Adaptive configuration management system
An automated configuration management system (ACMS) oversees resources of a virtualized ecosystem by establishing a baseline configuration (including, e.g.,...
US-8,166,551 Automated security manager
Systems, methods, media, and other embodiments associated with automated security management are described. One example system embodiment includes logic to...
US-8,166,541 Information processing apparatus and data management system
It is an object to provide an information processing apparatus and a data management system which can access data and maintain security even in an environment...
US-8,166,498 Security monitoring using a multimedia processing device
A system includes a multimedia data interface to receive data representative of one or more multimedia channels and a display interface to a display device, the...
US-8,166,471 Implementing portable content protection to secure secrets
A source-level compiler may randomly select compilation conventions to implement portable content protection, securing the secrets embedded in a program by...
US-8,166,357 Implementing logic security feature for disabling integrated circuit test ports ability to scanout data
A method and apparatus for implementing integrated circuit security features are provided to selectively disable testability features on an integrated circuit...
US-8,166,312 Method of individually fitting a hearing device or hearing aid
The present invention provides a method of providing parameters for the fitting process of individually shaped or customized hearing devices by collecting and...
US-8,166,304 Support for multiple security policies on a unified authentication architecture
A method, computer program product, and data processing system are disclosed for ensuring that applications executed in the data processing system originate...
US-8,166,303 Method for transmitting data among components of the system electronics of mobile systems, and such components
A method for transmitting data among components of the system electronics of mobile systems, where, to increase the security of the information exchange, it is...
US-8,166,266 Securing non volatile data in an embedded memory device
The various embodiments of the invention relate generally to semiconductors and memory technology. More specifically, the various embodiment and examples of the...
US-8,166,122 Method and apparatus for generating a figure of merit for use in transmission of messages in a multi-level...
A method and apparatus that generate a figure of merit for use in transmission of messages in a multi-level secure environment. The method may include receiving...
US-8,166,118 Secure communication architecture, protocols, and methods
A trusted network system includes a data center, a gateway, and a trusted sender registry that provide a secure network to allow one or more user clients to...
US-8,166,071 System and method for efficiently securing enterprise data resources
Some embodiments provide a system and method that secures access to data objects of an enterprise that includes multiple data objects and multiple user...
US-8,165,730 Flight recorder having integral reserve power supply within form factor of enclosure and method therefor
A flight recorder includes an enclosure having a notch formed on one side or corner of the enclosure. An electronic interface is disposed within the enclosure....
US-8,165,525 Automatic data encryption and access control based on bluetooth device proximity
A method, apparatus, and system for using Bluetooth devices to secure sensitive data on other Bluetooth devices is described. A Bluetooth device is paired with...
US-8,165,338 Image processing apparatus and control method thereof
Even when multiple document-data images are imposed on a sheet, a paper fingerprint registration can be performed securely with single processing and collation...
US-8,165,305 Enhanced relational database security through encryption of table indices
A system (108) for securing a database including a first and second tables is provided, where the first table includes a first key field and a first data field...
US-8,165,302 Key table and authorization table management
In certain embodiments, a player device that receives and plays content stored on packaged media, the player device has a media reader that receives a packaged...
US-8,165,301 Input-output device and storage controller handshake protocol using key exchange for data security
A protocol for providing secured IO device and storage controller handshake protocol; IO device controlled cipher settings, and secured data storage and access...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.