Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,140,859 Secure storage and replay of media programs using a hard-paired receiver and storage device
A method and apparatus for storing and retrieving program material for subsequent replay is disclosed. The method comprises the steps of receiving a data stream...
US-8,140,858 Data processing apparatus
A data processing apparatus is provided, which detects falsification of software to data and rewriting of the data. The data processing apparatus according to...
US-8,140,845 Scheme for authentication and dynamic key exchange
A scheme for authentication, dynamic key generation and exchange provides means for authentication of mobile nodes and networks, and for generation of per...
US-8,140,797 Integrated circuit and method of securing access to an on-chip memory
An integrated circuit having an on-chip access right manager to grant or deny access to a memory segment to a peripheral device such as a CPU (Central...
US-8,140,638 Multistage online transaction system, server, multistage online transaction processing method and program
Provided is a system in which a plurality of nodes including a plurality of servers are connected at least with one NAS shared among the plurality of nodes. At...
US-8,140,576 On-demand database service system, method and computer program product for conditionally allowing an...
In accordance with embodiments, there are provided mechanisms and methods for conditionally allowing an application of an entity access to data of another...
US-8,140,409 Terminal device and security device which automatically receive electronic gift, information providing method...
It is possible to provide a privilege for data communication without requiring a troublesome user operation and to realize an information provision system for...
US-8,139,763 Randomized RSA-based cryptographic exponentiation resistant to side channel and fault attacks
Systems and/or methods that facilitate secure electronic communication of data are presented. A cryptographic component facilitates data encryption, data...
US-8,139,733 Simultaneous voice and data systems for secure catalog orders
Systems and methods for providing a simultaneous voice and data user interface for secure catalog orders and in particular for providing a system and method for...
US-8,139,588 Method and apparatus to establish routes based on the trust scores of routers within an IP routing domain
A router includes a management module and a routing module. The routing module can be used to route data around a network. The management module can be used to...
US-8,139,515 Device and method of managing data communications of a device in a network via a split tunnel mode connection
A device and a method for managing data communications of a device in a network are provided. The method includes establishing a secure communication connection...
US-8,139,243 Information processing apparatus, control method, and computer-readable medium for distributed processing of...
A print job often includes secret information, and information may suffer sniffing from devices that execute distributed processing of jobs, or on the network....
US-8,139,241 Printing apparatus and its control method, job processing method, and printing system
When authentication data input before execution of print processing based on a secure print job is authenticated, a copy is printed based on the secure print...
US-8,138,923 RFID security system and method, including security stamp
Embodiments of an RFID security system and method are described herein. Embodiments include an RFID security server or appliance and RFID security software. In...
US-8,138,913 Panel system and method with embedded electronics
A system and method for a panel system containing embedded electronic elements providing both housing for the electronics and structural support. A preferred...
US-8,138,889 Method, transponder, and system for secure data exchange
A method for data exchange is provided, whereby a first code is generated by a transponder, which is transmitted to a base station, a first transmission...
US-8,138,886 Communication enabled active lock system
An active lock system includes wireless communication capability and information display and processing functions providing convenience, security and privacy...
US-8,138,882 Securing premises using surfaced-based computing technology
An approach is provided that that uses an electronic multi-touch floor covering that has numerous sensors to identify shapes. The electronic multi-touch floor...
US-8,136,165 Securing a data transmission channel
A method of establishing a secure communication channel between end nodes of an IP communication network via one or more intermediate nodes using the Secure...
US-8,136,162 Intelligent network interface controller
A network interface device includes a security database and a security services engine. The security database is configured to store patterns corresponding to...
US-8,136,152 Method and system for securely scanning network traffic
A method and system for implementing secure network communications between a first device and a second device, at least one of the devices communicating with...
US-8,136,148 Reusable authentication experience tool
A reusable authentication component may be integrated into a web page to communicate with an authentication server and authenticate a user to the web page. The...
US-8,136,146 Secure audit log access for federation compliance
A computer implemented method, data processing system, and computer program product for allowing limited access to a federation partner's audit logs in a...
US-8,135,980 Storage availability using cryptographic splitting
A secure storage appliance is disclosed, along with methods of storing and reading data in a secure storage network. In one aspect, a method includes assigning...
US-8,135,962 System and method providing region-granular, hardware-controlled memory encryption
A memory, system, and method for providing security for data stored within a memory and arranged within a plurality of memory regions. The method includes...
US-8,135,953 System and method for providing variable security level in a wireless communication system
A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of...
US-8,135,952 Method and system for secure position determination
A system and method of security for navigation, positioning, and localization systems, and applications of cryptography thereto are provided. The security can...
US-8,135,931 Information equipment, method for supporting operation thereof, and computer-readable storage medium for...
Information equipment having a memory area for which access restrictions are set is provided. The information equipment makes a determination, in response to...
US-8,135,825 Method for loading and managing an application on mobile equipment
A method for loading and managing a software application in a mobile equipment intended to receive digital data of mobile television services broadcasted via a...
US-8,135,657 Systems and methods for processing data flows
A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and...
US-8,135,656 Online management service for identification documents which prompts a user for a category of an official document
An online identification document management service includes a host server having a web-based interface adapted to facilitate secure customer access to the...
US-8,135,135 Secure data protection during disasters
In situations, such as disasters, where the physical protection of data may be compromised, algorithmic protection of such data can be increased in anticipation...
US-8,135,134 Systems and methods for managing cryptographic keys
A common interface for managing cryptographic keys is provided. A request to manage a cryptographic key may be received in a first interface format, translated...
US-8,135,007 Method and mechanism for port redirects in a network switch
A method for selectively redirecting a data packet to a port on a switching device which is associated with a corresponding network service. In one embodiment,...
US-8,134,462 Self-contained sensor package for water security and safety
Disclosed is a floating sensor system having a casing that encloses a microcontroller. The microcontroller includes a digital processor and a non-volatile...
US-8,132,252 System and method for securely transmitting data using video validation
A system and method is disclosed for secure transmission of electronic information between two parties. A first data communication session between a first...
US-8,132,236 System and method for providing secured access to mobile devices
A system and method for providing secured access of a mobile device is disclosed herein. Access to data included in the mobile device is permitted when the...
US-8,132,025 Management method for archive system security
Creating a plaintext index from a text that is extracted from a file presents the risk of a leak of confidential information from the created index. To address...
US-8,132,015 Method and system for loading a secure firmware update on an adapter device of a computer system
One embodiment of the present invention sets forth a method for loading a secure firmware update onto an adapter device in a computer system. The method...
US-8,132,004 Multiple independent levels of security containing multi-level security interface
Methods and systems for enabling security in transferring data from a single level MILS partition to the multiple level LAN. When a frame is received from an...
US-8,131,995 Processing feature revocation and reinvocation
A method includes storing, at a storage location of a system, a first security value and utilizing, at the system, a first security certificate compatible with...
US-8,131,988 Secure boot device
An electronic device includes a power supply unit, a control unit, a first boot circuit, and a data encryption unit. The control unit outputs a boot signal for...
US-8,131,959 Method and arrangement for securing user-definable data of a franking machine
In a method for data backup of a franking machine in which, in a data backup step, a connection is established between the franking machine and a remote data...
US-8,131,942 Control data modification within a cache memory
A data processing system is provided with at least one processor 4, 6, a main memory 18 and a cache memory 14. Cache data within the cache memory 14 has...
US-8,131,822 Access of elements for a secure web page through a non-secure channel
Particular embodiments generally relate to allowing access of non-secure elements through a non-secure channel when a top-level page was accessed through a...
US-8,131,738 Search engine service utilizing hash algorithms
A secure search method of securing searches by a user through a hash provider using a search engine. The user registers with the hash provider. The hash...
US-8,131,672 System and method for synchronizing data records between multiple databases
A system and method for synchronizing data records between multiple databases is provided. Each database includes data records that are modified to include at...
US-8,131,646 Reprogrammable security for controlling piracy and enabling interactive content using revocation status
Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic...
US-8,131,401 Real-time stability indexing for intelligent energy monitoring and management of electrical power network system
A system and method for intelligent monitoring and management of an electrical system is disclosed. The system includes a data acquisition component, a power...
US-8,131,145 Lightweight cordless security camera
The present invention is a lightweight, cordless security camera comprising a lightweight stand or tripod, a video camera with pan, tilt, and zoom articulation...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.