Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,049,617 Method and system for providing tracking services to locate an asset
The present invention is directed to a method of asset location. Location data is received from a cellular transmitter associated with a selected asset, which...
US-8,049,613 Building security system
A security system that can be used in a home, office, or other building in order to generate alarms or take other actions depending on conditions within the...
US-8,047,435 System and method for secured voting transactions
A secured electronic system and method for taking and counting votes. A database of unique ballot security codes, each ballot security code consisting of a...
US-8,047,427 Currency recycler reconcilement activity
A currency handling system, for example, a currency recycler or depository machine, may be configured to process currency transactions, including receiving one...
US-8,046,835 Distributed computer network security activity model SDI-SCAM
A distributed multi-agent system and method is implemented and employed across at least one intranet for purposes of real time collection, monitoring,...
US-8,046,831 Automating software security restrictions on system resources
Security components of managed computers are configured using inoculation data. Inoculation data can be retrieved from an inoculation data provider. The...
US-8,046,592 Method and apparatus for securing the privacy of sensitive information in a data-handling system
A data-handling system (20) is arranged to scan through data it holds for instances of sensitive information as identified by reference (35) to a set of...
US-8,046,580 Data processing apparatus and method for generation of protection compression encoded data
An encoding data processing apparatus is described which is operable to generate protected compression encoded data representative of protected media signals....
US-8,046,577 Secure IP access protocol framework and supporting network architecture
A protocol framework for a Secure IP Access (SIA) method, and supporting components deployed on IP hosts and IP networks. Using this method, an IP host can...
US-8,046,490 System and method for enhancing network security
A method of transmitting data via a network of computers comprises receiving, at a first node of the network and from a second node of the network, first...
US-8,046,380 Data storage system
The present invention is directed to an archival data storage system. The archival data storage system includes write once and read many (WORM) capability, data...
US-8,046,379 System and method for access control and for supply chain management via a shared bill of material
A system for securely uploading and downloading data from a client to a remote data storage location under control of a remote application program. The data is...
US-8,046,313 Ergonomic man-machine interface incorporating adaptive pattern recognition based control system
An adaptive interface for a programmable system, for predicting a desired user function, based on user history, as well as machine internal status and context....
US-8,046,311 Postal indicia generating system and method
A method for generating a postal indicia associated with a mailpiece is disclosed. The method includes generating an indicia data stream including a postal...
US-8,046,261 EMV transaction in mobile terminals
A mobile terminal is enabled to conduct an EMV transaction. A wireless access node in the EMV card-reader terminal is provided for connecting a mobile terminal...
US-8,045,974 Method and system for mobile IP-nodes in heterogeneous networks
A method for establishing an optimized communication link between mobile network nodes. An interface management module of a first mobile network node checks the...
US-8,045,753 Method of and system for authenticating an item
A method of authenticating the identity of an item bearing or associated with a printed security marker, the method comprising: a. printing the security marker...
US-8,045,707 System and method for securing data
Systems and systems that protect data are provided. In one embodiment, a system may include, for example, a memory and a processor. The memory may store, for...
US-8,045,706 System of efficiently implementing secure hash algorithm (SHA-1) in digital hardware that accomplishes optimal...
A method of completing the Secure Hash Algorithm (SHA-1) computation in exactly 81 clock cycles with digital hardware. The general implementation techniques...
US-8,045,684 Securely sending notification of a new incoming e-mail message by way of a public network
A system notifies a computing device of an incoming message. In the system, a message server is coupled to a data communications network for receiving the...
US-8,045,557 Group communication through broadcast channels
Methods, media, and systems are provided for optimizing the use of broadcast channels for group communication streams on a wireless telecommunications data...
US-8,045,289 Data transfer apparatus for use with tape cartridges having a helical cammed surface and tape cartridges having...
A tape cartridge includes a housing and a tape reel that is rotatable about an axis of rotation. The tape reel is adapted to cooperably engage a reel drive...
US-8,045,203 Methods and apparatus for secure facsimile transmissions to electronic storage destinations
A method for a computer includes determining a call-in fax telephone number called by a facsimile transmission device, receiving the facsimile transmission from...
US-8,045,192 Image data encryption apparatus, image data encryption method and recording medium having computer executable...
An image processing apparatus disclosed in the present application includes a destination designation receiving unit that receives a designation of a...
US-8,045,191 Information processing device with attached security settings and security setting-dependent operation modes
In a printer 1 which is an information processing apparatus of the present invention, after a password is accepted from a PC 2 together with image data and job...
US-8,042,189 System and method to force a mobile device into a secure state
Embodiments relate to systems and methods for implementation on a mobile device to force the mobile device into a secure state upon detection or determination...
US-8,042,181 Systems and methods for message threat management
The present invention is directed to systems and methods for detecting unsolicited and threatening communications and communicating threat information related...
US-8,042,178 Alert message control of security mechanisms in data processing systems
An authenticated secure network communication link is established between an alert message generating computer 2 and a destination data processing system 6. The...
US-8,042,170 Bearer control of encrypted data flows in packet data communications
In a communication session in which data flows with encrypted data packets pass through a monitoring intermediary for data traffic control. The encrypted data...
US-8,042,157 System for restricting data access
A filter is arranged to selectively block or allow a data access command from an initiator according to whether the initiator is secure or insecure and whether...
US-8,042,149 Systems and methods for message threat management
The present invention is directed to systems and methods for detecting unsolicited and threatening communications and communicating threat information related...
US-8,042,147 Network security appliance
A network security appliance that provides security to devices in industrial environments by transparently bridging traffic to the endpoint device. The security...
US-8,042,064 System and method for delivering virtual tour content using the hyper-text transfer protocol (HTTP)
A system and method for delivering Virtual Reality (VR) tour content and spatial navigation comprising the hyper-text transfer protocol (HTTP) through a dynamic...
US-8,042,023 Memory system with cyclic redundancy check
A memory system, with a memory controller and a memory module, is configured to transfer error securing data and address signals within signal frames between...
US-8,041,946 Data transfer between networks operating at different security levels
A secure network server wherein both the forwarding process and the receiving process are created upon connection initialization, and the receiving process is...
US-8,041,941 Method and apparatus for compression of data on storage units using devices inside a storage area network fabric
The capability to encrypt or compress the traffic over network links, thus improving the security of the link on the performance of the links, and the...
US-8,041,930 Data processing apparatus and method for controlling thread access of register sets when selectively operating...
The data processing apparatus has processing logic for performing data processing operations and a register bank for storing data associated with the processing...
US-8,041,913 Data protection method
A data protection method for an electronic device having a storage medium is provided, wherein the storage medium includes a plurality of partitions and a...
US-8,041,912 Memory devices with data protection
A memory device comprises a memory array, a status register coupled with the memory array, and a security register coupled with the memory array and the status...
US-8,041,848 Media processing method and device
A media processing system and device with improved power usage characteristics, improved audio functionality and improved media security is provided....
US-8,041,788 Systems and methods for development of secure shell devices
A shell device with minimal software and/or hardware resources can download from a server configuration information and/or user data in order to allow the shell...
US-8,041,761 Virtual filer and IP space based IT configuration transitioning framework
A system and method enables gradual transitioning of a server, such as a filer, to a new security domain and/or IP address scheme. A single physical platform...
US-8,041,749 Systems and methods of managing specification, enforcement, or auditing of electronic health information access...
Methods and apparatus, including computer program products, related to managing specification, enforcement, or auditing of electronic health information use. In...
US-8,041,677 Method and system for data backup
Embodiments of the present invention are directed to Web-Services-based data backup and data-archiving applications that provide remote data backup and data...
US-8,041,645 Document security utilizing color gradients
The present invention includes apparatus and methods for printing and verifying postage stamps on demand via a personal postage stamp printer. The indicium by...
US-8,041,644 Cryptographic module for secure processing of value-bearing items
An on-line value bearing item (VBI) printing system that includes one or more cryptographic modules and a central database is disclosed. The cryptographic...
US-8,041,628 Method for directing and executing certified trading interests
Preferred embodiments of the subject invention comprise: (a) electronically receiving securities order-related data regarding a set of securities market...
US-8,041,581 System and method for collecting, processing, and storing discrete data records based upon a single data input
According to the present invention, there is provided a system and method for the collection, capture, processing, storage, and tracking of data for both...
US-8,041,528 Arrangement for calibrating a vector network analyzer
An arrangement for calibrating a vector network analyzer (VNA) is substantially secure against operating errors and offers cost-effective calibration by...
US-8,041,435 Modular object dynamic hosting
An object can be used in an industrial control configuration in relation to performing a function or task. Matching can occur such that an object with...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.