Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,103,844 Secure direct platter access
Bulk data transfers by directly accessing a persistent and secured area on the data storage device, e.g., a disk drive having a magnetic storage medium, without...
US-8,103,797 Parameterized recursive network architecture with topological addressing
A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the...
US-8,103,783 Systems and methods of providing security and reliability to proxy caches
The present solution provides a variety of techniques for accelerating and optimizing network traffic, such as HTTP based network traffic. The solution...
US-8,103,765 Method of non-intrusive analysis of secure and non-secure web application traffic in real-time
Provided is a method and system for monitoring and analysis of networked systems, that is non-intrusive and real time. Both secure and non-secure traffic may be...
US-8,103,618 Hosted system for enabling enterprises to build and operate online communities
A system that enables enterprises to design, create integrate and operate online communities. The system operates as an on-demand hosted platform ...
US-8,103,579 Systems and methods regarding targeted dissemination
One exemplary aspect comprises a computer-implemented method comprising: (a) electronically receiving, from a first securities market participant, data...
US-8,103,001 Method for verifying rights contained in a security module
A method of verification of rights is disclosed, contained in a security module associated to an apparatus processing broadcasted digital data. The apparatus is...
US-8,102,999 Secure telemetric link
A communications protocol is used to provide data privacy, message integrity, message freshness, and user authentication to telemetric traffic, especially to...
US-8,102,988 Method and system for dynamically terminating wireless and wireline calls between carriers
A third party tandem provider that intercepts and routes voice and data traffic between telecommunications carriers, e.g., wireless carriers, local exchange...
US-8,102,863 High-speed WAN to wireless LAN gateway
A gateway interconnecting a high speed Wide Area Network (WAN) and a lower speed Wireless Local Area Network (WLAN) is provided. The high speed WAN is...
US-8,102,725 Method for controlling a pre-charge process and a respective integrated circuit
A method of controlling a pre-charge process of a data line (21, 22) in an integrated circuit (100) comprises the step of monitoring a rate of change of a...
US-8,102,557 System and method for disabling access to non-volatile storage in a multi-function peripheral
A multi-function peripheral (MFP) device having enhanced security for processed data is disclosed. The MFP includes both a non-volatile memory and a volatile...
US-8,102,263 Passive tag including volatile memory
A passive tag including a volatile memory is provided. The passive tag includes: a sensing unit which senses or measures information about environmental...
US-8,102,260 Methods, systems and devices for detecting threatening objects and for classifying magnetic data
A method for detecting threatening objects in a security screening system. The method includes a step of classifying unique features of magnetic data as...
US-8,102,240 Controller providing shared device access for access control systems
An access control system and method for controlling access to secured areas includes a plurality of local readers connected to corresponding local control...
US-8,101,434 Method for LED-module assembly
A method for LED-module assembly comprising the steps of providing a base portion with a base inner surface and a cover with a cover inner surface which...
US-8,100,436 Data support with an optically variable structure
The invention relates to a security element with an optically variable structure, which has an embossed structure and a coating, wherein the embossed structure...
US-8,100,336 Method of unblocking a locked application using a personal identification number
The invention relates to a method of securing applications on a chip card which is disposed in a digital appliance. A count is made of the number of times a...
US-8,100,323 Apparatus and method for verifying components of an ATM
An automated banking machine is provided which may comprise a trusted platform (TP) including a trusted platform module (TPM) in a computer of the machine....
US-8,099,788 Declarative data security for a rapid application development tool component
A security privilege view object instance. The security privilege view object instance provides security at the view object instance level, permitting multiple...
US-8,099,783 Security method for data protection
An integrated circuit (IC) security apparatus with complementary security traces and a method for producing such an apparatus is disclosed. The security...
US-8,099,778 Method for access control to conditional access data
A method is disclosed for access control to conditional access data in a multimedia unit comprising at least one security module. This process includes:...
US-8,099,777 High security, multi-level processor and method of operating a computing system
A computing system can be optimized for high security, reliability and/or integrity. The computing system can include a multiple instruction stream, single data...
US-8,099,771 Method for issuing IC card storing encryption key information
It is possible to issue an IC card storing unique encryption key information in such a manner that re-issuing is enabled and sufficient security can be assured....
US-8,099,769 System and method for trusted communication
A method of establishing a trusted path of data and a method of verifying the integrity of data presented for signing to a user of the personalized device in a...
US-8,099,664 Dynamic help user interface control with secured customization
A method and system is disclosed for generating a help interface to present static help content and customized help content for an application. Help content...
US-8,099,588 Method, system and computer program for configuring firewalls
A solution is proposed for distributing a software product to a set of data processing entities (such as endpoints) in a data processing system; the system...
US-8,099,489 Network monitoring method and system
A method of monitoring a network, in particular a data or telecommunication network, where the network includes a number of units to be monitored, and where...
US-8,099,378 Secure virtual private network utilizing a diagnostics policy and diagnostics engine to establish a secure...
A secure virtual private network (VPN) is described herein. The secure VPN implements standard VPN software with diagnostics to ensure a client device coupling...
US-8,099,369 Method and system for securing content in media systems
A method and system for securing transfer, storage, and playback of media content. The method and system relate to securing transfer, storage, and playback of...
US-8,099,365 Extended data collection for multi-merchant purchasing environment for downloadable products
A multi-merchant purchasing system is configured to identify downloadable products selected by a user for purchase. The identified downloadable products are...
US-8,099,358 Quantifying the output of credit research systems
A method of quantifying the value added by an internal company credit rating system is described. The method includes determining an internal company credit...
US-8,099,324 Securely providing advertising subsidized computer usage
A method and apparatus for assuring delivery of paid advertising to a user may involve asking a question about an advertisement or requiring data about the...
US-8,099,077 Customer identification and authentication procedure for online internet payments using mobile phone
This invention shows a mobile terminal device (3) having a memory unit (3a) and an interface device (3b) which is releasably connectable to a multiple partner...
US-8,099,053 Communication apparatus and communication system
Remote control data is securely transmitted to a device under control. A remote control device transmits an acknowledge request for A ch to the device under...
US-8,098,822 Secure communication system and method using shared random source for key changing
Apparatus for use by a first party for key management for secure communication with a second party, said key management being to provide at each party,...
US-8,098,819 Method, system and securing means for data archiving with automatic encryption and decryption by fragmentation...
In the method for data archiving with automatic en- and decryption data (9, 10) are exchanged between a client station (1) and an archive station (4). A...
US-8,098,815 Device, system and method for cryptographic key exchange
A method is disclosed whereby two parties can establish a cryptographic key for secure communications without any prior distribution of secret keys or other...
US-8,098,386 Image management system, image output apparatus, and computer readable medium for security enhancement
Disclosed herein is an image management system, including: an image output apparatus which outputs an image data to various types of media, and a server,...
US-8,098,147 System for monitoring the tire
This invention provides a tire monitoring system, comprising a remote tire monitoring unit installed in the tire, a central controller, a speech indicating unit...
US-8,097,804 Cable protection system
A cable protection system protects a cable, such as an insulated conductor, data line, fluid or gas conduit, power cord, communication line or the like. The...
US-8,096,466 Transaction recordal system
A system for recording a transaction relating to a security document, the security document having disposed thereon or therein coded data including a number of...
US-RE43,119 Password protected modular computer method and device
A method and device for securing a removable Attached Computer Module ("ACM") 10. ACM 10 inserts into a Computer Module Bay ("CMB") 40 within a peripheral...
US-8,095,986 Method for enabling a trusted dialog for collection of sensitive data
The present invention is a method for enabling a trusted dialog for collection of sensitive data, including the steps of: storing a personal security token...
US-8,095,984 Systems and methods of associating security vulnerabilities and assets
Systems and methods of associating security vulnerabilities and assets, and related Graphical User Interfaces (GUIs) and data structures, are disclosed. A...
US-8,095,983 Platform for analyzing the security of communication protocols and channels
A security analyzer tests the security of a device by attacking the device and observing the device's response. Attacking the device includes sending one or...
US-8,095,965 Secure authentication for authorization for transaction processing
A method and apparatus for authenticating and authorizing online transactions. An authentication cookie is transmitted to a client system. The authentication...
US-8,095,805 Security flash memory, data encryption device and method for accessing security flash memory
The present invention discloses a security flash memory which includes a flash memory chip with a plurality of data transmission terminals, and a data...
US-8,095,802 System and method for securely saving a program context to a shared memory
A system, method and program product for securely saving a program context to a shared memory is presented. A secured program running on an special purpose...
US-8,095,801 Method of protecting microcomputer system against manipulation of data stored in a memory assembly of the...
A method of protecting a microcomputer system against manipulation of data stored in a memory assembly of the microcomputer system is provided. The method may...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.