Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,037,321 Method and apparatus for the secure storage of audio signals
In one embodiment, a method, system and apparatus for recording audio is provided so that the recording can be authenticated. The system may be implemented as a...
US-8,037,319 System and method for securely storing cryptographic keys with encrypted data
The payload of a set of storage devices is encrypted using a payload key that is stored within the set of storage devices itself. However, the payload key is...
US-8,037,304 System and method for lost data destruction of electronic data stored on portable electronic devices
A data security system and method protects stored data from unauthorized access. According to one aspect of the invention, a client computing device...
US-8,037,303 System and method for providing secure multicasting across virtual private networks
A method is provided for securely transmitting multicast data across an unsecured public network. Such a method includes receiving a join message identifying at...
US-8,037,295 Hardware-bonded credential manager method and system
An internet data exchange authentication method that can provide much of the user authentication assurance and capability of dedicated computer security...
US-8,037,290 Preboot security data update
Providing computer security is disclosed. A computing system is booted into a pre operating system environment. The pre operating system environment is used to...
US-8,037,282 Register having security function and computer system including the same
A register having a security function is provided. The register includes: a write security unit and a storage unit. The write security unit outputs a first...
US-8,037,178 System and method for providing secure access to a remote desktop across firewalls in an interactive grid...
A system and method for secure access to a remote desktop across firewalls in an interactive grid environment is disclosed. Embodiments of the present invention...
US-8,037,149 System and method for processing messages being composed by a user
A system and method for processing messages being composed by a user of a computing device (e.g. a mobile device). Embodiments are described in which the...
US-8,037,123 Securely and efficiently extending data processing pipeline functionality
The present invention extends to methods, systems, and computer program products for securely and efficiently extending data processing pipeline functionality....
US-8,037,045 Computer system and file storage/read-out method
When storing data (D1), spread on a memory (10), into a file storage unit (50), a user .alpha. assigns a meaningful filename-for-user, such as "sales book for...
US-8,036,988 System and method for performing secure credit card transactions
A method and system of performing secure credit card purchases in the context of a remote commercial transaction, such as over the telephone, wherein only the...
US-8,036,956 Secure, differentiated reading of sensors and RFID tags
Secure access to inventory data concerning a supplier's product located at a seller's premises is provided by tagging units of product with a supplier...
US-8,036,769 Method and device for compensating for positional and shape deviations
A method for compensating positional and/or shape deviations in NC-controlled cutting production machines. The method including the steps of securing a new...
US-8,036,638 Mobile banking
Systems and methods are disclosed for identifying circumstances where end-to-end security is not available to a mobile banking customer. The user may be...
US-8,036,386 System and method for providing electronic ticket, and electronic ticket vending apparatus and mobile telephone...
An electronic ticket providing system capable of distributing and browsing the information relating to a ticket can be realized while maintaining the security...
US-8,036,383 Method and apparatus for secure communication between cryptographic systems using real time clock
Provided are a method and apparatus for secure communication between cryptographic systems using a Real Time Clock (RTC). The method and apparatus allow a...
US-8,035,864 Image processing apparatus
Depending on processing to be executed, the processing is prevented from being restricted even if a particular image is included in image data. There is...
US-8,033,459 System and method for secure electronic data delivery
Electronic data is securely delivered from an issuer to a recipient, in the form of an encrypted object. Data belonging to the issuer to be delivered is first...
US-8,032,939 Method and system for providing wireless vulnerability management for local area computer networks
A Software-as-a-Service (SaaS) based method for providing wireless vulnerability management for local area computer networks. The method includes providing a...
US-8,032,934 Network security system and the method thereof
The present invention discloses a network security system including a firewall arranged between the internal network and the external network, and a trusted...
US-8,032,927 Verification engine for user authentication
Computer-implemented system and methods for authenticating the identity of a person, for example a customer (1) of an E-Commerce web site (15). The web site or...
US-8,032,765 Secure database access through partial encryption
The present invention generally is directed to systems, methods, and articles of manufacture for securing sensitive information involved in database...
US-8,032,761 Method and system for memory attack protection to achieve a secure interface
Aspects of a method and system for memory attack protection to achieve a secure interface are provided. An integrated memory within a slave device may be...
US-8,032,744 Method and apparatus for self-authenticating digital records
A method for proving the validity of a digital document digitally signed using a digital key that corresponds to a digital certificate in a chain of digital...
US-8,032,630 Method and apparatus for comprehensive network management system
In a system for managing data, voice, application and video networks and associated systems and services that comprise multiple, interconnected network...
US-8,032,569 Information management system, display system, management apparatus and program
Only the display device stores content files and a management device stores file management information. The content files are managed using the file management...
US-8,032,435 Secure transmission of money transfers
The invention relates to a method and a device for enabling a validated money transfer between a sending and a receiving person via a sending and a receiving...
US-8,032,181 Service provider activation with subscriber identity module policy
Systems and methods for activating a mobile device for use with a service provider are described. In one exemplary method, a mobile device having a currently...
US-8,032,084 Data security device
A portable data storage device is described, which includes a short range wireless communication interface. The device is configured to communicate with a...
US-8,031,903 Networked security system
The application discloses a system and methods for remote access and analysis of data collected about items under inspection. The system includes one or more...
US-8,031,875 Key distribution in unidirectional channels with applications to RFID
A technique for securing information involves encrypting raw data into encrypted data based on an initial key. The technique further involves generating a set...
US-8,031,865 Multiple level security system and method for encrypting data within documents
A multiple level security system and method for encrypting data within documents is disclosed. The method includes one or more different encryption algorithms,...
US-8,031,672 System and method for providing secure mobility and internet protocol security related services to a mobile...
A method for connection roaming a Mobile Node (MN) to a Network GateWay (NGW) for providing secure data path using Internet Protocol (IP) security procedure....
US-8,031,471 Secure transparent enclosure for communication device
An enclosure comprises first and second sections formed of a transparent material, a plurality of wall sections, a plurality of vent holes, a hinge, a cable...
US-8,031,349 Approach for securely printing electronic documents
An approach is provided for securely printing electronic documents using a portable media. The approach is applicable to a wide variety of contexts and...
US-8,031,348 Approach for securely printing electronic documents
An approach is provided for securely printing electronic documents using a portable media. The approach is applicable to a wide variety of contexts and...
US-8,031,049 Method of communicating a command for load shedding of a load control system
The present invention provides a means for secure communication between an electrical utility company and an electricity customer, such that the customer is...
US-8,030,969 Semiconductor integrated circuit
In a dynamic flip-flop circuit with a data selection function, for example, when data having an H value has been selected using a selection signal S0, a first...
US-8,029,443 Glucose measuring device integrated into a holster for a personal area network device
A glucose meter module integrated into a holster device that can securely accommodate another device such as a portable server device or an insulin pump is...
US-8,028,908 Systems and methods for the secure control of data within heterogeneous systems and networks
A system and method for managing data rights is disclosed. A label associated with a data object is received and one or more predefined rules for the conversion...
US-8,028,903 System and method of pre-approving card holders for expedited security processing using emerging countries...
The present disclosure relates generally to a system and method, and more particularly to a system and method of pre-approving card holders for expedited...
US-RE42,814 Password protected modular computer method and device
A method and device for securing a removable Attached Computer Module ("ACM") 10. ACM 10 inserts into a Computer Module Bay ("CMB") 40 within a peripheral...
US-8,028,341 Providing extended memory protection
In one embodiment, the present invention provides for extended memory protection for memory of a system. The embodiment includes a method for associating a...
US-8,028,334 Automated generation of configuration elements of an information technology system
A firewall rule generation method, a load balancing rule generation method, and a wrapper generation method, for an Information Technology (IT) system,...
US-8,028,172 Systems and methods for updating a secure boot process on a computer with a hardware security module
Systems and methods are provided for maintaining and updating a secure boot process on a computer with a trusted platform module (TPM). A boot process may be...
US-8,028,164 Practical and secure storage encryption
The present invention relates to an electronic device (301) in which acceleration of data processing operations is provided, the device comprising a secure...
US-8,028,159 Security protocols for hybrid peer-to-peer file sharing networks
In a hybrid peer-to-peer file sharing network including a receiver peer and a provider peer, the receiver sends the provider a ticket [710] obtained from a...
US-8,028,157 On-chip security method and apparatus
A boot method an apparatus are described which reduce the likelihood of a security breach in a mobile device, preferably in a situation where a reset has been...
US-8,028,146 Management of temporary and permanent areas in nonvolatile memories of a storage system
The temporary area capacity required to be secured with respect to the whole permanent area is calculated in accordance with the capacity and access frequency...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.