Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-7,962,757 Secure coordinate identification method, system and program
A method, program and system (10) for processing data are disclosed. The method, program and system comprising the steps of: (a) receiving data representing a...
US-7,962,755 System and method for biometrically secured, transparent encryption and decryption
A computer program for enabling biometrically secured, transparent encryption and decryption provides a user interface that allows a user to drag and drop files...
US-7,962,753 Method and a circuit for SHA operation with power saved
A Secure Hash Algorithm (SHA) operation circuit includes plural storages for storing the variables of the SHA calculation, a permutation section for permuting...
US-7,962,741 Systems and methods for processing packets for encryption and decryption
A network device for processing data packets includes an encryption services module, a number of network interfaces and a forwarding module. A network interface...
US-7,962,713 Memory device having secure non-volatile locking functionality
A device and method is provided for maintaining, upon unlocking of a memory, the lock status of the memory prior to the memory being unlocked and recreating the...
US-7,962,571 Method and system for collecting information from computer systems based on a trusted relationship
A method and system for retrieving data from devices in a way that seeks to preserve privacy and ensure the integrity of the retrieved data is provided. A...
US-7,962,544 Patient and device location dependent healthcare information processing system
A system automatically establishes context information (e.g., determining changes to user interface workflows, screens, menus, and access requirements for...
US-7,962,492 Data management apparatus, data management method, data processing method, and program
Data management security against leakage or loss of personal information is achieved by setting a division range for dividing personal information into...
US-7,962,423 Method and system for dispensing virtual stamps
A method and system for a virtual stamp dispensing metering system is provided wherein indicia of varying values are calculated at a data center and downloaded...
US-7,962,398 Method and system for executing trades in a user preferred security
A system for executing trades in a user preferred security comprising a server system (12) in communication with a client system (14), a security data source...
US-7,962,304 Device for thorough testing of secure electronic components
An apparatus including a test circuit, an output circuit and a control circuit. The test circuit may be configured to generate test data in response to one or...
US-7,962,122 Secure traffic redirection in a mobile communication system
A method of securely initializing subscriber and security data in a mobile routing system when the subscribers are also subscribers of a radio communication...
US-7,961,935 Method for forming and distributing a composite file including a dental image and associated diagnosis
A method of providing dental-related imaging data of a patient to a dental practitioner is provided, the dental-related imaging data being obtained by a third...
US-7,961,874 XZ-elliptic curve cryptography with secret key embedding
Secure communications over an insecure channel is provided using symmetric key elliptic curve cryptography. More specifically, a shared secret key and/or data...
US-7,961,722 Multiple virtualized operating environments within a VPN appliance
A secure socket layer virtual private network (SSL VPN) network appliance includes a set of virtual systems having respective context information. Each of the...
US-7,961,715 Technique for reserving resources for authorized entities in a communication network
A technique for reserving resources in a communication network for an entity. Communication units in the network register with policy data points (PDPs) to...
US-7,961,674 Multi-tier wireless home mesh network with a secure network discovery protocol
An apparatus and method for a multi-tier wireless home mesh network is described. The method may include formation of an infrastructure-less wireless home mesh...
US-7,961,108 Identification band
Updateable, customizable identification bands are disclosed herein. The identification band may include a band having an opening therein and at least one...
US-7,961,091 Method for synchronizing frequency-hopping short-range radio devices
A method for synchronizing a security system control panel and a sensor. The control panel and the sensor each have a transceiver. The control panel monitors a...
US-7,959,076 Secure card
Systems and methods for monetary cards are described. The cards are free from personally identifiable data, e.g., no name or embossment. In an example, the card...
US-7,959,073 Method and system for random data access for security applications
A method for securely handling processing of information in a chip may include randomly selecting one of a plurality of data processes based on a random process...
US-7,959,070 Banking system operated responsive to data bearing records
A system for use in banking operates responsive to data in data bearing records. The system is suitable for securing the contents in safety deposit boxes or...
US-7,958,558 Computational system including mechanisms for tracking propagation of information with aging
Mechanisms have been developed for securing computational systems against certain forms of attack. In particular, it has been discovered that, by maintaining...
US-7,958,554 Secure method and system for computer protection
Attacks by computer viruses, worm programs, and other hostile software (`malware`), have become very serious problems for computer systems connected to large...
US-7,958,550 Method and system for secure communication
A method and system for secure communication is presented. A virtual private proxy is generated based on an agreement between a first entity and a second...
US-7,958,521 Optical disc drive with latching mechanism that facilitates driving mechanism replacement
There is provided an optical disc drive designed for reading data stored in an optical disc. The optical disc drive includes a body, a driving module, a body...
US-7,958,414 Enhancing security of internal memory
An embodiment of a method of enhancing security of internal memory is disclosed. For this embodiment of the method, the application specific block is operated...
US-7,958,356 System and method for establishing a shared secret among nodes of a security appliance
A system and method securely establishes a shared secret among nodes of a security appliance. The shared secret is established by distributing private keys...
US-7,958,351 Method and apparatus for multi-level security implementation
A method of operating a multi-level security system including the steps of providing a plurality of processors. At least some of said processors are equipped...
US-7,958,350 Proactive forced renewal of content protection implementations
A system for proactive forced renewal of content protection implementations in devices includes a key generation facility to generate and allocate keys for the...
US-7,958,348 Method for securing an electronic certificate
A method is for securing and verifying an electronic certificate issued by an authority to an owner. The certificate is stored in the memory of a user unit...
US-7,958,320 Protected cache architecture and secure programming paradigm to protect applications
Embodiments of the present invention provide a secure programming paradigm, and a protected cache that enable a processor to handle secret/private information...
US-7,958,296 System management and advanced programmable interrupt controller
Methods for processing more securely are disclosed. Embodiments provide effective and efficient mechanisms for reducing APIC interference with accesses to...
US-7,958,268 Data security system and method adjunct to a browser, telecom or encryption program
Data security for processing data or securing browser-input data operates on security sensitive content which is extracted, then either encrypted or stored in...
US-7,958,250 System and method for multi-level guided node and topology discovery
Systems and methods for user-guided iterative node discovery and topology discovery in a network of nodes involved in secure and reliable data transfer.
US-7,958,206 Controlling access rights to network resources based on a hierarchical arrangement of security sets
Mechanisms for securing access to network resources are described. The mechanisms may perform operations for securing access to a network element and which can...
US-7,958,144 System and method for secure reciprocal exchange of data
A system for transmission of data between a first device operated by a first user and a second device includes a database that receives a first set of data...
US-7,958,102 Method and apparatus for searching a storage system for confidential data
Method and apparatus for searching a storage system for confidential data is described. One aspect of the invention relates to searching a computer for...
US-7,958,038 Methods and systems for providing an anti-benchmark portfolio
In one aspect, the invention comprises a method comprising: (a) acquiring data regarding a first group of securities in a first portfolio; (b) based on said...
US-7,957,975 Voice controlled wireless communication device system
A wireless communication device is disclosed that accepts recorded audio data from an end-user. The audio data can be in the form of a command requesting user...
US-7,957,851 System and method for utilization of transmitted digital flight data acquisition information to accomplish...
A system and method is provided for monitoring, collecting, storing, transmitting, calculating and uploading to a secure web server real-time balancing...
US-7,957,534 System and method for security association between communication devices within a wireless home network
Embodiments of the application describe a method and system for discovering and authenticating communication devices and establishing a secure communication...
US-7,957,528 Near field registration of home system audio-video device
A near field communication (NFC) sticker which stores a key is attached to a new client device. A remote commander in a home network reads the key using a NFC...
US-7,957,527 Cryptographic processing apparatus
An apparatus and a method for performing a hyperelliptic curve cryptography process at a high speed in a highly secure manner are provided. A base point D is...
US-7,957,363 System, method, and service for dynamically selecting an optimum message pathway
A message pathway selection system dynamically selects an optimum message pathway for transmitting messages. The system dynamically optimizes a message pathway...
US-7,957,320 Method for changing a group key in a group of network elements in a network system
The invention relates to a method for changing a group key GK for a secure data exchange in a group of network elements P.sub.1 . . . P.sub.n (n=2, 3, . . . )...
US-7,955,258 External data processing device to interface with an ambulatory repeater and method thereof
An external data processing device to interface with an ambulatory repeater and method thereof is presented. An external data processing device is interfaced in...
US-7,954,725 Secure payment card with static and variable data
In a first aspect of the subject invention, a secure payment card is provided, including: a flat body, the flat body having a patterned channel in proximity to...
US-7,954,703 Banking system controlled responsive to data bearing records
A banking system operates to cause financial transfers responsive to card data read from data bearing records by a card reader. The system includes at least one...
US-7,954,160 Computer security intrusion detection system for remote, on-demand users
An intrusion detection system, and a related method and computer program product, for implementing intrusion detection in a remote, on-demand computing service...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.