Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,042,178 Alert message control of security mechanisms in data processing systems
An authenticated secure network communication link is established between an alert message generating computer 2 and a destination data processing system 6. The...
US-8,042,170 Bearer control of encrypted data flows in packet data communications
In a communication session in which data flows with encrypted data packets pass through a monitoring intermediary for data traffic control. The encrypted data...
US-8,042,157 System for restricting data access
A filter is arranged to selectively block or allow a data access command from an initiator according to whether the initiator is secure or insecure and whether...
US-8,042,149 Systems and methods for message threat management
The present invention is directed to systems and methods for detecting unsolicited and threatening communications and communicating threat information related...
US-8,042,147 Network security appliance
A network security appliance that provides security to devices in industrial environments by transparently bridging traffic to the endpoint device. The security...
US-8,042,064 System and method for delivering virtual tour content using the hyper-text transfer protocol (HTTP)
A system and method for delivering Virtual Reality (VR) tour content and spatial navigation comprising the hyper-text transfer protocol (HTTP) through a dynamic...
US-8,042,023 Memory system with cyclic redundancy check
A memory system, with a memory controller and a memory module, is configured to transfer error securing data and address signals within signal frames between...
US-8,041,946 Data transfer between networks operating at different security levels
A secure network server wherein both the forwarding process and the receiving process are created upon connection initialization, and the receiving process is...
US-8,041,941 Method and apparatus for compression of data on storage units using devices inside a storage area network fabric
The capability to encrypt or compress the traffic over network links, thus improving the security of the link on the performance of the links, and the...
US-8,041,930 Data processing apparatus and method for controlling thread access of register sets when selectively operating...
The data processing apparatus has processing logic for performing data processing operations and a register bank for storing data associated with the processing...
US-8,041,913 Data protection method
A data protection method for an electronic device having a storage medium is provided, wherein the storage medium includes a plurality of partitions and a...
US-8,041,912 Memory devices with data protection
A memory device comprises a memory array, a status register coupled with the memory array, and a security register coupled with the memory array and the status...
US-8,041,848 Media processing method and device
A media processing system and device with improved power usage characteristics, improved audio functionality and improved media security is provided....
US-8,041,788 Systems and methods for development of secure shell devices
A shell device with minimal software and/or hardware resources can download from a server configuration information and/or user data in order to allow the shell...
US-8,041,761 Virtual filer and IP space based IT configuration transitioning framework
A system and method enables gradual transitioning of a server, such as a filer, to a new security domain and/or IP address scheme. A single physical platform...
US-8,041,749 Systems and methods of managing specification, enforcement, or auditing of electronic health information access...
Methods and apparatus, including computer program products, related to managing specification, enforcement, or auditing of electronic health information use. In...
US-8,041,677 Method and system for data backup
Embodiments of the present invention are directed to Web-Services-based data backup and data-archiving applications that provide remote data backup and data...
US-8,041,645 Document security utilizing color gradients
The present invention includes apparatus and methods for printing and verifying postage stamps on demand via a personal postage stamp printer. The indicium by...
US-8,041,644 Cryptographic module for secure processing of value-bearing items
An on-line value bearing item (VBI) printing system that includes one or more cryptographic modules and a central database is disclosed. The cryptographic...
US-8,041,628 Method for directing and executing certified trading interests
Preferred embodiments of the subject invention comprise: (a) electronically receiving securities order-related data regarding a set of securities market...
US-8,041,581 System and method for collecting, processing, and storing discrete data records based upon a single data input
According to the present invention, there is provided a system and method for the collection, capture, processing, storage, and tracking of data for both...
US-8,041,528 Arrangement for calibrating a vector network analyzer
An arrangement for calibrating a vector network analyzer (VNA) is substantially secure against operating errors and offers cost-effective calibration by...
US-8,041,435 Modular object dynamic hosting
An object can be used in an industrial control configuration in relation to performing a function or task. Matching can occur such that an object with...
US-8,041,339 Method for secure authentication of mobile devices
A method for authenticating a mobile device is provided. The method includes receiving a communication request from the mobile device. The mobile device is...
US-8,041,338 Mobile wallet and digital payment
The claimed subject matter provides a system and/or a method that facilitates securing a wireless digital transaction. A terminal component can receive a...
US-8,041,127 Method and system for obscuring and securing financial data in an online banking application
One embodiment of the present invention provides a system that obscures critical information communicated over a network. During operation, the system receives...
US-8,040,638 Self-fixturing pivoting actuator
A rotary actuator arm assembly for positioning a transducer over a data track of at least one rotating magnetic disk. The actuator includes self contained...
US-8,040,231 Method for processing alarm data to generate security reports
A system and method are provided that allow analysis of alarm data to generate security reports. A security report system may include a monitoring tool and a...
US-8,037,542 Team based row level security system and method
A team based row level security system and method are provided that permits items of data to be shared across a team.
US-8,037,537 System, method, and computer program product for conditionally securing data stored on a peripheral device...
A system, method, and computer program product are provided for conditionally securing data stored on a peripheral device coupled to a system, based on a state...
US-8,037,532 Application protection from malicious network traffic
A program, method and system for embedding a programmable packet filter into an application to protect the application against malicious network packets are...
US-8,037,530 Method and apparatus for providing adaptive self-synchronized dynamic address translation as an intrusion...
A translator is provided for translating predetermined portions of packet header information including an address of a data packet according to a cipher...
US-8,037,321 Method and apparatus for the secure storage of audio signals
In one embodiment, a method, system and apparatus for recording audio is provided so that the recording can be authenticated. The system may be implemented as a...
US-8,037,319 System and method for securely storing cryptographic keys with encrypted data
The payload of a set of storage devices is encrypted using a payload key that is stored within the set of storage devices itself. However, the payload key is...
US-8,037,304 System and method for lost data destruction of electronic data stored on portable electronic devices
A data security system and method protects stored data from unauthorized access. According to one aspect of the invention, a client computing device...
US-8,037,303 System and method for providing secure multicasting across virtual private networks
A method is provided for securely transmitting multicast data across an unsecured public network. Such a method includes receiving a join message identifying at...
US-8,037,295 Hardware-bonded credential manager method and system
An internet data exchange authentication method that can provide much of the user authentication assurance and capability of dedicated computer security...
US-8,037,290 Preboot security data update
Providing computer security is disclosed. A computing system is booted into a pre operating system environment. The pre operating system environment is used to...
US-8,037,282 Register having security function and computer system including the same
A register having a security function is provided. The register includes: a write security unit and a storage unit. The write security unit outputs a first...
US-8,037,178 System and method for providing secure access to a remote desktop across firewalls in an interactive grid...
A system and method for secure access to a remote desktop across firewalls in an interactive grid environment is disclosed. Embodiments of the present invention...
US-8,037,149 System and method for processing messages being composed by a user
A system and method for processing messages being composed by a user of a computing device (e.g. a mobile device). Embodiments are described in which the...
US-8,037,123 Securely and efficiently extending data processing pipeline functionality
The present invention extends to methods, systems, and computer program products for securely and efficiently extending data processing pipeline functionality....
US-8,037,045 Computer system and file storage/read-out method
When storing data (D1), spread on a memory (10), into a file storage unit (50), a user .alpha. assigns a meaningful filename-for-user, such as "sales book for...
US-8,036,988 System and method for performing secure credit card transactions
A method and system of performing secure credit card purchases in the context of a remote commercial transaction, such as over the telephone, wherein only the...
US-8,036,956 Secure, differentiated reading of sensors and RFID tags
Secure access to inventory data concerning a supplier's product located at a seller's premises is provided by tagging units of product with a supplier...
US-8,036,769 Method and device for compensating for positional and shape deviations
A method for compensating positional and/or shape deviations in NC-controlled cutting production machines. The method including the steps of securing a new...
US-8,036,638 Mobile banking
Systems and methods are disclosed for identifying circumstances where end-to-end security is not available to a mobile banking customer. The user may be...
US-8,036,386 System and method for providing electronic ticket, and electronic ticket vending apparatus and mobile telephone...
An electronic ticket providing system capable of distributing and browsing the information relating to a ticket can be realized while maintaining the security...
US-8,036,383 Method and apparatus for secure communication between cryptographic systems using real time clock
Provided are a method and apparatus for secure communication between cryptographic systems using a Real Time Clock (RTC). The method and apparatus allow a...
US-8,035,864 Image processing apparatus
Depending on processing to be executed, the processing is prevented from being restricted even if a particular image is included in image data. There is...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.