Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-7,944,929 Secure integrated mobile internet protocol transit case
A self-contained wireless internet protocol system includes a power supply converter for receiving input power of any type and converting the input power to a...
US-7,944,920 Data processing system using internet protocols and RDMA
Disclosed are systems employing an architecture that provides capabilities to transport and process Internet Protocol (IP) packets from Layer 2 through...
US-7,944,849 Transmission path quality measuring device, communication system, quality measurement method, and quality...
A communication quality measuring device includes: a quality measuring unit that measures the communication quality of a transmission path, based on data being...
US-7,944,692 Method and apparatus for installation and removal of overhead cooling equipment
Disclosed is a data center comprising a first row of equipment racks, a second row of equipment racks, a hot aisle defined by a space between the first row of...
US-7,944,649 Magnetically preloaded anti-rotation guide for a transducer
A transducer positioning apparatus is provided that supports a read/write head on a data storage machine and biases the head against rotation. The transducer...
US-7,944,469 System and method for using self-learning rules to enable adaptive security monitoring
Rules "learn" what is typical or expected for a certain attribute of device data for a given location, premises, time period, etc. Using a rule for a standard...
US-7,944,355 Security techniques in the RFID framework
The subject invention provides a system and/or a method that facilitates employing a security technique to an RFID network. An interface can receive role-based...
US-7,944,350 Method and system for providing tracking services to locate an asset
The present invention is directed to a method of asset location. Location data is received from a cellular transmitter associated with a selected asset, which...
US-7,942,679 Grounding terminal block assembly including conduit adapter for multiple services
A grounding terminal block assembly that includes a conduit adapter, a grounding bar, and a detachable cover. The conduit adapter enables attachment to a wall...
US-7,942,333 IC card secure personalization method
A method for an entity different than a manufacturer of an integrated circuit (IC) card to perform a secure personalization phase of the semi-finished IC card...
US-7,941,982 Integrated curtain wall and wireway distribution system
A curtain wall including an extruded aluminum sill having a first channel for receiving a glazed panel, a sill anchor/access portion for securing the sill to a...
US-7,941,851 Architecture for identifying electronic threat patterns
The invention is a comprehensive conceptual and computational architecture that enables monitoring accumulated time-oriented data using knowledge related to the...
US-7,941,841 Firewall-tolerant voice-over-internet-protocol (VoIP) emulating SSL or HTTP sessions embedding voice data in...
A voice-over-Internet-Protocol (VoIP) client codes audio data as printable ASCII characters, then embeds the ASCII audio data inside a cookie that is sent over...
US-7,941,840 Secure resource access
A method, computer readable media, and system for providing a first network resource with secure but limited access to a second network resource. A method...
US-7,941,830 Authentication protocol for network security services
In one embodiment, an authentication protocol used in a network security service is performed over non-secure connection, such as HTTP. A router subscribing to...
US-7,941,674 Apparatus and method for securing data on a portable storage device
A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of...
US-7,941,670 Data processing apparatus in which data is accessed in response to an access request from a plurality of access...
A data processing apparatus is provided which is capable of improving the responsiveness of communication in which only a maximum of one access request source...
US-7,941,668 Method and system for securely managing application transactions using cryptographic techniques
A method and system for secure managing transactions between application devices over a network. The present invention provides a method and system for...
US-7,941,623 Selective exposure of configuration identification data in virtual machines
In one embodiment, a computer system comprises a host machine comprising a plurality of compute resources, at least one secure memory location coupled to the...
US-7,941,579 Communication system for authenticating authority of host device for accessing storage medium set to periphery...
A search-instruction-data creating unit issues a search request command to a peripheral device, and creates search instruction data including a predetermined...
US-7,941,526 Transmission of syslog messages over a one-way data link
A special syslog daemon on a send node, wherein the send node is connected to a receive node by a one-way data link, the special syslog daemon configured to...
US-7,941,497 Community-based method and system for creating and subscribing to dynamic push channels
A system and method are provided for allowing a user to define and subscribe to channels of information to be pushed to a wireless device. In defining a channel...
US-7,941,412 Presenting evidentiary information
The invention concerns the presentation of evidentiary information on computer generated interfaces within secure user groups. For example presenting evidence a...
US-7,941,380 Electronic data vault providing biometrically protected electronic signatures
An eVault system securely stores personal data and documents for citizens and allows controlled access by citizens and optionally by service providers. The...
US-7,941,376 System and method for customer authentication of an item
A system, apparatus and method is provided for authentication of an item or a label by storing unique random serial numbers or codes in a remote secure storage...
US-7,941,360 Methods and systems for trade cost estimation
In one aspect, the invention comprises: (a) calculating an average bid-ask spread of securities; (b) calculating values associated with one or more markets; (c)...
US-7,940,968 Analysis, secure access to, and transmission of array images
Systems and methods are provided the autocentering, autofocusing, acquiring, decoding, aligning, analyzing and exchanging among various parties, images, where...
US-7,940,933 Secure telemetric link
A communications protocol is used to provide data privacy, message integrity, message freshness, and user authentication to telemetric traffic, such as to and...
US-7,940,932 Methods, apparatus, and systems for securing SIM (subscriber identity module) personalization and other data on...
An electronic circuit 120 includes a more-secure processor (600) having hardware based security (138) for storing data. A less-secure processor (200) eventually...
US-7,940,929 Method for processing documents containing restricted information
A method, system and computer program product for processing documents containing restricted information. The method for processing the documents includes the...
US-7,940,654 Protecting a network from unauthorized access
A method and apparatus of protecting a first network from unauthorized access includes storing profile information for each call session, and determining if an...
US-7,940,405 Image processing system for preventing forgery
Conventionally, it is impossible to securely and efficiently implement the judgment of specific images. In order to solve this task, an image processing...
US-7,940,302 Apparatus and method for privacy protection of data collection in pervasive environments
A security system which is nonintrusive of personal privacy of a person in a space comprises at least a first localization sensor subsystem, if any, in the...
US-7,940,184 Integrated circuit and method to secure a RFID tag
A method to secure RFID card information consisting of a piezo electric element coupled to a transistor which is coupled across the antenna leads of a RFID tag,...
US-7,939,791 Optical data pipe
An optical interconnect system having a first optical sub-system and a second optical sub-system, each optical sub-system having a first end and a second end,...
US-7,938,863 Method, apparatus, and system for securing data on a removable memory device
A method, apparatus, and system for securing data on a removable memory device, which is removably coupled to and accessible by a computing apparatus, are...
US-7,938,328 Secure magnetic stripe reader
Magnetic stripe readers are disclosed that are configured to extract information from magnetic media and encrypt part of the extracted information. Embodiments...
US-7,938,318 System and method for controlling secured transaction using directionally coded account identifiers
A control method and system provides coded access to a system by acquiring account identification data corresponding to a combination of a plurality of symbols....
US-7,937,761 Differential threat detection processing
Detecting a network security threat is disclosed. Network traffic is classified with a security risk related classification, the classification being determined...
US-7,937,757 Multi-domain architecture for process isolation with processor supporting multi-domain architecture
A trusted computer system that offers Linux.RTM. compatibility and supports contemporary hardware speeds. It is designed to require no porting of common...
US-7,937,754 Information processing apparatus, control method for the apparatus, and information processing system
Update firmware is stored as one binary file. The binary file includes firmware data necessary for operating a controller unit and root certificate data...
US-7,937,745 Voice-capable system and method for user-directed network interaction monitoring for authentication and...
A system and method for use with a voice-capable system, includes but is not limited to a method including receiving a request from a user computationally...
US-7,937,645 Semiconductor memory
A conversion control unit sets a converting function of a write data conversion unit or a read data conversion unit enabled or disabled for each controller....
US-7,937,596 Adaptable microcontroller based security monitor
A method is provided for protecting embedded cryptographic processing circuits (112, 114), software and data, contained within electronic equipment. The method...
US-7,937,592 Network communication security processor and data processing method
The invention provides a network communication security processor and its data processing method, the security processor comprising: a data communication...
US-7,937,590 Secure identification with biometric data
A secure method and device of identification by biometric data in which digital biometric data obtained by a sensor are combined with an identifier of an...
US-7,937,580 Communication mediating apparatus for mediating communication over network
A mediation server 200 mediates a print demand from a client device 100 to a printing device 300. In order to elude a firewall F/W set between the mediation...
US-7,937,562 Processing apparatus
A processing apparatus includes an execution stage which executes each of instruction streams, a first resource counter which counts the number of operating...
US-7,937,435 Identifying, storing, and retrieving context data for a network message
A system and method for storing context data in a network device that is in the data path between a user computer and a server, thereby allowing for the secure...
US-7,937,351 Support vector machine using iterative chunking and violators
An implementation of SVM functionality improves efficiency, time consumption, and data security, reduces the parameter tuning challenges presented to the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.