Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-7,934,090 System for securing inbound and outbound data packet flow in a computer network
A method provides for control of access to network resources. A virtual identity machine resides in the network and is pre-authorized to access certain network...
US-7,934,076 System and method for limiting exposure of hardware failure information for a secured execution environment
A method and apparatus for limiting the exposure of hardware failure information is described. In one embodiment, an error reporting system of a processor may...
US-7,934,049 Methods used in a secure yet flexible system architecture for secure devices with flash mass storage memory
A device with mass storage capability that uses a readily available non secure memory for the mass storage but has firmware (and hardware) that provides...
US-7,934,005 Subnet box
The invention provides an external in-line device ("Subnet Box") placed between a network and an access point to achieve secure Wi-Fi communications without...
US-7,933,990 Agile network protocol for secure communications with assured system availability
A plurality of computer nodes communicate using seemingly random Internet Protocol source and destination addresses. Data packets matching criteria defined by a...
US-7,933,971 Method for secure communication over a public data network via a terminal that is accessible to multiple users
There is described a method of communicating over a public data network, for example the Internet. A user of a public PC, for example one located in an Internet...
US-7,933,945 Method, system, and computer program product for managing controlled residential or non-residential environments
A control server, or similar central processor, manages the distribution of data (including audio and video), voice, and control signals among a plurality of...
US-7,933,840 Electronic signature security system
One embodiment of the invention enhances the security of electronic signatures during transmission. A peripheral device, which may be located remotely and...
US-7,933,611 Disabling operation of features on a handheld mobile communication device based upon location
Methods and devices for implementing subsystem or functional aspect restrictions on a wireless handheld communication device. Data defining geographical...
US-7,933,591 Security in a mobile communications system
When a mobile terminal (10), having a basic identity module (12) operative according to a first security standard, initiates a service access, the home network...
US-7,933,414 Secure data distribution
Data encrypted with a scrambling key Ks are transmitted from a service provider via a master device to a plurality of client devices having unique identifiers,...
US-7,933,031 Information processing apparatus and method for inhibiting printing of secure documents
Generation/non-generation of print data for a printer driver is controlled in correspondence with an external print policy for a document to be printed. The...
US-7,931,562 Mobile data logging systems and methods
We have disclosed a modular personal network (MPN) that includes multiple devices that may be worn, carried, or used in close proximity to a user. The devices...
US-7,931,199 Computerized card production equipment
An apparatus and method for manipulating images is disclosed. In one embodiment according to the invention, a method for manipulating images comprises:...
US-7,930,756 Multi-level cryptographic transformations for securing digital assets
Enhanced multi-level cryptographic transformations that secure electronic files are disclosed. The secured electronic files contain not only secured data but...
US-7,930,755 System and method for ensuring security of data stored on electronic computing devices
A system and method for using a host electronic computing device to prevent access to data in a preselected memory portion of an electronic computing device...
US-7,930,750 Method to trickle and repair resources scanned using anti-virus technologies on a security gateway
In one embodiment, a trickle and repair application receives data from a sending computer system and trickles the data to a target computer system over an...
US-7,930,746 Method and apparatus for detecting anomalous network activities
A method and apparatus for detecting an anomalous activity in a communications network is described. In one example, short-term event data is received from a...
US-7,930,745 Network security system and method
A network security system and method for reacting to unauthorized data access in an inner data system by combining a redirect system is described. The examples...
US-7,930,742 Multiple-level data processing system
Methods and systems for processing multiple levels of data in system security approaches are disclosed. In one embodiment, a first set and a second set of...
US-7,930,605 Electronic circuit comprising a test mode secured by insertion of decoy data in the test chain, associated method
An electronic circuit includes configurable cells each having a test input and an output. The configurable cells are connected to one another in a chain in a...
US-7,930,591 Method and apparatus for providing intelligent error messaging
A method and apparatus for providing intelligent error messaging is disclosed wherein a user of a mobile communications device is provided with descriptive...
US-7,930,543 Secure telemetric link
A communications protocol is used to provide data privacy, message integrity, message freshness, and user authentication to telemetric traffic, such as to and...
US-7,930,346 Security in peer to peer synchronization applications
The claimed subject matter provides a system and/or a method that facilitates synchronizing data within a data storage system. An interface component can...
US-7,930,289 Methods and systems for providing improved security when using a uniform resource locator (URL) or other...
Methods and systems for improving security when accessing a URL, such as a Web site. In one exemplary method, a user is warned if a previously unvisited Web...
US-7,930,256 Security system for and method of detecting and responding to cyber attacks on large network systems
An improved security system for and method of detecting and responding to cyber attacks on a network or network element. The system comprises: (a) an...
US-7,930,239 Automated actions based on restrictions
A technique for resolving a violation of an investment account restriction is provided. The restriction is associated with the holding of one or more securities...
US-7,930,048 Apparatus and method for controlling a wave field synthesis renderer means with audio objects
An apparatus for controlling a wave field synthesis renderer with audio objects includes a provider for providing a scene description, wherein the scene...
US-7,929,706 Encryption key restoring method, information processing apparatus, and encryption key restoring program
A disclosed encryption key restoring method enables restoration of an encryption key in the event of inability to use the encryption key stored in a secure...
US-7,929,697 Secure data transmission via multichannel entitlement management and control
A method for communicating data, such as audio/video (AV) data, over plural channels involves selecting data and encryption information, and encrypting the data...
US-7,929,695 Printing system and printer with electronic signature capability and method thereof
A printing system and printer with an electronic signature capability, and a method thereof are provided. To print security documents using an electronic...
US-7,929,560 Packet transmitting apparatus
A packet transmitting apparatus for transmitting a content protected with a content protection technique such as DTCP in the form of packets which are widely...
US-7,929,528 System and method to support networking functions for mobile hosts that access multiple networks
An IP-based corporate network architecture and method for providing seamless secure mobile networking across office WLAN, home WLAN, public WLAN, and 2.5 G/3 G...
US-7,929,500 Home base tranceiver station apparatus using packet network in a mobile communication system and method thereof
A system using a packet network in a mobile communication system is provided, in which a home BTS provides a mobile communication service to an MS using a...
US-7,929,255 Magnetic head inspection system, magnetic head inspection method and magnetic disk drive manufacturing method
Embodiments of the present invention provide a magnetic head inspection system having a simple configuration capable of inspecting magnetic heads. According to...
US-7,928,860 System and method for importing location information and policies as part of a rich presence environment
A system and method are described herein that includes a presence server which is capable of notifying a watcher about a location of a person using a rich...
US-7,926,114 Testing software applications with schema-based fuzzing
Systems and methods to test software applications with schema-based fuzzing are described. In one aspect, the systems and methods automatically generate valid...
US-7,926,109 Secure channel reservation
A beacon method for use in a wireless communication network involves populating a beacon frame's channel identification data with accurate data associated with...
US-7,926,107 Internet security news network
A system and method are disclosed for collecting, analyzing, verifying, producing, and broadcasting security data. Internet security-related information may be...
US-7,926,093 System and method for secure configuration of sensitive web services
The present invention discloses a system and method for configuration of access rights to sensitive information handled by a sensitive Web-Service. In a case of...
US-7,926,090 Separate secure networks over a non-secure network
Systems and methods for creating and operating separate secure networks over a non-secure network are described herein. Some illustrative embodiments include a...
US-7,926,083 Process and adaptive and progressive system for the secured distribution of fixed pictures coded in wavelets
A process for secured distribution of digital fixed pictures in the form of streams comprising sequences of data each containing a part of information of the...
US-7,925,898 Systems and methods using cryptography to protect secure computing environments
Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and...
US-7,925,815 Modifications to increase computer system security
Methods and systems for processing more securely. More specifically, embodiments provide effective and efficient mechanisms for reducing APIC interference with...
US-7,925,660 Method for visual structuring of multivariable data
A system for visual structuring of multivariable data sets includes a plurality of sensors for monitoring data and generating events depending on the...
US-7,925,621 Installing a solution
Tool(s) enabling installation of a solution are described. These tool(s) may follow appropriate security precautions to contain possibly dangerous code in a...
US-7,925,573 Computer program product for implementing investment company that issues a class of conventional shares and a...
A computer program product is provided for administering a single investment company. The computer program product has a computer-readable medium encoded with...
US-7,925,566 System and method for trading fixed income financial instruments
A system for automated trading of U.S. Treasury, Liquid Agency, and Zero Coupon STRIP financial instruments comprises an updatable system database; an updatable...
US-7,925,563 Table driven accounting method and system
The described embodiments of the invention include a method for maintaining accounting records for a portfolio of investments, comprising accounting records...
US-7,925,561 Methods and systems for risk management
In one aspect, the invention comprises acquiring background data regarding securities positions and regarding real-time pricing data; performing calculations...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.