Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-7,937,596 Adaptable microcontroller based security monitor
A method is provided for protecting embedded cryptographic processing circuits (112, 114), software and data, contained within electronic equipment. The method...
US-7,937,592 Network communication security processor and data processing method
The invention provides a network communication security processor and its data processing method, the security processor comprising: a data communication...
US-7,937,590 Secure identification with biometric data
A secure method and device of identification by biometric data in which digital biometric data obtained by a sensor are combined with an identifier of an...
US-7,937,580 Communication mediating apparatus for mediating communication over network
A mediation server 200 mediates a print demand from a client device 100 to a printing device 300. In order to elude a firewall F/W set between the mediation...
US-7,937,562 Processing apparatus
A processing apparatus includes an execution stage which executes each of instruction streams, a first resource counter which counts the number of operating...
US-7,937,435 Identifying, storing, and retrieving context data for a network message
A system and method for storing context data in a network device that is in the data path between a user computer and a server, thereby allowing for the secure...
US-7,937,351 Support vector machine using iterative chunking and violators
An implementation of SVM functionality improves efficiency, time consumption, and data security, reduces the parameter tuning challenges presented to the...
US-7,937,327 Music content using apparatus
An apparatus is designed for using a music content composed of at least one content material in accordance with security information of the music content. In...
US-7,937,072 Mobile phone accessing system and related storage device
The present invention provides a mobile phone accessing system. The mobile phone accessing system comprises: a mobile phone having a first International Mobile...
US-7,936,897 Image forming apparatus
An image forming apparatus includes an image inputting section through which image information containing object information and secure object information is...
US-7,936,467 Data processing method suitable for system including image processing apparatus, system including image...
There is provided an image processing apparatus which is capable of maintaining high data security and provide high convenience and high security. When a print...
US-7,935,878 System, method and computer program for ensuring secure use of music playing data files
A system, apparatus, or method extracts a music playing data file from a given musical work resource such as an electronic music score data file, a printed...
US-7,934,993 Secure progressive controller
A method and system for configuring a progressive system that insures enhanced operative control and security of the progressive system. The progressive...
US-7,934,826 Recording medium processing apparatus
The apparatus has a carriage that holds a head, a carriage-driving mechanism having a motor, and a holding mechanism configured to press a recording medium to a...
US-7,934,251 Managed peer-to-peer applications, systems and methods for distributed data access and storage
Applications, systems and methods for securely and remotely operating a remote computer from a local computer over a network while providing seamless,...
US-7,934,216 Method and system for load balancing of computing resources
A load balancing method incorporates temporarily inactive machines as part of the resources capable of executing tasks during heavy process requests periods to...
US-7,934,099 Device and method for generating digital signatures
For the secure creation of digital signatures and/or for the secure authentication of users with a chip card, an apparatus is plugged into a computer and the...
US-7,934,094 Method, system and apparatus to support mobile IP version 6 services
For establishing a MIPv6 security association between the mobile node (10) roaming in a foreign network (20) and a home agent (36) and for simplifying...
US-7,934,090 System for securing inbound and outbound data packet flow in a computer network
A method provides for control of access to network resources. A virtual identity machine resides in the network and is pre-authorized to access certain network...
US-7,934,076 System and method for limiting exposure of hardware failure information for a secured execution environment
A method and apparatus for limiting the exposure of hardware failure information is described. In one embodiment, an error reporting system of a processor may...
US-7,934,049 Methods used in a secure yet flexible system architecture for secure devices with flash mass storage memory
A device with mass storage capability that uses a readily available non secure memory for the mass storage but has firmware (and hardware) that provides...
US-7,934,005 Subnet box
The invention provides an external in-line device ("Subnet Box") placed between a network and an access point to achieve secure Wi-Fi communications without...
US-7,933,990 Agile network protocol for secure communications with assured system availability
A plurality of computer nodes communicate using seemingly random Internet Protocol source and destination addresses. Data packets matching criteria defined by a...
US-7,933,971 Method for secure communication over a public data network via a terminal that is accessible to multiple users
There is described a method of communicating over a public data network, for example the Internet. A user of a public PC, for example one located in an Internet...
US-7,933,945 Method, system, and computer program product for managing controlled residential or non-residential environments
A control server, or similar central processor, manages the distribution of data (including audio and video), voice, and control signals among a plurality of...
US-7,933,840 Electronic signature security system
One embodiment of the invention enhances the security of electronic signatures during transmission. A peripheral device, which may be located remotely and...
US-7,933,611 Disabling operation of features on a handheld mobile communication device based upon location
Methods and devices for implementing subsystem or functional aspect restrictions on a wireless handheld communication device. Data defining geographical...
US-7,933,591 Security in a mobile communications system
When a mobile terminal (10), having a basic identity module (12) operative according to a first security standard, initiates a service access, the home network...
US-7,933,414 Secure data distribution
Data encrypted with a scrambling key Ks are transmitted from a service provider via a master device to a plurality of client devices having unique identifiers,...
US-7,933,031 Information processing apparatus and method for inhibiting printing of secure documents
Generation/non-generation of print data for a printer driver is controlled in correspondence with an external print policy for a document to be printed. The...
US-7,931,562 Mobile data logging systems and methods
We have disclosed a modular personal network (MPN) that includes multiple devices that may be worn, carried, or used in close proximity to a user. The devices...
US-7,931,199 Computerized card production equipment
An apparatus and method for manipulating images is disclosed. In one embodiment according to the invention, a method for manipulating images comprises:...
US-7,930,756 Multi-level cryptographic transformations for securing digital assets
Enhanced multi-level cryptographic transformations that secure electronic files are disclosed. The secured electronic files contain not only secured data but...
US-7,930,755 System and method for ensuring security of data stored on electronic computing devices
A system and method for using a host electronic computing device to prevent access to data in a preselected memory portion of an electronic computing device...
US-7,930,750 Method to trickle and repair resources scanned using anti-virus technologies on a security gateway
In one embodiment, a trickle and repair application receives data from a sending computer system and trickles the data to a target computer system over an...
US-7,930,746 Method and apparatus for detecting anomalous network activities
A method and apparatus for detecting an anomalous activity in a communications network is described. In one example, short-term event data is received from a...
US-7,930,745 Network security system and method
A network security system and method for reacting to unauthorized data access in an inner data system by combining a redirect system is described. The examples...
US-7,930,742 Multiple-level data processing system
Methods and systems for processing multiple levels of data in system security approaches are disclosed. In one embodiment, a first set and a second set of...
US-7,930,605 Electronic circuit comprising a test mode secured by insertion of decoy data in the test chain, associated method
An electronic circuit includes configurable cells each having a test input and an output. The configurable cells are connected to one another in a chain in a...
US-7,930,591 Method and apparatus for providing intelligent error messaging
A method and apparatus for providing intelligent error messaging is disclosed wherein a user of a mobile communications device is provided with descriptive...
US-7,930,543 Secure telemetric link
A communications protocol is used to provide data privacy, message integrity, message freshness, and user authentication to telemetric traffic, such as to and...
US-7,930,346 Security in peer to peer synchronization applications
The claimed subject matter provides a system and/or a method that facilitates synchronizing data within a data storage system. An interface component can...
US-7,930,289 Methods and systems for providing improved security when using a uniform resource locator (URL) or other...
Methods and systems for improving security when accessing a URL, such as a Web site. In one exemplary method, a user is warned if a previously unvisited Web...
US-7,930,256 Security system for and method of detecting and responding to cyber attacks on large network systems
An improved security system for and method of detecting and responding to cyber attacks on a network or network element. The system comprises: (a) an...
US-7,930,239 Automated actions based on restrictions
A technique for resolving a violation of an investment account restriction is provided. The restriction is associated with the holding of one or more securities...
US-7,930,048 Apparatus and method for controlling a wave field synthesis renderer means with audio objects
An apparatus for controlling a wave field synthesis renderer with audio objects includes a provider for providing a scene description, wherein the scene...
US-7,929,706 Encryption key restoring method, information processing apparatus, and encryption key restoring program
A disclosed encryption key restoring method enables restoration of an encryption key in the event of inability to use the encryption key stored in a secure...
US-7,929,697 Secure data transmission via multichannel entitlement management and control
A method for communicating data, such as audio/video (AV) data, over plural channels involves selecting data and encryption information, and encrypting the data...
US-7,929,695 Printing system and printer with electronic signature capability and method thereof
A printing system and printer with an electronic signature capability, and a method thereof are provided. To print security documents using an electronic...
US-7,929,560 Packet transmitting apparatus
A packet transmitting apparatus for transmitting a content protected with a content protection technique such as DTCP in the form of packets which are widely...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.