Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-7,900,063 Apparatus and method for securing data on a portable storage device
A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of...
US-7,900,060 Method and system for securing a disk key
In accordance with an embodiment of the present invention, a trusted client includes a non-volatile memory programmed with an encrypted disk key. The encrypted...
US-7,900,051 Secure multimedia data transmission method
A secure method and system of digital data transmission between a sender and a receiver, including a phase of receiver authentication by a symmetrical...
US-7,900,044 Enterprise computer investigation system
A method, apparatus and system for secure forensic investigation of a target machine by a client machine over a communications network. In one aspect the method...
US-7,900,043 Hard disk security method in a computer system
This invention presented a hard disk security method in a computer system, which provides a hard disk security mechanism combining with the power-on password...
US-7,900,042 Encrypted packet inspection
A method, system, and device for encrypted packet inspection allowing an authorized third party device to monitor cryptographic handshaking information (full-...
US-7,900,032 Method and system for NAND flash support in autonomously loaded secure reprogrammable system
Segmenting a boot code to allow separate and independent storage and validation of the segments in a manner that enable secure system boot by autonomous fetching...
US-7,900,012 Secure storage apparatus and method for controlling the same
The present invention discloses a storage apparatus in communication with one or more external systems, including at least one storage region, at least one...
US-7,900,001 System and method for obscuring hand-held device data traffic information
Increasing security for a hand-held data processing device with communication functionality where such a device includes an access-ordered memory cache relating...
US-7,899,901 Method and apparatus for exercising and debugging correlations for network security system
A selected time interval of previously stored security events generated by a number of computer network devices are replayed and cross-correlated according to...
US-7,899,882 System and method for providing remote forensics capability
A system and method for performing a forensic analysis of a subject computer having a non-volatile memory with a second computer is provided. In one embodiment,...
US-7,899,849 Distributed security provisioning
Systems, methods and apparatus for a distributed security that provides security processing external to a network edge. The system can include many distributed...
US-7,899,782 Security system for synchronization of desktop and mobile device data
A system, method and computer program product for a system, method and computer program product for controlling synchronization between a stationary computer and...
US-7,899,779 Security system for synchronization of desktop and mobile device data
A system, method and computer program product for a system, method and computer program product for controlling synchronization between a stationary computer and...
US-7,899,662 Data backup system including a data protection component
A data backup system is provided for backing up data files from a data source and for securing those data files against accidental modification or deletion. The...
US-7,899,440 Apparatus for securely transmitting/receiving contents in mobile communication network and method thereof
A mobile terminal including a transceiver configured to transmit and receive signals to and from another mobile terminal, a security parameter module configured...
US-7,899,306 Security system
A media data security system for rendering a secure media data file, having associated authentication data, for output comprises a data preparation unit operable...
US-7,899,189 Apparatus, system, and method for transparent end-to-end security of storage data in a client-server environment
The present invention includes one or more clients in communication with a server. The client desires to send a storage construct to the server for storage. The...
US-7,899,184 Ends-messaging protocol that recovers and has backward security
The presented messaging protocol uses three new public keys in a signed and encrypted message to achieve backward security and recovery in an environment where...
US-7,898,318 Data output clock signal generating apparatus and semiconductor integrated circuit with the same
A data clock control apparatus includes a bias voltage generator configured to receive a plurality of test mode signals and a plurality of fuse signals and to...
US-7,898,090 General purpose ball grid array security cap
A general purpose BGA security cap includes a substrate, an integrated circuit die, and an array of bond balls. The substrate includes an anti-tamper security...
US-7,896,247 Secure use of externally stored data
A smart card reader is adapted to extract and store authentication data from a response APDU received from a smart card before generating a filtered response...
US-7,896,238 Secured transaction using color coded account identifiers
A method and system provides coded access to a transactional or other type of system by acquiring account identification data corresponding to a combination of a...
US-7,895,663 Security system for communicating data between a mobile handset and a management server
A security system for communicating data between a mobile handset and a management server facilitates secure communication of data/code between a mobile handset...
US-7,895,662 Systems and methods for the remote deletion of pre-flagged data
Disclosed herein is a method for the secure deletion of data stored within a data processing system. The method includes the steps of executing a flag routine,...
US-7,895,650 File system based risk profile transfer
File system based risk profile transfer is disclosed. A request to access an object stored in memory is received from a requesting service, application, or other...
US-7,895,648 Reliably continuing a secure connection when the address of a machine at one end of the connection changes
An end machine (connected to one end of secure connection) may reliably continue to use the security association (SA) even if the self_address (usually the...
US-7,895,643 Secure logic interlocking
This invention discloses a method and system for processing logic modules, each having a separate functionality, into a unique functionality that is to be...
US-7,895,641 Method and system for dynamic network intrusion monitoring, detection and response
A probe attached to a customer's network collects status data and other audit information from monitored components of the network, looking for footprints or...
US-7,895,446 Secure data exchange between data processing systems
A data transfer method performed at a proxy server includes intercepting a data request from a client computer that is directed to a target server, encrypting...
US-7,895,440 Method of encrypting digital data, a method of masking a biometric print, and application to making a security...
The invention relates to a method of masking a plain datum b having n bits. The inventive method is characterised in that a masked datum m is produced using the...
US-7,895,434 Method and system for multiple asymmetric encryption of .ZIP files
The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data...
US-7,895,406 Memory device and password storing method thereof
To provide a memory device and a password storing method thereof, according to which an improved security function is realized by resourcefully designing the...
US-7,895,403 Secure deletion of information from hard disk drive
A method of securely deleting data from a storage medium includes generating a bitmap that corresponds to unused locations on the storage medium; initiating a...
US-7,895,144 Risk assessment in a pre/post security area within an airport
A risk assessment method and system. The method includes receiving by an inference engine, first sensor cohort data associated with a first cohort located within...
US-7,895,143 Risk assessment in an area external to an airport
A risk assessment method and system. The method includes receiving by an inference engine, first sensor cohort data associated with a first cohort located within...
US-7,894,945 Operation ready transportable data center in a shipping container
A movable data center is disclosed that comprises a portable container in which an operable computer system is assembled. A data link, power supply link and...
US-7,894,608 Secure approach to send data from one system to another
A secure approach for sending a original message from a sender to a receiver. The sender may encrypt the original message by performing an XOR (or XNOR)...
US-7,894,599 Enhanced data security with redundant inclusive data encryption segments
A computerized method, program product, and a service to protect critical data by first splitting the data into N streams. A partitioning algorithm is applied to...
US-7,894,480 Computer system and network interface with hardware based rule checking for embedded firewall
A data processing system adapted for high-speed network communications, a method for managing a network interface and a network interface for such system, are...
US-7,894,420 Fast path packet destination mechanism for network mobility via secure PKI channel
Disclosed is a method for reducing routing overheads during data transmission to a destination mobile router of a plurality of mobile routers roaming in a...
US-7,894,153 Secure data disposal for disk drive
When a disk sector is written to, a bit for the sector is set indicating that the sector will require secure data disposal (SDD) to be run on it. To save time...
US-7,891,563 Secure payment card transactions
Payment card transactions at a point of sale (POS) are secured in certain embodiments by intercepting, with a POS security layer installed on a POS terminal,...
US-RE42,163 Data management system
The present invention provides a system to ensure security of data in a computer network system. A center certifies a public-key of user of the system and...
US-7,891,004 Method for vehicle internetworks
Vehicle internetworks provide for communications among diverse electronic devices within a vehicle, and for communications among these devices and networks...
US-7,891,003 Enterprise threat modeling
A threat modeling application generates threats to a business application. The threat modeling application receives user input associated with business...
US-7,891,001 Methods and apparatus providing security within a network
An in-network security provider applies security event identification, analysis and processing to a customer's data communications traffic in the form of a...
US-7,891,000 Methods and apparatus for monitoring and reporting network activity of applications on a group of host computers
A security management system provides rules for monitoring network activity of applications to groups of host, computers, specifically activity indicating that...
US-7,890,995 System and method for remote management of communications networks
The invention provides a system and method for that facilitating the remote management of one or more networks. In enabling the remote management of a network,...
US-7,890,991 Apparatus and method for providing security and monitoring in a networking architecture
An apparatus is described that provides security and monitoring in a networking architecture. One embodiment of the apparatus includes a physical layer interface...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.