Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-7,958,296 System management and advanced programmable interrupt controller
Methods for processing more securely are disclosed. Embodiments provide effective and efficient mechanisms for reducing APIC interference with accesses to...
US-7,958,268 Data security system and method adjunct to a browser, telecom or encryption program
Data security for processing data or securing browser-input data operates on security sensitive content which is extracted, then either encrypted or stored in...
US-7,958,250 System and method for multi-level guided node and topology discovery
Systems and methods for user-guided iterative node discovery and topology discovery in a network of nodes involved in secure and reliable data transfer.
US-7,958,206 Controlling access rights to network resources based on a hierarchical arrangement of security sets
Mechanisms for securing access to network resources are described. The mechanisms may perform operations for securing access to a network element and which can...
US-7,958,144 System and method for secure reciprocal exchange of data
A system for transmission of data between a first device operated by a first user and a second device includes a database that receives a first set of data...
US-7,958,102 Method and apparatus for searching a storage system for confidential data
Method and apparatus for searching a storage system for confidential data is described. One aspect of the invention relates to searching a computer for...
US-7,958,038 Methods and systems for providing an anti-benchmark portfolio
In one aspect, the invention comprises a method comprising: (a) acquiring data regarding a first group of securities in a first portfolio; (b) based on said...
US-7,957,975 Voice controlled wireless communication device system
A wireless communication device is disclosed that accepts recorded audio data from an end-user. The audio data can be in the form of a command requesting user...
US-7,957,851 System and method for utilization of transmitted digital flight data acquisition information to accomplish...
A system and method is provided for monitoring, collecting, storing, transmitting, calculating and uploading to a secure web server real-time balancing...
US-7,957,534 System and method for security association between communication devices within a wireless home network
Embodiments of the application describe a method and system for discovering and authenticating communication devices and establishing a secure communication...
US-7,957,528 Near field registration of home system audio-video device
A near field communication (NFC) sticker which stores a key is attached to a new client device. A remote commander in a home network reads the key using a NFC...
US-7,957,527 Cryptographic processing apparatus
An apparatus and a method for performing a hyperelliptic curve cryptography process at a high speed in a highly secure manner are provided. A base point D is...
US-7,957,363 System, method, and service for dynamically selecting an optimum message pathway
A message pathway selection system dynamically selects an optimum message pathway for transmitting messages. The system dynamically optimizes a message pathway...
US-7,957,320 Method for changing a group key in a group of network elements in a network system
The invention relates to a method for changing a group key GK for a secure data exchange in a group of network elements P.sub.1 . . . P.sub.n (n=2, 3, . . . )...
US-7,955,258 External data processing device to interface with an ambulatory repeater and method thereof
An external data processing device to interface with an ambulatory repeater and method thereof is presented. An external data processing device is interfaced in...
US-7,954,725 Secure payment card with static and variable data
In a first aspect of the subject invention, a secure payment card is provided, including: a flat body, the flat body having a patterned channel in proximity to...
US-7,954,703 Banking system controlled responsive to data bearing records
A banking system operates to cause financial transfers responsive to card data read from data bearing records by a card reader. The system includes at least one...
US-7,954,160 Computer security intrusion detection system for remote, on-demand users
An intrusion detection system, and a related method and computer program product, for implementing intrusion detection in a remote, on-demand computing service...
US-7,954,156 Method to enhance platform firmware security for logical partition data processing systems by dynamic...
A system and method to reduce external access to hypervisor interfaces in a computer system, thereby reducing the possibility of attacks. In a preferred...
US-7,954,155 Identifying unwanted electronic messages
An unwanted message may be identified by inspecting the payload portion of a message being communicated, comparing the characteristics of the payload portion...
US-7,954,154 Communication system and communication apparatus
A communication system and communication apparatus that can improve the stability and security of communication. In this communication system, a communication...
US-7,953,988 Modular tamper resistant enclosure for secure systems
An active membrane creates a secure area around one or more devices. The active membrane forms a physical barrier between the encased secure area and an...
US-7,953,987 Protection of secure electronic modules against attacks
A method and apparatus is disclosed for preventing the unintended retention of secret data caused by preferred state/burn-in in secure electronic modules....
US-7,953,970 Method and apparatus for storage of security keys and certificates
A method and apparatus for storage of security keys and certificates is provided in which the keys and certificates are fragmented into non-uniform lengths and...
US-7,953,968 System and method for selective encryption of input data during a retail transaction
A retail environment having retail terminals with data entry point devices selectively encrypts input received by the data entry point devices and passes the...
US-7,953,953 Method and apparatus for reducing page replacement time in system using demand paging technique
A method and apparatus for reducing a page replacement time in a system using a demand paging technique are provided. The apparatus includes a memory management...
US-7,953,888 On-demand overlay routing for computer-based communication networks
Methods and apparatus are disclosed for dynamically discovering and utilizing an optimized network path through overlay routing for the transmission of data. A...
US-7,953,871 Secure networked system for controlling mobile access to encrypted data services
A networked system for controlling the mobile access to a data service, which may provide encrypted data, is presented. The system may include a mobile device...
US-7,953,846 Internet security updates via mobile phone videos
Information relevant to internet security is received at a data center server. Such information, for example, a network intrusion alert or details on a recent...
US-7,953,823 Controlling access rights to network resources
Mechanisms for securing access to network resources are described. The mechanisms may provide functionality for securing access to a network element and which...
US-7,953,670 Biometrically secured identification authentication and card reader device
An intelligent Caddy-Pilot for facilitating biometric verification. The device works as a single sign-on device for an internal VPN or network or in conjunction...
US-7,953,536 Inertial sensor software architecture security method
A method and apparatus is provided for validating a plurality of data, comprising transmitting one or more first values for a variable from a first source of...
US-7,953,368 RFIC chip, and position recognition system and security system using the same
Included are: a circuit unit having a non-volatile memory; a circuit unit having a volatile memory; a read-write circuit for reading data from, writing data...
US-7,953,081 Mobile communication control method, mobile communication system, routing device, management device, and program
When a mobile terminal (10a) moves from an access network (21a) to another access network (21c), the unique information on destination of the mobile terminal...
US-7,952,970 Apparatus and method for detecting an optimal writing power
A method and apparatus for accomplishing an OPC (optimal power calibration) at a test area secured in data recording area of a writable optical recording medium...
US-7,950,698 Ubiquitous imaging device based check image capture
A method or corresponding apparatus for remote transmission of a negotiable instrument. In an example embodiment, the process provides a carrier that secures a...
US-7,950,063 Diagnosis system with identification display device
An electronic system provides secure and authorized access to data or a user interface on at least one first computer for operating machines from at least one...
US-7,949,912 System and method of securing data stored in a memory
A system and method of securing data stored in a memory are disclosed. The method comprises storing a payload data in a memory in one of first and second states...
US-7,949,880 Secure remote password validation
A method, system and apparatus for secure password validation can include a local authentication process configured for coupling both to local authentication...
US-7,949,866 Exception types within a secure processing system
An apparatus for processing data includes a processor operable in a plurality modes including at least one secure mode being a mode in a secure domain and at...
US-7,949,788 Apparatus, systems and methods for transformation services
A web services hub receives a request from a data source system, transforms the request, and transmits the transformed request to an external system. A secure...
US-7,949,771 Authentication of unknown parties in secure computer communications
Authentication of an unknown party in a secure computer communication may be performed even without consulting a public whitelist of trusted parties. A digital...
US-7,949,769 Arrangements and methods relating to security in networks supporting communication of packet data
The present invention relates to a system nodes and a method for enhancing security of end user station access to Internet and intranet(s), e.g. of corporate...
US-7,949,541 Vehicle activity module
Systems and methods are disclosed for maintaining security and data gathering for a number of vehicles. The systems include a vehicle activity module for each...
US-7,949,175 Counterfeit deterrence using dispersed miniature security marks
A method is disclosed for detection of miniature security mark configurations within documents and images, wherein the miniature security marks are in the form...
US-7,949,128 Method and device for the encryption and decryption of data
Method for the encryption of data as well as a corresponding decryption method are set forth. In order to guarantee a secure transmission of data with...
US-7,948,649 Image-forming apparatus and executed-job-storing method thereof
An image-forming apparatus connectable to an external memory and an executed job-storing method thereof, which checks a stored data size of a job and an...
US-7,948,383 RFID tag assembly and method of managing a race
A race management system which includes an RFID tag located between an inner and outer layer and is removably secured to a participant's bib through a mounting...
US-7,947,034 Flexible shaft extender and method of using same
An extender for use in an electro-mechanical surgical system that includes a surgical attachment that may be detachably coupled to an electro-mechanical driver...
US-7,946,490 Computerized card production equipment
An apparatus and method for manipulating images is disclosed. In one embodiment according to the invention, a method for manipulating images comprises:...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.