Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-7,905,394 Assembly comprising a tachograph
An assembly has a tachograph and a data memory, in particular a data memory of a data card. The tachograph has an interface designed to exchange data between the...
US-7,904,951 Techniques for securely accelerating external domains locally
Techniques are provided for securely accelerating external domains locally. Secure client requests directed to an external domain are forwarded to a local domain...
US-7,904,946 Methods and systems for secure user authentication
Methods and systems for secure user authentication utilizes OTP generation and validation techniques in which the shared secret for generating the OTP is not...
US-7,904,945 System and method for providing security for a wireless network
A system and method for providing secure communication between nodes (102, 106, 107) in a wireless multihopping communication network (100). The system and...
US-7,904,911 Management of multiple network devices using unsigned java applets
Remote management of a plurality of network devices is described wherein each device is managed with its own unsigned Java.TM. applet. Unsigned applets launched...
US-7,904,775 Microprocessor comprising signature means for detecting an attack by error injection
A method for monitoring the execution of a sequence of instruction codes in an integrated circuit comprising a central processing unit provided for executing...
US-7,904,730 System for providing a trustworthy user interface
The preferred embodiment of the invention comprises a computer system which employs a trusted display processor (260), which has a trusted processor (300) and...
US-7,904,724 Translation device, translation method, and storage medium
A translation device has an input unit that inputs image data from a document; a detecting unit that detects a security information image, which indicates that...
US-7,904,723 Method and apparatus for enhancing security of wireless communications
The present invention is related to a method and apparatus for enhancing security of communications. The apparatus comprises a security processing unit, a data...
US-7,904,707 Systems and methods using cryptography to protect secure computing environments
Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and...
US-7,904,686 Data security for use with a file system
An embodiment of the invention provides an apparatus and method for providing data security for use with a file system. The apparatus and method performs acts...
US-7,904,569 Method for remote access of vehicle components
Vehicle internetworks provide for communications among diverse electronic devices within a vehicle, and for communications among these devices and networks...
US-7,904,565 System for providing security in a network comprising communications devices
A system for providing communications security and authentication to a plurality of computerized devices is disclosed. In one embodiment, the system is useful...
US-7,904,536 Method and system for remote management of customer servers
Embodiments of the invention are directed generally to a decentralization of security provisions, improved logging of textual and/or graphical data in the...
US-7,904,479 Detection of network security breaches based on analysis of network record logs
Computer program products and methods of inspecting a log of security records in a computer network are provided. The method includes retrieving a log record,...
US-7,904,465 Network-extensible reconfigurable media appliance
Extensible reconfigurable media appliance for security and entertainment captures images digitally for storage. Digital effects and filters are applied to...
US-7,904,456 Security monitoring tool for computer network
A security monitoring tool and method for a computer network receives data and determines whether the data is associated with a host already stored in a...
US-7,904,454 Database access security
Apparatus for protection of database objects from unwanted access, particularly from external connections via a firewall (20). The apparatus comprises a data...
US-7,904,371 Method and system for initiating pairs trading across multiple markets having automatic foreign exchange price...
Methods and systems for initiating trading, and more particularly, to pairs trading across multiple exchanges by allowing a trader to monitor, trade, and hedge...
US-7,904,338 Display device and funds transaction device including the display device
A display device is disclosed which may be used in a mobile telephone or other article which is intended to make secure transactions such as financial...
US-7,904,187 Internet appliance system and method
An Internet appliance, comprising, within a single housing, packet data network interfaces, adapted for communicating with the Internet and a local area network,...
US-7,903,846 Method for using an electronic lock box with a biometric identification device
An improved electronic lock box system is provided for more secure control over the accessibility of a secure compartment in the electronic lock box, which is...
US-7,903,814 Enhancing the security of public key cryptosystem implementations
In one embodiment, cryptographic transformation of a message is performed by first performing a table initiation phase to populate a data structure. Then, a...
US-7,903,671 Service for NAT traversal using IPSEC
Disclosed are methods and apparatus for methods and apparatus for facilitating a secure connection between a first and a second node in a computer network where...
US-7,903,670 Home network system
The present invention discloses a home network using a living network control protocol. The home network system includes: a network based on a predetermined...
US-7,903,243 Automatic brewster angle refractometer
An improved refractometer for automatically determining the refractive index of a test subject by using principles embodied in Brewster's Angle, the...
US-7,903,147 System and method of detecting communication device having built-in camera
Provided are a communication device having a built-in camera and a system and method of detecting a communication device having a built-in camera. In the system,...
US-7,903,048 Information display apparatus and navigation apparatus
In an information display apparatus such as a head-up display, while safety is being secured, visibility from a user is improved. Image data having an object...
US-7,901,285 Automated game monitoring
The present invention provides a system and method for monitoring players in a game, extracting player and game operator data, and processing the data. In one...
US-RE42,212 Protection system and method
.[.An anti-virus.]. .Iadd.A .Iaddend.protection system and method for use within a data transmission network to protect against the transfer of viruses from a...
US-7,900,265 Method and/or system to authorize access to stored data
Embodiments of methods and/or systems to authorize access to stored data are disclosed herein. When a data access request is detected by an agent executing on a...
US-7,900,262 Security management method and apparatus, and security management program
According to the present invention, a security management program which is recorded in a computer readable recording medium and is used to control access to...
US-7,900,261 File access authorization management apparatus and method
In an information processing apparatus which divides a memory area into a plurality of boxes and manages data stored in each box, security information containing...
US-7,900,250 Method of providing secure groups using a combination of group and pair-wise keying
A key selection process is provided which secures traffic between VPN end-points using a combination of SVPN group keys and pair-wise keys. The type of key used...
US-7,900,249 Method, system and software for maintaining network access and security
A system, method and apparatus for securing communications between a trusted network and an untrusted network are disclosed. A perimeter client is deployed...
US-7,900,211 Method and apparatus for data transfer across a network
Provided are methods, computer programs and apparatus for communication in a distributed object-oriented data processing environment. Requests for retrieval of...
US-7,900,093 Electronic data processing system and method for monitoring the functionality thereof
A method for monitoring of the functionality of an EDP system that is monitored in portions thereof by respectively associated agents that are designed to...
US-7,900,063 Apparatus and method for securing data on a portable storage device
A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of...
US-7,900,060 Method and system for securing a disk key
In accordance with an embodiment of the present invention, a trusted client includes a non-volatile memory programmed with an encrypted disk key. The encrypted...
US-7,900,051 Secure multimedia data transmission method
A secure method and system of digital data transmission between a sender and a receiver, including a phase of receiver authentication by a symmetrical...
US-7,900,044 Enterprise computer investigation system
A method, apparatus and system for secure forensic investigation of a target machine by a client machine over a communications network. In one aspect the method...
US-7,900,043 Hard disk security method in a computer system
This invention presented a hard disk security method in a computer system, which provides a hard disk security mechanism combining with the power-on password...
US-7,900,042 Encrypted packet inspection
A method, system, and device for encrypted packet inspection allowing an authorized third party device to monitor cryptographic handshaking information (full-...
US-7,900,032 Method and system for NAND flash support in autonomously loaded secure reprogrammable system
Segmenting a boot code to allow separate and independent storage and validation of the segments in a manner that enable secure system boot by autonomous fetching...
US-7,900,012 Secure storage apparatus and method for controlling the same
The present invention discloses a storage apparatus in communication with one or more external systems, including at least one storage region, at least one...
US-7,900,001 System and method for obscuring hand-held device data traffic information
Increasing security for a hand-held data processing device with communication functionality where such a device includes an access-ordered memory cache relating...
US-7,899,901 Method and apparatus for exercising and debugging correlations for network security system
A selected time interval of previously stored security events generated by a number of computer network devices are replayed and cross-correlated according to...
US-7,899,882 System and method for providing remote forensics capability
A system and method for performing a forensic analysis of a subject computer having a non-volatile memory with a second computer is provided. In one embodiment,...
US-7,899,849 Distributed security provisioning
Systems, methods and apparatus for a distributed security that provides security processing external to a network edge. The system can include many distributed...
US-7,899,782 Security system for synchronization of desktop and mobile device data
A system, method and computer program product for a system, method and computer program product for controlling synchronization between a stationary computer and...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.