Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,190,893 Portable security transaction protocol
A technique for providing message authenticity includes accepting transaction information, accepting a first data item used for authenticating an originating...
US-8,190,888 System and methodology providing multi-tier security for network data with industrial control components
The present invention relates to a system and methodology facilitating network security and data access in an industrial control environment. An industrial...
US-8,190,887 Cable network system and method for controlling security in cable network encrypted dynamic multicast session
A security control method in a cable network dynamic multicast session, and more particularly, a method of controlling forward secrecy and backward secrecy in a...
US-8,190,885 Non-volatile memory sub-system integrated with security for storing near field transactions
An architecture is presented that facilitates maintaining a log of near field transactions in a memory module that includes security functionalities and near...
US-8,190,875 Reducing processing load in proxies for secure communications
In one embodiment, a method for providing secure communications using a proxy is provided. The proxy negotiates with a client and a server to determine a...
US-8,190,840 Memory devices with data protection
A memory device comprises a memory array, a status register, a status-register write-protect bit and a security register. The memory array contains a number of...
US-8,190,767 Data structures and state tracking for network protocol processing
Described are data structures, and methodology for forming same, for network protocol processing. A method for creating data structures for firewalling and...
US-8,190,764 Method and system for an intercept chain of custody protocol
Techniques for establishing a chain of custody for intercepted electronic information are disclosed. In one particular exemplary embodiment, the techniques may...
US-8,190,716 Method and system for managing bluetooth communication using software or firmware filtering
Aspects of method and system for managing secure Bluetooth communication using software or firmware filtering are provided. In this regard, the IT or system...
US-8,190,635 Method and system for storing and retrieving information
A method of storing and retrieving a utilization data associated to a sensitive information which requires to be secured in an environment including a plurality...
US-8,190,631 Query-time and view-time security for semantic layer
Aspects may include determination of a first security profile associated with a user and an information space, the information space comprising metadata...
US-8,190,304 Automatic configuration-tracking apparatus, and a method and a system for such tracking
An automatic configuration-tracking apparatus for tracking the configuration of a vehicle having a multitude of components for which it is desired to consult...
US-8,189,794 System and method for effectively performing data restore/migration procedures
A system and method for effectively supporting data transfer procedures includes a source device that registers with an account server to participate in a data...
US-8,189,778 Adaptive generation of a pseudo random number generator seed
A seed for use in a cryptographic operation for an electronic device is determined by estimating the number of entropy data bits needed to satisfy a...
US-8,189,572 Systems and methods for resetting a network device
A network device includes a data store with first and second parameters, the first parameter affecting a communication operation of the network device and the...
US-8,189,238 Integrated and centralized method and system for managing delivered fax data
A method and system for managing facsimile (fax) data in an integrated manner. The system includes an integrated fax server, and a fax terminal configured to...
US-8,189,235 Apparatus, method and program product that calculates a color blending ratio so security dots reproduced in a...
The invention provides an image processing apparatus, an image processing method, a recording medium and a program capable of suppressing security dots from...
US-8,189,213 Image forming apparatus capable of using security code for communication
On receiving FAX image data, an image forming apparatus determines whether or not a security code is superimposed on the image data. If superimposed, the image...
US-8,189,208 Image processing apparatus, controlling method of image processing apparatus, program and storage medium
The present invention provides an image processing apparatus, a method of controlling the image processing apparatus, a program and a storage medium that can...
US-8,188,860 Secure sensor/actuator systems
A chip module including a sensor/actuator, an input/output interface, a data processing circuit connected between the input/output interface and the...
US-8,185,944 High-assurance file-driven content filtering for secure network server
A server for transferring data between networks. The server is programmed to perform the following steps: (a) creating a receiving process, a filtering process...
US-8,185,942 Client-server opaque token passing apparatus and method
In the computer client-server context, typically used in the Internet for communicating between a central server and user computers (clients), a method is...
US-8,185,935 Method and apparatus for dynamic home address assignment by home agent in multiple network interworking
A method and apparatus for dynamic home address assignment by a home agent in multiple network interworking. The invention provides a method and apparatus send...
US-8,185,934 Programmable data protection device, secure programming manager system and process for controlling access to an...
A data protection device for an interconnect network on chip (NoC) includes a header encoder that receives input requests for generating network packets. The...
US-8,185,752 Method and system for providing data field encryption and storage
An approach is provided for securely storing and managing sensitive data. A system and method are provided that include a central device that receives an actual...
US-8,185,751 Achieving strong cryptographic correlation between higher level semantic units and lower level components in a...
A data storage architecture for networked access by clients includes a file server capable of communication with the clients via the network, physical storage...
US-8,185,748 Methods and apparatus for facilitating a secure processor functional transition
A processor and associated local memory are capable of operative connection to a main memory such that data may be read from the main memory for use in the...
US-8,185,747 Methods of registration for programs using verification processes with biometrics for fraud management and...
Methods for pre-registering a participant in a program database using a participant smart card and biometric data in a verification process to manage fraud and...
US-8,185,735 System and method for lost data destruction of electronic data stored on portable electronic devices
A data security system and method protects stored data from unauthorized access. According to one aspect of the invention, a client computing device...
US-8,185,709 Security system for external data storage apparatus and control method thereof
A security system for an external data storage apparatus and a control method thereof, in which a data storage is driven by reading an identification (ID),...
US-8,185,690 Memory module, memory system, and information device
A memory system including ROM and RAM in which reading and writing are enabled. A memory system includes a non-volatile memory (FLASH), DRAM, a control circuit,...
US-8,185,510 Distributed security provisioning
Systems, methods and apparatus for a distributed security that provides security processing external to a network edge. The system can include many distributed...
US-8,185,430 Supplier stratification
Provided is a method and system of assigning a level of risk presented to an enterprise by a supplier of goods or services. In at least some embodiments, a tier...
US-8,185,429 System and method of making sales calls
A database navigation system simplifies the navigation and use of sales target information in a database. The salesperson, i.e., the user, begins navigating and...
US-8,185,101 Handheld portable real-time tracking and communications device
Portable handheld real-time tracking and communications devices include; a controller module, communications module including global positioning and mesh...
US-8,185,035 Image forming system
An image forming system which realizes reliable output of an original of a finished book, while maintaining security. A sheet-unique information-reading unit...
US-8,184,972 Method and apparatus relating to secure communication
Data is encrypted onto an electromagnetic beam by providing an electromagnetic beam having a signal component having a modal state, wherein the signal component...
US-8,184,872 One time password generating method and apparatus
The invention relates to a one-time password generating method and an apparatus. The method includes steps of collecting fingerprint images, extracting...
US-8,184,867 Method and system for biometric identification or verification
The invention relates to a method for the biometric identification or verification of people. According to said method, biometric characteristics are detected...
US-8,184,810 Secure device and relay terminal
An IC card includes a tamper resistant module which has one or more applications and a card control unit for controlling an operation of the IC card, a secure...
US-8,184,808 Chaotic asymmetric encryption process for data security
Disclosed is a method and apparatus for a chaotic asymmetric encryption system that is based on a mathematically proven chaotic dynamical system, the ergodic...
US-8,184,804 Hash function using a piling-up process
In the computer data security field, a cryptographic hash function process embodied in a computer system and which is typically keyless, but is highly secure....
US-8,184,691 Managing telemetry bandwidth and security
An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of...
US-8,184,530 Providing quality of service (QOS) using multiple service set identifiers (SSID) simultaneously
Quality of Service (QoS) is provided to a secure data tunnel such an IPsec tunnel using information about the tunnel and the underlying data session to...
US-8,184,490 Self-calibration method of a reading circuit of a nonvolatile memory
A self-calibration circuit of a nonvolatile memory includes a trimming data storage module, a sense amplifier module, a logic judgment module, and a scanning...
US-8,184,324 Mobile information apparatus for wireless search and data transfer
A mobile information apparatus for wireless digital media transfer and sharing in a wireless digital home or a wireless digital enterprise are disclosed. In a...
US-8,184,006 Shipping container integrity device and system
Disclosed is a remotely monitorable shipping container security and integrity system and radio frequency identification device. The system permits remote...
US-8,183,994 Flexible, scalable, service-oriented surveillance system architecture
A surveillance architecture having applications in a wide variety of surveillance-related applications is disclosed. This architecture can be used in various...
US-8,181,869 Method for customizing customer identifier
The present invention provides a method for customizing customer identifier. To resolve the problems in customizing the identifier in the electronic device by...
US-8,181,263 Data communication system controlling available addressees for data based on preselected security level of user...
An LDAP server stores security levels individually assigned to a plurality of destinations and a plurality of users in advance. When a user is authenticated...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.