Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-7,966,466 Memory domain based security control with data processing systems
Access to memory address space is controlled by memory access control circuitry using access control data. The ability to change the access control data is...
US-7,966,465 Method and system for secure code encryption for PC-slave devices
A PC-slave device may securely load and decrypt an execution code and/or data, which may be stored, encrypted, in a PC hard-drive. The PC-slave device may...
US-7,966,437 Wireless USB enabled dataloads
A wireless enabled data transferring system for transferring data from a storage device to a slave receiving system. The wireless enabled data transferring...
US-7,966,429 Peripheral devices using phase-change memory
Peripheral devices store data in non-volatile phase-change memory (PCM). PCM cells have alloy resistors with high-resistance amorphous states and low-resistance...
US-7,966,391 Systems, apparatus and methods for managing networking devices
Provided are systems, apparatus and methods for the management and control of a plurality of networking devices. Embodiments include a database at each node of...
US-7,966,326 Information processing apparatus, data communication apparatus, control methods therefor, address management...
An address book data download request issued from a data communication apparatus is received. On the basis of authority of a user of the data communication...
US-7,966,234 Structured finance performance analytics system
A method for providing users with financial reports over a computer network, comprising the steps of: storing respective financial performance data for each of...
US-7,966,016 Communication apparatus and communication method
To reduce the processing load and maintain higher security in the communications, a communication apparatus includes a network surveying unit configured to...
US-7,965,861 Methods and systems for digital image security
Methods and systems for securing digital imagery are provided. In one respect, embedding, compression, encryption, data hiding, and other imaging processing...
US-7,965,735 Local area network of serial intelligent cells
A serial intelligent cell (SIC) and a connection topology for local area networks using Electrically-conducting media. A local area network can be configured...
US-7,965,731 Communication apparatus and communication method
A communication apparatus is provided. The communication apparatus includes a first unit for performing data communication using a bandwidth reservation type...
US-7,965,702 Reliable reporting of location data
A machine, such as a mobile device having telephony features, such as a voice over Internet Protocol (VoIP) telephony application, is configured with a secure...
US-7,962,762 Storing and accessing data in a mobile device and a user module
The invention relates to methods for storing and accessing user data (48) and configuration data (62) in a mobile device (10) that is connected to a user module...
US-7,962,757 Secure coordinate identification method, system and program
A method, program and system (10) for processing data are disclosed. The method, program and system comprising the steps of: (a) receiving data representing a...
US-7,962,755 System and method for biometrically secured, transparent encryption and decryption
A computer program for enabling biometrically secured, transparent encryption and decryption provides a user interface that allows a user to drag and drop files...
US-7,962,753 Method and a circuit for SHA operation with power saved
A Secure Hash Algorithm (SHA) operation circuit includes plural storages for storing the variables of the SHA calculation, a permutation section for permuting...
US-7,962,741 Systems and methods for processing packets for encryption and decryption
A network device for processing data packets includes an encryption services module, a number of network interfaces and a forwarding module. A network interface...
US-7,962,713 Memory device having secure non-volatile locking functionality
A device and method is provided for maintaining, upon unlocking of a memory, the lock status of the memory prior to the memory being unlocked and recreating the...
US-7,962,571 Method and system for collecting information from computer systems based on a trusted relationship
A method and system for retrieving data from devices in a way that seeks to preserve privacy and ensure the integrity of the retrieved data is provided. A...
US-7,962,544 Patient and device location dependent healthcare information processing system
A system automatically establishes context information (e.g., determining changes to user interface workflows, screens, menus, and access requirements for...
US-7,962,492 Data management apparatus, data management method, data processing method, and program
Data management security against leakage or loss of personal information is achieved by setting a division range for dividing personal information into...
US-7,962,423 Method and system for dispensing virtual stamps
A method and system for a virtual stamp dispensing metering system is provided wherein indicia of varying values are calculated at a data center and downloaded...
US-7,962,398 Method and system for executing trades in a user preferred security
A system for executing trades in a user preferred security comprising a server system (12) in communication with a client system (14), a security data source...
US-7,962,304 Device for thorough testing of secure electronic components
An apparatus including a test circuit, an output circuit and a control circuit. The test circuit may be configured to generate test data in response to one or...
US-7,962,122 Secure traffic redirection in a mobile communication system
A method of securely initializing subscriber and security data in a mobile routing system when the subscribers are also subscribers of a radio communication...
US-7,961,935 Method for forming and distributing a composite file including a dental image and associated diagnosis
A method of providing dental-related imaging data of a patient to a dental practitioner is provided, the dental-related imaging data being obtained by a third...
US-7,961,874 XZ-elliptic curve cryptography with secret key embedding
Secure communications over an insecure channel is provided using symmetric key elliptic curve cryptography. More specifically, a shared secret key and/or data...
US-7,961,722 Multiple virtualized operating environments within a VPN appliance
A secure socket layer virtual private network (SSL VPN) network appliance includes a set of virtual systems having respective context information. Each of the...
US-7,961,715 Technique for reserving resources for authorized entities in a communication network
A technique for reserving resources in a communication network for an entity. Communication units in the network register with policy data points (PDPs) to...
US-7,961,674 Multi-tier wireless home mesh network with a secure network discovery protocol
An apparatus and method for a multi-tier wireless home mesh network is described. The method may include formation of an infrastructure-less wireless home mesh...
US-7,961,108 Identification band
Updateable, customizable identification bands are disclosed herein. The identification band may include a band having an opening therein and at least one...
US-7,961,091 Method for synchronizing frequency-hopping short-range radio devices
A method for synchronizing a security system control panel and a sensor. The control panel and the sensor each have a transceiver. The control panel monitors a...
US-7,959,076 Secure card
Systems and methods for monetary cards are described. The cards are free from personally identifiable data, e.g., no name or embossment. In an example, the card...
US-7,959,073 Method and system for random data access for security applications
A method for securely handling processing of information in a chip may include randomly selecting one of a plurality of data processes based on a random process...
US-7,959,070 Banking system operated responsive to data bearing records
A system for use in banking operates responsive to data in data bearing records. The system is suitable for securing the contents in safety deposit boxes or...
US-7,958,558 Computational system including mechanisms for tracking propagation of information with aging
Mechanisms have been developed for securing computational systems against certain forms of attack. In particular, it has been discovered that, by maintaining...
US-7,958,554 Secure method and system for computer protection
Attacks by computer viruses, worm programs, and other hostile software (`malware`), have become very serious problems for computer systems connected to large...
US-7,958,550 Method and system for secure communication
A method and system for secure communication is presented. A virtual private proxy is generated based on an agreement between a first entity and a second...
US-7,958,521 Optical disc drive with latching mechanism that facilitates driving mechanism replacement
There is provided an optical disc drive designed for reading data stored in an optical disc. The optical disc drive includes a body, a driving module, a body...
US-7,958,414 Enhancing security of internal memory
An embodiment of a method of enhancing security of internal memory is disclosed. For this embodiment of the method, the application specific block is operated...
US-7,958,356 System and method for establishing a shared secret among nodes of a security appliance
A system and method securely establishes a shared secret among nodes of a security appliance. The shared secret is established by distributing private keys...
US-7,958,351 Method and apparatus for multi-level security implementation
A method of operating a multi-level security system including the steps of providing a plurality of processors. At least some of said processors are equipped...
US-7,958,350 Proactive forced renewal of content protection implementations
A system for proactive forced renewal of content protection implementations in devices includes a key generation facility to generate and allocate keys for the...
US-7,958,348 Method for securing an electronic certificate
A method is for securing and verifying an electronic certificate issued by an authority to an owner. The certificate is stored in the memory of a user unit...
US-7,958,320 Protected cache architecture and secure programming paradigm to protect applications
Embodiments of the present invention provide a secure programming paradigm, and a protected cache that enable a processor to handle secret/private information...
US-7,958,296 System management and advanced programmable interrupt controller
Methods for processing more securely are disclosed. Embodiments provide effective and efficient mechanisms for reducing APIC interference with accesses to...
US-7,958,268 Data security system and method adjunct to a browser, telecom or encryption program
Data security for processing data or securing browser-input data operates on security sensitive content which is extracted, then either encrypted or stored in...
US-7,958,250 System and method for multi-level guided node and topology discovery
Systems and methods for user-guided iterative node discovery and topology discovery in a network of nodes involved in secure and reliable data transfer.
US-7,958,206 Controlling access rights to network resources based on a hierarchical arrangement of security sets
Mechanisms for securing access to network resources are described. The mechanisms may perform operations for securing access to a network element and which can...
US-7,958,144 System and method for secure reciprocal exchange of data
A system for transmission of data between a first device operated by a first user and a second device includes a database that receives a first set of data...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.