Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-7,890,927 Apparatus and method for configuring and editing a control system with live data
Methods and apparatus for configuring process, environmental, industrial and other control systems generate and/or utilize models representing configurations of...
US-7,890,917 Method and apparatus for providing secure intellectual property cores for a programmable logic device
Method and apparatus for providing secure intellectual property (IP) cores for a programmable logic device (PLD) are described. An aspect of the invention...
US-7,890,774 System and method for fast querying of encrypted databases
A system, method, computer program product, and data management service that allows any comparison operation to be applied on encrypted data, without first...
US-7,890,770 Method for deactivating and reactivating security modules
This invention concerns a security module deactivation and reactivation method particularly intended for access control of conditional access data. These...
US-7,890,766 Method and apparatus for a proximity warning system
The present invention provides a method, apparatus, and computer instructions for warning of a presence of a person in a zone having an inadequate security...
US-7,890,760 Secure method of termination of service notification
A method for notifying a client device of termination of at least one service provided to the client device by a server system within an enterprise network is...
US-7,890,753 Secure mode for processors supporting MMU and interrupts
A digital system is provided with a secure mode (3.sup.rd level of privilege) built in a non-invasive way on a processor system that includes a processor core,...
US-7,890,751 Method and system for increasing data access in a secure socket layer network environment
A system for increasing data access in a secure socket layer network environment includes a web server computer having SSL acceleration server software (SSLAS)...
US-7,890,726 Flash memory protection scheme for secured shared BIOS implementation in personal computers with an embedded...
An apparatus and method are disclosed. The apparatus allows dynamic setting of access permissions to contents of a shared memory in a memory device controlled by...
US-7,890,640 Access control in client-server systems
A control system methodology uses object-oriented software to integrate multiple control systems into a common object model. Object-oriented techniques are used...
US-7,890,612 Method and apparatus for regulating data flow between a communications device and a network
A network security device which acts as an "airlock" for traffic between a communications device and a network. Data is screened using rules based analysis by...
US-7,890,530 Method and system for controlling access to data via a data-centric security model
A method and system for controlling access to data via a data-centric security model. A business data classification scheme is defined as a hierarchy that...
US-7,890,517 Appliance for enterprise information integration and enterprise resource interoperability platform and methods
The invention provides apparatus, platforms and methods according to the invention provide a surveillance, monitoring and real-time events platform to (i) enable...
US-7,890,433 Private and secure payment system
With the payment system 02 of the present invention, a customer 06 may conduct a private and secure payment transaction (i) with a merchant 08 using a wireless...
US-7,890,400 Obtaining consent for electronic delivery of compliance information
A method and related system obtains consent from an individual for computer-aided delivery of compliance information. Initially, a computer-readable data storage...
US-7,890,399 Obtaining consent for electronic delivery of compliance information
A method and related system obtains consent from an individual for computer-aided delivery of compliance information. Initially, a computer-readable data storage...
US-7,890,398 Method, system and program for credit risk management utilizing credit limits
Software aggregates and integrates credit exposure and credit data across accounting, trading and operational systems within an organization and generates views...
US-7,890,051 Secure transmission over satellite phone network
A reach back secure communications terminal includes a modem to satellite interconnect board that captures DTMF tones, demodulates encrypted modem information,...
US-7,889,544 High-speed controller for phase-change memory peripheral device
Peripheral devices store data in non-volatile phase-change memory (PCM). PCM cells have alloy resistors with high-resistance amorphous states and low-resistance...
US-7,889,494 Portable electronic device holster with guided docking station
A holster provides a carrier for removable storing a portable electronic device, such as a cellular phone, PDA or MP3 player, and a fastener for securing the...
US-7,889,363 Color laser printer for printing prismatic duo-tone copy-resistant backgrounds
An improved printing apparatus and method for its use is provided for printing copy-resistant prismatic, duo-tone patterns as a background on print media. A user...
US-7,886,970 Data communicating apparatus and method for managing memory of data communicating apparatus
An IC card has a mechanism to securely manage information for each of a plurality of service providers in a memory area of the IC card. The IC card is shared by...
US-7,886,964 System and method for personalized e-commerce
A system allows consumers the ability to remotely transmit order and/or payment preference data to a vendor to facilitate sales transactions. A personal...
US-7,886,959 Security monitoring system for a bulk foodstuff transport container
A security monitoring system provides for the secure transport of a bulk foodstuff container. The system includes an electromechanical locking mechanism allowing...
US-D632,689 Apparatus to encrypt and distribute data for security applications
US-7,886,360 Security device for data carriers
The invention relates to a security device for data carriers which may be or is secured onto or within a data carrier or its housing, and in which data may be...
US-7,886,353 Accessing a USB host controller security extension using a HCD proxy
Systems and methods for enabling trusted software to monitor and control USB traffic associated with a security extension of a host controller and devices in a...
US-7,886,349 State-full perimeter security for data networks
The described embodiments include a system for controlling communications between a first network and a second network including a plurality of in-line security...
US-7,886,347 Forensic toolkit and method for accessing data stored on electronic smart cards
A tool kit for accessing data stored on an electronic SMART card is provided, the kit comprising a SMART card reader and recorder, at least one storage card, and...
US-7,886,162 Cryptographic secure program overlays
A method, computer program product, and data processing system for executing larger-than-physical-memory applications while protecting sensitive program code...
US-7,886,159 Data providing system and apparatus and methods of same
A content provider 101 distributes a secure container 104 storing content data encrypted using content key data, content key data encrypted using distribution...
US-7,886,156 Secure universal transaction system
A secure universal transaction system includes an operations and resource component, at least one communication device for enabling user interaction with the...
US-7,886,154 Method and apparatus for a proximity warning system
The present invention provides a method, apparatus, and computer instructions for warning of a presence of a person in a zone having an inadequate security...
US-7,886,152 Method and device for embedding watermark information and method and device for extracting embedded watermark...
For embedding watermark information into an information signal including audio and/or video information, first of all a synchronization sequence with a plurality...
US-7,886,150 System debug and trace system and method, and applications thereof
An embedded system or system on chip (SoC) includes a secure JTAG system and method to provide secure on-chip control, capture, and export of on chip information...
US-7,886,143 Multi-data rate cryptography architecture for network security
An architecture and associated methods and devices are described that include a plurality of stages of cipher round logic, each stage configured to perform...
US-7,886,098 Memory access security management
A data processing apparatus and method for generating access requests is provided. A bus master is provided which can operate either in a secure domain or a...
US-7,886,057 Method and apparatus for communicating data between two hosts
A method for communicating video data between at least a first host and a second host comprises: identifying, at a server, an address of the first host, to which...
US-7,885,903 Method and device for generation and sale of frankings for sending mail
Method for generation and sale of frankings, which can be used for sending mail from a customer to a receiver. The frankings are thus preferably produced on an...
US-7,885,877 Obtaining consent for electronic delivery of compliance information
A method and related system obtains consent from an individual for computer-aided delivery of compliance information. Initially, a computer-readable data storage...
US-7,885,876 Obtaining consent for electronic delivery of compliance information
A method and related system obtains consent from an individual for computer-aided delivery of compliance information. Initially, a computer-readable data storage...
US-7,885,875 Obtaining consent for electronic delivery of compliance information
A method and related system obtains consent from an individual for computer-aided delivery of compliance information. Initially, a computer-readable data storage...
US-7,885,874 Obtaining consent for electronic delivery of compliance information
A method and related system obtains consent from an individual for computer-aided delivery of compliance information. Initially, a computer-readable data storage...
US-7,885,873 Obtaining consent for electronic delivery of compliance information
A method and related system obtains consent from an individual for computer-aided delivery of compliance information. Initially, a computer-readable data storage...
US-7,885,872 Obtaining consent for electronic delivery of compliance information
A method and related system obtains consent from an individual for computer-aided delivery of compliance information. Initially, a computer-readable data storage...
US-7,885,635 Mobile device for accessing a common database and a computing device
The present invention has been made in consideration of thin devices efficiently communicating ideas and transactions into data networks by using other devices...
US-7,885,602 Wireless ad hoc network security
Providing network security includes detecting network traffic associated with an ad hoc network that includes a first station and a second station, and...
US-7,885,413 Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted...
A computer system is disclosed that contains cryptographic keys and cryptographic key identifiers. The system has a repository cryptographic engine that...
US-7,885,122 Flash-based FPGA with secure reprogramming
A flash-based programmable integrated circuit includes programmable circuitry, a flash memory array coupled to the programmable circuitry for configuring it,...
US-7,884,957 Image forming apparatus and image management method
The present invention provides an image forming apparatus, an image management method and an image management program in which a security of image data to which...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.