Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-7,899,779 Security system for synchronization of desktop and mobile device data
A system, method and computer program product for a system, method and computer program product for controlling synchronization between a stationary computer and...
US-7,899,662 Data backup system including a data protection component
A data backup system is provided for backing up data files from a data source and for securing those data files against accidental modification or deletion. The...
US-7,899,440 Apparatus for securely transmitting/receiving contents in mobile communication network and method thereof
A mobile terminal including a transceiver configured to transmit and receive signals to and from another mobile terminal, a security parameter module configured...
US-7,899,306 Security system
A media data security system for rendering a secure media data file, having associated authentication data, for output comprises a data preparation unit operable...
US-7,899,189 Apparatus, system, and method for transparent end-to-end security of storage data in a client-server environment
The present invention includes one or more clients in communication with a server. The client desires to send a storage construct to the server for storage. The...
US-7,899,184 Ends-messaging protocol that recovers and has backward security
The presented messaging protocol uses three new public keys in a signed and encrypted message to achieve backward security and recovery in an environment where...
US-7,898,318 Data output clock signal generating apparatus and semiconductor integrated circuit with the same
A data clock control apparatus includes a bias voltage generator configured to receive a plurality of test mode signals and a plurality of fuse signals and to...
US-7,898,090 General purpose ball grid array security cap
A general purpose BGA security cap includes a substrate, an integrated circuit die, and an array of bond balls. The substrate includes an anti-tamper security...
US-7,896,247 Secure use of externally stored data
A smart card reader is adapted to extract and store authentication data from a response APDU received from a smart card before generating a filtered response...
US-7,896,238 Secured transaction using color coded account identifiers
A method and system provides coded access to a transactional or other type of system by acquiring account identification data corresponding to a combination of a...
US-7,895,663 Security system for communicating data between a mobile handset and a management server
A security system for communicating data between a mobile handset and a management server facilitates secure communication of data/code between a mobile handset...
US-7,895,662 Systems and methods for the remote deletion of pre-flagged data
Disclosed herein is a method for the secure deletion of data stored within a data processing system. The method includes the steps of executing a flag routine,...
US-7,895,650 File system based risk profile transfer
File system based risk profile transfer is disclosed. A request to access an object stored in memory is received from a requesting service, application, or other...
US-7,895,648 Reliably continuing a secure connection when the address of a machine at one end of the connection changes
An end machine (connected to one end of secure connection) may reliably continue to use the security association (SA) even if the self_address (usually the...
US-7,895,643 Secure logic interlocking
This invention discloses a method and system for processing logic modules, each having a separate functionality, into a unique functionality that is to be...
US-7,895,641 Method and system for dynamic network intrusion monitoring, detection and response
A probe attached to a customer's network collects status data and other audit information from monitored components of the network, looking for footprints or...
US-7,895,446 Secure data exchange between data processing systems
A data transfer method performed at a proxy server includes intercepting a data request from a client computer that is directed to a target server, encrypting...
US-7,895,440 Method of encrypting digital data, a method of masking a biometric print, and application to making a security...
The invention relates to a method of masking a plain datum b having n bits. The inventive method is characterised in that a masked datum m is produced using the...
US-7,895,434 Method and system for multiple asymmetric encryption of .ZIP files
The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data...
US-7,895,406 Memory device and password storing method thereof
To provide a memory device and a password storing method thereof, according to which an improved security function is realized by resourcefully designing the...
US-7,895,403 Secure deletion of information from hard disk drive
A method of securely deleting data from a storage medium includes generating a bitmap that corresponds to unused locations on the storage medium; initiating a...
US-7,895,144 Risk assessment in a pre/post security area within an airport
A risk assessment method and system. The method includes receiving by an inference engine, first sensor cohort data associated with a first cohort located within...
US-7,895,143 Risk assessment in an area external to an airport
A risk assessment method and system. The method includes receiving by an inference engine, first sensor cohort data associated with a first cohort located within...
US-7,894,945 Operation ready transportable data center in a shipping container
A movable data center is disclosed that comprises a portable container in which an operable computer system is assembled. A data link, power supply link and...
US-7,894,608 Secure approach to send data from one system to another
A secure approach for sending a original message from a sender to a receiver. The sender may encrypt the original message by performing an XOR (or XNOR)...
US-7,894,599 Enhanced data security with redundant inclusive data encryption segments
A computerized method, program product, and a service to protect critical data by first splitting the data into N streams. A partitioning algorithm is applied to...
US-7,894,480 Computer system and network interface with hardware based rule checking for embedded firewall
A data processing system adapted for high-speed network communications, a method for managing a network interface and a network interface for such system, are...
US-7,894,420 Fast path packet destination mechanism for network mobility via secure PKI channel
Disclosed is a method for reducing routing overheads during data transmission to a destination mobile router of a plurality of mobile routers roaming in a...
US-7,894,153 Secure data disposal for disk drive
When a disk sector is written to, a bit for the sector is set indicating that the sector will require secure data disposal (SDD) to be run on it. To save time...
US-7,891,563 Secure payment card transactions
Payment card transactions at a point of sale (POS) are secured in certain embodiments by intercepting, with a POS security layer installed on a POS terminal,...
US-RE42,163 Data management system
The present invention provides a system to ensure security of data in a computer network system. A center certifies a public-key of user of the system and...
US-7,891,004 Method for vehicle internetworks
Vehicle internetworks provide for communications among diverse electronic devices within a vehicle, and for communications among these devices and networks...
US-7,891,003 Enterprise threat modeling
A threat modeling application generates threats to a business application. The threat modeling application receives user input associated with business...
US-7,891,001 Methods and apparatus providing security within a network
An in-network security provider applies security event identification, analysis and processing to a customer's data communications traffic in the form of a...
US-7,891,000 Methods and apparatus for monitoring and reporting network activity of applications on a group of host computers
A security management system provides rules for monitoring network activity of applications to groups of host, computers, specifically activity indicating that...
US-7,890,995 System and method for remote management of communications networks
The invention provides a system and method for that facilitating the remote management of one or more networks. In enabling the remote management of a network,...
US-7,890,991 Apparatus and method for providing security and monitoring in a networking architecture
An apparatus is described that provides security and monitoring in a networking architecture. One embodiment of the apparatus includes a physical layer interface...
US-7,890,927 Apparatus and method for configuring and editing a control system with live data
Methods and apparatus for configuring process, environmental, industrial and other control systems generate and/or utilize models representing configurations of...
US-7,890,917 Method and apparatus for providing secure intellectual property cores for a programmable logic device
Method and apparatus for providing secure intellectual property (IP) cores for a programmable logic device (PLD) are described. An aspect of the invention...
US-7,890,774 System and method for fast querying of encrypted databases
A system, method, computer program product, and data management service that allows any comparison operation to be applied on encrypted data, without first...
US-7,890,770 Method for deactivating and reactivating security modules
This invention concerns a security module deactivation and reactivation method particularly intended for access control of conditional access data. These...
US-7,890,766 Method and apparatus for a proximity warning system
The present invention provides a method, apparatus, and computer instructions for warning of a presence of a person in a zone having an inadequate security...
US-7,890,760 Secure method of termination of service notification
A method for notifying a client device of termination of at least one service provided to the client device by a server system within an enterprise network is...
US-7,890,753 Secure mode for processors supporting MMU and interrupts
A digital system is provided with a secure mode (3.sup.rd level of privilege) built in a non-invasive way on a processor system that includes a processor core,...
US-7,890,751 Method and system for increasing data access in a secure socket layer network environment
A system for increasing data access in a secure socket layer network environment includes a web server computer having SSL acceleration server software (SSLAS)...
US-7,890,726 Flash memory protection scheme for secured shared BIOS implementation in personal computers with an embedded...
An apparatus and method are disclosed. The apparatus allows dynamic setting of access permissions to contents of a shared memory in a memory device controlled by...
US-7,890,640 Access control in client-server systems
A control system methodology uses object-oriented software to integrate multiple control systems into a common object model. Object-oriented techniques are used...
US-7,890,612 Method and apparatus for regulating data flow between a communications device and a network
A network security device which acts as an "airlock" for traffic between a communications device and a network. Data is screened using rules based analysis by...
US-7,890,530 Method and system for controlling access to data via a data-centric security model
A method and system for controlling access to data via a data-centric security model. A business data classification scheme is defined as a hierarchy that...
US-7,890,517 Appliance for enterprise information integration and enterprise resource interoperability platform and methods
The invention provides apparatus, platforms and methods according to the invention provide a surveillance, monitoring and real-time events platform to (i) enable...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.