Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,904,194 Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-8,904,190 Method and apparatus including architecture for protecting sensitive code and data
A secure execution environment for execution of sensitive code and data including a secure asset management unit (SAMU) is described. The SAMU provides a secure...
US-8,904,188 Trusted storage systems and methods
Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of...
US-8,904,187 Secure biometric verification of identity
A high security identification card includes an on-board memory for stored biometric data and an on-board sensor for capturing live biometric data. An on-board...
US-8,904,181 System and method for secure three-party communications
A system and method for communicating information between a first party and a second party, comprising the steps of receiving, by an intermediary, an identifier...
US-8,904,180 Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and...
A key management system includes secured data stored on a first system secured by a control key stored securely on a key server. The secured data is secured...
US-8,904,175 System and method for secure distribution and/or storage of data files with long term file integrity verification
Systems and methods for securely uploading, distributing, managing and/or storing any type of data file within a subscriber-based system maintained by a third...
US-8,904,173 System and method for securely moving content
A domain controller is provided for use with a content source and a media device. The content source can provide encrypted content and rights data corresponding...
US-8,904,166 Secure client-side communication between multiple domains
Methods and systems for secure client-side communication between multiple domains is provided. Such methods and systems can provide for decreased communication...
US-8,904,162 Methods and apparatus for performing secure BIOS upgrade
A data processing system may comprise a primary basic input/output system (BIOS) image in a primary BIOS region and a rollback BIOS image in a rollback BIOS...
US-8,904,080 Tape backup method
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-8,903,836 System and method for parsing, summarizing and reporting log data
A system and method is disclosed which enables network administrators and the like to quickly analyze the data produced by log-producing devices such as network...
US-8,903,744 System and method for controlling access to personal identification information contained in documents
A system and method for creating a document containing secured personal identification information includes a database containing personal identification...
US-8,903,743 Cryptographic prescription system
A method, computer program product, and data processing system for secure automated dispensing of prescription medications are disclosed. A preferred embodiment...
US-8,903,521 Motion capture element
Motion capture element for low power and accurate data capture for use in healthcare compliance, sporting, gaming, military, virtual reality, industrial, retail...
US-8,903,361 Network locking method and apparatus for terminal
Embodiments of the present disclosure provide a network locking method and apparatus for a terminal. The method mainly includes: utilizing an IMSI number...
US-8,903,315 Secure context-based computing
An embodiment of the invention includes an article with instructions that enable a first unit to: (a) sense the first unit's local surroundings to determine...
US-8,903,128 Object recognition for security screening and long range video surveillance
A method of detecting an object in image data that is deemed to be a threat includes annotating sections of at least one training image to indicate whether each...
US-8,903,093 Mobile device, method of processing an input in a mobile device and electronic payment method using a mobile device
Handheld wireless communications devices include a data input device, which is configured to receive first input data provided by a user, a main processor and a...
US-8,903,091 Optical system with imparted secure codes
A secure optical communication system and method are disclosed. Short optical pulses are first modulated with data, then dispersed in time so that they spread...
US-8,903,090 Securely classifying data
Techniques are disclosed for securely classifying or decoding data. By way of example, a method of determining a most likely sequence for a given data set...
US-8,903,086 Enabling/disabling display data channel access to enable/disable high-bandwidth digital content protection
A switcher device comprises a multiplexer coupled in-between at least one input and output cards. The multiplexer detects the presence of an event signal from...
US-8,903,084 Efficient key derivation for end-to-end network security with traffic visibility
Both end-to-end security and traffic visibility may be achieved by a system using a controller that derives a cryptographic key that is different for each...
US-8,902,825 Wireless network system and method of configuring the same
Provided are a wireless network system and a method of configuring the same, more particularly, a wireless network system and a method of configuring the same,...
US-8,902,311 Building security system
A security system that can be used in a home, office, or other building in order to generate alarms or take other actions depending on conditions within the...
US-8,902,064 Security system
A security system comprises a plurality of alarm points distributed at a plurality of positions in a building; signal processing module for receiving alarm...
US-8,901,954 Active shield with electrically configurable interconnections
Introduced is an active shield method providing security to a security critical integrated circuit against some physical attacks like probing, manipulation and...
US-8,899,488 RFID tag system
An RFID tag system includes a housing that includes an enclosed sidewall and forms a recess with a housing base surface, where the housing is configured and...
US-8,898,807 Data protecting method, mobile communication device, and memory storage device
A data protecting method for a mobile communication device is provided. The data protecting method includes storing first authentication information into a...
US-8,898,801 Method for protecting a digital rights file description
The invention relates to a method of protecting a file containing a plurality of rights descriptions D.sub.i (i=1 . . . N), each right D.sub.i defining use by a...
US-8,898,794 Efficient and secure data structure synchronization
One embodiment of a computer-implemented data structure synchronization mechanism comprises an interface for accessing a data structure and storing ownership...
US-8,898,792 Search mechanism for content based information security repositories
A secure search mechanism (or search engine) for use with content based information security repositories. The present invention may be embodied in an...
US-8,898,787 Software vulnerability exploitation shield
This paper describes a mechanism for minimizing the exploitation of vulnerabilities on software installed on a computing system. At a transport layer (e.g.,...
US-8,898,768 Computer or microchip with a secure control bus connecting a central controller to volatile RAM and the...
A computer or microchip comprising a central controller that connected by a secure control bus with the other parts of the computer or microchip, including a...
US-8,898,762 Payment transaction processing using out of band authentication
Systems, apparatuses, and methods for increasing the security of electronic payment transactions, such as eCommerce transactions conducted over the Internet. A...
US-8,898,734 Analyzing security compliance within a network
A security policy database identifies the intended security policies within a network, a traffic generator provides test traffic that is configured to test each...
US-8,898,728 System and method of real-time change propagation and activation using a distributed object cache
Embodiments of the invention provide systems and methods for using a distributed object cache to propagate and activate changes to security information across...
US-8,898,473 System and method for compressing secure E-mail for exchange with a mobile data communication device
A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile...
US-8,898,470 Method and apparatus for performing security communication
Provided is a method of performing secured communication. In the method, a secured communication request for performing secured communication is received from...
US-8,898,468 Method for ensuring security and privacy in a wireless cognitive network
In some embodiments, authentication, confidentiality, and privacy are enhanced for a wireless network of cognitive radios by encryption of network management...
US-8,898,467 Enabling/disabling display data channel access to enable/disable high-bandwidth digital content protection
A switcher device comprises a multiplexer coupled in-between at least one input and output cards. The multiplexer detects the presence of an event signal from...
US-8,898,464 Systems and methods for secure workgroup management and communication
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser may split...
US-8,898,452 Protocol translation
A system and method for securing data by receiving encrypted data at a security appliance transmitted from a client, wherein at least a portion of the encrypted...
US-8,898,404 Memory management method and computer
A memory management method is provided to manage a memory in which areas of a garbage collected Java heap memory and a non-garbage collected external heap...
US-8,898,350 Multi-bus architecture for mass storage system-on-chip controllers
Systems and methods that can facilitate an expedient and efficient transfer of data between memory components (e.g., flash memory) and host components (e.g.,...
US-8,898,340 Dynamic network link acceleration for network including wireless communication devices
A method and apparatus for dynamic network link acceleration provides a managed communication link for accelerated and reliable network communication between a...
US-8,898,315 Remote access to resources
The invention provides systems and for securely transmitting data between a roaming computer and a managed network service over a shared public network. A...
US-8,897,751 Prevention of eavesdropping type of attack in hybrid communication system
Techniques are disclosed for use in securing communications in environments comprising hybrid communication systems. For example, a method comprises, in a...
US-8,897,704 Method and apparatus to enable use of motion to associate devices
A method and apparatus to provide easier pairing based on motion data is described. The method of associating two devices comprises receiving a signal to enter...
US-8,897,451 Storing secure information using hash techniques
Sensitive information is hashed using a hash key, salting key and additional logic. Upon receiving a credit card authorization request with a credit card number...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.