Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,782,433 Data security
This document discloses data security systems and methods of securing data. A cache memory can be connected between a decryption engine and a central processing...
US-8,782,431 Digital data authentication and security system
The present invention includes a system and process for generating secured, marked digital files. A cryptographic token is inertly embedded in markup language...
US-8,782,430 Secure external buffer for hard disk drive system on a chip
A system securely buffers hard disk drive data using a host side eXlusive OR (XOR) encryption engine. A host communicates with an encryption interface...
US-8,782,427 System and method for sequentially processing a biometric sample
This invention provides for progressive processing of biometric samples to facilitate user verification. A security token performs initial processing. Due to...
US-8,782,423 Network based management of protected data sets
A system that includes an account management module configured to maintain protected accounts. For instance, a particular protected account includes a protected...
US-8,782,419 Device and method for a backup of rights objects
A common backup format of a backup rights object according to embodiments of the present invention has the following features: License information that is not...
US-8,782,417 Method and processing unit for secure processing of access controlled audio/video data
A method for verifying access conditions performed by two conditional access devices consecutively on a control message before releasing a control word to a...
US-8,782,403 Method and apparatus for securing confidential data for a user in a computer
Method and apparatus for securing confidential data related to a user in a computer is described. In one example, rules are obtained that provide a...
US-8,782,401 Enhanced privacy ID based platform attestation
As opposed to utilizing a manufacturer provisioned EK Certificate for AIK processes, embodiments of the invention utilize EPID based data. EPID mitigates the...
US-8,782,388 Information processing apparatus, method, and computer-readable storage medium that encrypt data in a blob...
An information processing apparatus includes a main memory unit storing while on-power; an auxiliary storage unit functionable even off-power; a control unit...
US-8,782,387 Secure boot of a data breakout appliance with multiple subsystems at the edge of a mobile data network
A secure boot is provided for a breakout system having multiple subsystems at the edge of a mobile data network. The secure boot utilizes two trusted platform...
US-8,782,343 System and method for optimizing data remanence over hybrid disk clusters using various storage technologies
A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming...
US-8,782,174 Uploading and downloading unsecured files via a virtual machine environment
Methods, computer program products, and apparatuses are provided for securely exchanging a data file between a client machine and a remote application server...
US-8,782,086 Updating dispersed storage network access control information
In a dispersed storage network where slices of secure user data are stored on geographically separated storage units, a managing unit connected to the network...
US-8,781,978 Support vector machines processing system
An implementation of SVM functionality improves efficiency, time consumption, and data security, reduces the parameter tuning challenges presented to the...
US-8,781,974 System and method for a private and secure financial transaction system using a central system
A financial transaction system between a customer and a financial institution has a central system that facilitates private and secure payment transactions from...
US-8,781,962 System and method for providing alternate funding source for portable consumer device
A system, apparatus, and method for providing a mechanism for loading a prepaid card, such as a payroll card, with funds from a source other than the employer...
US-8,781,936 Financial data entry system
A method of tracking and aggregating all Securities and Exchange Commission (SEC) "shelf" registration and all capital market activity related to those shelf...
US-8,781,687 Security system comprising a self-mixing laser sensor and method of driving such a security system
A security system is described, comprising a sensor module (15) which accommodates a laser sensor (10) working with self-mixing interference. The laser sensor...
US-8,781,123 Method for processing location information relating to a terminal connected to a packet network via a cellular...
A method (400) for processing location information relating to a certain mobile station in a cellular network is presented. The method involves a first network...
US-8,781,087 Simultaneous voice and data systems for secure catalog orders
Systems and methods for providing a simultaneous voice and data user interface for secure catalog orders and in particular for providing a system and method for...
US-8,780,890 Hybrid packet-switched and circuit-switched telephony system
A hybrid telephony system with packet switching as well as circuit switching optimizes utilization of transport networks, and is accessible from any...
US-8,780,474 Writing data to tape medium
In a controller of a tape drive, a CM input-output unit recognizes a tape format; a tape variable acquisition unit acquires tape variables; a setting variable...
US-8,780,199 Networked security camera with local storage and continuous recording loop
A networked surveillance audio-video recorder for security applications with local storage and continuous record loop using high-definition video and encrypted...
US-8,779,922 Data center equipment location and monitoring system
Data center equipment location systems include hardware and software to provide information on the location, monitoring, and security of servers and other...
US-8,779,920 Multithreat safety and security system and specification method thereof
The invention relates to a safety and security system designed to protect a designated area. The system comprises sensors of various types (radars, infrared...
US-8,779,891 Access control device
The invention relates to an access control device, in particular for a switchgear cabinet system, having a central unit, which is designed to receive and...
US-8,777,116 Display-enabled card with security authentication function
A display-enabled card with security authentication function includes a flexible card structure internally provided with a flexible electronic system, which...
US-8,776,622 Apparatus for mobile collection of atmospheric sample for chemical analysis
Portable devices and related methods for collecting and storing atmospheric samples for subsequent chemical analysis are provided. A sample cartridge according...
US-8,776,254 System and method for the secure unidirectional transfer of software and software updates
A system is disclosed that provides an authenticated payload, e.g., a software program or update, to a recipient device. A storage device stores a payload. A...
US-8,776,252 System, method, and computer program product for securing data on a server based on a heuristic analysis
A system, method, and computer program product are provided for securing data on a server based on a heuristic analysis. In use, information associated with...
US-8,776,251 Data exchange between a secure element and a terminal
A method for data exchange between a secure element and a terminal, the secure element including a CRS (Contactless Registry Service) application, a CREL...
US-8,776,247 Verification of process integrity
A system implements a secure transaction of data between a server and a remote device. The remote device comprises: processing means adapted to process input...
US-8,776,238 Verifying certificate use
A method, system, and computer usable program product for verifying certificate use are provided in the illustrative embodiments. A secure data communication is...
US-8,776,230 Master security policy server
A master policy server manages security polices for client computers through a network of local policy servers. Each local policy server is responsible for the...
US-8,776,213 Mobile application security system and method
A system for authenticating the user of a computing device comprises an authorized user directory. Each record is uniquely associated with an authorized user...
US-8,776,211 Processing commands according to authorization
Devices, systems, methods, and other embodiments associated with processing commands according to authorization are described. In one embodiment, a chip...
US-8,776,206 Method, a system, and an apparatus for content security in computer networks
The present invention relates to a method, a system, and an apparatus for protecting data in a computer network. A device is placed on a network edge in such a...
US-8,776,198 Techniques for non-unique identity establishment
Techniques for non-unique identity establishment are presented. A plurality of biometric data associated with a user is acquired from a plurality of biometric...
US-8,776,183 Networks
A Personal Area Network Security Domain (PSD) is formed between devices (142, 150, 152, 154 and 156). The PSD allows the sharing of data and/or resources...
US-8,776,182 Secure boot of a data breakout appliance with multiple subsystems at the edge of a mobile data network
A secure boot is provided for a breakout system having multiple subsystems at the edge of a mobile data network. The secure boot utilizes two trusted platform...
US-8,776,145 In-transit electronic media with location-based content
Exemplary methods, systems and components are implemented on a multipassenger transit vehicle to provide passenger access to a pre-assigned interactive...
US-8,775,824 Protecting the security of secure data sent from a central processor for processing by a further processing device
A data processing apparatus comprising: a data processor for processing data in a secure and a non-secure mode, said data processor processing data in said...
US-8,775,819 Flexible method of user authentication
A method of authorising a user in communication with a workstation is disclosed. According to the method, a system automatically determines a plurality of...
US-8,775,816 Method and apparatus to enhance security and/or surveillance information in a communication network
Existing video surveillance security approaches enhanced with suitable functionality of the telecommunications wireless network are provided. Security personnel...
US-8,775,805 System and method for variable length encryption
Systems and methods for performing a secure transaction provided. In one embodiment, the method for encrypting data is provided, comprising: selecting clear...
US-8,775,803 High security display of private data
A device, method, and computer-readable medium are disclosed. In one embodiment, the device includes an inbound port to receive information from an information...
US-8,775,799 Apparatus and method of securely moving security data
Provided is an apparatus and method of securely moving security data. An apparatus for securely moving security stored in a first apparatus to a second...
US-8,775,792 Method of and system for encryption and authentication
The invention provides a method of and system for networked security, involving multiple clients and servers. Rather than relying on single server based...
US-8,775,791 System and method for secure messaging between wireless device and application gateway
A method and system for secure messaging between a wireless device and an application gateway provides for connecting a device to an application mapping layer...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.