Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,688,987 Secure key distribution with general purpose mobile device
One embodiment is directed to a method for managing cryptographic information. The method includes initiating cryptographic information loading application on a...
US-8,688,985 Data security method and apparatus using a characteristic preserving encryption
Provided is a data security method and apparatus using a characteristic preserving encryption. The data security apparatus includes an interface communicating...
US-8,688,802 System, method and computer program product for serving an application from a custom subdomain
In accordance with embodiments, there are provided mechanisms and methods for serving an application from a custom subdomain. These mechanisms and methods for...
US-8,688,797 Managed peer-to-peer applications, systems and methods for distributed data access and storage
Applications, systems and methods for efficiently accessing and controlling data of devices among multiple computers over a network. Communication of data over...
US-8,688,590 System and method to strengthen advertiser and consumer affinity
A system and method is provided for an on-demand advertising information vault so that advertisers may establish accounts for distributing advertisements...
US-8,688,558 System and method for analyzing data associated with statistical arbitrage
Providing computer-based systems and methods for analyzing historical performance of financial securities and identifying trades in those securities based on...
US-8,688,209 Device for ambulatory monitoring of brain activity
A device for ambulatory monitoring of brain activity includes a patch secured to a head of a monitoring subject and an electrode secured to the head of the...
US-8,688,080 Visual voicemail client authentication
Visual voicemail enables a user to view a list of voicemail messages and caller information, and select which messages to hear. Currently, a handset accesses...
US-8,688,041 Methods and apparatus for secure, portable, wireless and multi-hop data networking
A mobile network solution provides secure and portable wireless networking service to mobile users with devices equipped with wireless network interfaces. The...
US-8,687,944 Frame indexing technique to improve personal video recording functionality and security of transmitted video
Systems and methods of efficiently indexing a digitized video stream are presented. In one embodiment, the method comprises receiving a coded video stream...
US-8,687,810 Chaotic cipher system and method for secure communication
The present invention provides a method for a data encryption device to perform network communications, the method comprising obtaining an indexed array of...
US-8,687,805 Context-aware based cryptography
A method, of providing a key pair for secure transmission of data between at least two applications, includes receiving context information relating to the...
US-8,687,804 Separating control and data operations to support secured data transfers
For a data transfer, security is negotiated via a control channel operating in accordance with a first protocol. The data is transmitted responsive to the...
US-8,687,802 Method and system for accelerating the deterministic enciphering of data in a small domain
Conventional block ciphers that traffic in 128-bit block sizes are ill-suited for operating in small domains like credit card numbers. Some embodiments relate...
US-8,687,799 Data processing circuit and control method therefor
When an encryption processing circuit encrypts data, a current flows in the encryption processing circuit. A noise current generated by a noise generation...
US-8,687,553 Multi-tier wireless home mesh network with a secure network discovery protocol
An apparatus and method for a multi-tier wireless home mesh network is described. The method may include formation of an infrastructure-less wireless home mesh...
US-8,687,536 Method and apparatus to create multicast groups based on proximity
Devices and methods use close range communication links, such as near field communication (NFC) protocol links, to enable users to authenticate mobile devices...
US-8,687,475 Optical pickup device, optical pickup unit and data streamer apparatus
In one embodiment, an optical pickup device includes a fixed portion 100, a movable portion 11, first and second elastic supporting members 12a and 12b, one and...
US-8,687,242 Image processing apparatus for obtaining image data comprising a code generation section, an encryption...
In a digital multi-function peripheral, a QR code generation section generates image data of a QR code on the basis of first data for security of obtained image...
US-8,685,759 E-chuck with automated clamped force adjustment and calibration
The present disclosure describes a semiconductor manufacturing apparatus. The apparatus includes a processing chamber designed to perform a process to a wafer;...
US-8,685,110 System and method for securing a computer system
A secured computer system includes a communication interface and an intrusion detection module. The computer system may be portable and configured for wireless...
US-8,684,159 Method and apparatus for varying coin-processing machine receptacle limits
In one aspect, a method for optimizing a usable volume of a coin receptacle associated with a coin-processing device includes receiving a plurality of coins in...
US-8,683,602 System and method for multilevel secure object management
A system and method for secure transport of data, the method comprising: sharing of key information with a key distributor, wherein the key information is for...
US-8,683,600 Print policy commands
Embodiments of converting or translating electronic data from a first format to a second format with an applied electronic data security policy in mechanisms...
US-8,683,598 Mechanism to evaluate the security posture of a computer system
A mechanism for evaluating the security posture of a computer system is described. In one embodiment, a method includes receiving data representing an event...
US-8,683,549 Secure data storage and retrieval incorporating human participation
A computer related security mechanism requires that a human participate in an access verification sequence. Upon a request to access secure data, a puzzle is...
US-8,683,547 System and method for implementing adaptive security zones
A system for managing adaptive security zones in complex business operations, comprising a rules engine adapted to receive events from a plurality of event...
US-8,683,232 Secure user/host authentication
A portable storage device has a storage peripheral interface connecting to a computer. An encrypted data storage is available to the computer connected to the...
US-8,683,218 System and method for N-dimensional encryption
A system and method is directed to providing an n-dimensional entity for encoding and storing data securely. A user provides a cursor position within the...
US-8,683,215 Programmable security platform
A dynamically programmable security device. The device includes: a secure nonvolatile read only memory (NVMROM) for securely storing a unique device cipher key;...
US-8,683,214 Method and device that verifies application program modules
The present invention aims to perform tamper detection on a protection control module without having detection modules come to know the key data and functions...
US-8,683,212 Method and system for securely loading code in a security processor
Securely loading code in a security processor may include autonomous fetching an encrypted security data set, which may comprise security code and/or root keys,...
US-8,683,208 Information processing device, program developing device, program verifying method, and program product
According to one embodiment, an information processing device stores a program list and plural types of security functions each defining therein protection...
US-8,683,189 On-chip security method and apparatus
A boot method an apparatus are described which reduce the likelihood of a security breach in a mobile device, preferably in a situation where a reset has been...
US-8,683,059 Method, apparatus, and computer program product for enhancing computer network security
A security management approach that combines network security management with application layer or software service security to address the threat of internal...
US-8,682,986 Communication device having the capability of performing information exchange between a facsimile medium and an...
A communication device allows a user to get access from the outside via an external public line to obtain e-mail data stored in a device connected to an...
US-8,682,934 Metadata generating apparatus, information processing apparatus, imaging apparatus, video conference system,...
A metadata generating apparatus generating metadata associated with content data continuously generated in real time includes an additional information...
US-8,682,912 Providing secure access to data with user defined table functions
Methods, systems and articles of manufacture are disclosed for providing secure access to data. Public UDTFs, private UDTFs and a metadata processor are...
US-8,682,868 Removal of data remanence in deduplicated storage clouds
A method implemented in a computer infrastructure including a combination of hardware and software includes receiving from a local computing device a request to...
US-8,682,845 Secure high performance multi-level security database systems and methods
In accordance with one or more embodiments of the present disclosure, systems and methods described herein provide for transferring data over one or more...
US-8,682,801 Method and arrangement for provision of security relevant services via a security module of a franking machine
In a method and an arrangement for provision of at least one secured service via a security module of a franking machine for at least one procedure for data...
US-8,682,770 Using commercial share of wallet in private equity investments
Commercial size of spending wallet ("CSoSW") is the total business spend of a business including cash but excluding bartered items. Commercial share of wallet...
US-8,682,767 System and method for accessing and displaying data relating to financial securities
A computer system for furnishing data relating to investments has a processor and one or more memory storage devices in communication with the processor. Data...
US-8,682,763 Apparatus and method for component analysis of pooled securities
A system for valuation of pooled financial products contracts comprises receiving or extracting or generating data elements regarding financial products...
US-8,682,750 Method and apparatus for enabling purchase of or information requests for objects in digital content
A client computing system renders digital content (such as, for example, a movie or TV program) for a user. Based on the user's interest, the user may select an...
US-8,682,309 Decision support
Decision support information is exchanged over a secure wireless network among mobile computing devices, and also optionally a central command computer. Each of...
US-8,682,043 Method of merging anatomical data and surface data of a patient's dentition
A method of obtaining and merging volumetric data and surface data of a patient's dentition for use in designing and/or manufacturing a prosthodontic component,...
US-8,682,034 System for automated screening of security cameras
The present invention involves a system for automatically screening closed circuit television (CCTV) cameras for large and small scale security systems, as used...
US-8,681,989 WCDMA 3G voice communication protection method and terminal using the same
A WCDMA 3G voice communication protection method and a terminal using the method are provided. The method is performed by a terminal operating in conjunction...
US-8,681,988 Encoding a connection between a base and a mobile part
A method for encoding a connection between a base (2) and a mobile part (1), and a computer program product is povided. The method comprises generating a key...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.