Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0286698 Systems and Methods for Uploading Streamed Objects to a Cloud Storage System
Methods in a cloud object store facilitate strong data encryption, customer-management of object (encryption) keys, reductions in latency, globally-distributed...
2017/0286697 Systems and Methods for Proxying Encryption Key Communications Between a Cloud Storage System and a Customer...
Methods in a cloud object store facilitate strong data encryption, customer-management of object (encryption) keys, reductions in latency, globally-distributed...
2017/0286696 Systems for Improving Performance and Security in a Cloud Computing System
Methods in a cloud object store facilitate strong data encryption, customer-management of object (encryption) keys, reductions in latency, globally-distributed...
2017/0286695 Methods for Improving Performance and Security in a Cloud Computing System
Methods in a cloud object store facilitate strong data encryption, customer-management of object (encryption) keys, reductions in latency, globally-distributed...
2017/0286694 METHOD AND APPARATUS FOR PERFORMING PROTECTED WALK BASED SHADOW PAGING
PWSP method includes storing a multiple level page tables structure in second stage page tables (S2). The method includes: when an S2 entry is marked with a...
2017/0286693 SECURITY ANALYSIS USING RELATIONAL ABSTRACTION OF DATA STRUCTURES
Analyzing program code can include detecting an instance of a container within the program code using a processor, selecting a model container correlated with...
2017/0286692 VULNERABILITY FINDING DEVICE, VULNERABILITY FINDING METHOD, AND VULNERABILITY FINDING PROGRAM
A vulnerability finding device has a vulnerability extracting unit, a normalization processing unit, and a matching unit. The vulnerability extracting unit...
2017/0286691 Pattern generation, IDS signature conversion, and fault detection
Fault injection methods and apparatus are disclosed. An example method includes interjecting a pattern with fault-inducing sub-fields, where the pattern is an...
2017/0286690 Automatic Generation of Data-Centric Attack Graphs
Generating an attack graph is provided. A set of sensitive data corresponding to a regulated service is identified. A set of components corresponding to the...
2017/0286689 DETECTING VULNERABILITIES IN MANAGED CLIENT DEVICES
Various examples relate to detecting vulnerabilities in managed client devices. In some examples, a system determines whether a vulnerability scan of a...
2017/0286688 PRECISION-TUNED RUNTIME MONITORING
Preliminary program analysis of an executable may be performed. A security vulnerability level of a portion of the executable may be determined based on the...
2017/0286687 PROTECTION OF DATA STORED IN A VOLATILE MEMORY
A method of detecting a cold-boot attack includes transferring, into a first volatile memory of an integrated circuit, a pattern stored in a non-volatile...
2017/0286686 PROTECTION OF SECURED BOOT SECRETS FOR OPERATING SYSTEM REBOOT
Protecting secured boot secrets while starting an operating system. Embodiments include starting a first operating system using a trusted computing base,...
2017/0286685 METHOD AND SYSTEM FOR VERIFYING AUTHENTICITY OF AT LEAST PART OF AN EXECUTION ENVIRONMENT FOR EXECUTING A...
A system for verifying authenticity of at least part of an execution environment for executing a computer program module. The system includes a processor and a...
2017/0286684 Method for Identifying and Removing Malicious Software
A method for identifying and removing malicious code uses a personal computing device that can communicate with a remote server. The remote server manages a...
2017/0286683 SYSTEM AND METHODS THEREOF FOR IDENTIFICATION OF SUSPICIOUS SYSTEM PROCESSES
A computerized method for identification of suspicious processes executing on an end-point device communicatively connected to network, the network...
2017/0286682 ELECTRONIC DEVICE AND PROTECTION METHOD
According to a first aspect of the present disclosure, an electronic device is provided, comprising: an attack detection unit arranged to detect one or more...
2017/0286681 RESTRICTING REPROGRAMMING OF A REDIRECTED USB DEVICE
Reprogramming of a redirected USB device can be restricted to prevent the redirected USB device's firmware from being modified maliciously. A virtual bus...
2017/0286680 ADAPTIVE SYSTEMS AND PROCEDURES FOR DEFENDING A PROCESSOR AGAINST TRANSIENT FAULT ATTACKS
Various features pertain to defending a smartphone processor or other device from a transient fault attack. In one example, the processor is equipped to detect...
2017/0286679 System, Apparatus And Method For Performing Secure Memory Training And Management In A Trusted Environment
In one embodiment, a system includes: a processor; a security processor to execute in a trusted executed environment (TEE), the security processor to execute...
2017/0286678 Behavior Profiling for Malware Detection
Provided herein are systems and methods for behavior profiling of targets to determine malware presence. The method includes, in various embodiments, applying...
2017/0286677 SYSTEMS AND METHODS FOR INFERENCE OF MALWARE LABELS IN A GRAPH DATABASE
Systems and methods are described which integrate file properties that in conventional systems has been considered weaker evidence of malware and analyzes the...
2017/0286676 METHOD OF MALWARE DETECTION AND SYSTEM THEREOF
There is provided a system and a computer-implemented method of detecting malware in real time in a live environment. The method comprises: monitoring one or...
2017/0286675 Fingerprinting Electronic Control Units For Vehicle Intrusion Detection
An anomaly-based intrusion detection system is presented for use in vehicle networks. The intrusion detection system measures and exploits the intervals of...
2017/0286674 Time Varying Address Space Layout Randomization
Embodiments include computing devices, apparatus, and methods implemented by the apparatus for time varying address space layout randomization. The apparatus...
2017/0286673 Malware-Resistant Application Control in Virtualized Environments
Described systems and methods enable enforcing application control remotely and automatically, on a relatively large number of client systems (e.g., a...
2017/0286672 System, Apparatus And Method For Filtering Memory Access Logging In A Processor
In one embodiment, a processor comprises: a first storage including a plurality of entries to store an address of a portion of a memory in which information...
2017/0286671 Detecting Malicious User Activity
Detecting malicious user activity is provided. A profile for a user that accesses a set of protected assets is generated based on static information...
2017/0286670 MALWARE DETECTION AND IDENTIFICATION USING DEVIATIONS IN ONE OR MORE OPERATING PARAMETERS
A method is provided for detecting malware, such as a virus or spyware. The method looks for deviations expected operating parameters instead of focusing...
2017/0286669 SYSTEMS AND METHODS FOR SECURING VIRTUAL MACHINE COMPUTING ENVIRONMENTS
Systems and methods are provided for securing data in virtual machine computing environments. A request is received for a security operation from a first...
2017/0286668 TECHNOLOGIES FOR MUTUAL APPLICATION ISOLATION WITH PROCESSOR-ENFORCED SECURE ENCLAVES
Technologies for mutual application isolation include a computing device having a processor with secure enclave support. The computing device loads an...
2017/0286667 Password Recovery
A password recovery technique for access to a system includes receiving a request from a first party to recover the first party's password to access the...
2017/0286666 SYSTEM AND METHOD FOR REPLACING COMMON IDENTIFYING DATA
A system and method for generating a unique identifier for a user. A processor hosted by the system transmits a prompt for user selection of a digital image...
2017/0286665 DEVICES AND METHODS FOR FACILITATING SOFTWARE SIGNING BY MORE THAN ONE SIGNING AUTHORITY
Electronic devices are adapted to facilitate execution of software signed by more than one entity. According to one example, an electronic device can store...
2017/0286664 DYNAMIC UPDATING OF PROCESS POLICIES
A system for changing policy information of a process is provided. When a process is to execute, the system stores policy information for the process in...
2017/0286663 SYSTEM AND METHOD EMPLOYING REDUCED TIME DEVICE PROCESSING
Methods and systems for facilitating a transaction are provided. A transaction involving an integrated circuit user device in contact with an access device is...
2017/0286662 INFORMATION DISPLAY DEVICE
The present invention provides an information display device which may simply display a defined information to improve the convenience. The information display...
2017/0286661 BIOMETRICS FOR USER IDENTIFICATION IN MOBILE HEALTH SYSTEMS
A wearable device may include a sensor system capable of obtaining physiological from a user's body. Some wearable devices may include a substance delivery...
2017/0286660 Method for Unlocking Screen by Using Fingerprint and Terminal
A method for unlocking a screen by using a fingerprint includes: sending, by a fingerprint sensor, a first notification to a control chip and concurrently...
2017/0286659 BIOMETRIC AUTHENTICATION
In an example biometric authentication system, a light beam generator may be configured to generate a light beam. The light beam may be projected to a retina...
2017/0286658 Biometric recognition system
A biometric recognition system for a hand held computing device incorporating an inertial measurement unit (IMU) comprising a plurality of accelerometers and...
2017/0286657 SECURE STORAGE OF FINGERPRINT RELATED ELEMENTS
The present disclosure relates to secure storage of a detailed set of elements relating to fingerprint features for a finger and to a method for authenticating...
2017/0286656 SYSTEMS AND METHODS FOR PAIRED DEVICE AUTHENTICATION
A pair of remote computing devices for authenticating a user of one of the pair of remote computing devices is provided. The pair of remote computing devices...
2017/0286655 WEARABLE DEVICE, SYSTEM INCLUDING THE SAME, AND OPERATION METHODS THEREOF
A wearable device may include: an authentication unit suitable for authenticating a user by verifying user identification information of the user; a sensor...
2017/0286654 SYSTEM AND METHOD FOR SMART WEAPON IMPLEMENTATION AND DEPLOYMENT
A weapon is equipped with processing capabilities and can include, inter alia, communication technology, geographic positioning systems, a camera, memory and...
2017/0286653 IDENTITY RISK SCORE GENERATION AND IMPLEMENTATION
Embodiments are directed to providing an identity risk score as part of an authentication assertion, applying operating heuristics to determine an operating...
2017/0286652 SECURITY MODEL FOR NETWORK INFORMATION SERVICE
Systems and methods for providing information security in a network environment are disclosed. The method includes initiating processing, invoked by a user, of...
2017/0286651 AUTHENTICATION
Robotic customer service agents are provided such that, when properly authenticated, they are operable to perform a customer service task. A contact center may...
2017/0286650 TIERED CODE OBFUSCATION IN A DEVELOPMENT ENVIRONMENT
A method for viewing a plurality of encrypted code displayed within an integrated development environment with a pair of augmented reality (AR) glasses. A...
2017/0286649 ELECTRONIC STORAGE SYSTEM
An electronic storage system is provided. The system includes a housing, securable units within the housing, a kiosk to assign securable units to users and to...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.