Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0300718 IDENTIFYING ONLINE SYSTEM USERS INCLUDED IN A GROUP GENERATED BY A THIRD PARTY SYSTEM WITHOUT THE THIRD PARTY...
A third party system generates a group of users and a function that identifies users in the group as well as additional users not in the group when applied to...
2017/0300717 MOBILE OBJECT AND ANTENNA AUTOMATIC ALIGNMENT METHOD AND SYSTEM THEREOF
An antenna automatic alignment method for a mobile object includes acquiring, in real time, current feature information of a plurality of antennas of the...
2017/0300716 SYSTEM AND METHOD FOR GENERATION, STORAGE, ADMINISTRATION AND USE OF ONE OR MORE DIGITAL SECRETS IN ASSOCIATION...
A system for generation, storage, administration and use of one or more digital secrets in association with a portable electronic device. The system comprises...
2017/0300715 PATIENT DATA HUB
In one example, the patient data hub includes a housing, a first network interface disposed within the housing, a second network interface disposed within the...
2017/0300714 PREFIX SEARCH IN ENCRYPTED TEXT
A method enables prefix search of cloud stored encrypted files that are encrypted using an order preserving encryption (OPE) algorithm. The encrypted text...
2017/0300713 Method and System for Verifiable Searchable Symmetric Encryption
A method for verification of search results in an encrypted search process includes transmitting a search query including the encrypted keyword from a client...
2017/0300712 FINE GRAIN SECURITY FOR ANALYTIC DATA SETS
The technology disclosed relates to assigning field level security to fields extracted from primary sources on a batch basis and compiled into analytical,...
2017/0300711 INFORMATION PROCESSING METHOD AND DEVICE AND COMPUTER-READABLE MEDIUM
Disclosed are an information processing method and device and a computer-readable medium. The method includes: communication data is acquired from a...
2017/0300710 RETROACTIVE SHARED CONTENT ITEM LINKS
A content management system implementing methodologies providing retroactive shared content item links is disclosed. The content management system and...
2017/0300709 LIMITED-ACCESS FUNCTIONALITY ACCESSIBLE AT LOGIN SCREEN
Techniques and technologies for providing limited-access functionality accessible at a "login screen" (or "lock screen") of a device are described. In at least...
2017/0300708 METRICS AUTHORIZATION BASED ON A CERTIFICATE
In one implementation, a system can include a tenant engine to maintain a plurality of tenant profiles with access to a first set of metrics of a plurality of...
2017/0300707 Method and Device for Accessing and Processing Image
A method and device for processing and accessing image are provided. The image processing method includes: one or more protected areas are determined in an...
2017/0300706 HYBRID APPROACH TO DATA GOVERNANCE
A cloud-based data governance system includes a processing unit, a network adapter, and memory for storing data and code. The network adapter establishes a...
2017/0300705 HYBRID APPROACH TO DATA GOVERNANCE
A cloud-based data governance system includes a processing unit, a network adapter, and memory for storing data and code. The network adapter establishes a...
2017/0300704 System for Controlling Database Security and Access
Systems for controlling access to a database are provided. A system may include a computing platform that may receive a request to access a database from a...
2017/0300703 Securely Processing Range Predicates on Cloud Databases
Methods, systems, and computer program products for securely processing range predicates on cloud databases are provided herein. A computer-implemented method...
2017/0300702 PRESERVING DATA PROTECTION AND ENABLING SECURE CONTENT AWARENESS IN QUERY SERVICES
Embodiments of the present disclosure include systems and methods for providing query service of secured contents. A data collection service collects data and...
2017/0300701 SECURE AND COMPLIANT EXECUTION OF PROCESSES
At design time, a process designer may generate a workflow model of a process associated with in-memory database. The workflow model include tasks and...
2017/0300700 METHOD FOR CONTROLLING LOCK STATUS OF APPLICATION AND ELECTRONIC DEVICE SUPPORTING SAME
Provided are a method of controlling a lock status of an application and an electronic device supporting the method. The method includes receiving a first...
2017/0300699 System, Method and Apparatus to Visually Configure an Analysis of a Program
A method extracts views from an application program, where at least some extracted views include at least one view component, and presenting the extracted...
2017/0300698 Distributed System for Discovery of Vulnerabilities in Applications Including Detecting and/or Filtering Out...
A vulnerability report evaluation system comprises a preprocessor that takes as its input a data record representing a vulnerability report and outputs a...
2017/0300697 ENFORCING SECURITY POLICIES FOR SOFTWARE CONTAINERS
In response to an attempt to install an instance of a container in a production environment, a set of security criteria associated with the container and...
2017/0300696 SOFTWARE VERIFICATION METHOD AND APPARATUS
A software verification method and apparatus are disclosed, applied to the cloud computing field and the communications field, and can be used to automatically...
2017/0300695 ENCRYPTION AND DECRYPTION METHOD AND APPARATUS IN VIRTUALIZATION SYSTEM, AND SYSTEM
An encryption and decryption method in a virtualization system is disclosed. The virtualization system includes a VMM and an encryption and decryption virtual...
2017/0300694 SYSTEM AND METHOD FOR MAINTAINING SECURITY TAGS AND REFERENCE COUNTS FOR OBJECTS IN COMPUTER MEMORY
Described is a system and method for monitoring and enforcing information flow security in software systems. The system maintains security tags and reference...
2017/0300693 FOG-BASED DISTRIBUTED MALWARE DEFENSE
In one embodiment, a device in a network joins a fog-based malware defense cluster comprising one or more peer devices. The device and each peer device in the...
2017/0300692 Hardware Hardened Advanced Threat Protection
Systems and methods for hardware hardened advanced threat protection are described. In some embodiments, an Information Handling System (IHS) may include a...
2017/0300691 TECHNOLOGIES FOR SOFTWARE BASIC BLOCK SIMILARITY ANALYSIS
Technologies for analyzing software similarity include a computing device having access to a collection of sample software. The computing device identifies a...
2017/0300690 ENDPOINT MALWARE DETECTION USING AN EVENT GRAPH
A data recorder stores endpoint activity on an ongoing basis as sequences of events that causally relate computer objects such as processes and files, and...
2017/0300689 ANONYMIZED APPLICATION SCANNING FOR MOBILE DEVICES
Disclosed are various approaches for integrating application scanning into a mobile enterprise computing management system. A management service can add a...
2017/0300688 System and Method for Detecting and Preventing Execution of Malicious Instructions within a Processor of a...
In one aspect of the embodiments, malicious instructions executed or to be executed by a processor in a computing device are identified and preventive action...
2017/0300687 SYSTEMS, METHODS, AND APPARATUSES FOR CREDENTIAL HANDLING
An approach is described for securely and automatically handling credentials when used for accessing endpoints, and/or applications and resources on the...
2017/0300686 VISUAL STORYTELLING AUTHENTICATION
Method, system and media for authenticating a subject as a user. Embodiments generate visual stories specific to the user and for which the subject must select...
2017/0300685 METHOD AND SYSTEM FOR VISUAL AUTHENTICATION
A method for visual authentication with a monitoring system. The method includes pre-provisioning the monitoring system with a reference visual authentication...
2017/0300684 METHOD OF AUTHENTICATING A USER, CORRESPONDING TERMINALS AND AUTHENTICATION SYSTEM
A method of authenticating a user at a first terminal or a remote server connected to the first terminal, the authentication including inputting a code into...
2017/0300683 AUTHENTICATION SOURCE SELECTION
An example method is provided for a computing device to select an authentication source. The method may comprise receiving a request to authenticate a user...
2017/0300682 FINGERPRINT GESTURES
User authentication for a user device can leverage one or more fingerprint sensor regions capable of detecting and/or recognizing a user's fingerprints. The...
2017/0300681 SYSTEM AND METHOD FOR USER ENROLLMENT IN A SECURE BIOMETRIC VERIFICATION SYSTEM
A computer-implemented method and system for verifying the identity of a user in an identity authentication and biometric verification system which includes...
2017/0300680 BIOMETRIC ENROLMENT AUTHORISATION
A method of authorising enrolment of an RFID device including a biometric sensor may include separately sending the RFID device and an authorisation code...
2017/0300679 IDENTITY VERIFICATION
Certain embodiments of the invention generally relate to identity verification. A server may include at least one processor, and at least one memory including...
2017/0300678 METHOD AND APPARATUS FOR USING A BIOMETRIC TEMPLATE TO CONTROL ACCESS TO A USER CREDENTIAL FOR A SHARED...
Methods and apparatus for using a biometric template to control access to a user credential for a shared wireless communication device. One method includes...
2017/0300677 Security Mode Prompt Method and Apparatus
A security mode prompt method and apparatus where the method includes when it is determined that a terminal is currently in a first security mode, acquiring...
2017/0300676 METHOD AND DEVICE FOR REALIZING VERIFICATION CODE
A method and device for realizing a verification code are provided. In some embodiments, a character verification code is obtained and displayed when it is...
2017/0300675 LOGIN INTERFACE SELECTION FOR COMPUTING ENVIRONMENT USER LOGIN
A device may provide a login process to authenticate users prior to admittance to a computing environment. The device may also enable users to adjust various...
2017/0300674 Transaction Medium
A transaction medium comprises a non-e-paper portion and a passive e-paper display portion to display a first expression of an authentication element in a...
2017/0300672 FIELD CONTROL ANNOTATIONS BASED ON AUTHORIZATION OBJECTS
An application scaffold is generated based on an object model. The object model includes CDS objects and DCL objects. The CDS objects and the DCL objects are...
2017/0300671 AUTOMATICALLY MANAGING OPERATION ACROSS MULTIPLE PERSONAS IN ELECTRONIC DEVICE
Embodiments herein achieve a method for managing at least one operation in an electronic device. The method includes detecting, by a persona manager, at least...
2017/0300670 SYSTEMS AND METHODS FOR WATERMARKING SOFTWARE AND OTHER MEDIA
Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an...
2017/0300669 ENTERPRISE APPLICATION MANAGEMENT WITH ENROLLMENT TOKENS
Embodiments of the disclosure provide application management capabilities to enterprises. A computing device of a user, associated with the enterprise,...
2017/0300668 SYSTEM AND METHODS FOR PROVISIONING AND MONITORING LICENSING OF APPLICATIONS OR EXTENSIONS TO APPLICATIONS ON A...
Embodiments of the invention provide a mechanism for a multi-tenant platform operator (or a developer or publisher of an application or an extension to an...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.