At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
2017/0300718 |
IDENTIFYING ONLINE SYSTEM USERS INCLUDED IN A GROUP GENERATED BY A THIRD
PARTY SYSTEM WITHOUT THE THIRD PARTY... A third party system generates a group of users and a function that identifies users in the group as well as additional users not in the group when applied to... |
2017/0300717 |
MOBILE OBJECT AND ANTENNA AUTOMATIC ALIGNMENT METHOD AND SYSTEM THEREOF An antenna automatic alignment method for a mobile object includes acquiring, in real time, current feature information of a plurality of antennas of the... |
2017/0300716 |
SYSTEM AND METHOD FOR GENERATION, STORAGE, ADMINISTRATION AND USE OF ONE
OR MORE DIGITAL SECRETS IN ASSOCIATION... A system for generation, storage, administration and use of one or more digital secrets in association with a portable electronic device. The system comprises... |
2017/0300715 |
PATIENT DATA HUB In one example, the patient data hub includes a housing, a first network interface disposed within the housing, a second network interface disposed within the... |
2017/0300714 |
PREFIX SEARCH IN ENCRYPTED TEXT A method enables prefix search of cloud stored encrypted files that are encrypted using an order preserving encryption (OPE) algorithm. The encrypted text... |
2017/0300713 |
Method and System for Verifiable Searchable Symmetric Encryption A method for verification of search results in an encrypted search process includes transmitting a search query including the encrypted keyword from a client... |
2017/0300712 |
FINE GRAIN SECURITY FOR ANALYTIC DATA SETS The technology disclosed relates to assigning field level security to fields extracted from primary sources on a batch basis and compiled into analytical,... |
2017/0300711 |
INFORMATION PROCESSING METHOD AND DEVICE AND COMPUTER-READABLE MEDIUM Disclosed are an information processing method and device and a computer-readable medium. The method includes: communication data is acquired from a... |
2017/0300710 |
RETROACTIVE SHARED CONTENT ITEM LINKS A content management system implementing methodologies providing retroactive shared content item links is disclosed. The content management system and... |
2017/0300709 |
LIMITED-ACCESS FUNCTIONALITY ACCESSIBLE AT LOGIN SCREEN Techniques and technologies for providing limited-access functionality accessible at a "login screen" (or "lock screen") of a device are described. In at least... |
2017/0300708 |
METRICS AUTHORIZATION BASED ON A CERTIFICATE In one implementation, a system can include a tenant engine to maintain a plurality of tenant profiles with access to a first set of metrics of a plurality of... |
2017/0300707 |
Method and Device for Accessing and Processing Image A method and device for processing and accessing image are provided. The image processing method includes: one or more protected areas are determined in an... |
2017/0300706 |
HYBRID APPROACH TO DATA GOVERNANCE A cloud-based data governance system includes a processing unit, a network adapter, and memory for storing data and code. The network adapter establishes a... |
2017/0300705 |
HYBRID APPROACH TO DATA GOVERNANCE A cloud-based data governance system includes a processing unit, a network adapter, and memory for storing data and code. The network adapter establishes a... |
2017/0300704 |
System for Controlling Database Security and Access Systems for controlling access to a database are provided. A system may include a computing platform that may receive a request to access a database from a... |
2017/0300703 |
Securely Processing Range Predicates on Cloud Databases Methods, systems, and computer program products for securely processing range predicates on cloud databases are provided herein. A computer-implemented method... |
2017/0300702 |
PRESERVING DATA PROTECTION AND ENABLING SECURE CONTENT AWARENESS IN QUERY
SERVICES Embodiments of the present disclosure include systems and methods for providing query service of secured contents. A data collection service collects data and... |
2017/0300701 |
SECURE AND COMPLIANT EXECUTION OF PROCESSES At design time, a process designer may generate a workflow model of a process associated with in-memory database. The workflow model include tasks and... |
2017/0300700 |
METHOD FOR CONTROLLING LOCK STATUS OF APPLICATION AND ELECTRONIC DEVICE
SUPPORTING SAME Provided are a method of controlling a lock status of an application and an electronic device supporting the method. The method includes receiving a first... |
2017/0300699 |
System, Method and Apparatus to Visually Configure an Analysis of a
Program A method extracts views from an application program, where at least some extracted views include at least one view component, and presenting the extracted... |
2017/0300698 |
Distributed System for Discovery of Vulnerabilities in Applications
Including Detecting and/or Filtering Out... A vulnerability report evaluation system comprises a preprocessor that takes as its input a data record representing a vulnerability report and outputs a... |
2017/0300697 |
ENFORCING SECURITY POLICIES FOR SOFTWARE CONTAINERS In response to an attempt to install an instance of a container in a production environment, a set of security criteria associated with the container and... |
2017/0300696 |
SOFTWARE VERIFICATION METHOD AND APPARATUS A software verification method and apparatus are disclosed, applied to the cloud computing field and the communications field, and can be used to automatically... |
2017/0300695 |
ENCRYPTION AND DECRYPTION METHOD AND APPARATUS IN VIRTUALIZATION SYSTEM,
AND SYSTEM An encryption and decryption method in a virtualization system is disclosed. The virtualization system includes a VMM and an encryption and decryption virtual... |
2017/0300694 |
SYSTEM AND METHOD FOR MAINTAINING SECURITY TAGS AND REFERENCE COUNTS FOR
OBJECTS IN COMPUTER MEMORY Described is a system and method for monitoring and enforcing information flow security in software systems. The system maintains security tags and reference... |
2017/0300693 |
FOG-BASED DISTRIBUTED MALWARE DEFENSE In one embodiment, a device in a network joins a fog-based malware defense cluster comprising one or more peer devices. The device and each peer device in the... |
2017/0300692 |
Hardware Hardened Advanced Threat Protection Systems and methods for hardware hardened advanced threat protection are described. In some embodiments, an Information Handling System (IHS) may include a... |
2017/0300691 |
TECHNOLOGIES FOR SOFTWARE BASIC BLOCK SIMILARITY ANALYSIS Technologies for analyzing software similarity include a computing device having access to a collection of sample software. The computing device identifies a... |
2017/0300690 |
ENDPOINT MALWARE DETECTION USING AN EVENT GRAPH A data recorder stores endpoint activity on an ongoing basis as sequences of events that causally relate computer objects such as processes and files, and... |
2017/0300689 |
ANONYMIZED APPLICATION SCANNING FOR MOBILE DEVICES Disclosed are various approaches for integrating application scanning into a mobile enterprise computing management system. A management service can add a... |
2017/0300688 |
System and Method for Detecting and Preventing Execution of Malicious
Instructions within a Processor of a... In one aspect of the embodiments, malicious instructions executed or to be executed by a processor in a computing device are identified and preventive action... |
2017/0300687 |
SYSTEMS, METHODS, AND APPARATUSES FOR CREDENTIAL HANDLING An approach is described for securely and automatically handling credentials when used for accessing endpoints, and/or applications and resources on the... |
2017/0300686 |
VISUAL STORYTELLING AUTHENTICATION Method, system and media for authenticating a subject as a user. Embodiments generate visual stories specific to the user and for which the subject must select... |
2017/0300685 |
METHOD AND SYSTEM FOR VISUAL AUTHENTICATION A method for visual authentication with a monitoring system. The method includes pre-provisioning the monitoring system with a reference visual authentication... |
2017/0300684 |
METHOD OF AUTHENTICATING A USER, CORRESPONDING TERMINALS AND
AUTHENTICATION SYSTEM A method of authenticating a user at a first terminal or a remote server connected to the first terminal, the authentication including inputting a code into... |
2017/0300683 |
AUTHENTICATION SOURCE SELECTION An example method is provided for a computing device to select an authentication source. The method may comprise receiving a request to authenticate a user... |
2017/0300682 |
FINGERPRINT GESTURES User authentication for a user device can leverage one or more fingerprint sensor regions capable of detecting and/or recognizing a user's fingerprints. The... |
2017/0300681 |
SYSTEM AND METHOD FOR USER ENROLLMENT IN A SECURE BIOMETRIC VERIFICATION
SYSTEM A computer-implemented method and system for verifying the identity of a user in an identity authentication and biometric verification system which includes... |
2017/0300680 |
BIOMETRIC ENROLMENT AUTHORISATION A method of authorising enrolment of an RFID device including a biometric sensor may include separately sending the RFID device and an authorisation code... |
2017/0300679 |
IDENTITY VERIFICATION Certain embodiments of the invention generally relate to identity verification. A server may include at least one processor, and at least one memory including... |
2017/0300678 |
METHOD AND APPARATUS FOR USING A BIOMETRIC TEMPLATE TO CONTROL ACCESS TO A
USER CREDENTIAL FOR A SHARED... Methods and apparatus for using a biometric template to control access to a user credential for a shared wireless communication device. One method includes... |
2017/0300677 |
Security Mode Prompt Method and Apparatus A security mode prompt method and apparatus where the method includes when it is determined that a terminal is currently in a first security mode, acquiring... |
2017/0300676 |
METHOD AND DEVICE FOR REALIZING VERIFICATION CODE A method and device for realizing a verification code are provided. In some embodiments, a character verification code is obtained and displayed when it is... |
2017/0300675 |
LOGIN INTERFACE SELECTION FOR COMPUTING ENVIRONMENT USER LOGIN A device may provide a login process to authenticate users prior to admittance to a computing environment. The device may also enable users to adjust various... |
2017/0300674 |
Transaction Medium A transaction medium comprises a non-e-paper portion and a passive e-paper display portion to display a first expression of an authentication element in a... |
2017/0300672 |
FIELD CONTROL ANNOTATIONS BASED ON AUTHORIZATION OBJECTS An application scaffold is generated based on an object model. The object model includes CDS objects and DCL objects. The CDS objects and the DCL objects are... |
2017/0300671 |
AUTOMATICALLY MANAGING OPERATION ACROSS MULTIPLE PERSONAS IN ELECTRONIC
DEVICE Embodiments herein achieve a method for managing at least one operation in an electronic device. The method includes detecting, by a persona manager, at least... |
2017/0300670 |
SYSTEMS AND METHODS FOR WATERMARKING SOFTWARE AND OTHER MEDIA Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an... |
2017/0300669 |
ENTERPRISE APPLICATION MANAGEMENT WITH ENROLLMENT TOKENS Embodiments of the disclosure provide application management capabilities to enterprises. A computing device of a user, associated with the enterprise,... |
2017/0300668 |
SYSTEM AND METHODS FOR PROVISIONING AND MONITORING LICENSING OF
APPLICATIONS OR EXTENSIONS TO APPLICATIONS ON A... Embodiments of the invention provide a mechanism for a multi-tenant platform operator (or a developer or publisher of an application or an extension to an... |