Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0364715 Methods for Recovering RFID Data Based Upon Probability Using an RFID Receiver
RFID data signals from RFID tags may be recovered by determining the probabilities of transitions between data states between a series of a pairs of signal...
2017/0364714 COMBINED READING APPARATUS FOR IDENTIFYING PRODUCT
Disclosed herein is a combined reading apparatus for identifying a product. According to a first aspect of the present invention, a combined reading apparatus...
2017/0364713 COMPUTING SYSTEMS AND METHODS
A security device for a local computer, said security device comprising a locked-down system environment that includes a remote-access connector and an...
2017/0364712 TECHNOLOGIES FOR SECURE INPUT/OUTPUT DEVICE ACTIVATION
Technologies for secure input/output device activation include a compute device to identify an attempt to activate an input/output device of the compute...
2017/0364711 SECURE ELEMENT
The invention relates to a secure element device comprising at least one processor, at least one communication interface, at least one memory RAM and NVM and...
2017/0364710 Apparatus and Method for Obfuscating Power Consumption of a Processor
An apparatus for obfuscating power consumption associated with one or more operations of a logic circuitry of a processor. The apparatus comprises...
2017/0364709 RELIABILITY ENHANCEMENT METHODS FOR PHYSICALLY UNCLONABLE FUNCTION BITSTRING GENERATION
A Hardware-Embedded Delay Physical Unclonable Function ("HELP PUF") leverages entropy by monitoring path stability and measuring path delays from core logic...
2017/0364708 PEER INTEGRITY CHECKING SYSTEM
A distributed file integrity checking system is described. The described peer integrity checking system (PICS) may negate an attack by storing a properties...
2017/0364707 TECHNOLOGIES FOR TRUSTED I/O WITH A CHANNEL IDENTIFIER FILTER AND PROCESSOR-BASED CRYPTOGRAPHIC ENGINE
Technologies for trusted I/O include a computing device having a processor, a channel identifier filter, and an I/O controller. The I/O controller may generate...
2017/0364706 File Protection Method and Apparatus
A file protection method, to resolve a problem that privacy of a file cannot be ensured by manually hiding the file or manually encrypting the file, is...
2017/0364705 METHOD AND SYSTEM FOR OBFUSCATION OF GRANULAR DATA WHILE RETAINING DATA PRIVACY
A method for obfuscating granular transaction data via the introduction of noise includes: storing transaction data entries, each including transaction data...
2017/0364704 PER-VOLUME TENANT ENCRYPTION AND EXTERNAL KEY MANAGER
A server node with one or more processors is configured to receive a request to write data to a storage medium and compress the data to yield compressed data....
2017/0364703 MANAGEMENT OF COLLABORATIVE DATASETS VIA DISTRIBUTED COMPUTER NETWORKS
Various embodiments relate generally to data science and data analysis, computer software and systems, and wired and wireless network communications to provide...
2017/0364702 INTERNAL CONTROLS ENGINE AND REPORTING OF EVENTS GENERATED BY A NETWORK OR ASSOCIATED APPLICATIONS
Provided is a process including: obtaining, with a network controls engine, network traffic, wherein: the network traffic is sent across the network between...
2017/0364701 STORING DIFFERENTIALS OF FILES IN A DISTRIBUTED BLOCKCHAIN
Provided is a process including: receiving a request to write a new version of a document to a tamper-evident, immutable data repository; determining that the...
2017/0364700 IMMUTABLE LOGGING OF ACCESS REQUESTS TO DISTRIBUTED FILE SYSTEMS
Provided is a process including: receiving a request to access a distributed data store, wherein the distributed data store stores a plurality of units of...
2017/0364699 TRANSPARENT CLIENT APPLICATION TO ARBITRATE DATA STORAGE BETWEEN MUTABLE AND IMMUTABLE DATA REPOSITORIES
Provided is a process including: receiving a first write request from an application requesting to write data to a first remote database via a network;...
2017/0364698 FRAGMENTING DATA FOR THE PURPOSES OF PERSISTENT STORAGE ACROSS MULTIPLE IMMUTABLE DATA STRUCTURES
Provided is a process including: receiving one or more write requests; selecting a first subset of the values as corresponding to higher-security fields;...
2017/0364697 DATA INTERWORKING METHOD AND DATA INTERWORKING DEVICE
A data interworking method and a data interworking device are provided. The implementation of the method comprises: receiving first data and second data,...
2017/0364696 METHOD FOR FILTERING DOCUMENTS AND ELECTRONIC DEVICE
Embodiments of the present disclosure relate to a method and apparatus for document retrieval. The method comprises: determining, in response to receiving a...
2017/0364695 SYSTEMS, METHODS, AND APPARATUSES FOR IMPLEMENTING CROSS-ORGANIZATIONAL DATA SHARING
In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing cross organizational data sharing including,...
2017/0364694 PLATFORM MANAGEMENT OF INTEGRATED ACCESS OF PUBLIC AND PRIVATELY-ACCESSIBLE DATASETS UTILIZING FEDERATED QUERY...
Various techniques are described for platform management of integrated access of public and privately-accessible datasets utilizing federated query generation...
2017/0364693 SYSTEMS AND METHODS FOR EFFICIENT ACCESS CONTROL
An apparatus configured for database access control. The apparatus includes a memory and a processor coupled to the memory, wherein the processor is configured...
2017/0364692 ELECTRONIC FILE SHARING LINK GRANULARITY
An electronic file sharing system includes a data store, a processor, and memory. The memory is coupled to the processor and stores instructions that when...
2017/0364691 Method and System for Controlling Encryption of Information and Analyzing Information as well as Terminal
The present document discloses methods, systems and terminals for controlling encryption of information and analyzing information. The method for controlling...
2017/0364690 TECHNIQUE FOR POSITION CALCULATION OF A RECEIVER VIA USE OF ENCRYPTED SIGNALS OF A PUBLIC REGULATED SERVICE
A method for determining a position of a receiver via use of encrypted signals of a public regulated service. The method comprises transmitting PRN code chips...
2017/0364689 TECHNOLOGIES FOR SECURELY BINDING A PLATFORM MANIFEST TO A PLATFORM
Technologies for securely binding a manifest to a platform include a computing device having a security engine and a field-programmable fuse. The computing...
2017/0364688 TECHNOLOGIES FOR TRUSTED I/O PROTECTION OF I/O DATA WITH HEADER INFORMATION
Technologies for trusted I/O include a computing device having a hardware cryptographic agent, a cryptographic engine, and an I/O controller. The hardware...
2017/0364687 SEALED NETWORK INITIALIZATION
Embodiments are provided for initializing a sealed network. A sealed network does not require administrators and may run on hardware and software that has been...
2017/0364686 AUTO-INJECTION OF SECURITY PROTOCOLS
A method for automatically enhancing security and fixing security vulnerabilities in the source code of a computer program in an object oriented run time...
2017/0364685 PROVIDING SECURITY TO COMPUTING SYSTEMS
Described herein are methods, device, and systems that provide security to various computing systems, such as, smartphones, tablets, personal computers,...
2017/0364684 IN-MEMORY ATTACK PREVENTION
Examples relate to in-memory attack prevention. The examples disclosed herein enable obtaining, in response to a first boot command, a first encryption key...
2017/0364683 COMPUTING DEVICE SECURE BOOT
A device includes a processor, a hardware component, a communication channel between the processor and the hardware component, and a secure memory that stores...
2017/0364682 APPARATUS, SYSTEM, AND METHOD FOR PROTECTING AGAINST KEYLOGGING MALWARE
An apparatus, system, and method is disclosed for protecting against key logger malware. The protection includes protection form grabbing keylogger malware. In...
2017/0364681 METHODS OF PRESERVING AND PROTECTING USER DATA FROM MODIFICATION OR LOSS DUE TO MALWARE
Methods of preserving and protecting user data from modification or loss due to malware are disclosed, as well as systems and computer program products related...
2017/0364680 DETECTING ATTACKS BY MATCHING OF ACCESS FREQUENCIES AND SEQUENCES IN DIFFERENT SOFTWARE LAYERS
A number of events are counted in different layers of a computing environment during execution of a software application. The number of counted events can be...
2017/0364679 INSTRUMENTED VERSIONS OF EXECUTABLE FILES
Examples described herein include receiving a loading request of an executable file from a requester. The executable file may include original content....
2017/0364678 COGNIZANT ENGINES: SYSTEMS AND METHODS FOR ENABLING PROGRAM OBSERVABILITY AND CONTROLABILITY AT INSTRUCTION...
The present invention is directed to system for and methods of real time observing, monitoring, and detecting anomalies in programs' behavior at instruction...
2017/0364677 USB STACK ISOLATION FOR ENHANCED SECURITY
Disclosed is a computer and method in a computer that detects attachment of an external device. A determination may be made whether the external device is...
2017/0364676 AUTHENTICATION AND CONTROL OF ENCRYPTION KEYS
An apparatus, a method, and a system are presented in which the apparatus includes an interface control circuit that may be configured to receive a message...
2017/0364675 Methods for User Authentication
Methods and systems for authenticating a user include presenting a list of themes on a user interface of a client device for user selection. Images of a...
2017/0364674 METHODS AND SYSTEMS FOR ACCESSING A SECURE SYSTEM
Systems and methods are described for accessing a secure system requiring multi-point authentication by receiving an optical image, wherein the optical image...
2017/0364673 DEVICE SECURITY VIA SWIPE PATTERN RECOGNITION
One embodiment provides a method for ensuring device security via swipe pattern recognition, the method comprising: utilizing at least one processor to execute...
2017/0364672 METHOD AND MOBILE TERMINAL FOR CONTROLLING SCREEN LOCK
A method of controlling screen lock and a mobile terminal employing the same is provided. The mobile device includes a User Interface (UI) for setting a screen...
2017/0364671 MOBILE WIRELESS HAND-HELD IDENTIFICATION SYSTEM AND BREATHALYZER
A mobile, wireless biometric identification system includes a biometric capture device which enables a smartphone, using a commercially established wireless...
2017/0364670 ELECTRONIC DEVICE AND WORKING MODE SELECTING METHOD THEREOF
A method for an electronic device to restrict functionality according to working mode is provided. The method establishes a fingerprint database, wherein the...
2017/0364669 RESTRICTED ACCOUNTS ON A MOBILE PLATFORM
Systems and techniques are provided for restricted accounts on a mobile platform. A request to create a restricted account may be received. The restricted...
2017/0364668 METHOD FOR PROCESSING DATA
Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the...
2017/0364667 PREMISES COMPOSITION & MODULAR RIGHTS MANAGEMENT
A multi-tired, modular, electronic system which utilizes restricted usage management. In a multi-tiered environment, lower tiered systems contain, based on...
2017/0364666 K-MER BASED STRAIN TYPING
At least one of the disclosed embodiments describes a computer system that enables efficient strain typing by comparing strain k-mer profiles to generate a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.