Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0032764 CARD READER
Provided is a card reader capable of preventing the illegitimate acquisition of data from the card reader even when a criminal attempts to obtain data...
2018/0032763 Magnetic Reader Identification of Objects
A magnetic reader for identifying an object includes a hardware processor, a memory storing multiple magnetic field profiles, and a magnetic field detector....
2018/0032762 RFID READER DISCIPLINE
A method for coordinating reader transmissions, according to one embodiment, includes: at a first reader, receiving from a second reader a request to transmit...
2018/0032761 SYSTEM AND METHOD FOR PREVENTING THIN/ZERO CLIENT FROM UNAUTHORIZED PHYSICAL ACCESS
Certain aspects direct to systems and methods for preventing a thin client or a zero client from unauthorized physical access. A microcontroller is provided...
2018/0032760 Method and System for Detecting Hardware Trojans and Unintentional Design Flaws
The present disclosure includes systems and methods relating to information flow tracking and detection of unintentional design flaws of digital devices and...
2018/0032759 OPEN REGISTRY FOR HUMAN IDENTIFICATION
An identity system for the Internet of Things (IOT) that enables users and machines to identify, authenticate and interact with items/identities/persons...
2018/0032758 Method and Systems using Privacy-Preserving Analytics for Aggregate Data
Methods and systems for transmitting user aggregate data to a third party, such that a privacy of the aggregated data is protected, while analytical usefulness...
2018/0032757 Health Status Matching System and Method
Techniques are disclosed for encrypting a user's health status and matching a user's profile with another user's profile based on each user's preferences for...
2018/0032756 SYSTEM AND METHOD FOR SECURE USE OF MESSAGING SYSTEMS
A system and method for secure use of messaging systems. A mediator may receive an original message, process the original message to produce a processed...
2018/0032755 Computer-Implemented System And Method For Storing And Retrieving Sensitive Information
A computer-implemented system and method for storing and retrieving sensitive information is provided. Segments of sensitive data each encrypted via a single...
2018/0032754 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM AND INFORMATION PROCESSING METHOD
A memory stores common identification information that is shared between a plurality of information provision institutions for identifying a person. A...
2018/0032753 PRIVACY PROTECTION IN NETWORK INPUT METHODS
Aspects of the present invention include a method, system and computer program product for preventing certain sensitive private or personal information of a...
2018/0032752 METHOD AND APPARATUS FOR NETWORK SECURE STORAGE
This application discloses a method for network secure storage. The method includes: receiving a client request to create a window; creating a window in...
2018/0032751 DISCOVERING AVAILABILITY OF DIGITAL MEDIA FROM MULTIPLE SOURCES
Disclosed are various embodiments for discovering availability of digital media titles from multiple digital media service providers. A user account can have a...
2018/0032750 INTEGRATED CREDENTIAL DATA MANAGEMENT TECHNIQUES
In general, systems and techniques are described for automating manual processes for managing credential data for customers have been issued a credential by an...
2018/0032749 ON-DEMAND DATABASE SERVICE SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR CONDITIONALLY ALLOWING AN...
In accordance with embodiments, there are provided mechanisms and methods for conditionally allowing an application of an entity access to data of another...
2018/0032748 MOBILE DEVICE PHOTO DATA PRIVACY
A computer-implemented method according to one embodiment includes identifying a photograph taken utilizing a mobile device, analyzing a plurality of privacy...
2018/0032747 System and Method for Database-Level Access Control Using Rule-Based Derived Accessor Groups
A system and method is provided that facilitates database-level access control using rule-based derived accessor groups. The system may comprise a database...
2018/0032746 SYSTEM AND METHOD FOR ENCAPSULATING AND ENABLING PROTECTION THROUGH DIVERSE VARIATIONS IN SOFTWARE LIBRARIES
A flexible software library in which the software modules are defined as an abstract intermediate representation. The flexible library allows security...
2018/0032745 SYSTEM AND METHOD OF BLOCKING ACCESS TO PROTECTED APPLICATIONS
Disclosed are systems and methods for blocking access to protected applications. An exemplary method includes: intercepting access by a process of first...
2018/0032744 METHODS OF DYNAMICALLY SECURING ELECTRONIC DEVICES AND OTHER COMMUNICATIONS THROUGH ENVIRONMENTAL AND SYSTEM...
This invention is for a system capable of securing one or more fixed or mobile computing device and connected system. Each device is configured to change its...
2018/0032743 METHOD FOR PROVIDING AN AUTHENTICATED CONNECTION BETWEEN AT LEAST TWO COMMUNICATION PARTNERS
A method for providing an authenticated connection between at least two communication partners including implementing a server application on a first...
2018/0032742 Multi-Focused Fine-Grained Security Framework
An approach is provided in which a knowledge manager generates a knowledge structure that includes security annotation tokens and term tokens. Each of the...
2018/0032741 PRIVACY AWARE INTENT RESOLUTION WITH EXTERNAL SOURCES
Methods for identifying and obtaining a suitable application for interacting with a selected content item by providing secure access to a limited portion of...
2018/0032740 ADAPTIVE SYSTEM PROFILE
An approach to generating and regenerating a profile value from features of a system (e.g., a computer system), allows for certain changes of features of the...
2018/0032739 ENCRYPTION OF APPLICATION DATA USING FIELD-LEVEL METADATA
Techniques are provided for identifying and encrypting fields of an application object at an application layer in a multi-tenant cloud architecture, using an...
2018/0032738 SECURE ELASTIC STORAGE IN A DISPERSED STORAGE NETWORK
A method for execution by a dispersed storage and task (DST) processing unit includes: generating an encoded data slice from a dispersed storage encoding of a...
2018/0032737 Static analysis based on abstract program representations
An application analysis platform enables automatic generation of abstract program representations (APRs) that are amenable to static analyses for finding...
2018/0032736 Cybersecurity Vulnerability Management System and Method
A method and system are provided for managing cybersecurity vulnerabilities of resources within at least one network. The method includes collecting data...
2018/0032735 SYSTEM AND METHOD FOR ENHANCING STATIC ANALYSIS OF SOFTWARE APPLICATIONS
In a system for determining components of a software application from binary code thereof, one or more binary files are read without loading any...
2018/0032734 SECURE BOOTING OF COMPUTER SYSTEM
A computer system is securely booted by executing a boot firmware to locate a boot loader and verify the boot loader using a first key that is associated with...
2018/0032733 Multiple Hardware-Separated Computer Operating Systems within a Single Processor Computer System to Prevent...
Using a single processor, separate and independent hardware-enforced operating systems (OS's) are created in a computer, each OS inaccessible by another OS so...
2018/0032732 Malicious Program Identification Based on Program Behavior
An execution of a data object is identified by a computing device. In response to identifying the execution of the data object, it is determined that the data...
2018/0032731 KERNEL-BASED DETECTION OF TARGET APPLICATION FUNCTIONALITY USING VIRTUAL ADDRESS MAPPING
Systems, methods, and computer programs are disclosed for detecting high-level functionality of an application executing on a computing device. One method...
2018/0032730 PORTABLE POWER CHARGER WITH WIRELESS AND DIRECT CHARGING CONNECTIVITY
A portable power charger is provided for charging one or more electronic devices using wireless power transmission components, such as a transmitter and a...
2018/0032728 HARDWARE-ASSISTED SYSTEM AND METHOD FOR DETECTING AND ANALYZING SYSTEM CALLS MADE TO AN OPERTING SYSTEM KERNEL
The present disclosure relates to a system and method for monitoring system calls to an operating system kernel. A performance monitoring unit is used to...
2018/0032727 USE OF AN APPLICATION CONTROLLER TO MONITOR AND CONTROL SOFTWARE FILE AND APPLICATION ENVIRONMENTS
In embodiments of the present invention, a framework for an extensible, file-based security system is described for determining an appropriate application,...
2018/0032726 ELIMINATION OF FALSE POSITIVES IN ANTIVIRUS RECORDS
Systems and methods for managing antivirus records. A method can include providing a data store of antivirus records, providing an antivirus application to be...
2018/0032725 METHOD AND APPARATUS FOR DISPLAYING KEYBOARD, AND TERMINAL DEVICE
Embodiments of the present invention disclose a method and an apparatus for displaying a keyboard, and a terminal device. The method includes: displaying, on a...
2018/0032724 GRAPH-BASED ATTACK CHAIN DISCOVERY IN ENTERPRISE SECURITY SYSTEMS
Methods and systems for detecting anomalous events include detecting anomalous events in monitored system data. An event correlation graph is generated based...
2018/0032723 SECURITY SUPERVISION
There is disclosed a system for monitoring the security of a target system (110) with a circuit (120), the target system (110) comprising at least one...
2018/0032722 VISUAL ACCESS ALERT SYSTEM
A user is involved in security on each access of a website, application or other computer element, and leveraging the user to enhance security. In one...
2018/0032721 KERNEL-BASED DETECTION OF TARGET APPLICATION FUNCTIONALITY USING OFFSET-BASED VIRTUAL ADDRESS MAPPING
Systems and methods are disclosed for detecting high-level functionality of an application executing on a computing device. One method comprises storing, in a...
2018/0032720 DETECTION OF MALICIOUS SOFTWARE PACKAGES
Systems and methods for a security tool that verifies the security of a software package. An example method may involve identifying a plurality of components...
2018/0032719 METHOD FOR PROCESSING SECURITY OF APPLICATION AND ELECTRONIC DEVICE SUPPORTING THE SAME
An electronic device is provided. The electronic device includes a memory to store an application, a communication interface to communicate with an external...
2018/0032718 ADVANCED PROTECTION SYSTEM FOR CONSUMABLE OR DETACHABLE PARTS FOR AN INDUSTRIAL PRINTER
A method for an industrial printer to secure at least one consumable or detachable element, the printer comprising a 1.sup.st microcontroller that will make a...
2018/0032717 SECURITY SYSTEM FOR CASH HANDLING MACHINE
The invention provides a security system for preventing unauthorised dispensing of cash from a cash dispenser (5), the cash dispenser (5) being located inside...
2018/0032716 CHAINED AUTHENTICATION USING MUSICAL TRANSFORMS
A service receives a request from a user of a group of users to perform one or more operations requiring group authentication in order for the operations to be...
2018/0032715 ENHANCED LEVEL OF AUTHENTICATION RELATED TO A SOFTWARE CLIENT APPLICATION WITHIN A CLIENT COMPUTING DEVICE
A method for authentication related to a software client application within a client computing device includes: in a first step, an authentication-related...
2018/0032714 Method of Dynamically Adapting a Secure Graphical Password Sequence
A method of dynamically adapting a secure graphical password sequence provides a secure means to access a restricted account through a dynamic password defined...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.