Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0046829 ANONYMIZING MACHINE DATA EVENTS
Components of a system for generating anonymized data from timestamped event data are disclosed. The generation of anonymized data is performed in accordance...
2018/0046828 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM AND INFORMATION PROCESSING METHOD
A memory stores a plurality of pieces of information transferred respectively from a plurality of information provision institutions. A processor extracts a...
2018/0046827 SECURE ACCESS TO INDIVIDUAL INFORMATION
A facility for accessing information relating to a person is described. In a reader device, the facility accesses first credentials stored in a first storage...
2018/0046826 DYNAMIC ENFORCEMENT OF PRIVACY SETTINGS BY A SOCIAL NETWORKING SYSTEM ON INFORMATION SHARED WITH AN EXTERNAL SYSTEM
An external system (such as a website) that interacts with users communicates with a social networking system to access information about the users, who may...
2018/0046825 METHOD AND APPARATUS FOR DISCOVERING SOCIAL TIES BASED ON CLOAKED TRAJECTORIES
An approach is provided for discovering social ties among users based on cloaked trajectories. In a method, cloaked regions of a first trajectory of a first...
2018/0046824 METHOD, UE AND NETWORK NODE FOR PROTECTING USER PRIVACY IN NETWORKS
A method for managing privacy of a user in a network includes generating, by a user equipment (UE), a Locally Administered Randomized WLAN MAC Address (LRA),...
2018/0046823 Secure Public Cloud
A method, system, computer-readable media, and apparatus for ensuring a secure cloud environment is provided, where public cloud services providers can remove...
2018/0046822 SECURE ACCESS TO HEALTHCARE INFORMATION
A system and method for providing or exchanging healthcare information (e.g., medical information) to authorized users in a secure manner. The method is...
2018/0046821 PROVIDING UNIQUE VIEWS OF DATA BASED ON CHANGES OR RULES
In one embodiment, a method comprises creating and storing, one or more data objects; wherein a first plurality of the data objects is associated with a base...
2018/0046820 SYSTEM AND METHOD FOR PERFORMING CONNECTION VALIDATION IN A MULTI-TENANT ENVIRONMENT
Described herein are systems and methods for providing access to a database in a multi-tenant environment, including the use of a connection pool, and support...
2018/0046819 STRONG CONFIRMATION MECHANISM FOR MANIPULATION OF SENSITIVE CONFIGURATION DATA
Pursuant to issuing a confirmation prompt to confirm an intention to perform a data management function in a computing environment, a processor device...
2018/0046818 QUICK USAGE CONTROL
One or more elements on a computing device can be selected and locked from use. For example, a first user (e.g., adult) of a computing device can allow a...
2018/0046817 DOCUMENT VERIFICATION SYSTEM
The present invention provides a method and system to facilitate the verification of genuineness of a document by visiting a unique, non-forgeable, permanent...
2018/0046816 METHOD AND APPARATUS FOR AUTOMATICALLY STORING AND APPLYING PERMISSIONS TO DOCUMENTS ATTACHED TO TEXT-BASED...
A method and electronic device are provided to determine that a text-based message to be sent from a sender to a recipient includes a document attached...
2018/0046815 Method and Apparatus for Secure Communication
Secrecy scheme systems and associated methods using list source codes for enabling secure communications in communications networks are provided herein....
2018/0046814 METHOD AND APPARATUS FOR IMAGE PRIVACY PROTECTION
A method and apparatus for protecting the details of an image to ensure privacy of the image by generating a protected image from an original image is...
2018/0046813 STRONG CONFIRMATION MECHANISM FOR MANIPULATION OF SENSITIVE CONFIGURATION DATA
An intention to perform a data management function in a computing environment is confirmed by issuing a confirmation prompt requiring a user to input at least...
2018/0046812 SECURE DATA PROCESSING ON SENSITIVE DATA USING TRUSTED HARDWARE
Methods, systems, and computer-readable media are directed towards receiving, at an untrusted component, a query for a data store. The query includes a...
2018/0046811 NON-DISRUPTIVE DDOS TESTING
DDoS testing service features testing and verifying the integrity of a DDoS mitigation strategy of an organization while maintaining operation of the targeted...
2018/0046809 SECURE HOST OPERATING SYSTEM RUNNING A VIRTUAL GUEST OPERATING SYSTEM
Among other things, a guest operating system is refreshed from a master image of the guest operating system repeatedly in connection with use of one or more...
2018/0046808 MULTI-MODAL MEMORY HIERARCHICAL MANAGEMENT FOR MITIGATING SIDE-CHANNEL ATTACKS IN THE CLOUD
Techniques for preventing side-channel attacks on a cache are provided. A method according to these techniques includes executing a software instruction...
2018/0046807 INTELLIGENT IDENTIFICATION OF STRESSED MACHINES FOR DATA SECURITY MANAGEMENT
Some embodiments provide a method for preventing stressed end machines from being scanned for security check on a host machine that executes several different...
2018/0046806 MEMORY SCANNING METHODS AND APPARATUS
Memory scanning methods and apparatus are disclosed. An example apparatus includes scan manager to identify a physical memory address that has recently been...
2018/0046805 HARDWARE-BASED SOFTWARE-RESILIENT USER PRIVACY EXPLOITING EPHEMERAL DATA RETENTION OF VOLATILE MEMORY
Various features relate to the providing Software-Resilient User Privacy within smartphones or other devices by storing and processing all pertinent values...
2018/0046804 APPARATUS AND METHOD FOR MONITORING CONFIDENTIALITY AND INTEGRITY OF TARGET SYSTEM
An apparatus and method for monitoring the confidentiality and integrity of a target system. The apparatus for monitoring the confidentiality and integrity of...
2018/0046803 TECHNOLOGIES FOR HARDWARE ASSISTED NATIVE MALWARE DETECTION
Technologies for hardware assisted native malware detection include a computing device. The computing device includes one or more processors with hook logic to...
2018/0046802 SYSTEM AND METHOD FOR DETECTING MALWARE IN MOBILE DEVICE SOFTWARE APPLICATIONS
A system and method for test a mobile device software application is provided. In one example, a mobile application can interface with an emulation environment...
2018/0046801 MALWARE DATA ITEM ANALYSIS
Embodiments of the present disclosure relate to a data analysis system that may automatically analyze a suspected malware file, or group of files. Automatic...
2018/0046800 DEVICE FOR DETECTING MALWARE INFECTED TERMINAL, SYSTEM FOR DETECTING MALWARE INFECTED TERMINAL, METHOD FOR...
A detection device generates an event sequence from events that are acquired for each of identifiers that distinguish among terminals in a monitoring target...
2018/0046799 MULTI-THREAT ANALYZER ARRAY SYSTEM AND METHOD OF USE
A method for determining the threat level of a sample, comprising: providing a multi-analyzer array running on a server comprising a static analyzer, a...
2018/0046798 Mining Sandboxes
A technique to confine a computer program to computing resources accessed during automatic testing. Sandbox mining first explores software behavior by means of...
2018/0046797 METHOD FOR INPUTTING A SECURE PASSWORD, SHEET, SET OF SHEETS, INPUT UNIT, AND USES THEREOF
The sheet for the implementation of the method bears a plurality of patterns positioned in pattern positions, each pattern position corresponding to a symbol...
2018/0046796 METHODS FOR IDENTIFYING COMPROMISED CREDENTIALS AND CONTROLLING ACCOUNT ACCESS
A system and method includes at an authentication platform that is implemented via one or more computing servers: identifying compromised credential data,...
2018/0046795 PROTECTING DATA IN MEMORY OF A CONSUMABLE PRODUCT
A non-transitory memory storing a digital signature of a consumable product where the digital signature indicates that an identifier and host device setting...
2018/0046794 SESSION ACTIVITY TRACKING FOR SESSION ADOPTION ACROSS MULTIPLE DATA CENTERS
Techniques are disclosed for managing session activity of SSO access across multiple data centers. Session activity of SSO access is managed across multiple...
2018/0046793 IMAGE DECOLORING APPARATUS AND METHOD OF CONTROLLING SECURITY IN IMAGE DECOLORING APPARATUS
According to an embodiment, an image erasing apparatus includes an accessory information acquiring unit and an execution availability determining unit. The...
2018/0046792 IDENTIFYING ONE OR MORE USERS BASED ON TYPING PATTERN AND/OR BEHAVIOR
One or more users (42) are identified based on typing pattern and/or behavior in a computerized system. A typing input is generated by one or more authorized...
2018/0046791 DEVICE, AUTHENTICATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT
A device includes a first unit and a second unit, wherein, a first storage controller of the first unit stores in a first storage authentication information...
2018/0046790 APPARATUSES, SYSTEMS, AND METHODS FOR PROVIDING ACCESS SECURITY IN A PROCESS CONTROL SYSTEM
Apparatuses, systems, and methods of the present disclosure may provide access security in a process control system. For example, current biometric data...
2018/0046789 BIOMETRIC IDENTITY VERIFICATION WITH LOCATION FEASIBILITY DETERMINATION
A method includes receiving an incoming biometric identification request on a first device from a user. First location data for the first device is determined....
2018/0046788 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM
Provided is an information processing apparatus including a processing unit configured to perform a predetermined process on the basis of first information...
2018/0046787 Method for identification of user's interaction signature
Method for identification of a interaction signature of a user, comprising the flowing steps of: acquisition of a direct data (10), acquisition of an indirect...
2018/0046786 PORTABLE TERMINAL AND METHOD OF SETTING AND RELEASING USE RESTRICTION THEREFOR
A portable terminal with a body having a front surface with a display device and a rear surface including a rear password input device provided on the rear...
2018/0046785 Multiple-Point Cognitive Identity Challenge System
A mechanism is provided for verifying an identity of a user using dynamically generated questions based on transactions conducted by the user. Responsive to...
2018/0046784 VIDEO FILE ATTRIBUTION
Methods, computer program products, and systems are set forth herein and can include examining a video file using content of an authorship attribution...
2018/0046783 MULTIMEDIA NETWORK SYSTEM WITH CONTENT IMPORTATION, CONTENT EXPORTATION, AND INTEGRATED CONTENT MANAGEMENT
This system provides wired and/or wireless access throughout a multimedia network built on a distributed architecture which can be transparent to the user....
2018/0046782 PERFORMING CHEMICAL TEXTUAL ANALYSIS TO DISCOVER DANGEROUS CHEMICAL PATHWAYS
According to one embodiment, a computer program product for performing chemical textual analysis to discover dangerous chemical pathways includes a computer...
2018/0046781 INFORMATION PROCESSING APPARATUS AND METHOD FOR CLINICAL LABORATORY MANAGEMENT
To facilitate management of the entirety of one or a plurality of clinical laboratories. This information processing apparatus is used in management of a...
2018/0046780 COMPUTER IMPLEMENTED METHOD FOR DETERMINING CLINICAL TRIAL SUITABILITY OR RELEVANCE
The invention relates to systems for structuring clinical trials protocols into machine interpretable form. A hybrid human and natural language processing...
2018/0046779 CACHING TECHNOLOGY FOR CLINICAL DATA SOURCES
Presented herein are systems and methods to automatically and periodically retrieve clinical trial data from an EDC source, process the data to transform it...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.