Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0239923 LOCATION BASED DISK DRIVE ACCESS
Methods, apparatuses, systems, and devices are described for providing data security. In one method, data security is provided for a computing device having a...
2018/0239922 STORING DATA FROM A SENSOR DEVICE INTO A NEIGHBORING DEVICE
Embodiments of the present invention disclose a method, computer system, and a computer program product for routing an image file from an imaging device to a...
2018/0239921 SUPPORTING SECURITY ACCESS CONTROLS IN AN OVERLAY FILESYSTEM
An implementation of this disclosure provides a system comprising memory to store a plurality of layers and a processing device coupled to that memory to set...
2018/0239920 Secure Retrieval of Cloud-Based Sensitive Data by Obfuscating Data Access Patterns
Cloud-based data is securely retrieved by obfuscating access patterns. A cloud storage system receives a request for data from a remote client that specifies a...
2018/0239919 STORING DATA FROM A SENSOR DEVICE INTO A NEIGHBORING DEVICE
Embodiments of the present invention disclose a method, computer system, and a computer program product for routing an image file from an imaging device to a...
2018/0239918 Method and System for Anonymizing Activity Records
A method for processing activity records. The method includes obtaining an activity record, and generating an anonymization dictionary. Generating the...
2018/0239917 FILE TRANSMITTING AND RECEIVING SYSTEM
The present invention addresses the problem of realizing a tamper-proof and intrusion-proof file transmitting and receiving means between an Internet of Things...
2018/0239916 FEATURE-BASED ACCESS TO A MULTI-FUNCTION PERIPHERAL APPLICATION USING AN ACTIVATION SERVER
An approach provides feature-based access to an application executing on a Multi-Function Peripheral (MFP) using an activation server. An activation server...
2018/0239915 METHODS, APPARATUSES, AND STORAGE MEDIUMS FOR PROTECTING INFORMATION
Methods, apparatuses, and storage mediums are provided for protecting information. The method may include: acquiring an unlocking input for unlocking a...
2018/0239914 SYSTEM AND METHOD OF PROTECTING DIGITALLY TRANSFERRED DATA
The present invention provides a method and system for receiving by a user from a source a communication being a fragment of a message having an unrecognizable...
2018/0239913 DEVICE CONTROL METHOD AND APPARATUS
The disclosure describes a device control method. A near field communication connection between a terminal and a target device is established. A feature...
2018/0239912 DATA SECURITY METHOD AND LOCAL DEVICE WITH SWITCH(ES)
A hardware device with switch(es) for enabling or disabling additional protection to secure local data storage is presented. The device can be a separate...
2018/0239911 AUTOMATED MANAGEMENT OF CONFIDENTIAL DATA IN CLOUD ENVIRONMENTS
A shared networked storage may be separated from a key vault system. A storage request with data to be stored and the storage request with a confidentiality...
2018/0239910 ENCRYPTED TEXT VERIFICATION SYSTEM, METHOD AND RECORDING MEDIUM
In a system with registration data, in a data registration phase, encrypted data is calculated by encrypting input data to be concealed by using a secret key...
2018/0239909 SYSTEMS AND METHODS FOR PROVIDING PROCESSOR STATE PROTECTIONS IN A VIRTUALIZED ENVIRONMENT
Methods, systems, and computer program products are included for providing protections to a processor state of a virtual machine. An example method includes...
2018/0239908 NON-PERSISTENT MODE FOR NETWORK CONNECTION
Systems and methods for enhanced network connection privacy. An example method may comprise: receiving a selection to activate a non-persistent mode for a...
2018/0239907 CHECKING METHOD, CHECKING SYSTEM AND CHECKING DEVICE FOR PROCESSOR SECURITY
The present disclosure discloses a processor security checking method, system and checking device. The processor security checking method includes: acquiring...
2018/0239906 SYSTEMS, METHODS, AND APPARATUS TO ENHANCE THE INTEGRITY ASSESSMENT WHEN USING POWER FINGERPRINTING SYSTEMS FOR...
A power fingerprinting system is adopted for assessing integrity of a target computer-based system. In one implementation, the power fingerprinting system may...
2018/0239905 METHOD, CHECKING DEVICE, AND SYSTEM FOR DETERMINING SECURITY OF A PROCESSOR
The disclosure provides a method, a checking device and a system for determining security of a processor. The method comprises: setting an initial running...
2018/0239904 ASSIGNING CLASSIFIERS TO CLASSIFY SECURITY SCAN ISSUES
A technique includes receiving data representing issues identified in a security scan of an application and features associated with the issues. The technique...
2018/0239903 DETERMINING AND MANAGING APPLICATION VULNERABILITIES
A method includes retrieving application files of an enterprise application store. Each application file corresponds to an application provided by the...
2018/0239902 VALIDATION OF SECURITY MONITORING THROUGH AUTOMATED ATTACK TESTING
Systems, devices, and methods of an automatic attack testing framework for the security testing of an operational service are disclosed. In an example, such...
2018/0239901 RUNTIME VERIFICATION USING EXERNAL DEVICE
Examples herein disclose a processor-based computing system. The system comprises at least one processor, a non-volatile memory comprising a basic input output...
2018/0239900 FIRMWARE MODULE EXECUTION PRIVILEGE
According to one example for verifying firmware module execution privilege, a firmware is booted on a processor. At least one firmware module in the firmware...
2018/0239899 Checking Method, Checking Device and Checking System for Processor
A checking method for a processor is provided. The checking method first determines whether a checked processor satisfies a security-sensitive condition...
2018/0239897 PERFORMANCE OF DISTRIBUTED SYSTEM FUNCTIONS USING A TRUSTED EXECUTION ENVIRONMENT
Example embodiments provide for secure storage and accessing of confidential information by a distributed system and for securely executing a function of the...
2018/0239896 SYSTEM INCLUDING A HYPERVISOR
There is provided a system (1) comprising: a processing unit (11) equipped with execution modes including a non-secure mode (3) in which access to a protected...
2018/0239895 SYSTEMS AND METHODS FOR ASSURING INTEGRITY OF OPERATING SYSTEM AND SOFTWARE COMPONENTS AT RUNTIME
Examples of the present disclosure are related to systems and methods for assuring integrity of operating system and software components at runtime. More...
2018/0239894 UNIVERSAL APPLICATION COMPOSED OF MULTIPLE UNIVERSAL APPLICATIONS
A computer-implemented method comprises executing a first application package in a runtime having a first application security context, identifying a...
2018/0239893 Dynamically Updating CAPTCHA Challenges
Systems and methods of dynamically updating CAPTCHA challenges are provided. For instance, a request to access an online resource can be received from a user...
2018/0239892 HYPERVISOR AND VIRTUAL MACHINE PROTECTION
A computer-implemented method, according to one embodiment, includes: determining, using a processor, whether a virtual machine is authorized to run using a...
2018/0239891 IN-BAND PERIPHERAL AUTHENTICATION
This document describes techniques (300, 400) and apparatuses (100, 500, 600, 700) for in-band peripheral authentication. These techniques (300, 400) and...
2018/0239890 Authenticating Internet User Identities in Electronic Transactions
A method and system for authenticating an Internet user identity by cross-referencing and comparing at least two independent sources of information. A first...
2018/0239889 VALIDATING HUMAN INPUT DEVICES WHEN CONNECTED TO A COMPUTER
A computer reduces the likelihood that an input device connected to a port can perform unauthorized actions by verifying that the input device is a valid human...
2018/0239888 VERIFICATION METHOD AND DEVICE
Machine-based verification is minimized by presenting a web page to a user that includes a number of objects in a verification image, and then instructing the...
2018/0239887 SYSTEMS AND METHODS FOR SENSOR-BASED LAYER VARIATION ON MOBILE DEVICES
The present disclosure generally relates to visually varying an image using parallax image layers, and more specifically, relates to visually varying...
2018/0239886 DEVICE AND A METHOD FOR THE IDENTIFICATION OF PERSONS
A person-identification system which includes a scanner unit, which scans a person to be identified by an electromagnetic radiation. The electromagnetic...
2018/0239885 USER EQUIPMENT WITH SMART BIOMETRIC UNLOCK
The apparatus of the disclosure provides a solution to the inconvenience currently faced while accessing the most frequently used applications by opening the...
2018/0239884 Detection System, Fingerprint Sensor, and Method of Finger Touch Authentication Thereof
The present invention discloses a method of finger touch authentication through a fingerprint sensor. The method includes obtaining a plurality of touch...
2018/0239883 Authentication Session Extension Using Ephemeral Behavior Detection
Hardware on a device, including sensors that may be embedded in or accessible to the device, extend the validity session of an authentication event by...
2018/0239882 OBFUSCATING MOBILE DEVICE PASSWORDS THROUGH PATTERN GENERATION
A computer-implemented a method for authenticating a user includes: displaying, by a computer device, a first user interface on a display; receiving, by the...
2018/0239881 METHOD FOR PROCESSING DATA
Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the...
2018/0239880 DETECTING AND TRACKING VIRTUAL CONTAINERS
Examples of techniques for detecting and tracking virtual containers are disclosed. In one example implementation according to aspects of the present...
2018/0239879 INFORMATION PROCESSING DEVICE, AND INFORMATION PROCESSING METHOD, AND PROGRAM
A configuration in which usage control that is substantially similar to content usage control in a copy source medium can be performed in a content copy...
2018/0239878 DNA METHYLTRANSFERASE 1 TRANSITION STATE STRUCTURE AND USES THEREOF
Methods and systems for obtaining inhibitors of human DNA methyltransferase 1 (DNMT1) are disclosed where the methods involve designing compounds that resemble...
2018/0239877 METHOD, COMPUTER PROGRAM, VIDEO GAME AND SYSTEM FOR OPTIMIZING A MOLECULE FOR MEDICAL APPLICATIONS
The invention relates to a method, a computer program a system, a video game system and a video game for designing a molecule for medical applications by...
2018/0239876 OPTIMAL CONTRAST INJECTION PROTOCOL ENGINE
Systems, methods and computer program products to provide a patient-specific contrast injection protocol in order to achieve optimal contrast enhancement for a...
2018/0239875 SYSTEM AND METHOD FOR COMPUTING SURVIVORSHIP RISK ASSOCIATED WITH DELAYING THERAPY IN BREAST CANCER
An estimate is made of a time since a given presenting cancer would have first been detectable using a known diagnostic technique, and an estimate is also made...
2018/0239874 DYNAMIC INTERVENTION FOR INDIVIDUALS BASED ON DETECTED CONTEXTUAL FACTORS
A wellness intervention system that collects data about multiple factors pertaining to an individual's health and uses such data to generate timely and...
2018/0239873 MEDICAL CONDITION COMMUNICATION MANAGEMENT
Embodiments for medical condition communication management by one or more processors. A maturity score and medical condition acceptance score relating to a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.