Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0247087 Securing an Unprotected Hardware Bus
Techniques are disclosed for securing communication from an unprotected hardware bus. The described techniques may be implemented by placing a secure hardware...
2018/0247086 METHODS AND A SYSTEM FOR SECURE DATA STORAGE
Methods and a system for secure data storage are described. In particular, a digital storage system for storing and retrieving user data is described, said...
2018/0247085 SECURE JOB POOL AND PROCESS
An example device includes processor and a secure storage area having accessibility limited to a secure communication. The secure storage area stores a job...
2018/0247084 SYSTEMS AND METHODS FOR SECURE PROCESSING WITH EMBEDDED CRYPTOGRAPHIC UNIT
Processor system with a general purpose processor and a cryptographic processor dedicated to performing cryptographic operations and enforcing the security of...
2018/0247083 TRUSTED COMPUTING
A trusted computing device (TCD) includes an isolated environment, host interface, secure interface, and program instructions. The environment includes an...
2018/0247082 Secure Public Cloud with Protected Guest-Verified Host Control
A host Virtual Machine Monitor (VMM) operates "blindly," without the host VMM having the ability to access data within a guest virtual machine (VM) or the...
2018/0247081 AUTOMATED SECURE DISPOSAL OF HARDWARE COMPONENTS
Techniques of implementing automated secure disposal of hardware components in computing systems are disclosed herein. In one embodiment, a method includes...
2018/0247080 Security Systems and Methods for Social Networking
Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data...
2018/0247079 METHOD AND SYSTEM FOR ACTIVATING USER CONTEXTS ACCORDING TO ONLINE SERVICE USE
Exemplary systems and methods enable consistent context settings for different devices of a user. When a user accesses a service such as a web site through a...
2018/0247078 SYSTEM FOR ANONYMIZATION AND FILTERING OF DATA
An information-retrieval system includes a server that manages document retrieval, anonymizes data, receives queries for documents from client devices and...
2018/0247077 SEPARATE PRIVACY SETTING CONTROL FOR MULTIPLE APPLICATION INSTANCES OF A USER
One or more terminals that are coupled to a packet-based network are installed with a first instance and/or a second instance of a communication client...
2018/0247076 MACHINE-DRIVEN CROWD-DISAMBIGUATION OF DATA RESOURCES
Embodiments use crowd disambiguation techniques to protect the privacy of potentially sensitive client resources in web transactions. Crowd disambiguation...
2018/0247075 CONFIGURING IMAGE AS PRIVATE WITHIN STORAGE CONTAINER
An image is configured as private within a storage container. An image processing application initiates operations to configure the image as private upon...
2018/0247074 SYSTEMS AND METHODS FOR FACILITATING ACCESS TO PRIVATE FILES USING A CLOUD STORAGE SYSTEM
A method for providing access to objects associated with a particular client in a cloud storage system is disclosed. The method includes the steps of...
2018/0247073 ACCESS CONTROLLED GRAPH QUERY SPANNING
Controlling access to nodes in a relational graph at query time by using an approximate membership query (AMQ) filter and ordered queries based on historic...
2018/0247072 PERMISSIONS-CONSTRAINED DYNAMIC FACETING OF SEARCH RESULTS IN A CONTENT MANAGEMENT SYSTEM
User permissions for a search on content managed by a content management system (CMS) can be evaluated in a search engine based on a user identity of a user...
2018/0247071 PASSWORD AUGMENTED ALL-OR-NOTHING TRANSFORM
A computing device includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational...
2018/0247070 EMERGENCY NOTIFICATION, ACCESS CONTROL, AND MONITORING SYSTEMS AND METHODS
The present invention is related to systems and methods for identifying and reporting a crisis status. In at least one embodiment, the system comprises a...
2018/0247069 INHIBITING MEMORY DISCLOSURE ATTACKS USING DESTRUCTIVE CODE READS
Disclosed are devices, systems, apparatus, methods, products, and other implementations, including a method that includes determining whether an operation to...
2018/0247068 SYSTEM AND METHOD FOR USING UNIQUE DEVICE IDENTIFIERS TO ENHANCE SECURITY
A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can...
2018/0247067 SYSTEMS AND PROCESSES FOR MANAGING ACCESS TO VEHICLE DATA
A gateway apparatus for managing local-device access to vehicle data, including an input/output component for receiving requests for vehicle data from a local...
2018/0247066 MONITORING DIGITAL IMAGES
Digital images are monitored by enabling access to a digital image, receiving a notification associated with the digital image from a first user, and...
2018/0247065 OPERATING METHOD OF ELECTRONIC DEVICE FOR FUNCTION EXECUTION BASED ON VOICE COMMAND IN LOCKED STATE AND...
An operating method of an electronic device for function execution includes receiving an execution signal associated with executing a voice command function...
2018/0247064 APPLYING HOST ACCESS CONTROL RULES FOR DATA USED IN APPLICATION CONTAINERS
Embodiments for applying host access control rules for application containers by one or more processors. A first set of user identifiers and permissions is...
2018/0247063 SECURE DATA TRANSACTIONS
A data exchange agreement between a first user and a second user is written, by a data exchange platform, into a block chain. The data exchange agreement is...
2018/0247062 LABEL TRANSITION FOR MANDATORY ACCESS CONTROLS
Systems and methods for enforcing label-based mandatory access control are provided. A first label may be assigned to a resource. An event associated with a...
2018/0247061 IMAGE PROCESSING APPARATUS, PRINT SYSTEM, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
An image processing apparatus includes a nonvolatile storage unit, an acceptance unit, a conversion unit, and a controller. The nonvolatile storage unit stores...
2018/0247060 DETECTING SECURITY VULNERABILITIES ON COMPUTING DEVICES
Identifying security vulnerabilities on computing devices by detecting an inter-process communication on a computing device, determining whether the...
2018/0247059 SYSTEMS AND METHODS FOR SECURE BOOT AND RUNTIME TAMPER DETECTION
A method may include determining if both of two redundant operating system images for executing functionality of a chassis management controller were found...
2018/0247058 SYSTEM AND METHOD FOR DETECTION OF MALICIOUS HYPERTEXT TRANSFER PROTOCOL CHAINS
A system configured to detect malware is described. The system configured to detect malware including a data collector configured to detect at least a first...
2018/0247057 SYSTEMS AND/OR METHODS FOR AUTOMATICALLY PROTECTING AGAINST MEMORY CORRUPTION VULNERABILITIES
Certain example embodiments described herein relate to techniques for automatically protecting, or hardening, software against exploits of memory-corruption...
2018/0247056 APPLICATION SECURITY PROTECTION PROCESSING METHOD AND DEVICE, AND TERMINAL DEVICE
An application security protection processing method and device, and terminal device are disclosed. The method includes: acquiring a sample application from...
2018/0247055 METHODS FOR PROTECTING A HOST DEVICE FROM UNTRUSTED APPLICATIONS BY SANDBOXING
A method is provided for protecting a host device from untrusted applications. Upon detecting an initial installation and/or execution of an application, the...
2018/0247054 METHOD AND SYSTEM FOR PIRACY DETECTION
In one embodiment, a system, apparatus and a method is described, the system, apparatus and a method including, a storage device and a memory operative to...
2018/0247053 AUTOMATIC PASSWORD RESET USING A SECURITY SYSTEM
A system and method for modification of a passcode for accessing the system are provided. The system includes a premises control unit. The premises control...
2018/0247052 AUTHENTICATION MANAGEMENT
Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing...
2018/0247051 AUTHENTICATION MANAGEMENT
Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing...
2018/0247050 SYSTEM AND METHOD FOR MANAGING PASSWORD FOR A PHYSICAL OBJECT ON AN INTERACTIVE BOARD
A system and method is provided for password management for a physical object on the interactive board. The system includes a plurality of physical objects,...
2018/0247049 Method and Device for Realizing Session Identifier Synchronization
A method and an apparatus for realizing session identifier synchronization are provided. The method includes initiating a first request for logging into an...
2018/0247048 AUTHENTICATION MANAGEMENT SYSTEM, MANAGEMENT APPARATUS, AND AUTHENTICATION MANAGEMENT METHOD
An authentication management system includes a plurality of authentication apparatuses disposed at different locations, each of the authentication apparatuses...
2018/0247047 DETERMINING WHETHER CONTINUOUS BYTE DATA OF INPUTTED DATA INCLUDES CREDENTIAL
A system for detecting user credentials comprising an interface and a processor. The interface is configured to receive a plurality of data chunks. The...
2018/0247046 ELECTRONIC DEVICE, INFORMATION PROCESSING SYSTEM, INFORMATION MANAGING APPARATUS, INFORMATION PROCESSING...
An electronic device includes: a reception section to receive attribute information of input items inherent to an installed program as the input items for...
2018/0247045 CONTEXT-BASED SECURE CONTROLLER OPERATION AND MALWARE PREVENTION
In one implementation, a method for providing security on an externally connected controller includes launching, by the controller, a security layer that...
2018/0247044 PASSWORD HINT GENERATION MECHANISM
A system, method, and computer product for managing a password includes receiving a new password set by a user via a key input interface, generating a diagram...
2018/0247043 INDIVIDUALIZED CONTROL SYSTEM UTILIZING BIOMETRIC CHARACTERISTIC
A control system including a detection device and a control host is provided. The detection device is configured to detect a biometric characteristic to...
2018/0247042 System and Method for Authentication Across Multiple Platforms Using Biometric Data
A system and method for authenticating a system user across multiple digital systems using a single biometric key employs a scanning device to preclude the use...
2018/0247041 PHYSICAL TOKEN-LESS SECURITY SCREENING USING BIOMETRICS
In physical token-less security screening using biometrics, a person provides biometric data to a security computing device as part of a security screening....
2018/0247040 METHOD AND A DEVICE FOR RECOGNIZING AN INDIVIDUAL BY BIOMETRIC SIGNATURE
A method of recognizing individuals by means of at least one processor executing a recognition algorithm comprising the steps of: detecting biometric...
2018/0247039 ELECTRONIC DEVICE FOR AUTHENTICATING USING BIOMETRIC INFORMATION AND METHOD OF OPERATING ELECTRONIC DEVICE
A device and a method for authenticating using biometric information in an electronic device are provided. The electronic device includes a display, and at...
2018/0247038 SYSTEM AND METHOD FOR EYE TRACKING DURING AUTHENTICATION
A system, apparatus, method, and machine readable medium are described for performing eye tracking during authentication. For example, one embodiment of a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.