Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0307871 SECURITY DISPLAY PROCESSING
Display data is intercepted before being provided to an input port of a display. A variety of sensor, peripheral device, and/or application input data...
2018/0307870 Process and Detachable Device for Using and Managing Encryption Keys
A data storage system comprising: a detachable data storage device; an alarm device; where the alarm device is connected to the detachable data storage device...
2018/0307869 SELF-ENCRYPTING DRIVE
A data security system, and a method of operation thereof, includes a data security transceiver or receiver; an authentication subsystem operatively connected...
2018/0307868 Selective Data Security Within Data Storage Layers
A data storage layer provides enhanced data security. In one implementation, the data storage layer allows selective encryption of specific parts of data...
2018/0307867 SECURE MEMORY DEVICE WITH UNIQUE IDENTIFIER FOR AUTHENTICATION
A secure memory device for secure data storage and related method are provided. The device may include an accessible data storage area configured to store...
2018/0307866 Multi-Function, Modular System for Network Security, Secure Communication, and Malware Protection
Representative embodiments are disclosed for providing network and system security. A representative apparatus includes an input-output connector coupleable to...
2018/0307865 ELECTRONIC CIRCUIT SECURED BY DISRUPTION OF ITS POWER SUPPLY
The electronic circuit comprises a logic module performing a first function. A number generator generates a series of first numbers. A voltage generator...
2018/0307864 RANDOM TIME GENERATED INTERRUPTS IN A CRYPTOGRAPHIC HARDWARE PIPELINE CIRCUIT
Apparatus and method for defending against a side-channel information attack such as a differential power analysis (DPA) attack. In some embodiments, a...
2018/0307863 REMOVABLE CHIPLET FOR HARDWARE TRUSTED PLATFORM MODULE
A secured system includes at least one semiconductor chip comprising information processing circuitry. An array of contact pads is disposed on a surface of the...
2018/0307862 SECURITY TECHNIQUES BASED ON MEMORY TIMING CHARACTERISTICS
Techniques are disclosed for obtaining data using memory timing characteristics. In some embodiments, a physical unclonable function is used to obtain the...
2018/0307861 SYSTEM AND METHOD FOR AUTOMATICALLY ESTABLISHING, TRACKING, AND QUERYING THE TRUST LEVEL OF FILES, PATCHES, AND...
A system and method for maintaining server data integrity by identifying and classifying changes, preemptively, that may occur due to operating system updates,...
2018/0307860 MANAGING CONFIGURATIONS OF COMPUTING TERMINALS
Disclosed is a system for configuring a terminal by intercepting requests, such as Input/Output (IO) requests or registry requests, evaluating rules based on...
2018/0307859 SYSTEMS AND METHODS FOR ENFORCING CENTRALIZED PRIVACY CONTROLS IN DE-CENTRALIZED SYSTEMS
Systems, computer-readable media, and methods for improving both data privacy/anonymity and data value, wherein data related to a data subject can be used and...
2018/0307858 MULTI-PARTY AUTHENTICATION AND AUTHORIZATION
Disclosed are various examples for multi-party authentication and authentication. In one example, a user can gain access to secured data stored by a managed...
2018/0307857 REPLACING DISTINCT DATA IN A RELATIONAL DATABASE WITH A DISTINCT REFERENCE TO THAT DATA AND DISTINCT...
Provided is a process including: obtaining criteria to select plain-text values in a lower-trust database; selecting, based on the criteria, a first plain-text...
2018/0307856 SYSTEM AND METHOD FOR MANAGING METADATA
A system for managing metadata on the basis of fetching in a big data platform includes: one or more client servers, each including a service provider...
2018/0307855 ACCESS MANAGEMENT SYSTEM, FILE ACCESS SYSTEM, ENCRYPTING APPARATUS AND PROGRAM
An access control apparatus is an access management system that manages access to an electronic file stored in a file sharing server and includes: a file...
2018/0307854 TRACKING PRIVACY BUDGET WITH DISTRIBUTED LEDGER
Systems and methods are provided for sending a request to register a data offer from a data owner to participate in a distributed ledger, the request including...
2018/0307853 REFERENCED ACCESS CONTROL LIST
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for referenced access control lists. In one aspect, a method...
2018/0307852 SYSTEM AND METHOD FOR DATA SECURITY
A system of securely sharing data includes first and second computers connected to a network and first and second non-transitory computer-readable media. Each...
2018/0307851 Method and System to Sanitize, Recover, Analyze and Wipe Data Stored on Non-Transitory Memory Devices Connected...
A Dedicated Embedded Microcomputer Analyzer Sanitizer mounts a USB memory device or other non-volatile memory device on a dedicated microcomputer under...
2018/0307850 SYSTEM FOR ACCESSING A KERNEL SPACE OF AN OPERATING SYSTEM WITH ACCESS CONTROL FUNCTIONALITY
In an operating system with access control functionality, a request for a function that requires kernel space access can be initiated by an application and...
2018/0307849 METHOD AND SYSTEM FOR IMPROVING SECURITY AND RELIABILITY IN A NETWORKED APPLICATION ENVIRONMENT
A security application manages security and reliability of networked applications executing collection of interacting computing elements within a distributed...
2018/0307848 ENCRYPTION ENABLING STORAGE SYSTEMS
A system includes a data storage device containing encrypted data to be decrypted, and a VZ storage device containing a key material for decrypting data,...
2018/0307847 SELECTIVE ENCODING METHOD AND ELECTRONIC DEVICE USING SAME
An operation method for an electronic device is disclosed. The operation method for an electronic device according to an embodiment may comprise the steps of:...
2018/0307846 OPTICALLY READABLE FORMAT OF ENCRYPTED DATA
Private data to be communicated to a recipient is encrypted with the public key of a public and private key pair associated with the recipient. An optically...
2018/0307845 Multiple Security Level Monitor for Monitoring a Plurality of MIL-STD-1553 Buses with Multiple Independent...
Disclosed is a Multiple Security Level Monitor ("MSLM") for monitoring a plurality of MIL-STD-1553 data buses ("1553 buses") having at least one security...
2018/0307844 USING SMART GROUPS FOR SIMULATED PHISHING TRAINING AND PHISHING CAMPAIGNS
This disclosure describes systems and methods for adding users to user groups based on interactions with simulated phishing emails and completion of...
2018/0307843 SYSTEMS AND METHODS FOR IMPLEMENTING MODULAR COMPUTER SYSTEM SECURITY SOLUTIONS
In some embodiments, an apparatus includes a control chain generation module is configured to receive, from a control database, a security guideline control to...
2018/0307842 INFORMATION PROCESSING APPARATUS, SECURITY MANAGEMENT SYSTEM, SECURITY MEASURE PROVIDING METHOD, SECURITY...
A management apparatus (10) includes: an identification unit (110) that identifies a kind of operation information corresponding to a measure applicable to an...
2018/0307841 COMPUTER CONTROL SYSTEM SECURITY
A redundant and diverse secondary control system mirrors a primary control system but has some fundamental structural difference as compared to the primary...
2018/0307840 SECURE CONTROLLER OPERATION AND MALWARE PREVENTION
In one implementation, a method for providing security on an externally connected controller includes launching, by the controller, a kernel level security...
2018/0307839 MULTI-STEP APPROACH FOR RANSOMWARE DETECTION
A server manager for detecting ransomware includes a server interface to retrieve, from a storage device, a backup of a plurality of files stored by a client...
2018/0307837 METHOD AND SYSTEM FOR EVALUATING SECURITY OF APPLICATION
Provided are methods and/or systems for evaluating security of an application. A security evaluation method including storing ...
2018/0307836 EFFICIENT WHITE LISTING OF USER-MODIFIABLE FILES
A system and method for efficiently determining that a received file is not malware is presented. In operation, when a file is received at a computing device,...
2018/0307835 COMPUTING SYSTEM WITH POWER VARIATION ATTACK COUNTERMEASURES
A computing system can be arranged to generate a range of different frequencies with at least one oscillator of a clock module prior to providing a first clock...
2018/0307834 METHOD AND APPARATUS FOR ANTI HACKER'S HIJACKING OF AUTONOMOUS VEHICLE, DEVICE AND STORAGE MEDIUM
The present disclosure provides a method and apparatus for anti hacker's hijacking of an autonomous vehicle, a device and a storage medium, wherein the method...
2018/0307833 APPARATUS AND METHOD FOR CONDUCTING ENDPOINT-NETWORK-MONITORING PACKET TAGGING
Provided is an intrusion detection technique configured to: obtain kernel-filter criteria indicative of which network traffic is to be deemed potentially...
2018/0307832 INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER READABLE MEDIUM
A monitor event designating unit (131) designates, if an attack event which attacks an information system in which a plurality of system component elements are...
2018/0307831 SYSTEMS AND METHODS FOR IMPROVING ACCURACY IN RECOGNIZING AND NEUTRALIZING INJECTION ATTACKS IN COMPUTER SERVICES
Systems and methods for analyzing SQL queries for constraint violations for injection attacks. Tokenizing a SQL query generates a token stream. A parse tree is...
2018/0307830 METHOD FOR EXECUTING A PROGRAM INTENDED TO BE INTERPRETED BY A VIRTUAL MACHINE PROTECTED AGAINST FAULT...
The present invention particularly concerns a method for executing a program (P) intended to be interpreted by a virtual machine (M), the method comprising...
2018/0307829 SECURELY SUPPORTING A GLOBAL VIEW OF SYSTEM MEMORY IN A MULTI-PROCESSOR SYSTEM
Techniques for securely supporting a global view of system memory in a physical/virtual computer system comprising a plurality of physical/virtual CPUs are...
2018/0307828 IN-PROCESS STACK MEMORY PROTECTION
A computer-implemented method protects stack memory from a malicious function. One or more processors identify a first function and a second function in a...
2018/0307827 SYSTEM AND METHOD TO CAUSE AN OBFUSCATED NON-FUNCTIONAL DEVICE TO TRANSITION TO A STARTING FUNCTIONAL STATE...
A system and method to cause an obfuscated non-functional device to transition to a starting functional state using a specified number of cycles are disclosed....
2018/0307826 CONTEXT-BASED SECURE CONTROLLER OPERATION AND MALWARE PREVENTION
In one implementation, a method for providing security on an externally connected controller includes launching, by the controller, a security layer that...
2018/0307825 DEVICE, SYSTEM, AND METHOD FOR SECURE REPLICATION OF VEHICLE ACCESS DEVICES
A secure system for replication of a personal access device to function with a vehicle having an immobilizer system, the system including a console configured...
2018/0307824 OCR-BASED SINGLE SIGN-ON
A method and technique for OCR-based single sign-on in a computing environment includes launching a login interface to log a user into an application. The...
2018/0307823 METHOD AND APPARATUS FOR AUTHENTICATION OF A USER TO A SERVER USING RELATIVE MOVEMENT
Method and apparatus for authentication of a user to a server that involves the user performing a requested act and that further involves relative movement...
2018/0307822 PASSWORD SPYING PROTECTION SYSTEM
In example embodiments, a first pattern of characters is displayed on a user interface of a user device. A user input is received and the first pattern of...
2018/0307821 TOUCH AND SOUND AUTHENTICATION DEVICE
An authentication device designed to be used with an electronic device including a capacitive touch screen and a receiver, wherein the authentication device...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.