At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-9,613,222 |
Assigning access rights in enterprise digital rights management systems The present subject matter relates to assigning access rights in enterprise digital rights management (eDRM) systems. In one embodiment, a method includes... |
US-9,613,221 |
Signed application cards A device that displays signed application cards. The device receives a card object that includes: an application function identifier that identifies an... |
US-9,613,220 |
Secure data parser method and system The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention... |
US-9,613,219 |
Managing cross perimeter access In some implementations, a method of managing access to resources in a single device including receiving, from a first resource assigned to a first perimeter, a... |
US-9,613,218 |
Encryption system in a virtualized environment For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by... |
US-9,613,217 |
Confidential content display in flexible display devices Confidential content within a file is masked for display on a flexible display device. A legend relating the masking to the confidential content is displayed in... |
US-9,613,216 |
Encryption recommendation method and encryption recommendation device An encryption recommendation method and an encryption recommendation device are provided. The method includes: scanning user operations on an application in a... |
US-9,613,215 |
Method and system for implementing a secure chain of trust A method, an integrated circuit and a system for implementing a secure chain of trust is disclosed. While executing secure boot code in a secure boot mode,... |
US-9,613,214 |
Self-measuring nonvolatile memory devices with remediation capabilities
and associated systems and methods Several embodiments of systems incorporating nonvolatile memory devices are disclosed herein. In one embodiment, a system can include a central processor (CPU)... |
US-9,613,213 |
Using telemetry to reduce malware definition package size Clients send telemetry data to a cloud server, where the telemetry data includes security-related information such as file creations, timestamps and malware... |
US-9,613,212 |
Execution profile assembly using branch records Technologies for assembling an execution profile of an event are disclosed. The system and method may include recording a plurality of branch records,... |
US-9,613,211 |
Systems and methods for identifying suspicious text-messaging applications
on mobile devices A computer-implemented method for identifying suspicious text-messaging applications on mobile devices may include (1) identifying at least one outgoing text... |
US-9,613,210 |
Evaluating malware in a virtual machine using dynamic patching Analysis of potentially malicious software samples in a virtualized environment is disclosed. One or more modifications are applied to a first virtual machine... |
US-9,613,209 |
Augmenting system restore with malware detection An anti-malware program monitors the behavior of a system after a system restore to determine the likelihood of a hidden infection of malicious code still... |
US-9,613,208 |
Trusted security zone enhanced with trusted hardware drivers An electronic device comprises a processor, a permissive sector, a trusted security zone that is separate from the permissive sector, a hardware driver, a first... |
US-9,613,207 |
Method and apparatus for preventing autorun of portable USB storage Provided is a technology which creates an autorun file that is used in autorun for preventing the autorun of a USB-based portable storage, thereby allowing an... |
US-9,613,206 |
Authentication mechanism A computer-implemented method for preventing password leakage into a non-password field includes detecting that a user of an electronic device has entered a... |
US-9,613,205 |
Alternate authentication A user may utilize an existing digital identity to authorize the user's access to security-enabled device operations, where the security-enabled device... |
US-9,613,204 |
Computer readable storage media for legacy integration and methods and
systems for utilizing same Systems and methods for integrative legacy context management are disclosed herein. An example computer hardware system may include at least one processing unit... |
US-9,613,203 |
Security mechanism for an electronic device According to some aspects, disclosed methods and systems may include determining, by an electronic device, a value associated with a first parameter configured... |
US-9,613,202 |
System and method for motion gesture access to an application and limited
resources of an information handling... An information handling system includes a processor that determines a first orientation from orientation sensors and a sensor hub for detecting a motion... |
US-9,613,201 |
Access control by a mobile device using an image A technique provides access control on a mobile device (e.g., a smart phone, a tablet, etc.). The technique involves displaying an image on a touch screen of... |
US-9,613,200 |
Ear biometric capture, authentication, and identification method and
system The current document discloses an ear-biometrics-based authentication and identification system that includes an ear-image-capture subsystem that generates an... |
US-9,613,199 |
Methods and systems for ensuring that an individual is authorized to
conduct an activity A method for ensuring that an individual is authorized to conduct an activity is provided. The method includes conducting, using a processor, an authentication... |
US-9,613,198 |
Apparatus and method for intelligent video surveillance of industrial
console operations A method implemented in an operator console includes receiving a captured image of an operator at the operator console. The method also includes identifying... |
US-9,613,197 |
Biometric user authentication system and a method therefor The present disclosure relates to a method and a system for authenticating a user. In one embodiment, one or more input and target data samples extracted from a... |
US-9,613,196 |
Protection system including machine learning snapshot evaluation This disclosure is directed to a protection system including machine learning snapshot evaluation. A device may comprise a machine learning engine (MLE) to... |
US-9,613,195 |
Secondary security authority Techniques to facilitate protecting control programs used in an industrial automation environment are disclosed herein. In at least one implementation, control... |
US-9,613,194 |
Function control methods and systems for wearable electronic devices Function control methods and systems for wearable electronic devices are provided. First, a flag having a specific initial value is provided in a wearable... |
US-9,613,193 |
Mechanism for locking a computer display and for unlocking the display
when purposely used A computer system, portable electronic device, and method are provided for preventing accidental enabling of a disabled display and/or graphical user interface... |
US-9,613,192 |
Flexible licensing architecture An improved technique involves analyzing a system configuration upon a system boot and sending the configuration to a system configuration database that... |
US-9,613,191 |
Access to an electronic asset using content augmentation Methods, computer program products, and systems are presented and can include for instance: crowdsourcing data from a plurality of users via a computer network,... |
US-9,613,190 |
Systems and methods of secure data exchange An example method for managing digital rights management (DRM) protected content sharing in a networked secure collaborative computer data exchange environment... |
US-9,613,189 |
Method for processing media content, control point, media server, and
media renderer A method for processing media content is provided. The method includes sending a control command to a media renderer in a home area network, where the control... |
US-9,613,188 |
Neuroimaging database systems and methods Systems for and methods of utilizing a neuroimaging database are presented. The systems and methods include techniques for analyzing the pathophysiological... |
US-9,613,187 |
Clinical information processing apparatus, method and program Likelihood ratio between a likelihood of belonging to one classification of a key item and a likelihood of belonging to other classification of the key item... |
US-9,613,186 |
Systems and methods for determining blood flow characteristics using flow
ratio Embodiments include a system for determining cardiovascular information for a patient which may include at least one computer system configured to receive... |
US-9,613,185 |
Influence filtering in graphical models According to an aspect, influence filtering in a graphical model includes accessing the graphical model in a data store. The graphical model includes a... |
US-9,613,184 |
Analyzing a washout period characteristic for psychiatric disorder therapy
delivery A characteristic of a washout period following the delivery of therapy to a patient according to a therapy program may be determined based on a physiological... |
US-9,613,183 |
Post-authorization transaction bundling control A data processing control comprising an outgoing payment request control object having 1) user-selectable data records, each user-selectable data record having... |
US-9,613,182 |
Electronic custody and control system for human assay test samples A system, method, and computer program that may used to more quickly, accurately, and efficiently identify, catalog, and track human assay samples and create... |
US-9,613,181 |
Semiconductor device structure including active region having an extension
portion A semiconductor device structure includes a semiconductor substrate with an active region provided therein, a gate structure, a dummy gate structure and two... |
US-9,613,180 |
Robotic control device and method for manipulating a hand-held tool Described is a robotic control device for manipulating a gripper-held tool. The device includes a robotic gripper having a plurality of tactile sensors. Each... |
US-9,613,179 |
Method and system for providing an event space associated with a primary
virtual space An approach to facilitate providing an event space associated with a primary virtual space is provided. An event space is provided to users of a primary virtual... |
US-9,613,178 |
Integrated circuit topologies for discrete circuits Various embodiments that pertain to electronic element matching are described. Having electronic elements, such as transistors, matching can be relatively easy... |
US-9,613,177 |
Methods of generating circuit layouts that are to be manufactured using
SADP routing techniques One method disclosed herein involves, among other things, generating a set of mandrel mask rules, block mask rules and a virtual, software-based ... |
US-9,613,176 |
Buffer chain management for alleviating routing congestion Systems and techniques for alleviating congestion are described. A set of buffer chains that pass through a congested region of the circuit design can be... |
US-9,613,175 |
Method, computer system and computer-readable storage medium for creating
a layout of an integrated circuit A method includes obtaining a plurality of design rules for an integrated circuit, including a first set of design rules and a second set of design rules. An... |
US-9,613,174 |
Common template for electronic article One or more techniques or systems for incorporating a common template into a system on chip (SOC) design are provided herein. For example, a common template... |
US-9,613,173 |
Interactive multi-step physical synthesis A processor-implemented method is provided for placing and routing a circuit design. A first netlist is generated for the circuit design. Placement is performed... |