Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,767,321 Setting security features of programmable logic devices
Systems and methods are disclosed for allowing security features to be selectively enabled during device configuration. For example, a programmable integrated...
US-9,767,320 Hardware enforced content protection for graphics processing units
This disclosure proposes techniques for graphics processing. In one example, a graphics processing unit (GPU) is configured to access a memory according to one...
US-9,767,319 Method and apparatus of secure authentication for system on chip (SoC)
A SoC may be utilized to authenticate access to one or more secure functions. A password may be generated within the SoC which is unique to each SoC instance...
US-9,767,318 Secure controller systems and associated methods thereof
Systems and methods for encrypted processing are provided. For example, an apparatus for encrypted processing includes: an input interface adapted to receive...
US-9,767,317 System to provide cryptographic functions to a markup language application
A browser includes modules to provide markup language applications with access to cryptographic functions executing in a secure zone. Non-secure operations...
US-9,767,316 Systems and methods for scrubbing confidential data
Methods and systems for scrubbing confidential insurance account information are provided. According to embodiments, a scrubbing server can receive a request to...
US-9,767,315 Systems and methods for initiating immediate data erasure on a device
A system and method of erasing data on a data handling device may include providing a device with a data storage element and a biometric characteristic scanning...
US-9,767,314 System and method for hosting a social network that enables granular management of the privacy of posted...
A system and method for hosting a social network that enables entities to particularly manage the privacy level of content posted on the social network. This...
US-9,767,313 Method for automated separation and partitioning of data in a payroll and resource planning system
A system for separation of data is provided. The data separation is implemented using a special data structure--a common attribute. The common attribute is a...
US-9,767,312 System and method for integrating a cloud platform environment with an application server or other environment
In accordance with an embodiment, described herein is a system and method for integrating a cloud platform with an application server or other environment, for...
US-9,767,311 Stack isolation by a storage network switch
Technology is disclosed for stack isolation in a storage system including a storage network switch and multiple storage sub-systems (e.g., storage stacks). The...
US-9,767,310 Systems and methods for secure data exchange and data tampering prevention
Systems and methods for secure data exchange and data tampering prevention. A secure data system receives electronic data files from data entities and stores...
US-9,767,309 Access control system for implementing access restrictions of regulated database records while identifying and...
A digital targeting system is configured to access data to determine users that satisfy content factors, such as pre-validation criteria, based on user...
US-9,767,308 Custom security policies for multiple objects
Techniques to facilitate controlling access to objects associated with an industrial automation environment are disclosed. In at least one implementation, a...
US-9,767,307 Reversible redaction and tokenization computing system
A computing system for redacting and/or tokenizing non-public information of electronic documents stored in a database may include a data redaction computing...
US-9,767,306 Secured data storage on a hard drive
Secured electronic data storage on a hard drive is described. A computer system that incorporates the hard drive includes a shrink, shred, and data...
US-9,767,305 Systems and methods for sharing media content with recognized social connections
Systems, methods, and non-transitory computer-readable media can detect a set of images locally stored on a computing system. The computing system can be...
US-9,767,304 Representation of operating system context in a trusted platform module
Techniques for representation of operating system context in a trusted platform module are described. In at least some embodiments, authorization principals...
US-9,767,303 Authenticated memory and controller slave
Systems and methods that can facilitate the utilization of a memory as a slave to a host are presented. The host and memory can provide authentication...
US-9,767,302 Detecting behavioral patterns and anomalies using activity profiles
Activity data is analyzed or evaluated to detect behavioral patterns and anomalies. When a particular pattern or anomaly is detected, a system may send a...
US-9,767,301 Context aware data protection
A method, system, and computer usable program product-for context aware data protection are provided. Information about an access context is received in a data...
US-9,767,300 Managing restricted tagged content elements within a published message
A computer encrypts only a restricted tag element from among a plurality of content elements to be electronically published as a message for access by a...
US-9,767,299 Secure cloud data sharing
A system and method for sharing an encrypted file stored on a cloud server is disclosed. In certain embodiments, the method includes generating a file key...
US-9,767,298 Information storage device, information processing system, information processing method, and program
There is provided a device and a method for preventing using of illegitimate content or manufacturing of the illegitimate media that uses illegitimate media. In...
US-9,767,297 Secure computing system
A computer system with multiple security levels, the system comprising a high-power processing device (130), a low-power processing device (110), and an...
US-9,767,296 Requesting access to restricted objects by a remote computer
A method for requesting access rights for an object of a computerized system, comprising invoking in a remote computer linkable to the computerized system an...
US-9,767,295 Content based hardware security module assignment to virtual machines
At least one hardware security module out of a plurality of hardware security modules is assigned to a guest system. The at least one hardware security module...
US-9,767,294 Intermediate server, database query processing method and program
To make it possible to prevent leakage of sensitive information from a database without using a server having both secure operation management and a high...
US-9,767,293 Content based hardware security module assignment to virtual machines
At least one hardware security module out of a plurality of hardware security modules is assigned to a guest system. The at least one hardware security module...
US-9,767,292 Systems and methods to identify security exploits by generating a type based self-assembling indirect control...
Using various embodiments, methods and systems for computing a self-assembling indirect control flow graph based on one or more function types and function...
US-9,767,291 Systems and methods for security and risk assessment and testing of applications
Provided herein are systems and methods for monitoring and assessing the security and risk presented by applications deployed in a complex computing...
US-9,767,290 Autonomous reasoning system for vulnerability analysis
A method of vulnerability analysis of a deployed program (program) includes inputting a binary program under analysis (BPUA) derived from the program. The...
US-9,767,289 Method for generating and executing encrypted BIOS firmware and system therefor
A firmware image is received at an information handling system. A symmetric key is generated and stored at a trusted platform module (TPM). The firmware image...
US-9,767,288 JTAG-based secure BIOS mechanism in a trusted computing system
An apparatus is provided for protecting a basic input/output system (BIOS) in a computing system. The apparatus includes a BIOS read only memory (ROM), a tamper...
US-9,767,287 Systems, methods, and computer program products for managing data re-installation
Systems, methods, and computer program products are provided for managing data re-installation including service re-installation. A re-installation procedure...
US-9,767,286 Electronic module for making a message accessible to a targeted operating system
An electronic module that includes means for determining an operating system targeted by a message received by a transmitter-receiver of an electronic device,...
US-9,767,285 Process categorization using crowdsourcing
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for categorizing a process using crowdsourcing are described....
US-9,767,284 Continuous run-time validation of program execution: a practical approach
Trustworthy systems require that code be validated as genuine. Most systems implement this requirement prior to execution by matching a cryptographic hash of...
US-9,767,283 System and method to mitigate malicious calls
Systems and methods are provided in example embodiments for mitigating malicious calls. The system can be configured to receive a function call, determine the...
US-9,767,282 Offline scan, clean and telemetry using installed antimalware protection components
The subject disclosure relates to antimalware scanning, and more particularly to offline antimalware scanning of a host environment via an alternate, known safe...
US-9,767,281 Device and method for processing data
A device for processing data, the device having an input interface for receiving input data and a processing module for processing data, characterized in that...
US-9,767,280 Information processing apparatus, method of controlling the same, information processing system, and...
Startup of a program and generation or change of a program is detected, or a program is searched for. It is determined, based on program information of a...
US-9,767,278 Method and apparatus for detecting irregularities on a device
A system and method for the detection of irregularities, such as fraud or malware, running on a device, is disclosed. The system comprises a monitoring program...
US-9,767,277 Detection of fault injections in a random number generator
A method for detecting a fault injection in a circuit, wherein a bit pattern is mixed in a bit stream originating from a noise source and the presence of this...
US-9,767,276 Scanning kernel data structure characteristics
A method and apparatus for detecting kernel data structure tampering are disclosed. In the method and apparatus, a memory region of a computer system is scanned...
US-9,767,275 Method of enforcing control of access by a device to a secure element, and corresponding secure element
A method of enforcing control of access by a hosting device to a secure element, and a secure element are described. The method includes steps performed by the...
US-9,767,274 Approaches for efficient physical to virtual disk conversion
Approaches for providing a guest operating system to a virtual machine. A read-only copy of one or more disk volumes, including a boot volume, is created. A...
US-9,767,273 Reliably terminating processes in a system with confined execution environments
Terminating a process executing within a container is described. An access restriction applicable to the process is temporarily modified with a policy change...
US-9,767,272 Attack Protection for valid gadget control transfers
In one embodiment, a processor comprises: a first register to store a first bound value for a stack to be stored in a memory; a second register to store a...
US-9,767,271 System and method for validating program execution at run-time
A pipelined processor comprising a cache memory system, fetching instructions for execution from a portion of said cache memory system, an instruction...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.