Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,824,238 Encoding of sensitive data
A computer-implemented method, the method includes identifying a piece of data to be served from a server system to a client device that is remote from the...
US-9,824,237 Audience-based sensitive information handling for shared collaborative documents
A method for providing audience-based redaction of sensitive information in an electronic document may include receiving a request from a computing device to...
US-9,824,236 System for anonymizing and aggregating protected information
A system for anonymizing and aggregating protected information (PI) from a plurality of data sources includes a master index server coupled to a data...
US-9,824,235 Web session security techniques
Web session security techniques which protect displayed sensitive information. In one example embodiment, the method includes setting, by a processor, a timer...
US-9,824,234 Method of protecting care information in a care provider terminal
A method protects care information in a care provider terminal. The method includes detecting if there is a network disconnection between the care provider...
US-9,824,233 Posixly secure open and access files by inode number
A method for secure portable operating system interface (POSIX) directory traversing for opening and accessing files by inode number. The method includes...
US-9,824,232 System for providing messages through media content
Described are techniques for associating messages with a particular portion of media content. A message received from a first device, associated with a portion...
US-9,824,231 Retention management in a facility with multiple trust zones and encryption based secure deletion
A computing facility, including a storage management system belonging to a first trust zone having a first privilege level, a metadata management system...
US-9,824,230 Remote data access techniques for portable devices
A wide-area network ("WAN")-based service enables remote data access transactions between participating endpoints within a group of participating endpoints that...
US-9,824,229 Controller with enhanced reliability
A controller with enhanced reliability of access to a database system. A programmable logic controller (PLC) accessible to a database accesses a database (DB)...
US-9,824,228 Preserving redundancy in data deduplication systems by encryption
A system and non-transitory computer program product for preserving data redundancy in a data deduplication system in a computing environment is provided. A...
US-9,824,227 Simulated control of a third-party database
An example method of providing simulated control of a third-party database to a client includes receiving, at a simulation control proxy, a query that selects...
US-9,824,226 Anti-theft in firmware
Methods, systems and storage media are disclosed for enhanced system boot processing that authenticates boot code based on biometric information of the user...
US-9,824,225 Protecting virtual machines processing sensitive information
Methods, apparatus and articles of manufacture for protecting virtual machines processing sensitive information are provided herein. A method includes...
US-9,824,224 Security-minded cloning method, system and program
In order to solve this problem, the first aspect of the present invention is a system for duplicating (cloning) a physical environment in a virtual environment...
US-9,824,223 System and method for automated remedying of security vulnerabilities
In a binary patching system for alleviating security vulnerabilities in a binary representation of a software application, a binary code portion determined to...
US-9,824,222 Method of distributed discovery of vulnerabilities in applications
In one aspect, the disclosure provides: A method comprising: inviting a distributed plurality of researchers to participate in one or more computer...
US-9,824,221 Dynamic risk management
A dynamic risk management system for operating systems that provides monitoring, detection, assessment, and follow-up action to reduce the risk whenever it...
US-9,824,220 Secure execution of software modules on a computer
A system and method for executing software modules on a computer, the method comprising: executing (S4) a bootloader (15, 16), at least partly (16) in the...
US-9,824,219 Electronic device having wake up verification and electronic system having the electronic device
An electronic system having wake up verification comprises an electronic device and a mobile device. The electronic device wirelessly connects to the mobile...
US-9,824,218 Detecting setting tampering
A computer implemented method includes generating a first cryptographic hash based on at least one setting associated with an operating system at a first time,...
US-9,824,217 Runtime detection of self-replicating malware
A method for detecting malicious active processes and self replicating executable binary files on a computing device. The method comprises monitoring in runtime...
US-9,824,216 Susceptible environment detection system
A computerized technique wherein a received object is analyzed using a plurality of information sources to determine context information, wherein one...
US-9,824,215 System, method, and computer program product for monitoring and/or analyzing at least one aspect of an...
A system, method and computer program product are provided. In use, execution of a portion of internal code of an interface is identified. Further, in response...
US-9,824,214 High performance software vulnerabilities detection system and methods
This invention teaches a system and methods of detecting software vulnerabilities in a computer program by analyzing the compiled code and optionally the source...
US-9,824,213 Method and apparatus for assembling component in router
A method and apparatus for assembling a component in a router are provided. The router includes at least one reconfigurable component, the at least one...
US-9,824,212 Method and system for recognizing advertisement plug-ins
Disclosed are a method and apparatus for recognizing advertisement plug-ins, relating to the field of computer technologies. The method comprises: searching for...
US-9,824,211 System and method to visualize user sessions
A system and method operable to identify and analyze persistent state information among a plurality of software-related events, and present persistent state...
US-9,824,210 Method for measuring and monitoring the access levels to personal data generated by resources of a user device
A method involves measuring and monitoring usage of data stored on a user device by software applications installed on the user device, the data being generated...
US-9,824,209 Framework for efficient security coverage of mobile software applications that is usable to harden in the field...
A method is described that includes receiving an application and creating a representation of the application that describes states and state transitions of the...
US-9,824,208 Cloud-based active password manager
Methods and systems for periodically generating and managing passwords for one or more websites of users are disclosed. The users are provided with the ability...
US-9,824,207 Authentication information update based on fraud detection
Techniques for maintaining and updating authentication information for a plurality of accounts may be provided. In an example a first set of authentication...
US-9,824,206 Eye gazing passcode generation crossing augmented reality (AR) and virtual reality (VR) devices
In one embodiment, a method includes initiating a password selection session on a source augmented reality or virtual reality device (hereafter the source AR/VR...
US-9,824,205 Mapping process changes
In one implementation, a computer-implemented method includes receiving a request to run a particular process; determining whether the particular process is to...
US-9,824,204 Systems and methods for synchronized sign-on methods for non-programmatic integration systems
Systems and methods for automatically signing a user on to an integration application when a user signs on to another application and signing a user off when...
US-9,824,203 Utilizing a radio frequency identification tag to assess the battery level of a peripheral device
Pursuant to at least some embodiments, the present disclosure relates to a method that includes configuring an RFID tag to store information related to a...
US-9,824,202 Electronic access-protection system, method of operating a computer system, chip card and firmware component
An electronic access protection system for a computer system includes an access-protected apparatus having a firmware component and a data processing device...
US-9,824,201 Method for java application to access intelligent key apparatus
A method for a java application to access an intelligent key apparatus. The apparatus comprises: a java application calling a JNI interface; obtaining a...
US-9,824,200 Wakeup strategy using a biometric sensor
Disclosed is a biometric authentication system. The system comprises a biometric image sensor in an operative position with respect to a mechanical switch on a...
US-9,824,199 Multi-factor profile and security fingerprint analysis
A security fingerprint architecture is disclosed. A security fingerprint comprises one or more behavioral factors which store a history of events associated...
US-9,824,198 System and method for identity and reputation score based on transaction history
Techniques for electronic signature process management are described. Some embodiments provide an electronic signature service ("ESS") configured to manage...
US-9,824,197 Classifier training method and apparatus, identity authentication method and system
Provided is a classifier training method, including: acquiring a training sample set; determining a classification condition at a root node according to a...
US-9,824,196 Authenticating users requesting access to computing resources
Systems and methods are provided for monitoring access of computing resources. Usage rules may be created and stored that define a usage constraint based on...
US-9,824,195 Calculating consecutive matches using parallel computing
Methods and systems for determining consecutive matches are provided. According to one embodiment, a class definition and a data stream are received by a...
US-9,824,194 Application security framework
In accordance with the teaching described herein, systems and methods are provided for providing secure access to a software application on a computing device....
US-9,824,193 Method for using mobile devices with validated user network identity as physical identity proof
The present disclosure discloses a method and network device for using mobile devices with validated user network identity as physical identity proof....
US-9,824,192 Simulation method for macromolecular material
A computer simulation method for a macromolecular material and filler is disclosed, wherein a polymer model of a macromolecular chain of the macromolecular...
US-9,824,191 Method, system and apparatus for controlling patient access to medicaments
A method, system and apparatus for controlling and tracking patient access to medicaments. A patient is provided with medication in locked pill containers that...
US-9,824,190 Systems and methods for creating and selecting models for predicting medical conditions
Systems and methods are provided for selecting one or more models for predicting medical conditions. An exemplary method may include receiving data related to a...
US-9,824,189 Image processing apparatus, image processing method, image display system, and storage medium
An image processing apparatus for estimating a position in an image which an operator who observes the image is likely to observe as the candidate of a next...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.