Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,870,488 Method and apparatus for securing programming data of a programmable device
Circuitry and methods prevent unauthorized programming, or reprogramming, of a programmable device, by requiring a signature in the configuration data to match...
US-9,870,486 Methods and apparatus to assign demographic information to panelists
Methods and apparatus to assign demographic information to panelists are disclosed. Example disclosed methods include generating decoy database proprietor...
US-9,870,485 System and method for detecting sensitive user input leakages in software applications
A system and method for detecting sensitive user input leakages in software applications, such as applications created for smartphone platforms. The system and...
US-9,870,484 Document redaction
A method for redacting an electronic document (ED) having a file format, including: obtaining a request to redact a sensitive data item in the ED; identifying a...
US-9,870,483 Row-level security in a relational database management system
Access control methods provide multilevel and mandatory access control for a database management system. The access control techniques provide access control at...
US-9,870,482 Method and system for managing and tracking content dissemination in an enterprise
A method and system for managing document dissemination, including obtaining a plurality of operation logs from a plurality of local agents, where each of the...
US-9,870,481 Associating a data encryption keystore backup with a computer system
The techniques presented herein provide for associating a data encryption lockbox backup with a data storage system. A first set of software system stable...
US-9,870,480 Automatic removal of global user security groups
A system for automatically replacing a user security group-based computer security policy by a computer security policy based at least partially on actual...
US-9,870,479 Method of handling a document stored in a cloud storage system and associated user credentials for processing...
Due to different formats for documents, in particular different means of identifying users, it is a problem how to handle a document in a cloud storage system,...
US-9,870,478 Data protection for storage device
A method for protecting data on a first storage device from unauthorized access is provided. The method includes copying a data map, such as a file allocation...
US-9,870,477 Security engine for a secure operating environment
The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a...
US-9,870,476 Industrial security agent platform
Systems, methods, and apparatus, including computer programs encoded on computer storage media, for facilitating secure communication. A system for facilitating...
US-9,870,475 Hardware configuration reporting systems
Embodiments related to hardware configuration reporting and arbitration are disclosed herein. For example, an apparatus for hardware configuration reporting may...
US-9,870,474 Detection of secure variable alteration in a computing device equipped with unified extensible firmware...
A firmware-based mechanism for protecting against physical attacks on ROM areas holding Authenticated Variables. A first hash of contents of at least one...
US-9,870,473 System and method for security processor control over CPU power states
The present disclosure presents methods and apparatuses for controlling a power state, which may include a C-state, of one or more processing cores of a...
US-9,870,472 Detecting malign code in unused firmware memory
Systems and methods for preventing attachment of malign code to unused firmware memory are described. In some embodiments, an Information Handling System (IHS)...
US-9,870,471 Computer-implemented method for distilling a malware program in a system
A computer-implemented method for distilling a malware program in a system is disclosed. The computer-implemented method includes steps of receiving a known...
US-9,870,470 Method and apparatus for detecting a multi-stage event
A multi-stage event detector for monitoring a system to detect the occurrence of multistage events in the monitored system, the multi-stage event detector...
US-9,870,469 Mitigation of stack corruption exploits
In an example, a stack protection engine is disclosed for preventing or ameliorating stack corruption attacks. The stack protection engine may operate...
US-9,870,468 System and method for segregating data in a dynamic programming language
Systems and methods are for segregating data and code implemented in a dynamic language, where the segregated data and code operate in an environment, where the...
US-9,870,467 Apparatus and method for implementing a forked system call in a system with a protected region
In an embodiment, at least one machine-readable storage medium includes instructions that when executed enable a system to receive, at a special library of a...
US-9,870,466 Hardware-enforced code paths
There is disclosed in one example, a computing apparatus, including: first one or more logic elements providing a code module, the code module comprising a...
US-9,870,465 Apparatus, method and article to facilitate automatic detection and removal of fraudulent user information in a...
A fraud detection system may obtain a number of known fraudulent end-user profiles and/or otherwise undesirable end-user profiles. Using statistical analysis...
US-9,870,464 Compromised authentication information clearing house
Techniques for maintaining potentially compromised authentication information for a plurality of accounts may be provided. An individual piece of authentication...
US-9,870,463 Permission management method, apparatus, and terminal
A permission management method, apparatus, and terminal. The permission management method includes obtaining an installation package of a first application...
US-9,870,462 Prevention of cable-swap security attack on storage devices
Generally, this disclosure provides systems, devices, methods and computer readable media for prevention of cable swap security attacks on storage devices. A...
US-9,870,461 CAPTCHA techniques utilizing traceable images
Techniques are disclosed for generating, utilizing, and validating traceable image CAPTCHAs. In certain embodiments, a traceable image is displayed, and a trace...
US-9,870,460 Systems and methods for a credential including multiple access privileges
A credential for use in an access control system may include a first sector including first data of a first database type, and a second sector including second...
US-9,870,459 Physical token-less security screening using biometrics
In physical token-less security screening using biometrics, a person provides biometric data to a security computing device as part of a security screening. The...
US-9,870,458 Concealed data matching device, concealed data matching program, and concealed data matching method
A concealed data matching method for a computer including: registering a first concealed vector obtained by concealing registered data and key data based on a...
US-9,870,457 HERMA--heartbeat microwave authentication
Systems and methods for identifying and/or authenticating individuals utilizing microwave sensing modules are disclosed. A HEaRtbeat Microwave Authentication...
US-9,870,456 Systems and methods for biometric authentication
Systems and methods for authentication are disclosed. A method for biometric authentication, includes: receiving a first attempt to validate an identity using...
US-9,870,455 System level user behavior biometrics using feature extraction and modeling
The interaction of a plurality of users with a computer system is monitored and measurements are made of different features of this interaction such as process...
US-9,870,454 Determine security access level based on user behavior
Examples of techniques for determining security access based on user behavioral measurements are disclosed. In accordance with aspects of the present...
US-9,870,453 Direct authentication system and method via trusted authenticators
Systems and methods are provided for enabling online entities to determine whether a user is truly the person who he says using a "two-factor" authentication...
US-9,870,452 Assigning new passcodes to electronic devices
An electronic book distribution system includes electronic devices that reset their passcodes after specified authentication failures. The passcodes of an...
US-9,870,451 Dynamic management, assembly, and presentation of web-based content
In a method for seamlessly providing health-related information, a patient presentation is identified. Each of at least some presentation nodes is selectively...
US-9,870,450 Drug delivery regulator
An apparatus for receiving, dispensing, and regulating controlled substances is provided. Furthermore the apparatus may comprise a portable, handheld container...
US-9,870,449 Methods and systems for predicting health condition of human subjects
Disclosed are methods and systems for classifying one or more human subjects in one or more categories indicative of a health condition of the one or more human...
US-9,870,448 Systems and methods for analyzing insurance claims associated with long-term care insurance
Systems and methods for processing insurance claims associated with a long-term care insurance policy are provided. According to certain aspects, an insurance...
US-9,870,447 Medical data transfer component
Diabetes care management system and method for transferring medical data from a handheld medical recording device to a host computer via a data transfer...
US-9,870,446 3D-volume viewing by controlling sight depth
A medical image data processing method for determining a set of medical image data to be displayed, the data processing method being constituted to be executed...
US-9,870,445 Endoscope Inspection report creating apparatus, creating method of endoscope inspection report and storage medium
An endoscope inspection report creating apparatus includes a folder creating section creating a plurality of folders for storing a plurality of endoscopic...
US-9,870,444 Shop order status visualization system
A method and apparatus for processing shop order instances for an aircraft. A model of the aircraft is identified. The shop order instances for the aircraft are...
US-9,870,443 Method and apparatus for integrated circuit mask patterning
Provided is an integrated circuit (IC) design method. The method includes receiving a design layout of the IC, the design layout having a first main feature,...
US-9,870,442 Equivalence checking between two or more circuit designs that include square root circuits
Methods and apparatuses are described for proving equivalence between two or more circuit designs that include one or more division circuits and/or one or more...
US-9,870,441 Snap-to valid pattern system and method
Described is a method for implementing a snap to capability that enables the manufactured of a valid pattern in a semiconductor device, based upon an originally...
US-9,870,440 Method for automatically generating a netlist of an FPGA program
A method for generating a netlist of an FPGA program. The model of the FPGA program is composed of at least two components, each component being assigned a...
US-9,870,439 Methods and systems for borehole image forward modeling of formation properties
A method and system for improving borehole image forward modeling of formation properties is disclosed. An imaginary circle (106) having a plurality of bins...
US-9,870,438 Computerized method for producing a production plant model
The invention concerns a computerized method for producing a two-dimensional plant model of a modular production plant for producing a chemical product, the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.