Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,001,9595 System and method for providing sensitive information access control
A system and method enabling information access control of the sensitive information, based on a trust computing platform is provided. The trustworthiness of...
US-1,001,9594 Pattern for secure store
A computer system, computer product, and method for accessing a secure store, which includes receiving a request to access a secure store, checking the file...
US-1,001,9593 Access control system for implementing access restrictions of regulated database records while identifying and...
A digital targeting system is configured to access data to determine users that satisfy content factors, such as pre-validation criteria, based on user...
US-1,001,9592 Tiered application permissions
Methods, systems, and computer-readable media for granting application permissions and providing notifications of API activity are provided. An example method...
US-1,001,9591 Low-latency media sharing
Devices, systems and methods are disclosed that receive encrypted media files from a remote device during pre-caching. The encrypted media files may be...
US-1,001,9590 Secure mobile phone document storage application
A method for a smart phone app is provided wherein entry to a secure data storage area is facilitated on a file or object level, and not on an app level,...
US-1,001,9589 Generating search results for people
Techniques include: receiving a search query; identifying content responsive to the search query; identifying one or more members of a social networking service...
US-1,001,9588 Systems and/or methods for enabling cooperatively-completed rules-based data analytics of potentially sensitive...
Certain example embodiments relate to systems and/or methods for providing enhanced control over potentially sensitive data sharable among and/or between...
US-1,001,9587 System and method for generating application control rules
Disclosed is a system and method for configuring control rules for applications executable on a computer. An example method includes classifying computer...
US-1,001,9586 Authentication method and system
The present invention provides a method and apparatus for the production and labeling of objects in a manner suitable for the prevention and detection of...
US-1,001,9585 Encryption recommendation method and encryption recommendation device
An encryption recommendation method and an encryption recommendation device are provided. The method includes: scanning user operations on an application in a...
US-1,001,9584 Performance of image forming functions based on encrypted data stored in volatile memory
An image forming apparatus includes a function unit configured to perform a predetermined function, a volatile memory configured to store data which is...
US-1,001,9583 Method and apparatus for performing protected walk-based shadow paging using multiple stages of page tables
A Protected Walk-based Shadow Paging (PWSP) method includes storing a multiple level first stage (S1) page tables structure in second stage (S2) page tables....
US-1,001,9582 Detecting application leaks
A method for detecting application leaks is described. In one embodiment, the method may include the method may include identifying a first application as a...
US-1,001,9581 Identifying stored security vulnerabilities in computer software applications
Identifying stored security vulnerabilities in computer software applications by providing via a first interface of a computer software application during...
US-1,001,9580 Integrity checking for computing devices
A computing device may perform integrity checks on a closed operating system defining a preconfigured user portion and a preconfigured system portion using an...
US-1,001,9579 Embedded controller for safety booting and method thereof
A safety booting method for an embedded controller is applied in a laptop. The embedded controller is installed in the laptop, and the laptop includes a central...
US-1,001,9578 Correlating a task with a command to perform a change ticket in an IT system
An approach is provided for controlling a task to perform a change ticket. The task is correlated with command(s) to perform the task, and first and second...
US-1,001,9577 Hardware hardened advanced threat protection
Systems and methods for hardware hardened advanced threat protection are described. In some embodiments, an Information Handling System (IHS) may include a...
US-1,001,9576 Security control system for protection of multi-core processors
A security control system is provided that works as an extra layer of defense as a way to prevent an "attack" that is initiated by modifying either the "jump"...
US-1,001,9575 Evaluating malware in a virtual machine using copy-on-write
Evaluating a potentially malicious sample using a copy-on-write overlay is disclosed. A first virtual machine instance is initialized as a copy-on-write overlay...
US-1,001,9574 Systems and methods for providing dynamic file system awareness on storage devices
Systems and methods for providing awareness of a host file system on a storage device are described. In one embodiment, a storage device includes a host...
US-1,001,9573 System and method for detecting executable machine instructions in a data stream
Detecting executable machine instructions in a data stream is accomplished by accessing a plurality of values representing data contained within a memory of a...
US-1,001,9572 Detecting malicious activities by imported software packages
Disclosed are various embodiments for detecting malicious activities by imported software packages. A monitoring service determines that untrusted code...
US-1,001,9571 Protection from side-channel attacks by varying clock delays
A system, comprising a logic circuit and delay circuitry, is described. The logic circuit is configured to perform a plurality of instances of a particular...
US-1,001,9570 Protection and communication abstractions for web browsers
Systems and methodologies for accessing resources associated with a Web-based application in accordance with one or more embodiments disclosed herein may...
US-1,001,9569 Dynamic patching for diversity-based software security
Methods, devices, and non-transitory storage media for dynamic patching of diversity-based software executing on a computing device. One of many variations of...
US-1,001,9568 Detecting generation of virtual machine authentication
Systems and methods for detecting the generation of authentication credentials for virtual machine instances are described. In various embodiments, an...
US-1,001,9567 Encoding of security codes
A method and apparatus for encoding security codes are provided. In the method and apparatus a first code, which may be an erroneous code, is compared to a set...
US-1,001,9566 Authorizing robot use and/or adapting physical control parameters for a robot
Some aspects are related to methods and apparatus that enable authorization of one or more functionalities of a robot based on a user physically manipulating...
US-1,001,9565 Method of authenticating integrated circuits using optical characteristics of physically unclonable functions
A method and apparatus for reading unique identifiers of an integrated circuit. The unique identifiers may be physically unclonable functions (PUFs), formed by...
US-1,001,9564 Authentication of a device
Pairing data associated with a second device may be received at a first device. The pairing data may be received from a server. A first authentication proof may...
US-1,001,9563 Information processing apparatus and information processing method
Provided is an information processing apparatus including: a biometric information authentication unit that authenticates biometric information identified from...
US-1,001,9562 Biometric authentication matching using grip detection
In embodiments of an electronic device having a biometric authentication system and grip detection sensor, an authentication circuit is coupled to the biometric...
US-1,001,9561 Systems and methods for continuous biometric authentication
Methods and systems for authenticating a user are described. In some embodiments, a series of voice interactions are received from a user during a voiceline...
US-1,001,9560 Password authenticating device for preventing leakage of passwords
Provided is a password-authenticating device in which a password is not perceived from the hand movements of an operator during entry of a password. The...
US-1,001,9559 Method, system and device for aggregating data to provide a display in a user interface
A method, a system and a device are provided for aggregating data to provide a display in a user interface. The method includes populating data records in data...
US-1,001,9558 Controlling licensable features of software using access tokens
Systems and methods are disclosed for activating features of software products at a client device utilizing a features set ID embedded in an access token. In...
US-1,001,9557 Method, systems, and apparatus for fragmented file sharing
Systems, methods, software, and apparatus are described for facilitating the distribution and management of fragmented content. In one embodiment, a packager...
US-1,001,9556 EPID attestation using RFID
Technologies for verification include storage with private keys, wherein each private key is associated with a group affiliation. The storage also includes...
US-1,001,9555 Interactive respiratory device usage tracking system
A monitoring system for inhalers includes a tracker module configured to be secured to a variety of inhalers, including both controller and rescue inhalers. The...
US-1,001,9554 Glycemic risk determination based on variability of glucose
A system and method for determining glycemic risks based on an analysis of glucose data includes visualization of hypoglycemia, variability, and hyperglycemia...
US-1,001,9553 Systems and methods for virtually integrated care delivery
Disclosed herein are systems and methods for virtually integrated care delivery. In one implementation, a provider controller is disposed in a virtual care...
US-1,001,9552 Systems and methods for remote patient monitoring and storage and forwarding of patient information
A method according to one aspect of the present invention includes receiving patient information, analyzing the patient information to identify a condition for...
US-1,001,9551 Generating a patient-specific orthopaedic surgical plan from medical image data
Technologies for generating a patient-specific surgical plan from medical image data include receiving an orthopaedic surgical plan request from a computing...
US-1,001,9550 Optical processing
We describe a quantitative PCR (qPCR) instrument for combined qPCR and melt curve (dissociation and/or association curve) analysis. The instrument has at least...
US-1,001,9549 Method of designing a common preform for providing preforms for turbine engine outlet guide vanes of different...
A method of designing a common preform for providing a plurality of preforms for turbine engine outlet guide vanes of different geometrical profiles and made...
US-1,001,9548 Method of generating modified layout and system therefor
A method, of generating a modified layout based on an original layout, includes: determining a first set of width bias values of an i-th set of layout patterns...
US-1,001,9547 Guide pattern data correcting method, pattern forming method, and computer readable record medium
According to one embodiment, a guide pattern data correcting method is for correcting guide pattern data of a physical guide for formation of a polymer material...
US-1,001,9546 Modular system on chip configuration system
A system-on-a-chip (SoC) includes a master module and a first adapter module. The master module includes an upstream interface and a downstream interface. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.