Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,002,5950 Systems and methods for image recognition
Systems and methods that utilize an image processing model to analyze features of an image to identify individuals within a set of images are disclosed. Feature...
US-1,002,5949 Item sharing based on information boundary and access control list settings
An item is shared based on an information boundary and access control settings. An application such as a document management application detects a selection of...
US-1,002,5948 Correcting access rights of files in electronic communications
A method for modifying access rights to electronically stored files linked in a draft electronic communication stored at a client device includes receiving, at...
US-1,002,5947 System and method to produce a virtually trusted database record
System and method to produce a virtual trusted database record, the method including receiving, by a processor coupled to a user-facing communication interface...
US-1,002,5946 Method of controlling whether an uncompleted transaction applied against a database goes forward or is aborted,...
A method is provided for controlling whether transactions applied against a database go forward or are aborted on a transaction processing system. A tracking...
US-1,002,5945 Decryption method for use in displaying data
A decryption method for use in displaying data includes the steps of executing a display instruction of an object inclusive of a plurality of data, displaying...
US-1,002,5944 Variable domain resource data security for data processing systems
The variable domain data access control system and method described herein use the same variable domain to describe a data security model and a variable domain...
US-1,002,5943 Commit and rollback of data streams provided by partially trusted entities
A collection of key-value pairs may be maintained by a key-value database management system. Updates to the collection may be provided by a partially trusted...
US-1,002,5942 System and method of establishing permission for multi-tenancy storage using organization matrices
A system and method of establishing permissions for multi-tenancy storage using an organization matrices is provided. The method includes a computing...
US-1,002,5941 Data element tokenization management
Systems and methods to manage a tokenization manifest that can be used for managing a redaction through tokenization of a set of field level tokenization values...
US-1,002,5940 Method and system for secure use of services by untrusted storage providers
A method for encrypting data. The method comprises receiving, from a user, via a client terminal, digital content including at least one textual string for...
US-1,002,5939 Internal dataset-based outlier detection for confidential data in a computer system
In an example, a submission of a confidential data value of a first confidential data type is received from a first user with one or more attributes. A...
US-1,002,5938 User-controllable screen privacy software
The disclosure relates to software that provides fine-grained user control over when and how a software-based privacy filter is used to reduce clarity and/or...
US-1,002,5937 Practical and dynamic approach to enterprise hardening
Techniques are disclosed for dynamically managing hardening policies in a client computer (e.g., of an enterprise network). A hardening management application...
US-1,002,5936 Systems and methods for SQL value evaluation to detect evaluation flaws
Methods and apparatuses for detecting an evaluation flaw in a SQL query, the SQL query configured to access data in a database table are disclosed. The method...
US-1,002,5935 Securely exchanging information during application startup
Provided is a method for securely exchanging information during application startup. A processor may send a request for a passphrase to one or more remote...
US-1,002,5934 Media protection policy enforcement for multiple-operating-system environments
Technologies for media protection policy enforcement include a computing device having multiple operating systems and a data storage device partitioned into a...
US-1,002,5933 System for utilizing one or more data sources to generate a customized set of operations
Systems and computer-readable media are disclosed for utilizing one or more data sources to generate a set of operations. First data may be received from a...
US-1,002,5932 Portable security device
A portable security device for a computing system includes a housing, an interface at least partially disposed within the housing, a trusted platform module...
US-1,002,5931 Method and system for malware detection
Example embodiments of the present invention relate to methods, systems, and a computer program product for detecting and responding to the presence of...
US-1,002,5930 Hardware assisted branch transfer self-check mechanism
Embodiments of the present disclosure are directed to a self-check application to determine whether an indirect branch execution is permissible for an...
US-1,002,5929 Detection of anomalous program execution using hardware-based micro-architectural data
Disclosed are devices, systems, apparatus, methods, products, media and other implementations, including a method that includes obtaining hardware-based...
US-1,002,5928 Proactive browser content analysis
A protection module operates to analyze threats, at the protocol level (e.g., at the HTML level), by intercepting all requests that a browser engine resident in...
US-1,002,5927 Malicious content analysis with multi-version application support within single operating environment
Techniques for efficient malicious content detection in plural versions of a software application are described. According to one embodiment, the computerized...
US-1,002,5926 Side-channel leakage evaluator and analysis kit
A method for analyzing side-channel leakage of an application running on a device including loading the application on a system comprising a device simulator,...
US-1,002,5925 Dynamically measuring the integrity of a computing apparatus
The present disclosure includes methods and systems for measuring the integrity of a device. A number of embodiments can include initiating an observatory in a...
US-1,002,5924 Taskless containers for enhanced isolation of users and multi-tenant applications
A system for managing Containers, including a hardware node running an OS; a multi-tenant application on the node; and a plurality of Containers under the OS. A...
US-1,002,5923 Data processing apparatus and method for protecting secure data and program code from non-secure access when...
A data processing apparatus includes processing circuitry and a data store including a plurality of regions including a secure region and a less secure region....
US-1,002,5922 User-mode component injection and atomic hooking
Techniques are described herein for loading a user-mode component associated with a kernel-mode component based on an asynchronous procedure call (APC) built by...
US-1,002,5921 Automatically altering and encrypting passwords in systems
In an approach for changing a password. Aspects of an embodiment of the present invention include an approach for changing a password, wherein the approach...
US-1,002,5920 Enterprise triggered 2CHK association
A method of operating a security server to securely transact business between a user and an enterprise via a network includes receiving, at the security server...
US-1,002,5919 Authentication based on object recognition
Various systems, mediums, and methods herein describe aspects of an authentication system. The system may receive a request from a user device to authenticate a...
US-1,002,5918 Apparatus and method for password authentication
A user inputs a password at a user device whose processor receives the password, retrieves a stored derived value resulting from a derivation function,...
US-1,002,5917 Biometrics for user identification in mobile health systems
A wearable device may include a sensor system capable of obtaining physiological from a user's body. Some wearable devices may include a substance delivery...
US-1,002,5916 Method and apparatus for executing device according to usage authority
Provided are a method and apparatus for executing a device according to usage authority, wherein usage authority information for a first device may be received,...
US-1,002,5915 Contact signature authentication of user of device
A method including receiving sensed information corresponding to a contact signature of a user holding a device, generating a contact signature from the sensed...
US-1,002,5914 Authentication using third-party data
In an example, techniques of this disclosure include establishing, by a computing device, authentication data for authenticating a user of a service provided by...
US-1,002,5913 Cross-application authentication on a content management system
Systems, methods, and computer-readable media for cross-application authentication on a content management system. A client application running at a client...
US-1,002,5912 Information processing system, reading apparatus, information processing apparatus, and information processing...
According to an embodiment, a reading apparatus is connectable with an information processing apparatus connected to a server apparatus. The reading apparatus...
US-1,002,5911 Replay attack prevention for content streaming system
The invention relates to a method for accessing protected content provided to a client device, wherein the client device decrypts the content using at least one...
US-1,002,5910 Endpoint development process
A system for developing and producing clinical endpoints based on patient reported outcome data utilizing algorithms to generate decision rules to evaluate...
US-1,002,5909 Medical devices and configuration update management
A configuration management resource keeps track of incremental updates to a locally stored copy of configuration information (such as drug library information)...
US-1,002,5908 Medication adherence systems and methods
Automated medication dispensing system and device, designed to monitor and verify that a patient is being properly medicated. A sensor equipped, processor...
US-1,002,5907 Pharmaceutical prescription transfer system
A pharmaceutical prescription transfer system making use of a transferring pharmacy module and a receiving pharmacy module, each of which may be made available...
US-1,002,5906 Mobile self-management compliance and notification method, system and computer program product
A computerized interactive method, system and computer program product is provided for managing a person's health and lifestyle through self-managing controlled...
US-1,002,5905 Communication device resource allocation based on medical data criticality and resource status
Methods and devices are disclosed for managing a resource of a communication device configured to process and communicate medical data in addition to other...
US-1,002,5904 Systems and methods for managing a master patient index including duplicate record detection
A system for managing a master patient index is described. The master patient index database is constructed using inverted indices. The inverted index...
US-1,002,5903 Validating a metadata tree using a metadata integrity validator
A method performed by a processing system includes reconstructing a metadata tree of a patient from a metadata tree journal, the metadata tree including a...
US-1,002,5902 Enhanced pathology diagnosis
A method includes magnifying a pathology sample with a microscope to form magnified pathology images, and recording the magnified pathology images with a...
US-1,002,5901 Healthcare system integration
An approach is provided for acquiring and integrating data into external services. According to the approach, image and/or video data and identification data...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.