Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,003,2049 Magnetic cards and devices for motorized readers
One or more detection activities of a card may allow calculation of rolling speed in motorized readers. Accordingly, the detection activity may result in a data...
US-1,003,2048 Method and system for compiling a multi-source database of composite investor-specific data records with no...
A system and method are disclosed for compiling a database of investor-related data by gathering and linking customer-specific data records from multiple...
US-1,003,2047 User search based on private information
In one embodiment, a method includes receiving, from a first user, a query specifying one or more criteria; accessing a data store comprising information...
US-1,003,2046 Protecting confidential information
An approach using a computer, receives from a first computer, text generated by a user and identifies in the text generated by the user, confidential...
US-1,003,2045 Dynamic runtime field-level access control using a hierarchical permission context structure
This disclosure provides for a system, method, and machine-readable medium for performing dynamic runtime field-level access control using a hierarchical...
US-1,003,2044 Multi-party authentication and authorization
Disclosed are various examples for multi-party authentication and authentication. In one example, a user who forgets a password can gain access to secured data...
US-1,003,2043 Masking sensitive data in mobile applications
In an approach to masking data in a software application associated with a mobile computing device, one or more computer processors receive a request to display...
US-1,003,2042 Digital identification enrollment
In some implementations, a computer-implemented method and system for enrolling customers into a digital identification program may include obtaining, from a...
US-1,003,2041 Storage volume protection using restricted resource classes
Techniques for restricting access to a storage volume attached to a data processing system are described. In one embodiment, a storage management and access...
US-1,003,2040 Safe web browsing using content packs with featured entry points
Content packs are provided for identifying a plurality of authorized web-based resources, wherein a web browser is configured to prevent access to web-based...
US-1,003,2039 Role access to information assets based on risk model
The program controls access to data objects stored on a tangible device of a computer system within an enterprise. A user request to access a data object...
US-1,003,2038 File system support for rolling keys
This application relates to a key rolling process for a file system of a computing device. The key rolling process allows for files to be transparently...
US-1,003,2037 Establishing application trust levels using taint propagation as a service
An application of a mobile device may be granted access to sensitive or private information. The mobile device may be configured to monitor the application's...
US-1,003,2036 Systems and methods of multidimensional encrypted data transfer
Example embodiments of the systems and methods of multidimensional encrypted data transfer disclosed herein also introduce novel and unobvious methods to store...
US-1,003,2035 Parallel and hierarchical password protection on specific document sections
The present disclosure involves systems and computer implemented methods for protecting portions of electronic documents. An example method includes receiving a...
US-1,003,2034 MPEG transport frame synchronization
Techniques are described for communicating encoded data using start code emulation prevention. The described techniques include obtaining at least one partially...
US-1,003,2033 Systems and methods for protecting backed-up data from ransomware attacks
The disclosed computer-implemented method for protecting backed-up data from ransomware attacks may include (1) determining that a backup system periodically...
US-1,003,2032 Software container registry inspection
A request to a scan a software image for specified criteria is received, the software image comprising layers stored in a first data store. Metadata in a second...
US-1,003,2031 Detecting unknown software vulnerabilities and system compromises
Disclosed are various embodiments for detecting unknown software vulnerabilities and system compromises. In a first implementation, a monitoring service records...
US-1,003,2030 Trusted kernel starting method and apparatus
A trusted kernel starting method and apparatus are provided. The method includes: starting a security boot module boot loader; invoking the boot loader to...
US-1,003,2029 Verifying integrity of backup file in a multiple operating system environment
Provided is a technique to enhance security of a computer in a multi-OS operating environment. A memory image of a primary OS is in an active state, and a...
US-1,003,2028 Method for processing UEFI protocols and system therefor
A Unified Extensible Firmware Interface protocol installer utilizes and modifies a list of global unique identifiers corresponding to Unified Extensible...
US-1,003,2027 Information processing apparatus and program for executing an electronic data in an execution environment
It is difficult to prevent virus infection, information leakage or the like for example when a user carelessly manipulates a file. An electronic file...
US-1,003,2026 Static and dynamic security analysis of apps for mobile devices
Techniques for performing static and dynamic analysis on a mobile device application are disclosed. Static analysis is performed on a mobile device application...
US-1,003,2025 Behavior-based ransomware detection
An anti-malware application detects, stops, and quarantines ransomware. The anti-malware application monitors threads executing on a computing device and...
US-1,003,2024 System and method for virtual partition monitoring
A method is provided in one example embodiment that includes receiving in an external handler an event notification associated with an event in a virtual...
US-1,003,2023 Systems and methods for selectively applying malware signatures
A computer-implemented method for selectively applying malware signatures may include (1) receiving a time-sensitive malware signature at a receiving time to...
US-1,003,2022 System and method for self-protecting code
Embodiments of the presently disclosed invention provide a method and system for providing self-protecting code. In particular, embodiments provide security...
US-1,003,2021 Method for detecting a threat and threat detecting apparatus
Aspects of the disclosure include a threat detecting apparatus. The threat detecting apparatus can include an interface circuit, an opcode detector, and a...
US-1,003,2020 Techniques for sharing network security event information
This disclosure provides techniques for pooling and searching network security events reported by multiple sources. As information representing a security event...
US-1,003,2019 System, method, and computer program product for detecting access to a memory device
Discrete events that take place with respect to a hard disk drive or other I/O device or port are indicated to logic that implements Self-Monitoring Analysis...
US-1,003,2018 Password recovery
A password recovery technique for access to a system includes receiving a request from a first party to recover the first party's password to access the system,...
US-1,003,2017 Methods and systems for enabling, tracking, and correlating anonymous user activity
Methods are disclosed for identity key management in networked application execution. In one embodiment, an identifier request is transmitted from a client...
US-1,003,2016 System and method to cause an obfuscated non-functional device to transition to a starting functional state...
A system and method to cause an obfuscated non-functional device to transition to a starting functional state using a specified number of cycles are disclosed....
US-1,003,2015 Password input method based on a two-stage conversion and a system using thereof
The invention discloses a password input method based on a two-stage conversion. The method specifically includes providing password symbols and randomly...
US-1,003,2014 Systems and methods for time changing dynamic security code
The present technology provides dynamic security code systems and method for their creation and use. The systems include a base layer including a first pattern...
US-1,003,2013 Image forming apparatus communicating with external device through network, network system, method of...
An image forming apparatus configured to communicate with an authentication apparatus through a network, the image forming apparatus including: an acquisition...
US-1,003,2012 Storage device capable of fingerprint identification
A storage device capable of fingerprint identification includes a first storage, a first controller and a second storage. The first storage is configured to...
US-1,003,2011 Method and device for managing authentication using an identity avatar
Aspects of the subject disclosure may include, for example, generating a digital certificate responsive to an authentication of a user according to a dynamic...
US-1,003,2010 System, device, and method of visual login and stochastic cryptography
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a possible attacker. A log-in...
US-1,003,2009 Motion information filtering
One embodiment provides a method, including: utilizing at least one processor to execute computer code that performs the steps of: receiving motion sensor...
US-1,003,2008 Trust broker authentication method for mobile devices
A mobile device may perform authentication with an authenticating entity. The mobile device may comprise a plurality of sensors and a processor. The processor...
US-1,003,2007 Controlling access by code
A novel code signing system, computer readable media, and method are provided. The code signing method includes receiving a code signing request from a...
US-1,003,2006 Copyright generation and storage utility
A utility, typically in the form of a software application, allows an author to record digital media, generate and associate and/or embed unique copyright data...
US-1,003,2005 Methods and systems to secure control and enhance medication adherence
Embodiments of the invention provide systems and methods to provide safe, secure and accurate point-to-point delivery of prescription and non-prescription drugs...
US-1,003,2004 Method and system to implement medical information tracking system and medication dispenser
Disclosed is a cloud-based resource and information tracking system for medical patients and healthcare providers. The cloud-based software system integrates...
US-1,003,2003 Patient medical data access system
A medical data point of care device is configured to collect, access, store, and distribute patient medical data. The device is particularly suited for use in a...
US-1,003,2002 Medical monitoring system
Medical patient monitoring devices that have the capability of detecting the physical proximity of a clinician are disclosed. The medical patient monitoring...
US-1,003,2001 Methods and systems for identifying the quantitation cycle for a PCR amplification reaction
Methods and systems for identifying a quantitation cycle (C.sub.q) for a PCR reaction that includes fitting a line having a plurality of line segments to data...
US-1,003,2000 Methods and systems for genomic analysis
A computer-implemented method for processing and/or analyzing nucleic acid sequencing data comprises receiving a first data input and a second data input. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.