Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,004,3043 Integrated circuit card reader with improved heat dissipation
Various embodiments provide a card reader that provides heat dissipation for high data transfer ICCs. The card reader includes a body having a press bar that...
US-1,004,3042 Decodable indicia reading terminal with indicia analysis functionality
A decodable indicia reading terminal can comprise a multiple pixel image sensor, an imaging lens configured to focus an image of decodable indicia on the image...
US-1,004,3041 Multi-function, modular system for network security, secure communication, and malware protection
Representative embodiments are disclosed for providing network and system security. A representative apparatus includes an input-output connector coupleable to...
US-1,004,3040 Protecting against fraud and incorrect entries in submission of confidential data
In an example embodiment, a method for protecting against incorrect confidential data values in a computer system is provided. A machine learning algorithm is...
US-1,004,3039 Verification paths of leaves of a tree
There is provided mechanisms for determining a verification path for each leaf of a tree. A method is performed by a tree manager processor. The method...
US-1,004,3038 Identifying private information from data streams
A method and apparatus for an automated classification of data in a data stream as private data includes receiving a data stream, parsing the data stream to...
US-1,004,3037 Systems and methods for scrubbing confidential data
Methods and systems for scrubbing confidential insurance account information are provided. According to embodiments, a scrubbing server can receive a request to...
US-1,004,3036 Systems and methods for tokenization to support pseudononymization of sensitive data
Systems and methods for tokenization to support pseudonymization are provided herein. An example method includes receiving an input set, seeding a random number...
US-1,004,3035 Systems and methods for enhancing data protection by anonosizing structured and unstructured data and...
Systems, computer-readable media, and methods for improving both data privacy/anonymity and data value, wherein real-world, synthetic, or other data related to...
US-1,004,3034 Randomized input device heating
A security code input may be obfuscated from a thermal imaging device by randomly heating a random set of inputs of an input device. The security code is...
US-1,004,3033 System and method for concealing sensitive data on a computing device
A computer-implemented method may hide sensitive information, such as sensitive information relating to auto, home, life, or renters insurance, banking, and/or...
US-1,004,3032 System for processing data
The present disclosure relates to transmitting a request for a set of data records, the request indicating encrypted data items associated with first and second...
US-1,004,3031 Secure management of user addresses in network service
Methods, systems, and programs are presented for securing user-address information. A first memory is configured according to a first table that does not...
US-1,004,3030 Large-scale authorization data collection and aggregation
Techniques for large-scale authorization data collection and aggregation are disclosed herein. An authorization data service may first receive a set of usage...
US-1,004,3029 Cloud storage encryption
Techniques are disclosed for securing data in a cloud storage. Plaintext files are stored as secured, encrypted files in the cloud. The ciphering scheme employs...
US-1,004,3028 Implementing extent granularity authorization processing in CAPI adapters
A method, system and computer program product are provided for implementing block extent granularity authorization processing for a Coherent Accelerator...
US-1,004,3027 Generation of mask-value pairs for managing access to memory segments
Methods and systems are disclosed for determining mask-value pairs for controlling access to a memory segment for a plurality of IDs. A first set of mask-value...
US-1,004,3026 Restricted replication for protection of replicated databases
Apparatuses and methods are disclosed for protection of data servers configured for data replication of a database. An example apparatus includes a processing...
US-1,004,3025 Persistent key access to a resources in a collection
A method includes receiving a first request from a first user device to access a first resource that includes data for a second user account for which access to...
US-1,004,3024 Intelligent governance controls based on real-time contexts
Method to perform an operation comprising receiving, from a set of input devices, data of an environment surrounding a computing device, determining a current...
US-1,004,3023 Method and device to access personal data of a person, a company, or an object
This invention aims to propose a method and a system allowing to supply certified reliable information without the source of the information being transmitted...
US-1,004,3022 Systems and methods for digital content delivery
Methods, apparatus, systems and machine readable medium for the delivery of digital content are disclosed herein. An example method includes receiving a first...
US-1,004,3021 Controlling access to application data
A method, system and computer-readable storage medium for controlling access to application data associated with an application configured on a computing...
US-1,004,3020 File filter
Method for transferring files to a destination folder on a computer. At least one rule to a transfer of files to a destination folder on a destination computer...
US-1,004,3019 External dataset-based outlier detection for confidential data in a computer system
In an example, a plurality of segments of percentile information indicating submitted confidential data values from users matching at least one attribute of a...
US-1,004,3018 Access privilege analysis for a securable asset
Techniques for access privilege analysis for a securable asset are described. According to various embodiments, a securable asset represents an object that is...
US-1,004,3017 Systems and methods for jurisdiction independent data storage in a multi-vendor cloud environment
A cloud based system for providing data security, the system having a processor which creates a source data file; wherein the source data file is split into at...
US-1,004,3016 Method and system for name encryption agreement in a content centric network
One embodiment provides a system that facilitates efficient name encryption in a CCN. During operation, the system determines, by a client computing device, an...
US-1,004,3015 Method and apparatus for applying a customer owned encryption
A method, computer-readable storage device and apparatus for customer owned encryption at a centralized storage server are disclosed. For example, the method...
US-1,004,3014 System and method for concealing sensitive data on a computing device
A computer-implemented method may hide sensitive information including when no one is looking at a display screen of a client computing device, such as...
US-1,004,3012 Method of correlating static and dynamic application security testing results for a web application
A method of correlating a static application security testing (SAST) finding and a dynamic application security testing (DAST) finding for an application having...
US-1,004,3011 Methods and systems for providing recommendations to address security vulnerabilities in a network of computing...
A solution recommendation (SR) tool can receive vulnerabilities identified by a vulnerability scanner and/or penetration testing tool. The SR tool can determine...
US-1,004,3010 Migration of sandbox processes for malware prevention
Techniques of protecting computers from malware involve migrating processes running applications from a first sandbox to a second sandbox. Along these lines,...
US-1,004,3009 Technologies for software basic block similarity analysis
Technologies for analyzing software similarity include a computing device having access to a collection of sample software. The computing device identifies a...
US-1,004,3008 Efficient white listing of user-modifiable files
A system and method for efficiently determining that a received file is not malware is presented. In operation, when a file is received at a computing device,...
US-1,004,3007 Security within a software-defined infrastructure
There is a method and system that includes establishing a security container that describes a workload and a set of resources that corresponds to the workload...
US-1,004,3006 Event anomaly analysis and prediction
According to an example, event anomaly analysis and prediction may include accessing a master directed graph that specifies known events and transitions between...
US-1,004,3005 Systems and methods for application control in virtualized environments
Described systems and methods enable enforcing application control remotely and automatically, on a relatively large number of client systems (e.g., a corporate...
US-1,004,3004 Method of correlating static and dynamic application security testing results for a web and mobile application
The invention provides a method of correlating and merging static application security testing (SAST) and dynamic application security testing (DAST) for web...
US-1,004,3003 System and method to combine multiple reputations
Particular embodiments described herein provide for an electronic device that can be configured to acquire a plurality of reputations related to an object and...
US-1,004,3002 Optimization of service in-line chain traffic
Systems and methods to optimize processing of service in-line chain traffic are described. The system generates a program comprised of a first plurality of...
US-1,004,3001 Methods and apparatus for control and detection of malicious content using a sandbox environment
A non-transitory processor-readable medium storing code representing instructions to cause a processor to perform a process includes code to cause the processor...
US-1,004,3000 System and method for process hollowing detection
A method and system for remediating a process hollowing intrusion on a user device comprising detecting a process starting on the user device, preparing the...
US-1,004,2999 Methods and apparatus to manage password security
Methods, apparatus, systems and articles of manufacture are disclosed to manage password security. An example apparatus includes a password field identifier to:...
US-1,004,2998 Automatically altering and encrypting passwords in systems
In an approach for changing a password. Aspects of an embodiment of the present invention include an approach for changing a password, wherein the approach...
US-1,004,2997 Authentication device and system
A public key architecture (160) includes a dual certificate hierarchy which facilitates two independent authentication functions. One of the authentication...
US-1,004,2996 Trusted device
A trusted device, such as a wristwatch, is provided with authentication circuitry, used to perform an authentication operation to switch the trusted device into...
US-1,004,2995 Detecting authority for voice-driven devices
A computing device senses speech or other user input. One or more physical variables pertaining to a user of the computing device are also sensed, and...
US-1,004,2994 Validation of the right to access an object
An iris biometric recognition module includes technology for capturing images of an iris of an eye of a person, whether the person is moving or stationary. The...
US-1,004,2993 Access control through multifactor authentication with multimodal biometrics
A system is provided in which a person may use a Cellular (Mobile) Telephone, a PDA or any other handheld computer to make a purchase. This is an example only....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.