Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,004,3035 Systems and methods for enhancing data protection by anonosizing structured and unstructured data and...
Systems, computer-readable media, and methods for improving both data privacy/anonymity and data value, wherein real-world, synthetic, or other data related to...
US-1,004,3034 Randomized input device heating
A security code input may be obfuscated from a thermal imaging device by randomly heating a random set of inputs of an input device. The security code is...
US-1,004,3033 System and method for concealing sensitive data on a computing device
A computer-implemented method may hide sensitive information, such as sensitive information relating to auto, home, life, or renters insurance, banking, and/or...
US-1,004,3032 System for processing data
The present disclosure relates to transmitting a request for a set of data records, the request indicating encrypted data items associated with first and second...
US-1,004,3031 Secure management of user addresses in network service
Methods, systems, and programs are presented for securing user-address information. A first memory is configured according to a first table that does not...
US-1,004,3030 Large-scale authorization data collection and aggregation
Techniques for large-scale authorization data collection and aggregation are disclosed herein. An authorization data service may first receive a set of usage...
US-1,004,3029 Cloud storage encryption
Techniques are disclosed for securing data in a cloud storage. Plaintext files are stored as secured, encrypted files in the cloud. The ciphering scheme employs...
US-1,004,3028 Implementing extent granularity authorization processing in CAPI adapters
A method, system and computer program product are provided for implementing block extent granularity authorization processing for a Coherent Accelerator...
US-1,004,3027 Generation of mask-value pairs for managing access to memory segments
Methods and systems are disclosed for determining mask-value pairs for controlling access to a memory segment for a plurality of IDs. A first set of mask-value...
US-1,004,3026 Restricted replication for protection of replicated databases
Apparatuses and methods are disclosed for protection of data servers configured for data replication of a database. An example apparatus includes a processing...
US-1,004,3025 Persistent key access to a resources in a collection
A method includes receiving a first request from a first user device to access a first resource that includes data for a second user account for which access to...
US-1,004,3024 Intelligent governance controls based on real-time contexts
Method to perform an operation comprising receiving, from a set of input devices, data of an environment surrounding a computing device, determining a current...
US-1,004,3023 Method and device to access personal data of a person, a company, or an object
This invention aims to propose a method and a system allowing to supply certified reliable information without the source of the information being transmitted...
US-1,004,3022 Systems and methods for digital content delivery
Methods, apparatus, systems and machine readable medium for the delivery of digital content are disclosed herein. An example method includes receiving a first...
US-1,004,3021 Controlling access to application data
A method, system and computer-readable storage medium for controlling access to application data associated with an application configured on a computing...
US-1,004,3020 File filter
Method for transferring files to a destination folder on a computer. At least one rule to a transfer of files to a destination folder on a destination computer...
US-1,004,3019 External dataset-based outlier detection for confidential data in a computer system
In an example, a plurality of segments of percentile information indicating submitted confidential data values from users matching at least one attribute of a...
US-1,004,3018 Access privilege analysis for a securable asset
Techniques for access privilege analysis for a securable asset are described. According to various embodiments, a securable asset represents an object that is...
US-1,004,3017 Systems and methods for jurisdiction independent data storage in a multi-vendor cloud environment
A cloud based system for providing data security, the system having a processor which creates a source data file; wherein the source data file is split into at...
US-1,004,3016 Method and system for name encryption agreement in a content centric network
One embodiment provides a system that facilitates efficient name encryption in a CCN. During operation, the system determines, by a client computing device, an...
US-1,004,3015 Method and apparatus for applying a customer owned encryption
A method, computer-readable storage device and apparatus for customer owned encryption at a centralized storage server are disclosed. For example, the method...
US-1,004,3014 System and method for concealing sensitive data on a computing device
A computer-implemented method may hide sensitive information including when no one is looking at a display screen of a client computing device, such as...
US-1,004,3013 Systems and methods for detecting gadgets on computing devices
The disclosed computer-implemented method for detecting gadgets on computing devices may include (i) identifying, on a computing device, a process containing...
US-1,004,3012 Method of correlating static and dynamic application security testing results for a web application
A method of correlating a static application security testing (SAST) finding and a dynamic application security testing (DAST) finding for an application having...
US-1,004,3011 Methods and systems for providing recommendations to address security vulnerabilities in a network of computing...
A solution recommendation (SR) tool can receive vulnerabilities identified by a vulnerability scanner and/or penetration testing tool. The SR tool can determine...
US-1,004,3010 Migration of sandbox processes for malware prevention
Techniques of protecting computers from malware involve migrating processes running applications from a first sandbox to a second sandbox. Along these lines,...
US-1,004,3009 Technologies for software basic block similarity analysis
Technologies for analyzing software similarity include a computing device having access to a collection of sample software. The computing device identifies a...
US-1,004,3008 Efficient white listing of user-modifiable files
A system and method for efficiently determining that a received file is not malware is presented. In operation, when a file is received at a computing device,...
US-1,004,3007 Security within a software-defined infrastructure
There is a method and system that includes establishing a security container that describes a workload and a set of resources that corresponds to the workload...
US-1,004,3006 Event anomaly analysis and prediction
According to an example, event anomaly analysis and prediction may include accessing a master directed graph that specifies known events and transitions between...
US-1,004,3005 Systems and methods for application control in virtualized environments
Described systems and methods enable enforcing application control remotely and automatically, on a relatively large number of client systems (e.g., a corporate...
US-1,004,3004 Method of correlating static and dynamic application security testing results for a web and mobile application
The invention provides a method of correlating and merging static application security testing (SAST) and dynamic application security testing (DAST) for web...
US-1,004,3003 System and method to combine multiple reputations
Particular embodiments described herein provide for an electronic device that can be configured to acquire a plurality of reputations related to an object and...
US-1,004,3002 Optimization of service in-line chain traffic
Systems and methods to optimize processing of service in-line chain traffic are described. The system generates a program comprised of a first plurality of...
US-1,004,3001 Methods and apparatus for control and detection of malicious content using a sandbox environment
A non-transitory processor-readable medium storing code representing instructions to cause a processor to perform a process includes code to cause the processor...
US-1,004,3000 System and method for process hollowing detection
A method and system for remediating a process hollowing intrusion on a user device comprising detecting a process starting on the user device, preparing the...
US-1,004,2999 Methods and apparatus to manage password security
Methods, apparatus, systems and articles of manufacture are disclosed to manage password security. An example apparatus includes a password field identifier to:...
US-1,004,2998 Automatically altering and encrypting passwords in systems
In an approach for changing a password. Aspects of an embodiment of the present invention include an approach for changing a password, wherein the approach...
US-1,004,2997 Authentication device and system
A public key architecture (160) includes a dual certificate hierarchy which facilitates two independent authentication functions. One of the authentication...
US-1,004,2996 Trusted device
A trusted device, such as a wristwatch, is provided with authentication circuitry, used to perform an authentication operation to switch the trusted device into...
US-1,004,2995 Detecting authority for voice-driven devices
A computing device senses speech or other user input. One or more physical variables pertaining to a user of the computing device are also sensed, and...
US-1,004,2994 Validation of the right to access an object
An iris biometric recognition module includes technology for capturing images of an iris of an eye of a person, whether the person is moving or stationary. The...
US-1,004,2993 Access control through multifactor authentication with multimodal biometrics
A system is provided in which a person may use a Cellular (Mobile) Telephone, a PDA or any other handheld computer to make a purchase. This is an example only....
US-1,004,2992 Image based CAPTCHA challenges
Systems and methods of determining image characteristics are provided. More particularly, a first image having an unknown characteristic can be obtained. The...
US-1,004,2991 Method and apparatus for operating mobile terminal
A method and apparatus for easily restricting a use right and improving use convenience in a mobile terminal are provided. The method includes displaying a...
US-1,004,2990 Field revisions for a personal security device
Atomically modifying a personal security device includes presenting the personal security device to a reader/writer coupled to an access module, the access...
US-1,004,2989 Device activation
The embodiments set forth systems and techniques to activate and provide other device services for user devices. An activation manager is configured to activate...
US-1,004,2988 Tiered code obfuscation in a development environment
A method for viewing a plurality of encrypted code displayed within an integrated development environment with a pair of augmented reality (AR) glasses. A...
US-1,004,2987 Statutory license restricted digital media playback on portable devices
Systems and methods are described for, e.g., providing a statutory audio content service on a portable device that complies with the provisions of the Digital...
US-1,004,2986 Infusion pump automation system and method
An infusion pump automation system and method includes a remote processor and an infusion pump having an infusion pump user interface, including a touch screen...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.