Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,005,5616 Securing internet of things (IOT) RF (radio frequency) location tags using source addresses to locate stations...
RF tags using source addresses to locate stations on a Wi-Fi network are secured. An RF location server receives a pseudo source address of an RF (radio...
US-1,005,5615 Card reader
A card reader may include a card insertion port; a magnetoresistive (MR) sensor; and a disturbing magnetic field generator, wherein the card may include a...
US-1,005,5614 Systems and methods for advanced detection mechanisms for magnetic cards and devices
A detection activity of a card may be sensitive to capacitance changes in adjacent and non-adjacent pads on the card. Accordingly, the detection activity may...
US-1,005,5613 NFC reader with auto tuner
A near field communication (NFC) reader is disclosed. The NFC reader includes a NFC controller, an antenna, a filter coupled to the NFC controller, a tuner...
US-1,005,5612 Authentication using optically sensed relative position
Systems and methods to safeguard data and hardware may include a memory configured to store a first image and sensitive data, and an optical sensor configured...
US-1,005,5611 Secure remote application shares
A customer support application provides screen sharing of the user's computing device with a remote customer support agent, thereby enabling the customer...
US-1,005,5610 Personal content control on media device using mobile user device
A method for controlling personal content on a media device includes establishing, at the media device, a wireless connection with a mobile user device using a...
US-1,005,5609 NFC-based authorization of access to data from a third party device
A third party device is authorized to access data associated with a user account at a service provider, wherein the third party device and a user device are in...
US-1,005,5608 Data management for combined data using structured data governance metadata
Systems and methods provide for data management and governance to enforce proper usage of combined data formed from different pieces of data. Data governance...
US-1,005,5607 Security layer and methods for protecting tenant data in a cloud-mediated computing network
A system for protecting data managed in a cloud-computing network from malicious data operations includes an Internet-connected server and software executing on...
US-1,005,5606 Implementing block device extent granularity authorization model processing in CAPI adapters
A method, system and computer program product are provided for implementing block extent granularity authorization model processing in Coherent Accelerator...
US-1,005,5605 Multi-party secure information integration system
A method of the present disclosure includes a host system authenticating a user of the user device to access secure host information associated with the user in...
US-1,005,5604 Filesystem access for web applications and native code modules
One embodiment provides a system that facilitates the execution of a web application. During operation, the system allocates a storage space on one or more...
US-1,005,5603 Electronic document management and delivery
In one embodiment, system to manage and delivery electronic documents is disclosed.
US-1,005,5602 Securely processing range predicates on cloud databases
Methods, systems, and computer program products for securely processing range predicates on cloud databases are provided herein. A computer-implemented method...
US-1,005,5601 Method and system for securing data
A first access key, which is provided by a key server for decrypting a file and the encrypted file is published on a public network by a first user. Every time...
US-1,005,5600 Analysis and specification creation for web documents
Described herein is a method for rendering specification creation, including identifying, within one or more contents, labels as sensitive labels when data...
US-1,005,5599 Processing method for making electronic documents secure
Disclosed are systems and processing methods that may be performed by first, second, and third processor units to give access to an item of sensitive text data...
US-1,005,5598 Content and service aggregation, management and presentation system
Techniques for facilitating discovery and usage of digital content and services include accessing a stored rights profile of a user and determining access...
US-1,005,5597 Intelligent connection method
An intelligent connection mechanism performs automatic connection for two or more physical elements requesting a connection to each other or one or more...
US-1,005,5596 Data protection system
A storage device of a data center may protect data stored on a storage medium of the storage device using a data security mechanism. The data security mechanism...
US-1,005,5595 Secure credentials control method
Methods, apparatus, and systems are provided to secure access to an account of a user. The account may have a system administrator. The user may have a...
US-1,005,5594 Virtual service provider zones
A service proxy services as an application programming interface proxy to a service, which may involve data storage. When a request to store data is received by...
US-1,005,5593 Updating processor microcode
Approaches are described for updating code and/or instructions in one or more computing devices. In particular, various embodiments provide approaches for...
US-1,005,5592 Systems and methods to generate a type based self-assembling indirect control flow graph
Using various embodiments, methods and systems for computing a self-assembling indirect control flow graph based on one or more function types and function...
US-1,005,5591 Secure protocol attack mitigation
A handshake for establishing a secure connection between a client computer system and a service includes a CAPTCHA element. When the client computer system...
US-1,005,5590 Rule matching in the presence of languages with no types or as an adjunct to current analyses for security...
A method includes reading by a computing system a rule file including one or more rules having specified paths to methods, each method corresponding to one of a...
US-1,005,5589 Systems and methods for validating auxiliary power unit or components by secure pin one time password
Systems and methods are provided for validating a vehicle component. The system includes a vehicle electronic control unit (ECU) in electronic communication...
US-1,005,5588 Event-based apparatus and method for securing BIOS in a trusted computing system during execution
An apparatus is provided for protecting a basic input/output system (BIOS) in a computing system. The apparatus includes a BIOS read only memory (ROM), an event...
US-1,005,5587 Implementations to facilitate hardware trust and security
Disclosed are devices, systems, apparatus, methods, products, media and other implementations, including a method that includes triggering a beacon circuit...
US-1,005,5585 Hardware and software execution profiling
Technologies for assembling an execution profile of an event are disclosed. The technologies may include monitoring the event for a branch instruction,...
US-1,005,5584 Method and device for obtaining virus signatures
A method and a device for obtaining virus signatures in the field of computer security have been disclosed. The method includes: obtaining text strings...
US-1,005,5583 Method and apparatus for processing file
The embodiments of the present invention provide a method and apparatus for processing a file. By means of acquiring a target file to be scanned and then using...
US-1,005,5582 Automated detection and remediation of ransomware attacks involving a storage device of a computer network
An apparatus in one embodiment comprises a security appliance having a processor coupled to a memory. The security appliance is associated with at least one...
US-1,005,5581 Locating a wireless communication attack
A technique for locating a wireless communication attack includes monitoring of Bluetooth.RTM. communications activity by a Bluetooth.RTM. capable communication...
US-1,005,5580 Technologies for multi-factor security analysis and runtime control
Technologies for client-level web application runtime control and multi-factor security analysis by a computing device include receiving application code...
US-1,005,5579 System resources for sandboxing
A method, computer program product, and apparatus for implementing a distributed sandbox is disclosed. The method comprises discovering a machine with...
US-1,005,5578 Secure software containers
A computer system that comprises a processor, a non-transitory memory, and a system application stored in the non-transitory memory. When executed by the...
US-1,005,5577 Technologies for mutual application isolation with processor-enforced secure enclaves
Technologies for mutual application isolation include a computing device having a processor with secure enclave support. The computing device loads an...
US-1,005,5576 Detection of malicious software packages
Systems and methods for a security tool that verifies the security of a software package. An example method may involve identifying a plurality of components...
US-1,005,5575 Smart random password generation
A method for generating a password for accessing a password-protected service is disclosed. A password requirements database and default password generation...
US-1,005,5574 Implementing extent granularity authorization processing in CAPI adapters
A method, system and computer program product are provided for implementing block extent granularity authorization processing for a Coherent Accelerator...
US-1,005,5573 Implementing extent granularity authorization and deauthorization processing in CAPI adapters
A method, system and computer program product are provided for implementing block extent granularity authorization and deauthorization processing for a Coherent...
US-1,005,5572 Systems and methods for preventing windows kernel code or drivers from being executed
Systems and methods for preventing drivers from being loaded in Windows.RTM. OS kernel space. A security driver according to aspects of the invention is loaded...
US-1,005,5571 Limiting user operations
An information processing device having a lock function for restricting user operations and a mechanism executed by this information processing device are...
US-1,005,5570 Mesh relay
A communication device capable of communicating over a network on behalf of a consumer device, the network being configured such transport of packets through...
US-1,005,5569 Location specific image based authentication
Embodiments are described for logging in to a location-specific user account on a host system. An example method includes sending, by a user device, as part of...
US-1,005,5568 Encryption authorization dongle having volatile memory
Embodiments of the present invention disclose a method, computer program product, and device for accessing encrypted data. A communication link may be...
US-1,005,5567 Proximity unlock and lock operations for electronic devices
The described embodiments perform a proximity unlock operation. For the proximity unlock operation, a first electronic device in a locked operating state...
US-1,005,5566 Using biometric user-specific attributes
Techniques are provided for determining two or more user-specific parameters that can be measured or obtained using various methods, and using values of the two...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.