Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0065767 SYSTEM AND METHOD FOR DATA INPUT RESISTANT TO CAPTURE
A computer-implemented method of confidential data input resilient against data capture includes receiving input concurrently from first and second input...
2019/0065766 CONTROLLING ACCESS WHEN PROCESSING INTENTS IN A DISPERSED STORAGE NETWORK
A method for execution by a storage unit includes receiving, from an intent processing entity (IPE) via a network, a request to access at least one slice...
2019/0065765 SYSTEMS AND METHODS TO CONTROL DATA ACCESS AND USAGE
Systems and methods to control data access and usage by storing a permitted use of a set of data items. The permitted use identifies: a set of computer...
2019/0065764 Secret Data Access Control Systems and Methods
The decentralized and distributed architecture of blockchain makes it challenging to store secret data. A Secure Document Access Control System (SEDACS) can...
2019/0065763 CLOUD-BASED IMAGE ACCESS SYSTEMS AND METHODS
The system may include a method comprising requesting, by a computer, a receiver identifier associated with a receiver; receiving, by the computer, the...
2019/0065762 EXTRACTING FEATURES FOR AUTHENTICATION EVENTS
In some examples, for a given authentication event between a plurality of devices in a network, a system identifies a set of events, at the devices, that are...
2019/0065761 NON-RASTERIZED IMAGE STREAMING SYSTEM THAT USES RAY TRACING SAMPLES
Secure rendering system that creates ray tracing samples with obfuscated positions, so that images can only be viewed by an authorized consumer able to recover...
2019/0065760 VIDEO SECURITY AND RAY TRACING SAMPLES COMPRESSION SYSTEM
Secure rendering system that creates ray tracing samples with obfuscated positions, so that images can only be viewed by an authorized consumer able to recover...
2019/0065759 METHOD FOR PROTECTING DATA
A method for encoding can include generating a data structure defining a Boolean circuit including a memory storing original data, inputs and outputs, logic...
2019/0065758 GEOGRAPHICAL TRACK DATA OBFUSCATION
In some examples, geographical track data obfuscation may include ascertaining geographical data points that include a first data point and subsequent data...
2019/0065757 PRIVATE VERIFICATION FOR FPGA BITSTREAMS
An apparatus, method and system are disclosed which may be used for assessing the trustworthiness of a particular proprietary microelectronics device design...
2019/0065756 COPY AND DECRYPT SUPPORT FOR ENCRYPTED VIRTUAL MACHINES
Systems and methods for copy and decrypt support for encrypted virtual machines are disclosed. An example method may include receiving, at a source host...
2019/0065755 AUTOMATIC TRANSFORMATION OF SECURITY EVENT DETECTION RULES
A computer-implemented method, a computer program product, and a computer system for transformation of security information and event management (SIEM) rules...
2019/0065754 OFF NODE SCANNING
Security risks associated with scanning a computer are at least mitigated by performing the scanning off node. State data of a target node, or computer, can be...
2019/0065753 PROTECTING COMPUTING DEVICES FROM UNAUTHORIZED ACCESS
Methods and systems for performing an authenticated boot; performing a continuous data protection; performing automatic protection and optionally a...
2019/0065752 System And Method For Booting Within A Heterogeneous Memory Environment
System and methods for booting a system-on-chip (SOC) in an enhanced memory mode are described herein. In one aspect, an enhanced memory mode indicator may be...
2019/0065751 Randomized Execution Countermeasures Against Fault Injection Attacks During Boot of an Embedded Device
An embedded device is provided that is configured to randomize execution time of a boot process of the embedded device performed responsive to a reset signal,...
2019/0065750 SECURING AND CHANGING IMMUTABLE DATA IN SECURE BOOTUP
A set of root keys is loaded as a first part of a secure boot process of a secure system. a first trusted key from a set of trusted keys is verified using a...
2019/0065749 SECURE ELEMENT OPERATING SYSTEM UPDATE NOTIFICATION
An operating system (OS) update to a secure element (SE) may be commanded, for example, in order to fix a security bug, upgrade a version of an OS, provide...
2019/0065748 TROLL ACCOUNT DETECTION
A computer-implemented method including scanning, by one or more processors, data that is maintained on one or more social network profiles of a protected...
2019/0065747 HEARTBEAT SIGNAL VERIFICATION
Examples associated with heartbeat signal verification are disclosed. One example includes verifying a provisioning key using a trusted key. The provisioning...
2019/0065746 Light-Weight Behavioral Malware Detection for Windows Platforms
A behavioral malware detection involves extracting features from prefetch files, wherein prefetch files; classifying and detecting benign applications from...
2019/0065745 Integrity, theft protection and cyber deception using a deception-based filesystem
A decoy filesystem that curtails data theft and ensures file integrity protection through deception is described. To protect a base filesystem, the approach...
2019/0065744 COMPUTER SECURITY SYSTEM WITH MALICIOUS SCRIPT DOCUMENT IDENTIFICATION
In some implementations, a method performed by data processing apparatuses includes receiving a new script document in a scripting language that has not yet...
2019/0065743 CLASSIFICATION METHOD, CLASSIFICATION DEVICE, AND CLASSIFICATION PROGRAM
A classification device constructs tree structure data in which attribute information relating to a single communication or multiple communications serves as a...
2019/0065742 QUARANTINING ELECTRONIC MESSAGES BASED ON RELATIONSHIPS AMONG ASSOCIATED ADDRESSES
A technique includes determining pairwise relationships among entities associated with a first electronic mail organization and entities associated with a...
2019/0065741 IDENTIFYING MALWARE BASED ON CONTENT ITEM IDENTIFIERS
Disclosed are systems, methods, and non-transitory computer-readable storage media for identifying malware based on content item identifiers. For example, a...
2019/0065740 GENERATION OF A RANDOM VALUE FOR A CHILD PROCESS
Processes being executed by a host system may be identified. The processes may be associated with random numbers that are generated by a first type of random...
2019/0065739 UNAUTHORIZED AUTHENTICATION EVENTS
In some examples, for a given authentication event between a plurality of devices in a network, a system identifies a set of events, at the devices, that are...
2019/0065738 DETECTING ANOMALOUS ENTITIES
In some examples, a system extracts features from event data representing events in a computing environment, trains ensembles of machine-learning models for...
2019/0065737 SYSTEM AND METHOD FOR INTRA-LEVEL PRIVILEGE SEPERATION FOR SYSTEM SOFTWARE ON ARM
Embodiments relate to an intra-level privilege separation method for managing system software on an ARM processor, including dividing the system software into...
2019/0065736 SYSTEMS AND METHODS FOR PREVENTING MALICIOUS APPLICATIONS FROM EXPLOITING APPLICATION SERVICES
The disclosed computer-implemented method for preventing malicious applications from exploiting application services may include (i) identifying an attempt by...
2019/0065735 Information processing apparatus, information processing method, and computer program product
According to an embodiment, an information processing apparatus includes one or more processors. The one or more processors are configured to: estimate a...
2019/0065734 ERROR CORRECTION CIRCUIT FOR PHYSICAL UNCLONABLE FUNCTION (PUF) CIRCUIT
An error correction circuit for a physical unclonable function (PUF) circuit includes a redundant bits memory, an output rectifier circuit, an error...
2019/0065733 DEVICE LIFECYCLE DISTRIBUTED LEDGER
A distributed ledger is used by one or more parties executing a ledger node to document a lifecycle of a device. When devices are manufactured, shipped, and...
2019/0065732 METHOD FOR PROVIDING SMART KEY SERVICE AND ELECTRONIC DEVICE THEREOF
An electronic device including a first memory configured to store authorization information; a first processor configured to access the first memory; a second...
2019/0065731 AUTOMATIC UPGRADE FROM ONE STEP AUTHENTICATION TO TWO STEP AUTHENTICATION VIA APPLICATION PROGRAMMING INTERFACE
A client transmits a user identifier and a password to a server via an application programming interface (API). The client establishes an authenticated session...
2019/0065730 AUTOMATIC UPGRADE FROM ONE STEP AUTHENTICATION TO TWO STEP AUTHENTICATION VIA APPLICATION PROGRAMMING INTERFACE
A client transmits a user identifier and a password to a server via an application programming interface (API). The client establishes an authenticated session...
2019/0065729 AUTHENTICATION AND GENERATION OF INFORMATION FOR AUTHENTICATION
Implementations of data security technologies are disclosed. In an implementation, a plurality of feature points of a user-selected image are determined. A...
2019/0065728 Systems and Methods for Accessing Contents
Systems and methods for accessing contents, application programs, or applications at electronic devices. In an aspect, when a user enters a password plus an...
2019/0065727 ELECTRONIC DEVICE AND AUTHENTICATION METHOD
An electronic device shifts between a locked state in which use of a function is restricted and an unlocked state in which the function is usable. The...
2019/0065726 SYSTEMS, METHODS AND DEVICES FOR SECURE INPUT PROCESSING
Systems, methods, and devices for secure input processing are disclosed. In one embodiment, a method for securely processing a touch-based gesture may include:...
2019/0065725 DISTRIBUTED PROFILE AND KEY MANAGEMENT
Disclosed are various examples for distributed profile and key management. In one example, a client device can include an agent application and a PIV-D...
2019/0065724 MULTI-FACTOR AUTHENTICATION WITH URL VALIDATION
Techniques are provided for providing multi-factor authentication with Uniform Resource Locator (URL) validation (MFAUV). One of the multiple authentication...
2019/0065723 AUTHENTICATION INTEGRITY PROTECTION
Systems, methods, and processor-readable media are disclosed to adaptively secure access operations with respect to electronic resources. A request from an...
2019/0065722 BLUE LIGHT ADJUSTMENT FOR BIOMETRIC SECURITY
Systems and methods for blue light adjustment with a wearable display system are provided. Embodiments of the systems and methods for blue light adjustment can...
2019/0065721 Biometric Personal Data Key (PDK) Authentication
Systems and methods verifying a user during authentication of an integrated device. In one embodiment, the system includes an integrated device and an...
2019/0065720 KEY REFERENCE UPDATING METHOD AND MODULE, AND TERMINAL DEVICE
In keystroke recognition technologies, a method and a module for updating a keystroke reference, and a terminal device are provided. The method for updating a...
2019/0065719 AUTHENTICATION USING PRISM MEMBER
A prism member of an authentication apparatus includes a living body contact surface configured to be in contact with the living body, and an imaging surface...
2019/0065718 AUTHENTICATION USING PRISM MEMBER
A prism member of an authentication apparatus includes a living body contact surface configured to be in contact with the living body, and an imaging surface...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.