Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0108359 USE CASE DRIVEN GRANULAR APPLICATION AND BROWSER DATA LOSS PREVENTION CONTROLS
A flexible policy system allows compliant apps on a mobile device to interact with a secure container memory space to ensure that data leak prevention policies...
2019/0108358 AUTOMATED DATA TRANSFER FROM MOBILE APPLICATION SILOS TO AUTHORIZED THIRD-PARTY APPLICATIONS
A "Data Transfer Tool" extracts, labels and stores user data or information that may be confined within application silos during user interaction with...
2019/0108357 Progressive Key Rotation for Format Preserving Encryption (FPE)
Aspects of the disclosure provide a technological improvement to a cipher by improving data security of format-preserving encryption (FPE), by, inter alia,...
2019/0108356 METHOD FOR MANAGING COLLECTED TRANSPORTATION VEHICLE DATA
A method for managing collected transportation vehicle data relating to a transportation vehicle in a database. The transportation vehicle data are stored in...
2019/0108355 SYSTEMS AND METHODS FOR IDENTIFYING POTENTIAL MISUSE OR EXFILTRATION OF DATA
Provided herein are systems and methods for preventing or controlling data movement. A learning engine may detect capabilities of a computing environment for...
2019/0108354 DATA SECURITY USING HIGH SPEED SERIAL EQUALIZATION
A system includes a transmit equalizer to equalize a data stream using a set of transmit parameters to generate an input signal. The system further includes a...
2019/0108353 Personalized Privacy Assistant
A system and method configures permission settings for applications ("apps") running on a computing device of a user. A data center generates at least one...
2019/0108352 Multi-Party Encryption Cube Processing Apparatuses, Methods and Systems
Computer-implemented systems and methods are disclosed herein for use within secure multi-party computation. A system and method are used for storing an...
2019/0108351 Expansion Joint Seal with load transfer and sensor
An expansion joint design for supporting transfer loads. The system, includes an elongated core and at least one longitudinal load-transfer member which are...
2019/0108350 METHOD FOR STORING DATA ON A STORAGE ENTITY
A method for storing data on a storage entity (SE) includes: computing a file identifier for a file to be stored on the SE; checking if the file has already...
2019/0108349 CHANGE-TOLERANT METHOD OF GENERATING AN IDENTIFIER FOR A COLLECTION OF ASSETS IN A COMPUTING ENVIRONMENT USING...
A secure and fault-tolerant, or variation-tolerant, method and system to turn a set of N shares into an identifier even when only M shares from this set have a...
2019/0108348 SYSTEM, METHOD AND COMPUTER-ACCESSIBLE MEDIUM FOR SECURITY VERIFICATION OF THIRD PART INTELLECTUAL PROPERTY CORES
An exemplary system, method and computer-accessible medium for detecting the presence of a Trojan(s) in a circuit(s), can include, for example, receiving...
2019/0108347 TECHNIQUES FOR PROCESSOR BOOT-UP
A processor can be configured to access boot firmware from a remote location independent from use of a chipset. After a processor powers-on or reboots, the...
2019/0108346 Simultaneous Multi-Processor (SiMulPro) Apparatus, Simultaneous Transmit And Receive (STAR) Apparatus, DRAM...
Infection by viruses and rootkits from data memory devices, data messages and data operations are rendered impossible by construction for the Simultaneous...
2019/0108344 ENHANCED VECTOR-BASED IDENTIFICATION OF CIRCUIT TROJANS
A system and method for detecting Trojans and other intermittent severe defects in a digital circuit design. A simulation of the digital circuit design results...
2019/0108343 TRUSTED MALWARE SCANNING
A trusted co-processor can provide a hardware-based observation point into the operation of a host machine owned by a resource provider or other such entity....
2019/0108342 SYSTEM AND METHOD FOR SECURING APPLICATIONS THROUGH AN APPLICATION-AWARE RUNTIME AGENT
A system and method for securing an application through an application-aware runtime agent can include: acquiring a code profile, instrumenting the application...
2019/0108341 RANSOMWARE DETECTION AND DATA PRUNING MANAGEMENT
This application relates to ransomware detection and data pruning management. Ransomware typically involves an I/O heavy process of encrypting data files...
2019/0108340 RANSOMWARE DETECTION
This application relates to ransomware detection. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the...
2019/0108339 DEACTIVATING EVASIVE MALWARE
Approaches to deactivating evasive malware. In an approach, a computer system installs an imitating resource in the computer system and the imitating resource...
2019/0108338 METHODS AND APPARATUS FOR USING MACHINE LEARNING ON MULTIPLE FILE FRAGMENTS TO IDENTIFY MALWARE
In some embodiments, a method includes processing at least a portion of a received file into a first set of fragments and analyzing each fragment from the...
2019/0108337 Container and Image Scanning for a Platform-as-a-Service System
A method of container and image scanning includes receiving, by a processing device executing a node of a multi-tenant Platform-as-a-Service (PaaS) system, a...
2019/0108336 SOFTWARE CONTAINER MODELING
A system determines a first volume of out-calls of a first out-call type made by a software container that is executing an application during a time period....
2019/0108335 Blocking Routine Redirection
Disclosed herein are methods, systems, and computer-readable media for blocking attempts at runtime redirection and attempts to change memory permissions...
2019/0108334 SYSTEM AND METHODS FOR DIGITAL ACCOUNT THREAT DETECTION
Systems and methods include: collecting digital event data for the digital account; using a trained machine learning model to extract account takeover (ATO)...
2019/0108333 SYSTEMS AND METHODS FOR MONITORING BAIT TO PROTECT USERS FROM SECURITY THREATS
The disclosed computer-implemented method for monitoring bait to protect users from security threats may include (i) monitoring a bait computing resource to...
2019/0108332 TAINT INJECTION AND TRACKING
An embodiment or embodiments of an electronic device can comprise an input interface and a hardware component coupled to the input interface. The input...
2019/0108331 REAL-TIME MONITORING AND ALERTING FOR DIRECTORY OBJECT UPDATE PROCESSING
An update change request that is made against attributes of a directory object causes automatically collection of customized information for an initiator of...
2019/0108330 CONTEXT-AWARE INTRUSION DETECTION METHOD FOR SMART DEVICES WITH SENSORS
A smart device can include a data oriented sensor providing a numerical value, a logic oriented sensor providing a state, a sensor value collector connected to...
2019/0108329 Method and Terminal for Enhancing Information Security
A method and a terminal for enhancing information security, where the method includes receiving, by a terminal, an open instruction of a sensitive application,...
2019/0108328 METHOD AND SYSTEM FOR SECURE PASSWORD STORAGE
The present disclosure relates to a method and system for secure password storage. In particular, the present disclosure relates to a computer implemented...
2019/0108327 SMART RESOURCE INSTRUMENTS AND DEVICES
A resource instrument system, alone or in combination with a user computer system, may be utilized to capture information from third-party resource instruments...
2019/0108326 INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAM FOR ACCESS CONTROL
An information processing apparatus comprises a controller configured to: (1) receive, from a first user authorized to access a resource, an access control...
2019/0108325 FINGERPRINT GESTURES
User authentication for a user device can leverage one or more fingerprint sensor regions capable of detecting and/or recognizing a user's fingerprints. The...
2019/0108324 SYSTEMS AND METHODS FOR CONTEXT-BASED DEVICE ADDRESS GENERATION
A method is described. The method includes associating an identity to a computing device based on a context measurement. The method also includes generating a...
2019/0108323 BLOCKCHAIN ENHANCED ENTITLEMENT CONTROL
Systems and methods for entitlement tracking and control with blockchain technology are provided. A server node may receive usage information indicating usage...
2019/0108322 System And Method For Computing Drug Controlled Release Performance Using Images
A method for computing the release rate of a controlled release drug and medical device using a combination of imaging data and computational physics is...
2019/0108321 COMPUTER-IMPLEMENTED TOOLS FOR USE IN ELECTROPHYSIOLOGY
Improved computer-implemented tools for use in modeling/simulating spatial charge distributions for electrophysiological systems are provided. The improvements...
2019/0108320 NEURAL NETWORK FOR PREDICTING DRUG PROPERTY
A computer-implemented method for predicting molecule properties is disclosed. According to some embodiments, the method may include receiving an input file of...
2019/0108319 ESTIMATION OF MUSCLE ACTIVITIES USING THE MUSCLES RELATIONSHIP DURING SIMULATING MOVEMENTS
A technique for estimating activity of a plurality of muscles is disclosed. In this technique, for each of two or more muscles included in a musculoskeletal...
2019/0108318 Safety Center and Associated Equipment
Embodiments of the invention provide a health kiosk system including, in an embodiment, a user-wearable device for interacting with the kiosk and with other...
2019/0108317 Method And System For Prescription Durable Medical Equipment Searching And Management
A method for durable medical equipment (DME) searching and management is disclosed. The method includes receiving input parameters corresponding to (i) a...
2019/0108316 PERSONAL ASSISTANT COMPUTING SYSTEM MONITORING
A computing system is configured to process at least one voice input of a user and output an audio result. The computing system comprises at least one...
2019/0108315 SYSTEM AND METHOD FOR IMPROVING HEALTHCARE THERAPY RECOMMENDATIONS
A method of improving healthcare therapy recommendations, the method including establishing a healthcare dataset including at least one set of predetermined...
2019/0108314 COGNITIVE HEALTH CARE VITAL SIGN DETERMINATION TO NEGATE WHITE COAT HYPERTENSION IMPACT
Embodiments include methods, systems, and computer program products for determining health care vital data. Aspects include receiving a health care vital...
2019/0108313 ANALYTICS AT THE POINT OF CARE
Analytics relevant to a particular patient are provided within the clinical decision workflow to provide data-driven decision support. When information is...
2019/0108312 MICROSATELLITE INSTABILITY CHARACTERIZATION
Embodiments of a method and/or system (e.g., for microsatellite instability detection associated with at least one cancer condition; etc.) can include:...
2019/0108311 SITE-SPECIFIC NOISE MODEL FOR TARGETED SEQUENCING
A processing system uses a Bayesian inference based model for targeted sequencing or variant calling. In an embodiment, the processing system determines first...
2019/0108310 ALIGNMENT METHOD FOR NUCLEIC ACID SEQUENCES
The current invention concerns a computer-implemented method, a computer system and a tangible non-transitory computer-readable data carrier comprising a...
2019/0108309 PATHOGENETIC CLASSIFICATION OF GENETIC ALTERATIONS
Embodiments of the present invention disclose a method, computer program product, and system for automatically classifying mutations using a table of knowledge...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.