Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,011,4969 Ultra-secure blockchain-based electronic information transfer system
The system and method presents a secure blockchain enabled encryption. Incoming information and data files may be encrypted using any preferred method of...
US-1,011,4968 Proximity based content security
Embodiments include method, systems and computer program products for proximity based content security. Aspects include receiving a request to access a secured...
US-1,011,4967 Converged mechanism for protecting data
Embodiments disclosed herein provide systems, methods, and computer readable media for a converged mechanism for protecting data. In a particular embodiment, a...
US-1,011,4966 Systems and methods of per-document encryption of enterprise information stored on a cloud computing service (CCS)
The technology disclosed relates to securely encrypting a document. In particular, it relates to accessing a key-manager with a triplet of organization...
US-1,011,4965 Techniques and system to monitor and log access of information based on system and user context using policies
An information management system approves or denies user requests to access information of the system. The information includes all types of information...
US-1,011,4964 Role-based content rendering
Systems and methods for rendering role-based content are described herein. The system includes a registration module configured to define an application role in...
US-1,011,4963 Data element tokenization management
Systems and methods to manage a tokenization manifest that can be used for managing a redaction through tokenization of a set of field level tokenization values...
US-1,011,4962 Generating a stub file corresponding to a classified data file
Protecting data files is disclosed, including: in response to an indication that a data file has been generated by a client device, determining a security...
US-1,011,4961 Operator system for a process control system
An operator system for a process control system, wherein the operator system includes an operator server and at least one operator client connected to the...
US-1,011,4960 Identifying sensitive data writes to data stores
Techniques for detecting access to computer system data by applications running on a computer system are described herein. Data access event log entries are...
US-1,011,4959 Information processing apparatus, information processing method, and information processing system
An information processing apparatus includes a first memory that stores a registered identification name of a user who is eligible to use the information...
US-1,011,4958 Protected regions
A data processing machine is configured to include one or more buried memory zones that are not intelligibly accessible to user software and to operating system...
US-1,011,4957 Collection folder for collecting file submissions and using facial recognition
A content management system for collecting files from one or more submitters in a collection folder. A collector, who generates the collection folder, can...
US-1,011,4956 Secure public key acceleration
In an embodiment, a system is provided in which the private key is managed in hardware and is not visible to software. The system may provide hardware support...
US-1,011,4955 Increasing search ability of private, encrypted data
Techniques are provided to allow full search for encrypted data within a database. In some embodiments, searchable data may be separated into different...
US-1,011,4954 Exploit prediction based on machine learning
Generation of one or more models is caused based on selecting training data comprising a plurality of features including a prevalence feature for each...
US-1,011,4953 Method and system for upgrading firmware of a card reader
The invention discloses a method and a system of upgrading firmware of a card reader. In the method, a card reader is connected to an IC card; the card reader...
US-1,011,4952 System, apparatus and method for performing secure memory training and management in a trusted environment
In one embodiment, a system includes: a processor; a security processor to execute in a trusted executed environment (TEE), the security processor to execute...
US-1,011,4951 Virus signature matching method and apparatus
The present disclosure provides a virus signature matching method, including: obtaining an inputted target file; loading a virus signature database, and...
US-1,011,4950 Mobile application management
Code of a particular application is analyzed against a semantic model of a software development kit of a particular platform. The semantic model associates a...
US-1,011,4949 Techniques for monitoring integrity of OS security routine
Various embodiments are generally directed to techniques for monitoring the integrity of an operating system (OS) security routine that checks the integrity of...
US-1,011,4948 Hypervisor-based buffer overflow detection and prevention
Technologies for securing an electronic device include determining addresses of one or more memory pages, injecting for each memory page a portion of identifier...
US-1,011,4947 Systems and methods for logging processes within containers
The disclosed computer-implemented method for logging processes within containers may include (i) detecting creation of a new container that comprises a...
US-1,011,4946 Method and device for detecting malicious code in an intelligent terminal
The present invention discloses a method and device for detecting malicious code in an intelligent terminal. The method comprises: acquiring a virtual machine...
US-1,011,4945 Clock rollback security
Methods and systems for preventing clock rollback attacks are described herein. A rollback attack may occur when a user manually sets a system clock to a...
US-1,011,4944 Systems and methods for classifying permissions on mobile devices
The disclosed computer-implemented method for classifying permissions on mobile devices may include (1) detecting that an application executing on a mobile...
US-1,011,4943 Automated process of managing and controlling accounts on a remote computer machine
The disclosed embodiments include systems and methods for managing an authentication credential of an account of a machine of a computer system via a remote...
US-1,011,4942 Interactive CAPTCHA
In response to a user access request, a media object containing a plurality of media components is constructed and transmitted to the user. At least one of the...
US-1,011,4941 Systems and methods for authenticating firmware stored on an integrated circuit
The invention discloses a method of authenticating data stored in an integrated circuit. The method includes storing randomized data in the integrated circuit...
US-1,011,4940 Information processing system, information processing apparatus, and information processing method
An information processing system includes a storage unit that stores, with respect to each application, application identification information identifying the...
US-1,011,4939 Systems and methods for secure communications between devices
The disclosed computer-implemented method for secure communications between devices may include (1) receiving, from a control device that is capable of...
US-1,011,4938 Secure electronic lock
Embodiments are directed to simulating an operation of a mechanical lock in an electronic context, comprising: applying a contactless wireless credential to a...
US-1,011,4937 Continuous biometric authentication system and method for man-machine user interfaces
A method for providing user identity verification comprising steps: (a) reading a plurality of biometric attributes from a user continuously and simultaneously...
US-1,011,4936 Information processing device, authentication system, authentication method, and program
An information processing device includes a first acquisition unit that acquires first biological data, a collation unit that refers to a collation data storage...
US-1,011,4935 Technologies for login pattern based multi-factor authentication
Technologies for multi-factor authentication of a user include a computing device with one or more sensors. The computing device may authenticate the user by...
US-1,011,4934 Calculating consecutive matches using parallel computing
Methods and systems for determining consecutive matches are provided. According to one embodiment, a class definition and a data stream are received by a...
US-1,011,4933 Technique for enabling nominal flow of an executable file
A technique for enabling nominal flow of an executable file on a client. The executable file includes executable code lacking at least one nominal constant,...
US-1,011,4932 Adapting a mobile application to a partitioned environment
Adapting a mobile or other application ("app") to a partitioned environment is disclosed. In various embodiments, a "secure zone" or other logical partition is...
US-1,011,4931 Pharmaceutical platform technology for the development of natural products
The present invention provides a set of in vitro and in silico methodologies for predicting in vivo pharmacokinetics and pharmacodynamics of multiple...
US-1,011,4930 Systems and methods for creating hair transplantation procedure sites
Methods and systems are provided for determining the location of procedure sites, for example hair implantation sites, the method and systems enabling a natural...
US-1,011,4929 Mathematical musical orchestral method for predicting classes of patients for medical treatment
Methods for classifying patients as responders or non-responders to treatment of a disease and predicting recurrence of disease in a patient using audio tunes...
US-1,011,4928 Method and device for documenting medical data
A method for documenting medical data in which the data captured by at least one data entry device from an operating room are stored in a storage medium wherein...
US-1,011,4927 Apparatus and method for acoustic alarm detection and validation
The invention relates to an apparatus and method for use in detecting and validating acoustic alarms, and in particular relates to an apparatus and method for...
US-1,011,4926 Workflow template management for medical image data processing
According to one embodiment, workflow templates are maintained, each workflow template including a predefined sequence of workflow stages associated with a...
US-1,011,4924 Methods for processing or analyzing sample of thyroid tissue
The present disorders disclosure provides method for processing or analyzing a sample of thyroid tissue of a subject, to generate a classification of the sample...
US-1,011,4923 Metagenomics-based biological surveillance system using big data profiles
A method comprises obtaining results of metagenomics sequencing performed on biological samples from respective sample sources, generating hit abundance score...
US-1,011,4922 Identifying ancestral relationships using a continuous stream of input
Identification of inheritance-by-descent haplotype matches between individuals is described. A set of tables including word match, haplotypes and segment match...
US-1,011,4921 Method and recording medium of reducing chemoepitaxy directed self-assembled defects
A method, system, and non-transitory computer readable medium for reducing chemo-epitaxy directed-self assembly (DSA) defects of a layout of a guiding pattern...
US-1,011,4920 Method and apparatus for performing sign-off timing analysis of circuit designs using inter-power domain logic
A netlist of a multiple voltage circuit design having a plurality of power domains is established, then inter-power domain (IPD) paths traversing the circuit...
US-1,011,4919 Placing and routing method for implementing back bias in FDSOI
The present disclosure provides a placing and routing method for implementing back bias in fully depleted silicon-on-insulator. In accordance with some...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.