Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,024,2205 Automatic parameter value generation
Automatic parameter value generation is disclosed. It is determined that a parameter value generation trigger associated with a parameter has occurred. A...
US-1,024,2204 Method for masking content displayed on electronic device
A method for masking content to be displayed on the electronic device is provided. The method includes receiving, by a processor in the electronic device, the...
US-1,024,2203 Format preservation based masking system and method
A computer implement format preservation based masking system and method is provided. The system obtains a first set of letters and a private key, and encrypts...
US-1,024,2202 Apparatus and method for staged graph processing to produce a risk inference measure
A computer implemented method includes processing a deterministic factual graph to produce superfacts. The deterministic factual graph has deterministic factual...
US-1,024,2201 Systems and methods for predicting security incidents triggered by security software
A computer-implemented method for predicting security incidents triggered by security software may include (i) collecting, by a computing device, telemetry data...
US-1,024,2200 Static analysis of vulnerabilities in application packages
Apparatus and methods are disclosed herein for analyzing computer programs for potential security vulnerabilities. In one computer-implemented embodiment of the...
US-1,024,2199 Application test using attack suggestions
Example embodiments disclosed herein relate to a security test. A crawl of an application under test (AUT) is performed to determine an attack surface using...
US-1,024,2198 Secure booting of a computing system based on write request and power-up management
A secure boot computer system is provided. The system comprises a logic block comprising one or more processing units that executes instructions, the logic...
US-1,024,2197 Methods and apparatus to use a security coprocessor for firmware protection
A data processing system (DPS) provides protection for firmware. The DPS comprises (a) a host module comprising a management engine and (b) a security module in...
US-1,024,2196 Secure booting of computer system
A computer system is securely booted by executing a boot firmware to locate a boot loader and verify the boot loader using a first key that is associated with...
US-1,024,2195 Integrity values for beginning booting instructions
Examples described herein include a computing device with a processing resource to execute beginning booting instructions of the computing device. The beginning...
US-1,024,2194 Method and apparatus for trusted execution of applications
A system and methodology for providing trusted execution of applications is provided. The computing system includes system hardware including memory. A Trusted...
US-1,024,2193 Method of resource-limited device and device class identification using system and function call tracing...
Methods for cyber physical systems device classification are provided. A method can include receiving system and function calls and parameters and a device...
US-1,024,2192 Method, system, and program product for remotely attesting to a state of a computer system
A method, system, and program product for remotely attesting to a state of computing system is provided. Specifically, the present invention allows a remote...
US-1,024,2191 Dynamically-loaded code analysis device, dynamically-loaded code analysis method, and dynamically-loaded code...
A dynamically-loaded code analysis device includes a memory unit, an extraction unit, and a specification unit. The memory unit memorizes dynamically-loaded...
US-1,024,2190 System and method for detection of malicious code by iterative emulation of microcode
Examples of systems, methods and media are shown for iteratively emulating potentially malicious code involving, for each offset of a microarchitecture for the...
US-1,024,2189 File format validation
A method for securely validating the file format type including receiving a file having a file format type, a header and a content block. The header has a...
US-1,024,2188 Method and apparatus of performing data executable integrity verification
Disclosed are an apparatus and method of verifying an application installation procedure. One example method of operation may include receiving an application...
US-1,024,2187 Systems and methods for providing integrated security management
The disclosed computer-implemented method for providing integrated security management may include (1) identifying a computing environment protected by security...
US-1,024,2186 System and method for detecting malicious code in address space of a process
Disclosed are system and method for detecting malicious code in address space of a process. An exemplary method comprises: detecting a first process executed on...
US-1,024,2185 Dynamic guest image creation and rollback
According to one embodiment, a computerized method comprises three operations. First, an incoming object is analyzed to determine if the incoming object is...
US-1,024,2184 Method and system for preventing and detecting security threats
A system and method is provided for implementing platform security on a consumer electronic device having an open development platform. The device is of the...
US-1,024,2183 Method of executing a program by a processor and electronic entity comprising such a processor
A method of executing a program by a processor, and an electronic entity including such a processor, the method includes the following steps: a calling...
US-1,024,2182 Computer security system and method
A method is provided for protecting a computer system, comprising creating an isolated process, then assigning a first process group to the process; creating an...
US-1,024,2181 Isolating applications hosted by plug-in code
Described is a technology in which one application running in a browser can host another application (e.g., an advertisement) in an isolated manner that...
US-1,024,2180 Component protection frameworks using defensive patterns
Systems and methods are provided herein for establishing a protection framework for a component. Identified assets of a component requiring protection from a...
US-1,024,2179 High-integrity multi-core heterogeneous processing environments
A high-integrity multi-core heterogeneous processing environment and methods for high integrity computing on multi-core heterogeneous processing environments...
US-1,024,2178 Methods and systems for enabling, tracking, and correlating anonymous user activity
Methods are disclosed for identity key management in networked application execution. In one embodiment, an identifier request is transmitted from a client...
US-1,024,2177 Wireless memory device authentication
A system for wireless memory device authentication is provided, wherein a communications device receives a certified public key from a wireless memory device....
US-1,024,2176 Controlled access communication between a baseboard management controller and PCI endpoints
A computing device includes a bus controller and an endpoint device that are in communication over an internal bus. The bus controller initiates a discovery...
US-1,024,2175 Method and system for authentication of a storage device
A method for authenticating a storage device includes sending encrypted host device data from a host device to the storage device for a current authentication...
US-1,024,2174 Secure information flow
Secure information flow may include a service receiving a request for data from a caller. The service may respond to the request with the requested data via a...
US-1,024,2173 OCR-based single sign-on
A method and technique for OCR-based single sign-on in a computing environment includes launching a login interface to log a user into an application. The login...
US-1,024,2172 Authentication device, authentication system, and authentication method
To provide an authentication device capable of performing authentication accurately even when biological information changes with time. An authentication device...
US-1,024,2171 Verifying a user identity
The present embodiments provide a biometric authentication method and electronic device. A proper authentication template can be selected during the acquisition...
US-1,024,2170 Method and apparatus for obtaining sensing data
An electronic device according to various embodiments of the present disclosure may include at least one sensor module including a transmitter, a receiver, a...
US-1,024,2169 Method for identification of user's interaction signature
Method for identification of a interaction signature of a user, comprising the flowing steps of: acquisition of a direct data (10), acquisition of an indirect...
US-1,024,2168 Methods and apparatuses for controlling smart device
Methods and apparatuses are provided for controlling a smart device in the field of Human-Computer Interaction. The method includes: displaying an interface for...
US-1,024,2167 Method for user authentication and electronic device implementing the same
A method for user authentication in an electronic device includes: detecting at least one rotation of the electronic device; obtaining at least one rotation...
US-1,024,2166 Image capturing control method, image capturing control system, and image capturing control server
An image capturing control server receives permitted terminal identification information being first terminal identification information identifying a first...
US-1,024,2165 Optimized security selections
A method includes initiating play of a media file, reading a first key associated with a device, reading a second key associated with an application, and...
US-1,024,2164 Managing application specific feature rights
Various systems and methods for modifying application specific feature rights are disclosed herein. In one example, a system for modifying application specific...
US-1,024,2163 Access to protected content based on license hierarchy
According to example configurations as described herein, use of software can be contingent upon whether a hierarchical license tree has a valid license for a...
US-1,024,2162 Water-insoluble material evaluation method and water-insoluble material evaluation
This invention relates to a method and system for predictively evaluating a water-insoluble material even without solubility measurement experiments.
US-1,024,2161 Automatic drug dispensing and picking sytem
An automatic drug dispensing and picking system that automatically dispenses prescribed drugs on the basis of prescription data includes a plurality of drug...
US-1,024,2160 Method and system for microbiome-derived diagnostics and therapeutics
A method for diagnosing and treating an immune microbial dysfunction in a subject, the method comprising: receiving an aggregate set of biological samples from...
US-1,024,2159 System and apparatus for electronic patient care
A system for electronic patient care includes a network, a facility gateway, a device gateway application and a medical device. The facility gateway is...
US-1,024,2158 Universal charge routing system for medical billing
A medical charge router receives charge information from a variety of sources and converts it to a standard charge format for automated processing and routing...
US-1,024,2156 Visualization of concurrently executing computer interpretable guidelines
A method for visualizing concurrently executing clinical guidelines executed by a clinical decision support system for a subject includes presenting, on a...
US-1,024,2155 BAMBAM: parallel comparative analysis of high-throughput sequencing data
A differential sequence object is constructed on the basis of alignment of sub-strings via incremental synchronization of sequence strings using known positions...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.