Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,024,8806 Information processing apparatus, information processing method, content management system, and non-transitory...
An information processing apparatus manages a plurality of content items, keywords associated with the plurality of content items respectively, and authorities...
US-1,024,8805 Database security tool
A database security tool includes a user interface, a retrieval engine, an authorization engine, an alert engine, and an update engine. The user interface...
US-1,024,8804 Fraudulent application detection system and method of use
The present invention provides a system and a method for detecting or determining possible fraudulent information provided by a subject using the subject's...
US-1,024,8803 Internal folder sharing
A method and system of sharing a folder in a file system between an owner and a grantee is provided. An indication of a folder to share with a grantee may be...
US-1,024,8802 Digital rights management using geographic and temporal traits
Digital rights management using geographic and temporal traits is described. In one or more implementations, a digital medium environment is configured to...
US-1,024,8801 Systems and methods for role-based file access control
A system for applying access permissions to read requests may write a file to a storage media. The file may contain data, an embedded flag, and an embedded...
US-1,024,8800 Secure comparison of information
The technology encompasses new uses of already-known cryptographic techniques. The technology entails computer-based methods of sharing information securely, in...
US-1,024,8799 Discouraging screen capture
Screen capture mitigation is disclosed. A first finger of a user is detected in a first designated region of a display. Content is displayed when the first...
US-1,024,8798 Method and system for a confidential scan of a document
A system and method for performing confidential scanning of a document are provided. Initially, a request from user for a confidential scan of a document...
US-1,024,8797 Systems and methods for zero-day DLP protection having enhanced file upload processing
Systems and methods for Zero-day Data Loss Protection (DLP) having enhanced file upload processing are provided. One method may include capturing and sending...
US-1,024,8796 Ensuring compliance regulations in systems with dynamic access control
Methods, systems, and computer-readable storage media for enforcing dynamic access control constraints of a plurality of access control policies, and actions...
US-1,024,8795 Implementing method for JavaCard application function expansion
An implementing method for JavaCard application function expansion is provided, where a registering process includes: an expansion application processes a...
US-1,024,8794 Encryption compliance verification system
A compliance checker to verify that a device complies with a policy is described. In one embodiment, the compliance checker comprises a compliance checker...
US-1,024,8793 Techniques and systems for durable encryption and deletion in data storage systems
A computer system, such as a data storage system, implements techniques for deleting durably stored data without affecting the availability or durability of...
US-1,024,8792 Detection and healing of vulnerabilities in computer code
An example process includes: identifying, by one or more processing devices, candidate code in executable code based on a static analysis of the executable...
US-1,024,8791 Technologies for secure hardware and software attestation for trusted I/O
Technologies for trusted I/O attestation and verification include a computing device with a cryptographic engine and one or more I/O controllers. The computing...
US-1,024,8790 Information processing system, controlling method, and controlling computer program
A virtual machine includes a shadow memory, a shadow disk, and a virtual NIC. A virtual machine includes a guest OS. The shadow memory and the shadow disk each...
US-1,024,8789 File clustering using filters working over file attributes
Systems and method classify a file using filters. A file event can be determined for the file. In response to the file event, metadata is received for the file....
US-1,024,8788 Detecting harmful applications prior to installation on a user device
Examples of techniques for detecting harmful applications prior to installation on a user device are disclosed. In one example implementation according to...
US-1,024,8787 Systems and methods for determining reputations of files
The disclosed computer-implemented method for determining reputations of files may include (i) identifying, on an endpoint device, a loadpoint data entry...
US-1,024,8786 Platform security using processor assists
Systems, apparatuses and methods may provide for detecting an attempt by an operating system (OS) to access a non-OS managed resource and injecting, in response...
US-1,024,8785 Application memory protection using a host page table switching virtual machine function
A hypervisor generates first and second page views, where a guest physical address points to a first page of the first page view and a second page of the second...
US-1,024,8784 Sequential object set passwords
Examples of techniques for sequential object set passwords are disclosed. In one example implementation according to aspects of the present disclosure, a...
US-1,024,8783 Methods and systems for identity creation, verification and management
An embodiment of a method of providing identity services includes: receiving identity data for an individual for which the identity provider has provided an...
US-1,024,8782 Systems and methods for access control to web applications and identification of web browsers
A method and system includes: receiving an access request for a protected web application server by the requesting browser application; returning a web page...
US-1,024,8781 Method of passcode unlock using force detection
A system and method unlock a passcode-secured device using force detection and haptic feedback. When prompted for a passcode, a user applies a press and hold...
US-1,024,8780 Method and device for securing an object, corresponding control method and device secured object
A device to secure an object receives a digital file representing a photograph as an input. The photogram represents at least one portion of the object. An...
US-1,024,8779 Mobile terminal, smart watch, and method of performing authentication with the mobile terminal and the smart watch
The present invention relates to a mobile terminal and a method capable of performing authentication using a smart watch, including: detecting a request for...
US-1,024,8778 Method for improving unlocking speed and mobile terminal
A method for improving unlocking speed and a mobile terminal are provided. The method is applicable to the mobile terminal in a screen-off state and equipped...
US-1,024,8777 Method of unlocking terminal device using fingerprint and mobile terminal
An unlocking control method includes the following. An original fingerprint image is acquired and an interrupt request is triggered when a terminal device is in...
US-1,024,8776 Background enrollment and authentication of a user
An electronic device can include a processing device operatively connected to a biometric sensing device. The biometric sensing device may capture a biometric...
US-1,024,8775 Managing latency and power in a heterogeneous distributed biometric authentication hardware
Techniques for authenticating a biometric input are disclosed. An example of a biometric authentication system is configured to receive a biometric input,...
US-1,024,8774 Method for controlling unlocking and mobile terminal
A method for controlling unlocking includes: fingerprint data is received; a dominant frequency of a processor is increased; matching is conducted on the...
US-1,024,8773 Vehicle security accessory and methods of identity authentication
An accessory configured to authenticate a transaction is disclosed. The accessory comprises a communication circuit configured to communicate with a transaction...
US-1,024,8772 Secure communication between a virtual smartcard enclave and a trusted I/O enclave
A system for accessing a trusted execution environment includes instructions to transmit, from a first trusted execution environment, a request for a biometric...
US-1,024,8771 Performing biometrics operations in uncontrolled environments
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving an enrollment biometric identifier of a user....
US-1,024,8770 Unobtrusive verification of user identity
Techniques for unobtrusively verifying the identity of a user of a computing device are provided. In one embodiment, the computing device can establish one or...
US-1,024,8769 Systems and methods for authenticating users on touchscreen devices
The disclosed computer-implemented method for authenticating users on touchscreen devices may include (i) detecting that the computing device is at an...
US-1,024,8768 Methods and systems for processing content rights
A system and method for processing content access rights and/or entitlement rights are disclosed. A method, in one aspect, provides for receiving a selection of...
US-1,024,8767 Leveraging a unification of content hosting and social networking
Content hosting architectures and/or social networking architectures can be improved by, e.g., unifying the two architectures to some extent. Services or...
US-1,024,8766 Simulation method and analyzing device
An analyzing device includes: a particle definition unit configured to define a system including a plurality of particles in a virtual space; a constraint...
US-1,024,8765 Systems, devices, and methods for bodily fluid sample collection, transport, and handling
Bodily fluid sample collection systems, devices, and method are provided. The device may comprise a first portion comprising at least a sample collection...
US-1,024,8764 System and methods for performing medical physics calculations
A method of calculating radiation fluence and energy deposition distributions on a networked virtual computational cluster is presented. With this method,...
US-1,024,8763 Healthcare prescription delivery techniques using a money transfer network
A healthcare prescription delivery mechanism using a money transfer network is disclosed. In the healthcare prescription delivery mechanism, a prescription for...
US-1,024,8762 System and method of medical device alarm management
Systems and methods of medical device alarm management include receiving alarm data from a plurality of medical devices. The alarm data includes a plurality of...
US-1,024,8761 Computerized system and method for recording and tracking dermatological lesions
A computerized method for recording and tracking dermatological lesions is disclosed. The method comprises creating a graphical template of a portion of a human...
US-1,024,8760 System and method for producing medical image data onto portable digital recording media
This application discloses a system for recording medical image data for production on a portable digital recording medium such as CDs and DVDs. This system...
US-1,024,8759 Medical imaging reference retrieval and report generation
A method for managing a patient medical case. The method includes: obtaining the patient medical case including a patient medical image and a patient medical...
US-1,024,8758 Self-assembling protein nanostructures
Synthetic nanostructures, proteins that are useful, for example, in making synthetic nanostructures, and methods for designing such synthetic nanostructures are...
US-1,024,8757 Genetic, metabolic and biochemical pathway analysis system and methods
Identifying pathways that are significantly impacted in a given condition is a crucial step in the understanding of the underlying biological phenomena. All...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.