Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0171248 Using Trusted Execution Environments for Security of Code and Data
An embodiment includes a processor coupled to memory to perform operations comprising: creating a first trusted execution environment (TXE), in protected...
2016/0171246 CODE INTEGRITY PROTECTION BY COMPUTING TARGET ADDRESSES FROM CHECKSUMS
A method of obscuring software code including a plurality of basic blocks, including: calculating, by a processor, a checksum value of the current basic block...
2016/0171245 ENTERPRISE CONTENT MANAGEMENT PLATFORM VALIDATOR
The present invention is directed to a system that enables a user (an associate, a data specialist, a researcher, an adjuster, an agent, a teller, or the like)...
2016/0171244 DIGITAL MEDIA PRIVACY PROTECTION
In one example of digital media privacy protection, a computer-readable medium stores computer-executable instructions that, when executed, cause one or more...
2016/0171243 HISTORY INFORMATION ANONYMIZATION METHOD AND HISTORY INFORMATION ANONYMIZATION DEVICE FOR ANONYMIZING HISTORY...
A history information anonymization method includes an association step of associating each of a plurality of pieces of history information collected from a...
2016/0171242 SYSTEM, METHOD, AND COMPUER PROGRAM PRODUCT FOR PREVENTING IMAGE-RELATED DATA LOSS
A system, method, and computer program product are provided for preventing data loss associated with an image. In use, an image is identified, and it is...
2016/0171241 APPARATUSES, SYSTEMS, METHODS, AND COMPUTER READABLE MEDIA FOR PROVIDING SECURE FILE-DELETION FUNCTIONALITY
A secure file-deletion function providing apparatus includes a request input unit configured to receive a file deletion request to delete a file stored in an...
2016/0171240 METHOD OF PRIVACY PRESERVING DURING AN ACCESS TO A RESTRICTED SERVICE
The present invention relates to a method of privacy-preserving during an access to a restricted e-service requiring user private data from a smart card. The...
2016/0171239 ENCRYPTION OF MEDIA BASED ON CONTENT
One embodiment provides a method, including: accessing, on a mobile end user device, a media file; processing, using a processor of the mobile end user device,...
2016/0171238 GEOLOCATION-BASED ENCRYPTION METHOD AND SYSTEM
A geolocation-based encryption method and system. The geolocation-based encryption method and system may comprise the steps of: providing an encryption...
2016/0171237 IMPLEMENTATION OF DATA PROTECTION POLICIES IN ETL LANDSCAPES
Embodiments of the present invention provide, systems, methods, and computer program products for processing data in an extract, transform, and load system....
2016/0171236 INTELLIGENT DATABASE WITH SECURE TABLES
Methods to perform an operation comprising upon determining that a received query requests values of sensitive data stored in a secure database table of a...
2016/0171235 INTELLIGENT DATABASE WITH SECURE TABLES
Systems, methods, and computer program products to perform an operation comprising upon determining that a received query requests values of sensitive data...
2016/0171234 Approach For Managing Access To Electronic Documents On Network Devices Using Document Analysis, Document...
An approach for managing access to electronic documents uses document retention and document security policies. In response to a request to access a particular...
2016/0171233 METHOD AND SYSTEM FOR PREVENTING UNAUTHORIZED RECORDING OF MEDIA CONTENT ON AN APPLE OPERATING SYSTEM
A method for preventing unauthorized recording of media content on an Apple operating system (OS). The present method registers a compliance mechanism on a...
2016/0171232 SYSTEM AND METHOD FOR SECURE RECIPROCAL EXCHANGE OF DATA
A system for transmission of data from a first device operated by a first user includes a wireless device and a database. The wireless device is used by a...
2016/0171231 EMERGENCY NOTIFICATION SYSTEM AND METHODS
The present invention is related to systems and methods for identifying and reporting a crisis status. In at least one embodiment, the system comprises a...
2016/0171230 Method to Delay Locking of Server Files On Edit
A server is implemented with a modified file open action, which, when a user performs the modified open, initially opens a file without locking the file. When...
2016/0171229 IMPLEMENTATION OF DATA PROTECTION POLICIES IN ETL LANDSCAPES
Embodiments of the present invention provide, systems, methods, and computer program products for processing data in an extract, transform, and load system....
2016/0171228 METHOD AND APPARATUS FOR OBFUSCATING USER DEMOGRAPHICS
A method to obfuscate the accurate detection of demographic information of a new user who provides ratings to a digital content service having a recommender...
2016/0171227 Privacy-Protective Data Transfer
A method receives authentication credentials for a user from a client device and receives a request from the user for content stored on a remote storage...
2016/0171226 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR CONDITIONALLY SHARING AN OBJECT WITH ONE OR MORE ENTITIES
In accordance with embodiments, there are provided mechanisms and methods for conditionally sharing an object with one or more entities. These mechanisms and...
2016/0171225 DETERMINING PRIVACY GRANULARITY
Techniques for determining privacy granularity in a data flow are described herein. The techniques may include identifying a data flow source statement within...
2016/0171224 ENABLING ACCESS TO DATA
Methods, systems, apparatus and computer programs for enabling access to data by a requesting party. A plurality of sets of data are generated. A one one-way...
2016/0171223 SYSTEMS AND METHODS FOR SECURE PROVISIONING OF PRODUCTION ELECTRONIC CIRCUITS
To securely configure an electronic circuit and provision a product that includes the electronic circuit, a first entity (e.g., a chip manufacturer) embeds one...
2016/0171222 INFORMATION RIGHTS MANAGEMENT USING DISCRETE DATA CONTAINERIZATION
Disclosed herein are a method and a system for discrete data containerization for Information Rights Management. The system identifies based on a user request,...
2016/0171221 INTELLIGENT KEY SELECTION AND GENERATION
A method, computer program product, and system for selecting and generating a key to perform a cryptographic operation are described. The method includes...
2016/0171220 DISPLAY CONTROL METHOD AND APPARATUS AND DISPLAY DEVICE COMPRISING SAME
A display control method and apparatus, and a display device comprising the apparatus, are provided. A method comprises receiving a display request sent by at...
2016/0171219 PROTECTING PRIVACY WITH SECURE DIGITAL SIGNAGE IN VEHICLE REGISTRATION PLATES
Various systems and methods for protecting privacy with secure digital signage in vehicle registration plates are described herein. A system with an electronic...
2016/0171218 MEMORY DEVICE AND SCRIPT-EXECUTION CONTROL METHOD
A memory device according to an embodiment includes a calculator and a storage unit. The calculator encrypts a first script to a first hash key. The storage...
2016/0171217 ENTITY IP MAPPING
Systems and methods for mapping IP addresses to an entity include receiving at least one domain name associated with the entity. Embodiments may further...
2016/0171216 NORMALIZING AND DETECTING INSERTED MALICIOUS CODE
A method, system, and computer program product for detecting malicious code insertion in data are provided in the illustrative embodiments. At an application...
2016/0171215 PROTECTING MOBILE DEVICES FROM MALWARE
Using a system distinct from a mobile device, the mobile device is switched from a first mode to a second mode to access a set of data storage locations in the...
2016/0171214 METHOD OF EXECUTING A PROGRAM BY A PROCESSOR AND ELECTRONIC ENTITY COMPRISING SUCH A PROCESSOR
A method of executing a program by a processor, and an electronic entity including such a processor, the method includes the following steps: a calling...
2016/0171213 APPARATUS AND METHOD FOR CONTROLLING INSTRUCTION EXECUTION TO PREVENT ILLEGAL ACCESSES TO A COMPUTER
An apparatus stores first instructions including a call instruction and second instructions including a return instruction. When executing the second...
2016/0171212 METHOD AND APPARATUS FOR RANDOMIZING COMPUTER INSTRUCTION SETS, MEMORY REGISTERS AND POINTERS
Described herein is a method and apparatus to randomize instruction sets, memory registers, and pointers to increase computer security by increasing resource...
2016/0171211 Return Oriented Programming (ROP) Attack Protection
Return oriented programming (ROP) attack prevention techniques are described. In one or more examples, a method is described of protecting against return...
2016/0171210 IMPLEMENTING SECURITY FUNCTIONS USING ROM
Systems, methods, and other embodiments associated with implementing security functions are described. According to one embodiment, a device includes a memory...
2016/0171209 SYSTEM AND METHOD FOR REPLACING COMMON IDENTIFYING DATA
A system and method for generating a unique identifier for a user. A processor hosted by the system transmits a prompt for user selection of a digital image...
2016/0171208 Selective Password Synchronization
A mechanism is provided for selective password synchronization. An indication is received that a password is to be changed for an account in a plurality of...
2016/0171207 METHOD FOR TRANSFERRING USER DATA BETWEEN TWO INSTANCES OF AN APPLICATION
The invention is a method of transferring user data from a first instance of a package to a second instance of another package corresponding to an upgraded...
2016/0171206 Hardware-Based Device Authentication
An opportunity for a computing device to participate in a secure session with a particular domain is identified. A domain identifier of the particular domain...
2016/0171205 INTEGRITY FOR SECURITY AUDIT LOGS
Methods, systems, and computer-readable storage media for storing event data in an audit log file. Implementations include actions of receiving event data,...
2016/0171204 INFORMATON PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT
An information processing apparatus includes a reception unit which receives first input information which is arbitrary set in conjunction with a login of the...
2016/0171203 SYSTEM AND METHOD OF USING RFID TAG PROXIMITY TO GRANT SECURITY ACCESS TO A COMPUTER
A system and method of granting and removing a user's security access to applications on a computer using proximity of authorized RFID tags is disclosed. A...
2016/0171202 SYSTEMS AND METHODS FOR FACILITATING MOBILE TRANSACTIONS
The invention relates to a method for enabling the user of at least one mobile terminal to access one or more of a plurality of services corresponding to a...
2016/0171201 External Secure Unit
A method for operating an external secure unit comprises at least a memory for storing data, a processor for processing the data, at least one interface for...
2016/0171200 Biometric Personal Data Key (PDK) Authentication
Systems and methods verifying a user during authentication of an integrated device. In one embodiment, the system includes an integrated device and an...
2016/0171199 Method & system for Providing Password-Free, Hardware-rooted, ASIC-Based, Authentication of Human to a...
Biometric data are obtained from a biometric sensor on a stand-alone computing device, which may contain an ASIC, connected to or incorporated within it. The...
2016/0171198 MANAGING LATENCY AND POWER IN A HETEROGENEOUS DISTRIBUTED BIOMETRIC AUTHENTICATION HARDWARE
Techniques for authenticating a biometric input are disclosed. An example of a biometric authentication system is configured to receive a biometric input,...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.