Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0180093 PROVISIONING LOCATION-BASED SECURITY POLICY
In one embodiment, a system comprises: a processor including at least one core to execute instructions; a plurality of sensors, including a first sensor to...
2016/0180092 PORTABLE SECURE STORAGE
Particular embodiments described herein provide for a portable electronic device that can be configured to receive data from an electronic device, where the...
2016/0180091 ANALYSIS OF SCRIPTS
A method and associated system. A first computer executes at least two text blocks of code derived from a script of a web page in response to a request for the...
2016/0180090 EXECUTION PROFILING DETECTION OF MALICIOUS OBJECTS
In an example, there is provided a system and method for execution profiling detection of malicious software objects. An execution profiling (EXP) engine may...
2016/0180089 IDENTIFICATION OF MALICIOUS EXECUTION OF A PROCESS
Particular embodiments described herein provide for an electronic device that can be configured to intercept a process, store execution profiling for the...
2016/0180088 DISCOVERY OF MALICIOUS STRINGS
Particular embodiments described herein provide for an electronic device that can be configured to determine a string sample of data, determine a hash of the...
2016/0180087 SYSTEMS AND METHODS FOR MALWARE DETECTION AND REMEDIATION
Provided in some embodiments are systems and methods for remediating malware. Embodiments include receiving (from a process) a request to access data,...
2016/0180086 SYSTEM AND METHOD FOR SECURE EXECUTION OF SCRIPT FILES
Disclosed are a system and method for secure execution of script files. An example method includes providing a security container associated with a script...
2016/0180085 REAL-TIME CODE AND DATA PROTECTION VIA CPU TRANSACTIONAL MEMORY SUPPORT
A technique allows for memory bounds checking for dynamically generated code by using transactional memory support in a processor. The memory bounds checking...
2016/0180084 SYSTEM AND METHOD TO COMBINE MULTIPLE REPUTATIONS
Particular embodiments described herein provide for an electronic device that can be configured to acquire a plurality of reputations related to an object and...
2016/0180083 Method, computer program and system that uses behavioral biometric algorithms
A computer-implemented method, computer program product, and system for determining whether a user exhibits machine behavior, or does not exhibit human-like...
2016/0180082 COMPOSITE PROPENSITY PROFILE DETECTOR
Detecting propensity profile for a person may comprise receiving artifacts associated with the person; detecting profile characteristics for the person based...
2016/0180081 Systems And Methods For Security In Computer Systems
Systems and methods are provided for the prevention and mitigation of security attacks in computer systems. Virtualization technology is provided and leveraged...
2016/0180080 PROTECTING USER INPUT AGAINST FOCUS CHANGE
In an embodiment, a system includes a processor having at least one core and a security engine, the security engine having a focus change logic to inform a...
2016/0180079 Execution Profiling Mechanism
A method comprises filtering branch trap events at a branch event filter, monitoring a branch event filter to capture indirect branch trap events that cause a...
2016/0180078 TECHNOLOGIES FOR ENHANCED USER AUTHENTICATION USING ADVANCED SENSOR MONITORING
Technologies for information security include a computing device with one or more sensors. The computing device may authenticate a user and, after successful...
2016/0180077 HANDHELD ELECTRONIC DEVICE AND METHOD FOR ENTERING PASSWORD THEREOF
A handheld electronic device and a method for entering a password thereof are provided. The method includes following steps. Motion change information of the...
2016/0180076 COMPUTER READABLE STORAGE MEDIA FOR LEGACY INTEGRATION AND METHODS AND SYSTEMS FOR UTILIZING SAME
Systems and methods for integrative legacy context management are disclosed herein. An example computer hardware system may include at least one processing...
2016/0180075 REGISTRATION AND AUTHENTICATION OF COMPUTING DEVICES USING A DIGITAL SKELETON KEY
A method for registering a computing device to a user account using at least one user-selected fingerprintable device externally accessible to the computing...
2016/0180074 SENSOR IDENTIFICATION
Techniques described here use variations in the sensor to generate an identifier for the sensor. Each sensor may be comprised of sub-sensing units, called...
2016/0180073 CAPTCHA PROCESSING METHOD AND DEVICE, TERMINAL AND SERVER
Provided are a CAPTCHA processing method and device, a terminal and a server. The method includes that: a CAPTCHA is received, wherein the CAPTCHA indicates a...
2016/0180072 SYSTEM AND METHODS FOR AUTHENTICATION USING MULTIPLE DEVICES
A system and method of authentication using an authenticator computing device and at least two registered user devices is described. In operation, the...
2016/0180071 METHOD AND SYSTEM FOR BIOMETRIC IDENTIFICATION WITH ACCELERATED TREATMENT
Identification method using data in a database that are distributed in at least a first group of data and a second group of data, a comparison being made using...
2016/0180070 PROCESSING METHOD AND SYSTEM FOR IDENTITY AUTHENTICATION WITH MOBILE TERMINAL BASED ON IRIS RECOGNITION
A processing method and system for identity authentication with a mobile terminal based on iris recognition is provided. The iris characteristic data of the...
2016/0180069 SYSTEM AND METHOD FOR UNLOCKING DEVICES ASSOCIATED WITH A CARRYING BAG
A system and method for unlocking devices associated with a carrying bag are provided. In example embodiments, biometric information of a user from a biometric...
2016/0180068 TECHNOLOGIES FOR LOGIN PATTERN BASED MULTI-FACTOR AUTHENTICATION
Technologies for multi-factor authentication of a user include a computing device with one or more sensors. The computing device may authenticate the user by...
2016/0180067 UNLOCKING ELECTRONIC DEVICES USING TOUCHSCREEN INPUT GESTURES
A computer implemented method for detecting input gesture events on a touchscreen of an electronic device and for unlocking the electronic device is disclosed....
2016/0180066 Using Single White-Box Implementation With Multiple External Encodings
A method of performing a keyed cryptographic operation by a cryptographic system mapping an encoded input message to an output message, including: receiving an...
2016/0180065 APPARATUS FOR TAMPER PROTECTION OF APPLICATION CODE AND METHOD THEREOF
Disclosed is an apparatus for tamper protection of an application which includes: an input unit that receives codes to be used for an application; a code...
2016/0180064 METHOD FOR PROVIDING A LICENCE IN A SYSTEM FOR PROVIDING MULTIMEDIA CONTENTS
A method for providing a licence includes: a step a) wherein a server receives a request including an identifier of a multimedia content and an identifier of a...
2016/0180063 LICENSING IN THE CLOUD
At least one machine readable medium comprising a plurality of instructions that in response to being executed by a system cause the system to send a unique...
2016/0180062 RIGHTS AND CAPABILITY-INCLUSIVE CONTENT SELECTION AND DELIVERY
Intelligent content delivery enables content to be delivered to different devices in formats appropriate for those devices based on the capabilities of those...
2016/0180061 TECHNOLOGIES FOR ENHANCED USER AUTHENTICATION USING ADVANCED SENSOR MONITORING
Technologies for 3D printing digital rights management (DRM) include a 3D printing device communicatively coupled with a 3D model storage server and a rights...
2016/0180060 SYSTEMS AND METHODS FOR MONITORING MOVEMENT OF DISEASE FIELD
A method for monitoring movement of disease across agricultural areas of interest including providing, using one or more processors and one or more data...
2016/0180059 METHOD AND SYSTEM FOR GENERATING A REPORT FOR A PHYSICAL ACTIVITY
Sensors can be used to monitor repeated performances of a physical activity. Data from the sensors are used to generate a report, which may include a video...
2016/0180058 SENSITIVE DRUG DISTRIBUTION SYSTEM AND METHOD
A drug distribution system and method utilizes a central pharmacy and database to track all prescriptions for a sensitive drug. Information is kept in the...
2016/0180057 DOSE PREPARATION DATA ANALYTICS
Providing selective, secure access to an aggregated, multidimensional data set comprising dose order records for generation of data analytics with respect...
2016/0180056 PROCESSING A SEARCH RESULT FROM A MEDICAL QUERY-BASED SEARCH
A system (100) is provided for processing a search result of a medical query (122) which is submitted to a search engine (040), e.g., by a user. The system...
2016/0180055 SYSTEMS AND METHODS FOR DETERMINING BLOOD FLOW CHARACTERISTICS USING FLOW RATIO
Embodiments include a system for determining cardiovascular information for a patient which may include at least one computer system configured to receive...
2016/0180054 SIMULATION SYSTEM
A system for configuring a prosthetic limb for use by a living being is provided. The system includes an electronic control unit (ECU) configured to receive a...
2016/0180053 System And Method Of Conducting In Silico Clinical Trials
Described herein are computer systems and methods for generating, in silico, one or more virtual patients. The one or more virtual patients can be used, for...
2016/0180052 METHOD FOR THE IDENTIFICATION OF SUPPLY AREAS, METHOD FOR THE GRAPHICAL REPRESENTATION OF SUPPLY AREAS,...
An embodiment of the invention is based on the idea of adjusting a physiological model of an anatomical region containing blood vessels on the basis of...
2016/0180051 METHOD AND ARRANGEMENT FOR MATCHING OF DISEASES AND DETECTION OF CHANGES FOR A DISEASE BY THE USE OF...
Techniques for matching of diseases and detection of changes for a disease by use of mathematical models that make it possible to match, find similar diseases,...
2016/0180050 METHODS FOR DETERMINING HEALTH RISKS
The present disclosure provides systems and methods for health management. The system can calculate a health risk of a subject based on health data and family...
2016/0180049 MANAGING MEDICAL EXAMINATIONS IN A POPULATION
A method of managing an allocation of medical examinations. The method comprises documenting, in at least one dataset, for each one of a plurality of...
2016/0180048 CLOUD-BASED MEDICAL INFORMATION RETRIEVAL METHOD AND SYSTEM THEREOF
The present invention is to provide a cloud-based retrieval method of medical information and system thereof. The method comprises (a) generating an...
2016/0180047 SYSTEM AND METHOD FOR PROVIDING DYNAMIC CONTENT
In certain embodiments, a video file may be obtained based on one or more predetermined criteria. Information associated with a user (to which dynamic content...
2016/0180046 DEVICE FOR INTERMEDIATE-FREE CENTRALISED CONTROL OF REMOTE MEDICAL APPARATUSES, WITH OR WITHOUT CONTACT
A device (1) for the remote control, with or without contact, of at least one medical apparatus (2), including a device (5) for projecting a graphical user...
2016/0180045 WIRELESS BEACON DEVICES USED TO TRACK MEDICAL INFORMATION AT A HOSPITAL
There are provided systems and methods for wireless beacon devices used to track medical information at a hospital. A hospital may set up one or more wireless...
2016/0180044 MOBILE HEALTHCARE HUB
A mobile healthcare hub includes a processor, memory coupled to the processor and a display coupled to the processor. A communications module includes a mobile...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.