Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0292440 PREVENTING CONTENT DATA LEAK ON MOBILE DEVICES
Preventing enterprise or other protected content data from "leaking" from being under secure management on a device, for example by virtue of being viewed...
2016/0292439 DEVICES AND METHODS FOR ENCRYPTION AND DECRYPTION OF GRAPHICAL 3D OBJECTS
An asset, which is a graphical 3D object, is protected at a processor of an encryption device that obtains the asset and a proxy including polyhedrons,...
2016/0292438 INFORMATION PROCESSING APPARATUS, CONTROL METHOD FOR INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM
An information processing apparatus includes an update unit configured to update firmware of the information processing apparatus, a determination unit...
2016/0292437 TECHNIQUE FOR DATA LOSS PREVENTION FOR A CLOUD SYNC APPLICATION
Techniques describe preventing sensitive data from being misappropriated during an operation performed by a cloud synchronization application. A request from a...
2016/0292436 METHOD AND SYSTEM FOR SECURE USE OF SERVICES BY UNTRUSTED STORAGE PROVIDERS
A method for encrypting data. The method comprises receiving, from a user, via a client terminal, digital content including at least one textual string for...
2016/0292435 MANAGING ACCESS TO DEVICE CONTENT
A method for managing access to a device includes receiving restriction information and access to a user's calendar, scanning the calendars for entries...
2016/0292434 METHOD AND APPARATUS FOR POLICY ADAPTION BASED ON APPLICATION POLICY COMPLIANCE ANALYSIS
An approach is provided for policy adaption based on application policy compliance analysis. The compliance platform processes and/or facilitates a processing...
2016/0292433 PERMISSION MANAGEMENT METHOD AND APPARATUS
A permission management method and apparatus are provided. In order to overcome inconvenient and error-prone in operations, the permission management method...
2016/0292432 METHOD OF DISTRIBUTING APPLICATION WITH SECURITY FEATURES AND METHOD OF OPERATING THE APPLICATION
Provided is a method of distributing an application including transmitting, by a distribution server, a signal for requesting metadata to a user terminal where...
2016/0292431 MANAGEMENT OF ENCRYPTION KEYS IN AN APPLICATION CONTAINER ENVIRONMENT
Systems, methods, and software to manage encryption keys in an application container environment are provided. In one example, a method of managing encryption...
2016/0292430 COMPUTING ON ENCRYPTED DATA USING DEFERRED EVALUATION
Methods, systems, apparatuses, and computer program products are provided for processing queries. A data server includes a query processor configured to...
2016/0292429 SECURE CLOUD-BASED STORAGE OF DATA SHARED ACROSS FILE SYSTEM OBJECTS AND CLIENTS
Techniques to provide secure cloud-based storage of data shared across file system objects and clients are disclosed. In various embodiments, a primary...
2016/0292428 SYSTEM AND METHOD FOR PROVIDING AN ELECTRONIC DOCUMENT
Systems, methods, and computer-readable media are provided. Some embodiments include initiating a scan operation to generate an electronic document...
2016/0292427 Database Encryption to Provide Write Protection
An online computer system including a database uses an encrypted table that allows for write protection its contents. Middleware logic operating on the system...
2016/0292426 Method and Apparatus for Scrambling a High Speed Data Transmission
A method of transmitting high speed serial data with reduced levels of radiated emissions is disclosed. A transmitting device scrambles data utilizing a...
2016/0292425 SYSTEM AND METHOD FOR AUTOMATED REMEDYING OF SECURITY VULNERABILITIES
In a binary patching system for alleviating security vulnerabilities in a binary representation of a software application, a binary code portion determined to...
2016/0292424 Inoculator and Antibody for Computer Security
In an embodiment of the invention, a method includes: determining, in a computer, an area where an undesired computer program will reside; and providing a data...
2016/0292423 HARDWARE CONFIGURATION REPORTING SYSTEMS
Embodiments related to hardware configuration reporting and arbitration are disclosed herein. For example, an apparatus for hardware configuration reporting...
2016/0292422 INFORMATION PROCESSING APPARATUS AND METHOD OF CONTROLLING THE APPARATUS
An information processing apparatus holding a secure chip includes a determination unit that determines whether the information processing apparatus returns...
2016/0292421 DETECTING KEYLOGGING
A device may detect or emulate a sequence of keystrokes to be used to detect a keystroke logger application. The device may determine a sequence of characters...
2016/0292420 CONFIGURING A SANDBOX ENVIRONMENT FOR MALWARE TESTING
A device may receive a file to be analyzed in a sandbox environment, and may determine configuration information for configuring the sandbox environment. The...
2016/0292419 MULTI-FILE MALWARE ANALYSIS
A device may identify a plurality of files for a multi-file malware analysis. The device may execute the plurality of files in a malware testing environment....
2016/0292418 WAVELET DECOMPOSITION OF SOFTWARE ENTROPY TO IDENTIFY MALWARE
A plurality of data files is received. Thereafter, each file is represented as an entropy time series that reflects an amount of entropy across locations in...
2016/0292417 Generic Unpacking of Program Binaries
By hooking application programming interfaces in an execution environment, the return address for hooked application programming interface calls can be logged...
2016/0292416 SYSTEM AND METHOD FOR IDENTIFYING A FILE PATH USING TREE DATA STRUCTURE
Disclosed is a system and method for identifying a path in a tree data structure having a plurality of levels. An example method includes receiving a request...
2016/0292415 ANALYZING A PASSWORD-PROTECTED FILE FOR MALWARE
A device may receive a password-protected file to be accessed for analysis. The device may identify a contextual term, associated with the password-protected...
2016/0292414 TECHNIQUES FOR DYNAMIC DOMAIN-BASED ISOLATION
Techniques for dynamic domain-based isolation are described. An apparatus may comprise a domain name component operative to receive a domain name request for a...
2016/0292413 TIME-VARYING PASSWORDS FOR USER AUTHENTICATION
Time-varying passwords for user authentication are disclosed. Example methods disclosed herein for password generation include obtaining a base password...
2016/0292412 AUTO-CREATION OF APPLICATION PASSWORDS
In one embodiment, an attempt to log in to a user account, by an application on a client device, is detected. It is determined whether the client device is a...
2016/0292411 VERIFICATION METHOD, APPARATUS AND SYSTEM
The present invention relates to the technical field of computer technologies. Disclosed are a verification method, apparatus and system. The method comprises:...
2016/0292410 Authenticating User and Launching an Application on a Single Intentional User Gesture
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for combining authentication and application shortcut. An...
2016/0292409 REFRIGERATOR AND METHOD FOR MEASURING BODY COMPOSITION USING THE REFRIGERATOR
A refrigerator includes a handgrip arranged on one side of a door to open and close a storage compartments, a measurer configured to measure fingerprints and...
2016/0292408 CONTINUOUSLY AUTHENTICATING A USER OF VOICE RECOGNITION SERVICES
A method for continuously authenticating a user of voice recognition services is described. According to the method a user is initially authenticated, with a...
2016/0292407 SYSTEMS AND METHODS FOR BIOMETRIC AUTHENTICATION
Systems and methods for authentication are disclosed. A method for biometric authentication, includes: receiving a first attempt to validate an identity using...
2016/0292406 APPARATUS AND METHOD FOR INTELLIGENT VIDEO SURVEILLANCE OF INDUSTRIAL CONSOLE OPERATIONS
A method implemented in an operator console includes receiving a captured image of an operator at the operator console. The method also includes identifying...
2016/0292405 SYSTEM AND METHOD FOR CANDIDATE PROFILE SCREENING
This disclosure relates generally to screening candidate profile, and more particularly to system and method for screening candidate profile. In one...
2016/0292404 Multi-User Login for Shared Mobile Devices
In particular embodiments, two or more users are provided with personalized experiences while using a shared mobile computing device. A login interface is...
2016/0292403 AUTHENTICATION SYSTEMS AND METHODS FOR GENERATING FLIGHT REGULATIONS
Systems and methods for UAV safety are provided. An authentication system may be used to confirm UAV and/or user identity and provide secured communications...
2016/0292402 PASSWORD INPUT METHOD AND SYSTEM BASED ON TWO-STAGE CONVERSION
The invention discloses a password input method based on two-stage conversion. The method specifically includes that (1) password composition symbols are used...
2016/0292401 MANAGING SOFTWARE DEPLOYMENT
The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of...
2016/0292400 SD CARD LICENSE MECHANISM
A system and approach for providing software device or secure digital (SD) cards for computing devices. An SD card may be programmed with a unique card...
2016/0292399 ENABLING ENFORCEMENT OF LICENSING TERMS IN DISTRIBUTING CONTENT IN CONTAINERS BY INCLUDING A KEY IN THE...
A method, system and computer program product for enforcing licensing terms when distributing content via a container image running in a container. Upon...
2016/0292398 ARRIS Secure Media DRM APIs in Hosted Architecture
Systems and methods are provided for digital rights management of licensed media content. Client library components and server library components provide...
2016/0292397 METHOD AND APPARATUS FOR AUTOMATIC LICENSE CONFIGURATION UPDATES
A license update engine is run as part of a license entitlement automation system. The license update engine is minimally executed daily and identifies, for...
2016/0292396 SYSTEM AND METHOD FOR AUTHENTICATING DIGITAL CONTENT
Various embodiments of the present invention relate generally to authenticating copies of digital information and support systems and methods for providing...
2016/0292395 SYSTEM AND METHOD FOR PROVIDING A CONTENT CONSUMPTION JOURNAL TO USERS IN A MULTI-DEVICE ENVIRONMENT
A system and method for providing content consumption data to users in a multi-device environment. Activity data from a plurality of UE devices associated with...
2016/0292394 METHOD AND DEVICE FOR PARTITIONING A MOLECULE
A method for partitioning a molecular subset is described. The partitioning method takes into account molecular structure and its manner of storage and...
2016/0292393 SYSTEMS AND METHODS FOR ORDERING LABORATORY TESTS AND PROVIDING RESULTS THEREOF
Systems and methods for ordering laboratory tests, performing laboratory tests, and providing results thereof are provided. Laboratory tests may be ordered,...
2016/0292392 SYSTEM AND METHOD OF DETERMINING MISSING INTERVAL CHANGE INFORMATION IN RADIOLOGY REPORTS
A system, method and computer readable storage medium for analyzing a medical report to determine if interval change data corresponding to a change of the...
2016/0292391 SYSTEM AND METHOD FOR IMPROVED NUTRIENT INTAKE
The present invention provides for a system and method of partitioning of macronutrients (carbohydrates, vegetables, dairy, proteins and fats) of each food...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.