Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0306987 METHOD AND APPARATUS FOR DIFFERENTIATED ACCESS CONTROL
A method for differentiated access control on a computing device having a connection with a second device, the method checking whether a timer has expired on...
2016/0306986 COLLECTION FOLDER FOR COLLECTING FILE SUBMISSIONS AND USING FACIAL RECOGNITION
A content management system for collecting files from one or more submitters in a collection folder. A collector, who generates the collection folder, can...
2016/0306985 Multi-Focused Fine-Grained Security Framework
An approach is provided in which a knowledge manager generates a knowledge structure that includes security annotation tokens and term tokens. Each of the...
2016/0306984 DATA STORAGE SYSTEMS AND METHODS
Data storage systems are disclosed for automatically generating encryption rules based on a set of training files that are known to include sensitive...
2016/0306983 Managing Keys Used for Encrypting Data
A method, a data processing system, and a computer program product for managing cryptographic information. A determination is made as to whether a first time...
2016/0306982 SYSTEM AND METHOD FOR PROVIDING A CRYPTOGRAPHIC PLATFORM FOR EXCHANGING INFORMATION
A system and method configured for providing a cryptographic platform for exchanging information. One or more information transactions including encrypted...
2016/0306981 METHODS AND APPARATUSES FOR IMPROVED APP SECURITY TESTING
Embodiments are disclosed for performing static and/or non-emulated dynamic analysis of mobile computing device software to improve app security testing. In...
2016/0306980 SYSTEM AND METHOD FOR CREATING AND EXECUTING BREACH SCENARIOS UTILIZING VIRTUALIZED ELEMENTS
A system for analyzing a computing system for potential breach points, the system comprising a memory device having executable instructions stored therein, and...
2016/0306979 SYSTEM AND METHOD FOR VERIFYING MALICIOUS ACTIONS BY UTILIZING VIRTUALIZED ELEMENTS
A system comprising a memory device having executable instructions stored in the memory device, and a processing device, in response to the executable...
2016/0306978 USER CONTROLLABLE PLATFORM-LEVEL TRIGGER TO SET POLICY FOR PROTECTING PLATFORM FROM MALWARE
Embodiments of systems, apparatuses, and methods to protect data stored in a storage system of a device from malware alternation are described. In some...
2016/0306977 SYSTEM AND METHODS FOR SECURE FIRMWARE VALIDATION
An electronic device, such as a dynamic transaction card having an EMV chip, that acts as a TPM having a memory, an applet, and a cryptographic coprocessor...
2016/0306976 SECURE SOFTWARE AUTHENTICATION AND VERIFICATION
A first time software is loaded for execution by a device, the software stored in non-secure storage is authenticated. Authenticating the software may involve...
2016/0306975 Method and Apparatus for Providing Security to Devices
Systems, methods, and apparatus are provided for generating verification data that may be used for validation of a wireless transmit-receive unit (WTRU). The...
2016/0306974 IDENTIFICATION OF COMPUTERIZED BOTS, AND IDENTIFICATION OF AUTOMATED CYBER-ATTACK MODULES
Devices, systems, and methods of detecting whether an electronic device or computerized device or computer, is being controlled by a legitimate human user, or...
2016/0306973 A COMPUTING DEVICE FOR ITERATIVE APPILCATION OF TABLE NETWORKS
A computing device (500) comprising an electronic storage (510) and an electronic processor (550) coupled to the storage, the storage storing a series of table...
2016/0306972 VIRUS SIGNATURE MATCHING METHOD AND APPARATUS
The present disclosure provides a virus signature matching method, including: obtaining an inputted target file; loading a virus signature database, and...
2016/0306971 AUTOMATED IDENTIFICATION AND REVERSE ENGINEERING OF MALWARE
An automated malware identification and reverse engineering tool is provided. Subroutine categories may be learned by machine learning. A program may then be...
2016/0306970 MANAGING SOFTWARE DEPLOYMENT
The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of...
2016/0306969 RENDER ENGINE, AND METHOD OF USING THE SAME, TO VERIFY DATA FOR ACCESS AND/OR PUBLICATION VIA A COMPUTER SYSTEM
A method and system to verify active content at a server system include receiving, at the server system a communication (e.g., an e-mail message or e-commerce...
2016/0306968 TECHNOLOGIES FOR MANAGING SECURITY THREATS TO A COMPUTING SYSTEM UTILIZING USER INTERACTIONS
Technologies for managing security threats on a computing system include detecting a security threat to the computing system, determining a plurality of...
2016/0306967 Method to Detect Malicious Behavior by Computing the Likelihood of Data Accesses
A method, performed by a processor to detect malicious or risky data accesses is provided. The method includes modeling user accesses to a content repository...
2016/0306966 Paravirtualized Security Threat Protection of a Computer-Driven System with Networked Devices
A computer-implemented method and computer program product for protecting a computer-driven system from a security threat. The computer-driven system includes...
2016/0306965 USER ACTIVITY MONITORING
Systems and methods are disclosed for associating an entity with a risk score that may indicate a security threat associated with the entity's activity. An...
2016/0306964 COMPUTER DEVICE AND METHOD FOR ISOLATING UNTRUSTED CONTENT ON A CLIPBOARD
A computer device and respective method provides a primary clipboard accessible from a primary user account, while a sandbox is used to isolate and contain a...
2016/0306963 COMPUTER DEVICE AND METHOD FOR CONTROLLING UNTRUSTED ACCESS TO A PERIPHERAL DEVICE
A computer device includes hardware with a connected peripheral device such as a camera or a microphone. An operating system is configured to operate the...
2016/0306962 DEVICE AND METHOD OF REQUESTING EXTERNAL DEVICE TO EXECUTE TASK
A first device requesting a second device to execute a task is provided. The first device includes a communication unit configured to communicate with the...
2016/0306961 SYSTEMS AND METHODS FOR AUTHENTICATED SYSTEM PARTITION ACCESS
In accordance with embodiments of the present disclosure, an information handling system may include a processor, a storage resource communicatively coupled to...
2016/0306960 SOFTWARE VERIFICATION FOR AUTOMATIC TRAIN OPERATION
An automatic train operation system includes a first control system configured to run a first software for controlling a first vehicle subsystem and a second...
2016/0306959 METHOD OF AUTHENTICATION
A method of image-based authentication comprising the steps of: receiving a user input representing a first combination of a plurality of images; and...
2016/0306958 NUMERIC KEYPAD ENCRYPTION FOR AUGMENTED REALITY DEVICES
Embodiments of the present invention provide methods and systems for numeric keypad encryption using an augmented reality device. The method may include...
2016/0306957 Unlocking Control Method and Apparatus for Intelligent Terminal
This application discloses an unlocking control method and apparatus for an intelligent terminal, including: detecting, when an intelligent terminal enters an...
2016/0306956 Secure Element as a Digital Pocket
The disclosure includes a system and method in which one or more virtual resources are presented to a secure element; and the one or more virtual resources are...
2016/0306955 PERFORMING USER SEAMLESS AUTHENTICATIONS
In one embodiment, a first device includes: a first logic to generate a first token when a user adapts the first device in approximate contact to the user, the...
2016/0306954 METHODS AND SYSTEMS FOR MULTI-KEY VERITABLE BIOMETRIC IDENTITY AUTHENTICATION
A technology is disclosed that addresses the problem of identity verification while respecting the need to minimize intrusion upon the privacy and civil rights...
2016/0306953 MULTI-FACTOR AUTHENTICATION USING A COMBINED SECURE PATTERN
A method and system for multi-factor authentication. The method involves combining a plurality of authentication patterns into a combined secure pattern by...
2016/0306952 SYSTEMS AND METHODS FOR PROVIDING AUTOMATIC CONTENT RECOGNITION TO VERIFY AFFILIATE PROGRAMMING
Systems and methods are disclosed herein for an Automatic Content Recognition (ACR) system that determines whether affiliates are adhering to criteria set by...
2016/0306951 INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, PROGRAM, AND SERVER
An information processing device includes an acquisition unit configured to acquire developer identification information associated with an application program...
2016/0306950 MEDIA DISTRIBUTION NETWORK, ASSOCIATED PROGRAM PRODUCTS, AND METHODS OF USING THE SAME
A media server is disclosed, and comprises one or more non-transitory computer-readable memory devices upon which at least one set of instructions are stored,...
2016/0306949 MEDIA CLIENT DEVICE SETUP UTILIZING ZERO-TOUCH INSTALLATION
A device may receive and store first device information (first information), associated with a media client device (media client), and a first security key (a...
2016/0306948 NETWORK MODELING FOR DRUG TOXICITY PREDICTION
A computational systems pharmacology framework consisting of statistical modeling and machine learning based on comprehensive integration of systems biology...
2016/0306947 METHODS, SYSTEMS, AND DEVICES FOR DESIGNING MOLECULES
Method, systems, and devices for designing a test molecule are disclosed. An example method includes using a molecular simulator to generate sets of simulation...
2016/0306946 SYSTEMS AND METHODS FOR PAIN TRACKING
Systems, methods, and computer program products for recording and monitoring pain are disclosed. A device may record a date and time corresponding to a pain...
2016/0306945 POPULATION PHARMACOKINETICS TOOLS AND USES THEREOF
The present invention is directed to computer based pharmacokinetics systems, such as. web-based pharmacokinetics systems, and their use to predict a dose and...
2016/0306944 SYSTEMS AND METHODS FOR ASSESSMENT OF TISSUE FUNCTION BASED ON VASCULAR DISEASE
Systems and methods are disclosed for assessing tissue function based on vascular disease. One method includes receiving a patient-specific anatomic model...
2016/0306943 SYSTEMS AND METHODS FOR CARDIOVASCULAR BLOOD FLOW AND MUSCULOSKELETAL MODELING FOR PREDICTING DEVICE FAILURE OR...
Computer-implemented methods are disclosed for assessing the effect of musculoskeletal activities on disease and/or clinical events, the method comprising:...
2016/0306942 SUBJECT-SPECIFIC ASSESSMENT OF NEUROLOGICAL DISORDERS WITH BIOCHEMICAL PROPAGATION MECHANISMS
A method for subject-specific assessment of neurological disorders, the method includes receiving 3D image data representative of a subject's brain and...
2016/0306941 CONDITION ANALYSIS
The present invention provides a method of determining a treatment program for a subject. The method includes obtaining subject data representing the subject's...
2016/0306940 SYSTEM, METHOD, AND COMPUTER PROGRAM FOR RESPIRATORY AND CARDIOVASCULAR MONITORING, EVALUATION, AND TREATMENT
A patient respiratory and cardiovascular monitoring and evaluation system broadly comprising a wearable respiratory and cardiovascular monitoring garment, a...
2016/0306939 SYSTEM AND METHOD FOR PERFORMING A DIAGNOSTIC ANALYSIS OF PHYSIOLOGICAL INFORMATION
A system that incorporates teachings of the present disclosure may include, for example, an avatar engine having a controller to retrieve a user profile of a...
2016/0306938 Safety Features for Medical Devices Requiring Assistance and Supervision
An automatic locking system for a medical treatment device helps to ensure that an assistant is present during treatment of a patient. Among the features...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.