Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0335454 SYSTEMS AND METHODS FOR ACCESSING COMPUTATIONAL RESOURCES IN AN OPEN ENVIRONMENT
The disclosed embodiments include methods and systems for accessing computation resources, such as information-technology (IT) assets, in an open environment....
2016/0335453 Managing Data
One example discloses a data manager of a data collector (DCDM) 8 executing on a virtual machine 6 for managing sensitive data. The DCDM 8 can have a...
2016/0335452 Dynamic Filtering and Precision Alteration of Query Responses Responsive to Request Load
Embodiments relate to processing a request from a user device for access rights for a resource. An access management system can send a request to query a...
2016/0335451 FIELD LEVEL DATA PROTECTION FOR CLOUD SERVICES USING ASYMMETRIC CRYPTOGRAPHY
Systems, apparatuses, and methods for providing data security for data that is stored in a cloud-level platform. In one embodiment, each session is associated...
2016/0335450 SEARCHABLE ENCRYPTION PROCESSING SYSTEM AND SEARCHABLE ENCRYPTION PROCESSING METHOD
A searchable encryption processing system includes a server including: a communication device to communicate with another device; a storage device configured...
2016/0335449 CONTEXT-BASED SECURITY SCREENING FOR ACCESSING DATA
A computer system securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic...
2016/0335448 Collection Folders in a Content Management System
A content management system allows a user to create a collection folder to which a submitting user can add content items without being able to access content...
2016/0335447 SECURE ENTERPRISE CDN FRAMEWORK
Various embodiments relate to a method, network node, and non-transitory machine-readable storage medium including the following: providing access to an...
2016/0335446 Detection of Obscured Copying Using Discovered Translation Files and Other Operation Data
Systems and methods that automatically compare sets of files to determine what has been copied even when sophisticated techniques for hiding or obscuring the...
2016/0335445 Owner Controlled Transmitted File Protection and Access Control System and Method
A system that encrypts a protected file embedded with encrypted policy rules. The policy rules are one or more `access rules` and `use rules` that determine...
2016/0335444 Proximity based digital rights management method and system
According to an example embodiment of the present invention, there is provided a method of controlling digital user rights on a mobile device comprising the...
2016/0335443 DATA TRANSMISSION SYSTEM, DATA TRANSMISSION APPARATUS, DATA TRANSMISSION METHOD, AND NON-TRANSITORY COMPUTER...
A data transmission system includes a storage site information transmitter, an access acceptor, and a password information transmitter. The storage site...
2016/0335442 ESTABLISHING AND USING A TRUST LEVEL IN MOBILE PHONES
Automatically establishing and/or modifying a trust relationship between devices, including mobile devices, in communication, and customizing a user interface...
2016/0335441 SECURITY ENGINE FOR A SECURE OPERATING ENVIRONMENT
The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g.,...
2016/0335440 Transferable Multiparty Computation
A method and apparatus are provided for secure multiparty computation. A set of first parties is selected from a plurality of first parties for computation....
2016/0335439 METHOD AND APPARATUS FOR DETECTING UNSTEADY FLOW IN PROGRAM
Disclosed herein is an apparatus and method for detecting unsteady flow of a program to protect against distribution of malicious codes through vulnerabilities...
2016/0335438 MECHANISMS FOR LOCKING COMPUTING DEVICES
Various systems and methods for locking computing devices are described herein. In an example, a portable device comprises an electro-mechanical lock; and a...
2016/0335437 METHOD AND DEVICE FOR FEATURE EXTRACTION
Provided are a method and device for feature extraction. The method comprises: acquiring a batch of black sample files and white sample files from an...
2016/0335436 Kernel runtime integrity using processor assists
Systems, apparatuses and methods may provide for locating operating system (OS) kernel information and user mode code in physical memory, wherein the kernel...
2016/0335435 AUTOMATIC THREAT DETECTION OF EXECUTABLE FILES BASED ON STATIC DATA ANALYSIS
Aspects of the present disclosure relate to threat detection of executable files. A plurality of static data points may be extracted from an executable file...
2016/0335434 STATIC SECURITY ANALYSIS USING A HYBRID REPRESENTATION OF STRING VALUES
Methods for creating a hybrid string representation include determining string components from input string information that may be represented concretely by...
2016/0335433 INTRUSION DETECTION SYSTEM IN A DEVICE COMPRISING A FIRST OPERATING SYSTEM AND A SECOND OPERATING SYSTEM
Intrusion detection systems dedicated to an operating system, and an intrusion detection system in a device implementing at least a first operating system and...
2016/0335432 Cascading Classifiers For Computer Security Applications
Described systems and methods allow a computer security system to automatically classify target objects using a cascade of trained classifiers, for...
2016/0335431 Method of Securing Non-Native Code
A method to secure a non-native application. The non-native application is processed to obtain an application stub to be triggered within a virtual machine....
2016/0335430 Apparatus and Method for Detecting Buffer Overflow Attack, and Security Protection System
An apparatus and a method for detecting a buffer overflow attack, and a security protection system. The apparatus for detecting a buffer overflow attack...
2016/0335429 Integrity protection of a mandatory access control policy in an operating system using virtual machine...
Systems, apparatuses and methods may provide for conducting a signature verification of a mandatory access control policy and provisioning the mandatory access...
2016/0335428 TERMINAL AND METHOD FOR RELEASING LOCKING STATE OF TERMINAL
Disclosed embodiments relate to a terminal having improved security and a method of releasing a locked state of a terminal. There is provided a terminal,...
2016/0335427 PHYSICAL TOKEN-LESS SECURITY SCREENING USING BIOMETRICS
In physical token-less security screening using biometrics, a person provides biometric data to a security computing device as part of a security screening....
2016/0335426 PERSONAL IDENTIFICATION SYSTEM AND METHOD
The present invention provides a device (10) for facilitating an exchange of personal information between a user and a third party. The device comprises a body...
2016/0335425 CLASSIFIER TRAINING METHOD AND APPARATUS, IDENTITY AUTHENTICATION METHOD AND SYSTEM
Provided is a classifier training method, including: acquiring a training sample set; determining a classification condition at a root node according to a...
2016/0335424 Unlocking Time to Non-Educational Content
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for unlocking time to non-educational tasks on devices. In...
2016/0335423 RESTRICTED ACCESS FOR HOME AUTOMATION SYSTEM
Systems and methods for determining access to a home automation system may include receiving a command from a user to perform a home automation function, and...
2016/0335422 APPARATUS AND METHOD FOR MANAGING UNITY FILE IN A MOBILE PLATFORM
The present invention relates to managing a Unity file in a mobile platform in order to forestall a Unity library executable in a mobile platform from being...
2016/0335421 Information Handling System License Management Through NFC
A portable information handling system having an NFC device obtains identifier information from information handling systems through NFC and applies the...
2016/0335420 Secure Document Management
Systems and methods for controlling access to digital works are described herein, e.g., including receiving a request for a digital work from a requestor;...
2016/0335419 APPARATUS AND METHODS FOR RIGHTS-MANAGED CONTENT AND DATA DELIVERY
Methods and apparatus for providing access to content across a plurality of devices and environments. In one embodiment, a downloadable rights profile is...
2016/0335418 METHOD AND SYSTEM FOR MANAGING STREAM IN HOME MEDIA NETWORK HAVING A HOME GATEWAY AND A PLURALITY OF DEVICES
It is provided a method for managing stream in home media network having home gateway and a plurality of devices comprising; building converged home media...
2016/0335417 MECHANISM AND APPROACH TO LOCK A LICENSE TO A GIVEN LOCALIZATION
An approach and mechanism relative to a license that is forced or locked to a particular localization. Forcing a license of a product to be localized may be...
2016/0335416 Process for Determining the Distillation Characteristics of a Liquid Petroleum Product Containing an Azeotropic...
A process for determining the distillation characteristics of a liquid petroleum product that contains an azeotropic mixture of an oxygenated or ...
2016/0335415 Remote Monitoring and Dynamic Document Management Systems and Methods
Systems, methods, and computer-readable media are disclosed for remote monitoring and dynamic document management. Example methods may include receiving a...
2016/0335414 AUTOMATED PRESCRIPTION WORKFLOW FOR DEVICE MANAGEMENT
Disclosed are some examples of systems, apparatus, methods and storage media for automated device management, and more specifically, for detecting exceptions...
2016/0335413 SYSTEM AND METHOD FOR MINIMALLY INVASIVE THERMAL ABLATION TREATMENT PLANNING
Various embodiments are described herein for a system and a method for treatment planning for providing ablative therapy to a patient. The treatment planning...
2016/0335412 SYSTEMS AND METHODS FOR PREDICTING AND ADJUSTING THE DOSAGE OF MEDICINES IN INDIVIDUAL PATIENTS
The method and system of this invention provides for the use of the Simcyp Simulator to identify the characteristics of a Virtual Twin to a real patient based...
2016/0335411 DEVICE-BASED RISK MANAGEMENT OF A THERAPEUTIC
A risk management system (RMS) device includes a RMS database and a RMS processor. The RMS processor includes a prescriber module to receive a request to...
2016/0335410 System and Method for Monitoring Activities through Portable Devices
A device and system are provided for notifying a user contact of the status of a user of a portable device. The status is determined by the portable device...
2016/0335409 DISTRIBUTED SYSTEM ARCHITECTURE FOR CONTINUOUS GLUCOSE MONITORING
The present disclosure relates to techniques for receiving glucose data from a continuous glucose sensor and controlling the use and redistribution of that...
2016/0335408 SYSTEMS AND METHODS FOR COMMUNICATING ORTHODONTIC TREATMENT INFORMATION
Systems and methods for communicating orthodontic treatment information are disclosed herein. The methods may include methods of delivering an informational...
2016/0335407 APPARATUS AND METHOD FOR SELECTING HEALTHCARE SERVICES
There is provided an apparatus and method for use in selecting healthcare services for a user, the method comprising: providing (101, 201) a database of health...
2016/0335406 SYSTEM AND METHOD FOR SELECTING A BARIATRIC SURGERY
This invention relates to a method and network system for selecting an appropriate bariatric surgery for a patient based upon baseline patient parameters.
2016/0335405 METHOD AND SYSTEM FOR ANALYZING DIGITAL ACTIVITY
A method for determining a user's well-being based on a user's digital activity, the method having the steps of: associating said user with a unique...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.