Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0350549 IMPLEMENTING ACCESS CONTROL BY SYSTEM-ON-CHIP
Systems and methods for implementing access control by systems-on-chip (SoCs). An example SoC may comprise: an access control unit comprising a secure memory...
2016/0350548 UNLOCKING A PORTABLE ELECTRONIC DEVICE BY PERFORMING MULTIPLE ACTIONS ON AN UNLOCK INTERFACE
The disclosure provided herein includes a multi-step authentication process to unlock a portable electronic device. To unlock the device, a user can use a...
2016/0350547 SYSTEMS AND METHODS FOR ELECTRONIC TICKET MANAGEMENT
A computer system according to certain aspects uses past ticket usage data indicating a probability that a respective entity would personally use a ticket...
2016/0350546 SYSTEM AND METHOD FOR MONITORING ENCRYPTED DATA AND PREVENTING MASSIVE DECRYPTION THEREOF
The present invention is a system for monitoring encrypted data and preventing the encrypted data from being decrypted in large quantities, the system...
2016/0350545 TRANS-LOCALITY BASED FIXED STORAGE SECURITY
Embodiments of the present invention provide a method, system and computer program product for trans-locality based fixed storage security. In an embodiment of...
2016/0350544 Methods And Apparatus For Sharing Encrypted Data
A method for sharing encrypted data and encryption keys through a system comprised of the following data types, but not limited to a; 1) Record and its...
2016/0350543 ELECTRONIC DEVICE AND METHOD OF ACCESSING KERNEL DATA
A method for an electronic device to access kernel data is provided. The method includes transmitting data associated with a kernel symbol to a secure world...
2016/0350542 SECURITY WITH RESPECT TO MANAGING A SHARED POOL OF CONFIGURABLE COMPUTING RESOURCES
Disclosed aspects include management of a shared pool of configurable computing resources having a first region and a second region. Using an analysis...
2016/0350541 SYSTEMS AND METHODS FOR IDENTIFYING ILLEGITIMATE ACCOUNTS BASED ON CLUSTERING
Systems, methods, and non-transitory computer-readable media can acquire a plurality of accounts associated with a set of features. Each account in the...
2016/0350540 METHOD AND SYSTEM FOR SAFEGUARDING DATABASE RELATIONS AGAINST UNAUTHORIZED ACCESS
A method is provided for safeguarding values of attributes of a data record that can be stored in a first relational database against unauthorized access,...
2016/0350539 METHOD FOR ENFORCING ENDPOINT HEALTH STANDARDS
An approach for enforcing standards regarding security vulnerabilities for an endpoint user device associated with a user includes collecting, at an inline...
2016/0350538 EMBEDDED CONTROLLER FOR SAFETY BOOTING AND METHOD THEREOF
A safety booting method for an embedded controller is applied in a laptop. The embedded controller is installed in the laptop, and the laptop includes a...
2016/0350537 CENTRAL PROCESSING UNIT AND METHOD TO VERIFY MAINBOARD DATA
Provided is a Central Processing Unit (CPU) and a method to verify mainboard data. The CPU comprises: an on-die Read-Only Memory (ROM) for storing trusted root...
2016/0350536 BOOT CONTROL SYSTEMS AND METHODS FOR VEHICLES
A hardware security module (HSM) transitions a first signal from a first state to a second state and transitions a second signal from a first state to a second...
2016/0350535 VIRTUAL MACHINE IMAGE ENCRYPTION
Embodiments of the present disclosure include systems and methods for encrypting a virtual machine image and accessing an encrypted virtual machine image....
2016/0350534 SYSTEM, APPARATUS AND METHOD FOR CONTROLLING MULTIPLE TRUSTED EXECUTION ENVIRONMENTS IN A SYSTEM
In an embodiment, a system is adapted to: record at least one measurement of a virtual trusted execution environment in a storage of the system and generate a...
2016/0350533 REDUCING DELAYS ASSOCIATED WITH RESTORING QUARANTINED FILES
A method to reduce delays associated with restoring quarantined files is disclosed. In one embodiment, such a method includes maintaining, for a file, a...
2016/0350532 RECURRENT NEURAL NETWORKS FOR MALWARE ANALYSIS
Using a recurrent neural network (RNN) that has been trained to a satisfactory level of performance, highly discriminative features can be extracted by running...
2016/0350531 THREAT DETECTION USING REPUTATION DATA
Threat detection is improved by monitoring variations in observable events and correlating these variations to malicious activity. The disclosed techniques can...
2016/0350530 DATA BLACKHOLE PROCESSING METHOD BASED ON MOBILE STORAGE DEVICE, AND MOBILE STORAGE DEVICE
A data blackhole processing method based on a mobile storage device, comprising: a computing device deploying a data blackhole system, causing the computing...
2016/0350529 METHOD FOR VALIDATING DYNAMICALLY LOADED LIBRARIES USING TEAM IDENTIFIERS
According to one embodiment, in response to a request received from an application by a launch module hosted by an operating system and executed by a processor...
2016/0350528 PASSWORD CHECK BY DECOMPOSING PASSWORD
A proposed password is decomposed into basic components to determine and score transitions between the basic components and create a password score that...
2016/0350527 Password Creating Method And Device
A password creating device and method is provided. In this method, two keyboard layouts are employed. Each key location of each layout is mapped onto an...
2016/0350526 3D PRINTER UNLOCK SYSTEM
A processor chip circuit emulates an original equipment manufacturer (OEM) EEPROM on a replaceable consumable for a 3D printer to circumvent an OEM electronic...
2016/0350525 Application Program Management Method, Device, Terminal, and Computer Storage Medium
Disclosed in an embodiment of the present document are an application program management method and an application program management device, a terminal and a...
2016/0350524 METHOD AND DEVICE FOR SECURING AN OBJECT, CORRESPONDING CONTROL METHOD AND DEVICE AND SECURED OBJECT
A device to secure an object receives a digital file representing a photograph as an input. The photogram represents at least one portion of the object. An...
2016/0350523 SHORT-RANGE COMMUNICATION DEVICE, FUNCTION CONTROL METHOD AND FUNCTION CONTROL SYSTEM
A wearable module is a device capable of performing short-range communication with a mobile device. A functional section executes a function which can be...
2016/0350522 MOBILE TERMINAL AND CONTROL METHOD FOR THE MOBILE TERMINAL
A mobile terminal including a touch screen configured to display screen information; and a controller configured to in response to a preset touch applied to...
2016/0350521 SECONDARY SECURITY AUTHORITY
Techniques to facilitate protecting control programs used in an industrial automation environment are disclosed herein. In at least one implementation, control...
2016/0350520 Diversifying Control Flow of White-Box Implementation
A non-transitory machine-readable storage medium encoded with instructions for execution by a keyed cryptographic operation by a cryptographic system mapping...
2016/0350519 THREAT-MONITORING SYSTEMS AND RELATED METHODS
Disclosed herein are methods, devices, systems and computer-executable instructions for managing software in threat-monitoring systems. One such method...
2016/0350518 Method for verifying web system license based on multi-way tree search
A web system license based on multi-way tree search includes steps of: identifying a requiring URL of each function; using the requiring URL of the function as...
2016/0350517 PC Secure Video Path
A system and method are disclosed for creating a secure video content path, or a protected media content bus, within an unsecure personal computer. A portable...
2016/0350516 METHODS AND APPARATUSES FOR DIGITAL CONTENT PROTECTION
A method for digital content protection comprises generating a plurality of frame keys, retrieving a plurality of frames from digital content, and at least one...
2016/0350515 METHOD, SYSTEM AND ELECTRONIC DEVICE FOR DIET MANAGEMENT
An electronic device, a system and a method for diet management based on image analysis are provided. The system includes a computer and a database. The...
2016/0350514 METHOD AND SYSTEM FOR CAPTURING FOOD CONSUMPTION INFORMATION OF A USER
A method and system for capturing food consumption information of a user is provided. The method includes automatically triggering one or more input means to...
2016/0350513 INFUSION PUMP SYSTEM AND METHOD WITH MULTIPLE DRUG LIBRARY EDITOR SOURCE CAPABILITY
An infusion pump system and method with multiple drug library editor source capability including: an infusion pump system having a first drug library editor...
2016/0350512 INFUSION PUMP WITH GRAPHIC USER INTERFACE
The present invention relates to an infusion pump (10) having a control unit (5) and a graphical user interface (3) functionally connected to the controller...
2016/0350511 Method of Improving Patient Medication Compliance
A method of improving compliance between a patient and a care provider is implemented by an electronic alert device, where the electronic alert device is...
2016/0350510 METHODS AND SYSTEMS FOR DELIVERING PREVENTATIVE URGENT CARE ON DEMAND USING WEB-BASED RESOURCES INCLUDING...
Preventive urgent healthcare services utilizing web-based resources for medical approval and particularly, a preemptive medical kit prescribed in advance of...
2016/0350509 Personalized Pain Management Treatments
Systems and methods disclosed herein provide efficacious pain management therapies based on delivery of physical medicine(s) via computer-implemented systems....
2016/0350508 RECOMMENDING AVAILABLE MEDICATION BASED ON SYMPTOMS
Medication can be recommended by a computer system that receives symptoms and can access available medications. A profile for the symptoms is used to determine...
2016/0350507 GEOGRAPHICALLY SMOOTHED DEMOGRAPHIC CARTOGRAMS AND CARTOGRAM SERVER
A contiguous cartogram is distorted proportionally to demographic data associated with geographical areas. The cartogram is associated with an underlying data...
2016/0350506 SYSTEMS AND METHODS TO MODEL AND MEASURE JOINT DISORDER TREATMENT EFFICACY
Computer implemented methods and systems for determining a probability of one or more outcomes of a therapeutic treatment of a patient having a musculoskeletal...
2016/0350505 PERSONALIZED LIFESTYLE MODELING DEVICE AND METHOD
The present invention relates to an apparatus and a method of modeling a personalized lifestyle which include collecting a lifelog, extracting an individual...
2016/0350504 DEVICE CONNECTIVITY ENGINE
An example medical device includes a physiological measurement device and a computing device. The computing device includes a device management engine and a...
2016/0350503 MEDICAL IMAGE DISPLAY APPARATUS AND METHOD OF PROVIDING USER INTERFACE
A medical image display apparatus including a touch screen configured to display a medical image and receive input from a user; and a controller configured to...
2016/0350502 METHOD FOR PROVIDING DISEASE CO-OCCURRENCE PROBABILITY FROM DISEASE NETWORK
Disclosed is a method of providing a disease co-occurrence probability including (a) receiving a disease network in which respective diseases are shown as...
2016/0350501 METHOD AND A SYSTEM FOR ESTIMATION OF MEDICAL BILLING CODES AND PATIENT FINANCIAL RESPONSIBILITY
A system and method for estimating medical billing codes and patient's financial responsibility for the services availed or to be availed by patients from...
2016/0350500 Global Healthcare Exchange
A system for rendering and controlling healthcare through a network, the system having a mechanism possessing a cloud intelligence for instructing a mechanism...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.