Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0357989 Page Substitution Verification Preparation
A system and method are disclosed for rendering published documents tamper evident. Embodiments render classes of documents tamper evident with cryptographic...
2016/0357988 SECURE MANAGEMENT OF OPERATIONS ON PROTECTED VIRTUAL MACHINES
A virtual secure mode is enabled for a virtual machine operating in a computing environment that is associated with a plurality of different trust levels....
2016/0357987 DIGITAL DEVICE AND SPEECH TO TEXT CONVERSION PROCESSING METHOD THEREOF
Disclosed in the present specification are a digital device and a speech to text conversion processing method thereof. The digital device and the speech to...
2016/0357986 METHOD AND APPARATUS FOR PROVIDING SECURE IMAGE ENCRYPTION AND DECRYPTION
Methods, non-transitory computer readable media and apparatuses for decrypting an image are disclosed. For example, a method captures a portion of an encrypted...
2016/0357985 METHODS AND SYSTEMS FOR REGULATING USER ENGAGEMENT
Methods and systems are provided for regulating interaction with respect to an object in a database. One exemplary method involves creating an engagement...
2016/0357984 HIERARCHICAL PERMISSIONS MODEL WITHIN A DOCUMENT
Case management systems and techniques are disclosed. In various embodiments, a hierarchical document permission model is received, the model describing a...
2016/0357983 STORAGE VOLUME PROTECTION USING RESTRICTED RESOURCE CLASSES
Techniques for restricting access to a storage volume attached to a data processing system are described. In one embodiment, a storage management and access...
2016/0357982 MAPPING PROCESS CHANGES
In one implementation, a computer-implemented method includes receiving a request to run a particular process; determining whether the particular process is to...
2016/0357981 LIMITED-ACCESS FUNCTIONALITY ACCESSIBLE AT LOGIN SCREEN
Techniques and technologies for providing limited-access functionality accessible at a "login screen" (or "lock screen") of a device are described. In at least...
2016/0357980 SECURE STORAGE AND SHARING OF DATA BY HYBRID ENCRYPTION USING PREDEFINED SCHEMA
The claimed subject matter includes techniques for storing, retrieving and sharing files. An example system includes a key generator module to generate a...
2016/0357979 SECURE STORAGE FOR SHARED DOCUMENTS
Embodiments are directed towards managing data storage for secure storage of shared documents. A user or an application may provide data destined for...
2016/0357978 PROTECTING DATA FILES
Protecting data files is disclosed, including: in response to an indication that a data file has been generated by a client device, determining a security...
2016/0357977 CONTENT MANAGEMENT SYSTEM, CONTENT MANAGEMENT SERVER AND MANAGEMENT PROGRAM FOR SERVER, CLIENT TERMINAL AND...
A content management system including a content management server and a client terminal connected to the content management server via a communication network,...
2016/0357976 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
An information processing apparatus includes a determination unit, a first acquisition unit, and a controller. The determination unit receives, from a first...
2016/0357975 METHOD FOR ENCRYPTING ON-SCREEN CONTENTS, ELECTRONIC APPARATUS USING THE METHOD AND RECORDING MEDIUM USING THE...
A method for encrypting on-screen contents, an electronic apparatus using the method, and a recording medium using the method are provided. The method is...
2016/0357974 INTELLIGENT KEY SELECTION AND GENERATION
A method, computer program product, and system for selecting and generating a key to perform a cryptographic operation are described. The method includes...
2016/0357973 METHOD AND APPARATUS FOR SECURING COMPUTER MASS STORAGE DATA
In general, embodiments of the invention include methods and apparatuses for securely storing computer system data. Embodiments of the invention encrypt and...
2016/0357972 Encrypted File Storage
Various systems facilitate encrypted file storage. A client device may generate an encrypted version of a file. The client device may obtain at least one...
2016/0357971 PARALLEL AND HIERARCHICAL PASSWORD PROTECTION ON SPECIFIC DOCUMENT SECTIONS
The present disclosure involves systems and computer implemented methods for protecting portions of electronic documents. An example method includes receiving...
2016/0357970 ELECTRONIC PERSONAL ASSISTANT PRIVACY
A method comprises receiving a first user communication, accessing a directory entry associated with the user, accessing, by a processor, a database stored in...
2016/0357969 REMEDIATION OF SECURITY VULNERABILITIES IN COMPUTER SOFTWARE
Processing a downgrader specification by constructing a set of candidate downgrader placement locations found within a computer software application, where...
2016/0357968 SECURITY HARDENING OF VIRTUAL MACHINES AT TIME OF CREATION
In a computer-implemented method for security hardening of a virtual machine at time of creation, creation of a virtual machine hosted by a pre-configured...
2016/0357967 PROCESS RISK CLASSIFICATION
In one implementation, a computer-implemented method includes receiving, at a process risk classifier running on a computer system, a request to determine a...
2016/0357966 DETECTION AND PREVENTION FOR MALICIOUS THREATS
A method of identifying one or more malicious threats in a computing device. The device comprises monitoring a plurality of events occurring on a computing...
2016/0357965 AUTOMATIC CLUSTERING OF MALWARE VARIANTS BASED ON STRUCTURED CONTROL FLOW
A computer network computer server device accesses software from a file. The device builds a structured flow control that maps the software's execution paths....
2016/0357964 PROCESS CATEGORIZATION USING CROWDSOURCING
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for categorizing a process using crowdsourcing are...
2016/0357963 PROTECTING A SECURE BOOT PROCESS AGAINST SIDE CHANNEL ATTACKS
Embodiments of an invention for protecting a secure boot process against side channel attacks are disclosed. In one embodiment, an apparatus includes...
2016/0357962 DE-OBFUSCATING SCRIPTED LANGUAGE FOR NETWORK INTRUSION DETECTION USING A REGULAR EXPRESSION SIGNATURE
A device receives data, identifies a context associated with the data, and identifies a script, within the data, associated with the context. The device parses...
2016/0357961 SECURITY RISK-BASED RESOURCE ALLOCATION
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for allocating resources to processes based on security...
2016/0357960 COMPUTER-READABLE STORAGE MEDIUM, ABNORMALITY DETECTION DEVICE, AND ABNORMALITY DETECTION METHOD
A computer-readable medium which stores an abnormality detection program causes a computer to execute processes including detecting, when a work corresponding...
2016/0357959 Location-Based Configuration Profile Toggling
Location-based configuration profile toggling may be provided. Configuration profiles associated with user devices may be identified, determinations of whether...
2016/0357958 Computer System Security
A security system monitors a computer system for process events to perform verification related to the event. A thread related to an event is identified and a...
2016/0357957 SYSTEM AND METHOD OF DETERMINING MALICIOUS PROCESSES
Systems, methods, and computer-readable media for managing compromised sensors in multi-tiered virtualized environments. A method includes determining a...
2016/0357956 AUTOMATICALLY ALTERING AND ENCRYPTING PASSWORDS IN SYSTEMS
In an approach for changing a password. Aspects of an embodiment of the present invention include an approach for changing a password, wherein the approach...
2016/0357955 AUTOMATIC ROTATION AND STORAGE OF SECURITY CREDENTIALS
A system and method for a credentials agent that automatically rotates and stores security credentials to be used at least in part to authenticate calling...
2016/0357954 METHOD FOR CONTROLLING ACCESS TO A PRODUCTION SYSTEM OF A COMPUTER SYSTEM NOT CONNECTED TO AN INFORMATION...
A method (M) for controlling access to a production system (SIP) of a computer system not connected to an information system (SIC), includes: A) an initial...
2016/0357953 DECENTRALIZED INFORMATION FLOW SECURING METHOD AND SYSTEM FOR MULTILEVEL SECURITY AND PRIVACY DOMAINS
The present invention discloses a method for securing information flow in an information system. The method comprises intercepting access requests to...
2016/0357952 VERIFICATION OF A PATTERN BASED PASSCODE
A method and system for verification of a pattern based passcode. A user input of a series of key inputs is received. A registered pattern for the user of a...
2016/0357951 DEVICE ACTIVATION
The embodiments set forth systems and techniques to activate and provide other device services for user devices. An activation manager is configured to...
2016/0357950 METHODS FOR CONFIGURING SECURITY RESTRICTIONS OF A DATA PROCESSING SYSTEM
According to one embodiment, a security manager of a first operating system executed by a processor of a data processing system receives a request received...
2016/0357949 AVAILABILITY OF PERMISSION MODELS IN ROAMING ENVIRONMENTS
A request for a digital license associated with a software product is received from a device. The request includes a user ID of a user of the device, with the...
2016/0357948 INFORMATION PROCESSING DEVICE AND MANAGEMENT METHOD
A method includes changing, by a first device included in a plurality of devices, a mode of the first device to a mode in which management of the license is to...
2016/0357947 PROTECTING CONTENT DISPLAYED ON A MOBILE DEVICE
A method, computer program product and system for protecting content includes a mobile device screen including a plurality of pixels, whereby each of the...
2016/0357946 SYSTEMS AND METHODS OF TRANSFORMING ELECTRONIC CONTENT
Exemplary embodiments are directed to systems and methods of transforming electronic content. Exemplary embodiments can electronically capture or receive a...
2016/0357945 METHODS AND SYSTEMS FOR ORGANIC SOLUTE SAMPLING OF AQUEOUS AND HETEROGENEOUS ENVIRONMENTS
Provided are computer implemented methods for organic solute sampling in aqueous and heterogeneous environments using oscillating chemical potentials in Grand...
2016/0357944 METHOD AND APPARATUS FOR VIRTUAL CLINICAL TRIAL SELF-RECRUITMENT MARKETPLACE FOR PATIENTS BASED ON BEHAVIORAL...
Method, Apparatus and non-transitory computer readable media that enhance patient-recruitment and participation in clinical trials preferably includes...
2016/0357943 PHYSIOLOGICAL IMAGERY GENERATOR SYSTEM AND METHOD
A system and method that generates a physiological imagery of one or more parts of a patient's body are provided. The system and method combine one or more...
2016/0357942 SYSTEMS AND METHODS FOR PROVIDING MEAL PLANS
A system ingests the purchases of a user at various retail outlets and are analyzed to characterize a user's taste profile as well as the complexity and effort...
2016/0357941 SYSTEMS AND METHODS FOR PROVIDING MEAL PLANS
A system ingests the purchases of a user at various retail outlets and are analyzed to characterize a user's taste profile as well as the complexity and effort...
2016/0357940 Systems and Methods for Connected Dispensing and Storage
Aspects of the present invention relate to a container for selective dispensing of a contained substance. Some aspects relate to wireless communication...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.