At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
DATA PROTECTION BASED ON USER AND GESTURE RECOGNITION
A computing device is described herein that automatically enters a data protection mode in response to determining that a certain number of persons are located...
CLIENT COMPUTER FOR UPDATING A DATABASE STORED ON A SERVER VIA A NETWORK
The invention relates to a client computer for updating a first relation in a database stored on a server via a network with an update first data item, the...
SENSOR DATA ANALYSIS FOR A PLURALITY OF USERS
A system for providing sensor data analysis to a plurality of users is disclosed. The system includes comprising an interface for receiving sensor data from a...
TRACING PROCESSING ACTIVITY
A data processing apparatus comprises a processing element having associated memory storage and one or more registers, the processing element being configured...
Fast Data Protection Using Dual File Systems
A computing device is described that utilizes two file systems to enable sensitive data stored thereon to be deleted automatically, quickly, and discretely...
DELETING INFORMATION TO MAINTAIN SECURITY LEVEL
A method, system, mediation server, client, and computer program for deleting a copied file in which a master file is duplicated while maintaining a certain...
Secure Display Element
Techniques for securely displaying sensitive information against attempts to capture such information via screenshots are introduced. Similar to the pieces of...
METHOD FOR REQUESTING A CLOSURE OF A TRACK SECTION AND A CLOSURE
REVOCATION AND ASSEMBLY HAVING A COMMUNICATION...
A method for requesting a closure of a track section and a closure revocation by way of a closure signal sent by a communication device, having a monitor on...
A data processing machine is configured to include one or more buried memory zones that are not intelligibly accessible to user software and to operating...
CONTROLLED ACCESS TO DATA IN A SANDBOXED ENVIRONMENT
Disclosed are various examples of systems and methods for transferring data between applications executing in sandboxed environments. An application executing...
Software Vulnerabilities Detection System and Methods
This invention discloses a system and methods of detecting software vulnerabilities in a computer program. The invention models compiled software to examine...
MOBILE PLATFORM SOFTWARE UPDATE WITH SECURE AUTHENTICATION
Generally, this disclosure describes devices, methods and systems and for securely updating software on a mobile platform using trusted hardware based...
METHOD AND SYSTEM FOR SEARCHING AND KILLING MACRO VIRUS
The present invention discloses a method and system for searching and killing a macro virus, which are applied in an enterprise edition virus searching and...
SYSTEM AND METHOD FOR ENSURING COMPLIANCE WITH ORGANIZATIONAL POLICIES
A method for ensuring compliance with organizational policies is described herein. The method can include the step of monitoring one or more parameters of a...
SYSTEMS AND METHODS FOR DATA DRIVEN MALWARE TASK IDENTIFICATION
Embodiments of a system and method for identifying malware tasks using a controlled environment to run malicious software to generate analysis reports, a...
EVENT ANOMALY ANALYSIS AND PREDICTION
According to an example, event anomaly analysis and prediction may include accessing a master directed graph that specifies known events and transitions...
DEVICE CONTROLLER AND METHOD OF ENFORCING TIME-BASED SECTOR LEVEL SECURITY
A device controller interfaced between an electronic processing device and a sector-based data storage device, includes a processor connected to a clock, and a...
ENHANCED SECURITY OF POWER MANAGEMENT COMMUNICATIONS AND PROTECTION FROM
SIDE CHANNEL ATTACKS
Systems, apparatuses and methods may provide for detecting a request to access a power management register and conducting, via a power management security...
CAPTURING CORRELATIONS BETWEEN ACTIVITY AND NON-ACTIVITY ATTRIBUTES USING
Identifying correlations between events recorded in a computer system log, the recorded events are generated by a plurality of processes executing on the...
Method to Use On-Chip Temperature Sensors for Detection of Trojan Circuits
A method for detecting a malicious circuit on an integrated circuit chip is provided, in which temperature sensors are thermally coupled to primary circuitry...
DETECTION OF MALICIOUS INVOCATION OF APPLICATION PROGRAM INTERFACE CALLS
Particular embodiments described herein provide for an electronic device that includes a binder kernel driver. The binder kernel driver can be configured to...
ACCOUNT AUTHORITY MANAGEMENT DEVICE AND ACCOUNT AUTHORITY MANAGEMENT
METHOD FOR A COMPONENT MOUNTER RELATED...
Names of registered groups are displayed in group name list section 21, and setting contents of authority for each function of a component mounting related...
INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD
In an information processing apparatus 100, a password input block 20 accepts a password for use in user authentification. An authentification block 40...
Authentication System and Car Onboard Control Device
The present invention prevents a maintenance tool for carrying out maintenance work of an electronic control unit (ECU) from being abused by a third person. In...
VERIFICATION METHODS AND VERIFICATION DEVICES
According to various embodiments, a verification method may be provided. The verification method may include: determining a plurality of objects, each object...
SEGMENT PATTERN ENTRY BASED AUTHENTICATION
A system and method to support authentication or device pairing. A respective indication is received from a respective output of each respective contact...
DEVICE CONTROLLER AND METHOD TO FORENSICALLY SECURE ELECTRONIC DATA
A device controller and method to forensically secure a storage device. A device controller, interfaced between a processing device and a storage device,...
SECURE AUTHENTICATION OF USERS OF DEVICES USING TACTILE AND VOICE
SEQUENCING WITH FEEDBACK
A method for securely authenticating users of a device which uses pairings of a verbal passphrase and user interactions. The user interactions may be finger...
SYSTEM, DEVICE, AND METHOD OF VISUAL LOGIN AND STOCHASTIC CRYPTOGRAPHY
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a possible attacker. A log-in...
ENHANCED ALTERNATIVE MULTIFACTOR AUTHENTICATION
Disclosed herein is a system and method for authenticating a user to a second device based on the user's current authentication to a primary device. Through a...
Method and System for Control of Computing Devices
Systems and methods for limiting a user's access to a specific subset of a plurality of software applications installed on a computing device. A method...
Code Obfuscation Device Using Indistinguishable Identifier Conversion And
A code obfuscation device and a method of obfuscating a code of an application program file are disclosed. The code obfuscation device includes an extraction...
METHOD AND APPARATUS FOR LIMITING ACCESS TO DATA BY PROCESS OR COMPUTER
FUNCTION WITH STATELESS ENCRYPTION
Systems and methods related to DRM content usage mechanisms for both online and offline usage of content are disclosed, including systems providing secure...
USER-GENERATED CONTENT PERMISSIONS STATUS ANALYSIS SYSTEM AND METHOD
A method for user-generated content privacy control, including: detecting a trigger event, identifying a post for permissions analysis, determining permissions...
ASSIGNMENT OF A MACHINE-READABLE INK TO CONTENT AS A PAYOFF
Examples disclosed herein relate to assignment of a machine-readable link to content as a payoff. Examples include acquisition of an email message specifying...
Method of security to discourage illegal copying of digital files
containing copyrighted work or works and give...
This invention involves a method of security in which every `filename representing a digital copy of a digital file containing a copyrighted work or works`...
UNIFIED DIGITAL RIGHTS MANAGEMENT FOR HETEROGENOUS COMPUTING PLATFORMS
Embodiments of the present invention provide systems, methods, and computer storage media directed to providing unified digital rights management (DRM) across...
QUANTITATIVE COMPARATIVE ANALYSIS METHOD FOR MOLECULAR ORBITAL
DISTRIBUTION, AND SYSTEM USING SAME
Disclosed herein are a method for quantitatively analyzing a molecular orbital distribution, and a quantitative analysis system of molecular orbital...
INTEGRATED METHOD FOR COLLECTION AND MAINTENANCE OF DETECTABILITY OF A
PLURALITY OF MICROBIOLOGICAL AGENTS IN A...
A method and kit related thereto are described for the collection and maintenance of detectability of a plurality of species of microbiological agents in a...
Generation and Data Management of a Medical Study Using Instruments in an
Integrated Media and Medical System
In general, a computer-implemented method is described for receiving one or more requests to generate a medical study, retrieving from one or more data...
METHODS, SYSTEMS, APPARATUS AND SOFTWARE FOR USE IN ACCEPTANCE AND
Various embodiments of the present disclosure comprise methods, apparatus, systems and software for use in implementing acceptance and commitment therapy...
ARCHITECTURE, SYSTEM AND METHOD FOR DYNAMIC THERAPY AND PROGNOSIS
Embodiments of systems to dynamically provide therapy to user by providing real time streaming of seminars based a therapy schedule, the therapy schedule based...
MEDICATION DISPENSING DEVICE AND METHOD
Devices, systems and methods for monitoring patient adherence to treatment regimens are described herein. In some embodiments, a medication dispensing system...
RADIO FREQUENCY MODULE AND RELATED MANAGEMENT SYSTEM
A radio frequency module coupled to an object is disclosed. The radio frequency module includes an antenna unit, operating in one of a first mode and a second...
MEDICINE PRESCRIPTION SUPPORT METHOD, MEDICINE PRESCRIPTION SUPPORTING
COMPUTER PROGRAM, AND MEDICINE...
A medicine prescription support method in a server which provides information of medicines to a user terminal through a communication network. The server...
MEDICINE PRESCRIPTION SUPPORT METHOD, MEDICINE PRESCRIPTION SUPPORTING
COMPUTER PROGRAM, AND MEDICINE...
A server controls propriety of access to a medicine taking history through a communication network A medicine prescription support method in the server...
METHOD AND SYSTEM FOR ESTIMATION OF EFFECTIVENESS OF A DRUG
Embodiments of the present disclosure relates to a method for estimation of effectiveness of a drug to be administered on a subject. The method comprises steps...
System and Method for Data Analyzing of Health-Related Data
A data analyzing system for analyzing health-related data of a patient is provided. The system includes a data repository configured to store a semantic...
SYSTEMS AND METHODS FOR REPORTING AND DISPLAYING BLOOD FLOW
Embodiments include a system for displays cardiovascular information for a patient. The system may include at least one computer system configured to receive...
METHOD AND SYSTEM FOR IMAGE PROCESSING AND PATIENT-SPECIFIC MODELING OF
Embodiments include a system for determining cardiovascular information for a patient. The system may include at least one computer system configured to...