Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0371504 DATA PROTECTION BASED ON USER AND GESTURE RECOGNITION
A computing device is described herein that automatically enters a data protection mode in response to determining that a certain number of persons are located...
2016/0371503 CLIENT COMPUTER FOR UPDATING A DATABASE STORED ON A SERVER VIA A NETWORK
The invention relates to a client computer for updating a first relation in a database stored on a server via a network with an update first data item, the...
2016/0371502 SENSOR DATA ANALYSIS FOR A PLURALITY OF USERS
A system for providing sensor data analysis to a plurality of users is disclosed. The system includes comprising an interface for receiving sensor data from a...
2016/0371501 TRACING PROCESSING ACTIVITY
A data processing apparatus comprises a processing element having associated memory storage and one or more registers, the processing element being configured...
2016/0371500 Fast Data Protection Using Dual File Systems
A computing device is described that utilizes two file systems to enable sensitive data stored thereon to be deleted automatically, quickly, and discretely...
2016/0371499 DELETING INFORMATION TO MAINTAIN SECURITY LEVEL
A method, system, mediation server, client, and computer program for deleting a copied file in which a master file is duplicated while maintaining a certain...
2016/0371498 Secure Display Element
Techniques for securely displaying sensitive information against attempts to capture such information via screenshots are introduced. Similar to the pieces of...
2016/0371497 METHOD FOR REQUESTING A CLOSURE OF A TRACK SECTION AND A CLOSURE REVOCATION AND ASSEMBLY HAVING A COMMUNICATION...
A method for requesting a closure of a track section and a closure revocation by way of a closure signal sent by a communication device, having a monitor on...
2016/0371496 PROTECTED REGIONS
A data processing machine is configured to include one or more buried memory zones that are not intelligibly accessible to user software and to operating...
2016/0371495 CONTROLLED ACCESS TO DATA IN A SANDBOXED ENVIRONMENT
Disclosed are various examples of systems and methods for transferring data between applications executing in sandboxed environments. An application executing...
2016/0371494 Software Vulnerabilities Detection System and Methods
This invention discloses a system and methods of detecting software vulnerabilities in a computer program. The invention models compiled software to examine...
2016/0371493 MOBILE PLATFORM SOFTWARE UPDATE WITH SECURE AUTHENTICATION
Generally, this disclosure describes devices, methods and systems and for securely updating software on a mobile platform using trusted hardware based...
2016/0371492 METHOD AND SYSTEM FOR SEARCHING AND KILLING MACRO VIRUS
The present invention discloses a method and system for searching and killing a macro virus, which are applied in an enterprise edition virus searching and...
2016/0371491 SYSTEM AND METHOD FOR ENSURING COMPLIANCE WITH ORGANIZATIONAL POLICIES
A method for ensuring compliance with organizational policies is described herein. The method can include the step of monitoring one or more parameters of a...
2016/0371490 SYSTEMS AND METHODS FOR DATA DRIVEN MALWARE TASK IDENTIFICATION
Embodiments of a system and method for identifying malware tasks using a controlled environment to run malicious software to generate analysis reports, a...
2016/0371489 EVENT ANOMALY ANALYSIS AND PREDICTION
According to an example, event anomaly analysis and prediction may include accessing a master directed graph that specifies known events and transitions...
2016/0371488 DEVICE CONTROLLER AND METHOD OF ENFORCING TIME-BASED SECTOR LEVEL SECURITY
A device controller interfaced between an electronic processing device and a sector-based data storage device, includes a processor connected to a clock, and a...
2016/0371487 ENHANCED SECURITY OF POWER MANAGEMENT COMMUNICATIONS AND PROTECTION FROM SIDE CHANNEL ATTACKS
Systems, apparatuses and methods may provide for detecting a request to access a power management register and conducting, via a power management security...
2016/0371486 CAPTURING CORRELATIONS BETWEEN ACTIVITY AND NON-ACTIVITY ATTRIBUTES USING N-GRAMS
Identifying correlations between events recorded in a computer system log, the recorded events are generated by a plurality of processes executing on the...
2016/0371485 Method to Use On-Chip Temperature Sensors for Detection of Trojan Circuits
A method for detecting a malicious circuit on an integrated circuit chip is provided, in which temperature sensors are thermally coupled to primary circuitry...
2016/0371484 DETECTION OF MALICIOUS INVOCATION OF APPLICATION PROGRAM INTERFACE CALLS
Particular embodiments described herein provide for an electronic device that includes a binder kernel driver. The binder kernel driver can be configured to...
2016/0371483 ACCOUNT AUTHORITY MANAGEMENT DEVICE AND ACCOUNT AUTHORITY MANAGEMENT METHOD FOR A COMPONENT MOUNTER RELATED...
Names of registered groups are displayed in group name list section 21, and setting contents of authority for each function of a component mounting related...
2016/0371482 INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD
In an information processing apparatus 100, a password input block 20 accepts a password for use in user authentification. An authentification block 40...
2016/0371481 Authentication System and Car Onboard Control Device
The present invention prevents a maintenance tool for carrying out maintenance work of an electronic control unit (ECU) from being abused by a third person. In...
2016/0371480 VERIFICATION METHODS AND VERIFICATION DEVICES
According to various embodiments, a verification method may be provided. The verification method may include: determining a plurality of objects, each object...
2016/0371479 SEGMENT PATTERN ENTRY BASED AUTHENTICATION
A system and method to support authentication or device pairing. A respective indication is received from a respective output of each respective contact...
2016/0371478 DEVICE CONTROLLER AND METHOD TO FORENSICALLY SECURE ELECTRONIC DATA STORAGE DEVICE
A device controller and method to forensically secure a storage device. A device controller, interfaced between a processing device and a storage device,...
2016/0371477 SECURE AUTHENTICATION OF USERS OF DEVICES USING TACTILE AND VOICE SEQUENCING WITH FEEDBACK
A method for securely authenticating users of a device which uses pairings of a verbal passphrase and user interactions. The user interactions may be finger...
2016/0371476 SYSTEM, DEVICE, AND METHOD OF VISUAL LOGIN AND STOCHASTIC CRYPTOGRAPHY
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a possible attacker. A log-in...
2016/0371475 ENHANCED ALTERNATIVE MULTIFACTOR AUTHENTICATION
Disclosed herein is a system and method for authenticating a user to a second device based on the user's current authentication to a primary device. Through a...
2016/0371474 Method and System for Control of Computing Devices
Systems and methods for limiting a user's access to a specific subset of a plurality of software applications installed on a computing device. A method...
2016/0371473 Code Obfuscation Device Using Indistinguishable Identifier Conversion And Method Thereof
A code obfuscation device and a method of obfuscating a code of an application program file are disclosed. The code obfuscation device includes an extraction...
2016/0371472 METHOD AND APPARATUS FOR LIMITING ACCESS TO DATA BY PROCESS OR COMPUTER FUNCTION WITH STATELESS ENCRYPTION
Systems and methods related to DRM content usage mechanisms for both online and offline usage of content are disclosed, including systems providing secure...
2016/0371471 USER-GENERATED CONTENT PERMISSIONS STATUS ANALYSIS SYSTEM AND METHOD
A method for user-generated content privacy control, including: detecting a trigger event, identifying a post for permissions analysis, determining permissions...
2016/0371470 ASSIGNMENT OF A MACHINE-READABLE INK TO CONTENT AS A PAYOFF
Examples disclosed herein relate to assignment of a machine-readable link to content as a payoff. Examples include acquisition of an email message specifying...
2016/0371469 Method of security to discourage illegal copying of digital files containing copyrighted work or works and give...
This invention involves a method of security in which every `filename representing a digital copy of a digital file containing a copyrighted work or works`...
2016/0371468 UNIFIED DIGITAL RIGHTS MANAGEMENT FOR HETEROGENOUS COMPUTING PLATFORMS
Embodiments of the present invention provide systems, methods, and computer storage media directed to providing unified digital rights management (DRM) across...
2016/0371467 QUANTITATIVE COMPARATIVE ANALYSIS METHOD FOR MOLECULAR ORBITAL DISTRIBUTION, AND SYSTEM USING SAME
Disclosed herein are a method for quantitatively analyzing a molecular orbital distribution, and a quantitative analysis system of molecular orbital...
2016/0371466 INTEGRATED METHOD FOR COLLECTION AND MAINTENANCE OF DETECTABILITY OF A PLURALITY OF MICROBIOLOGICAL AGENTS IN A...
A method and kit related thereto are described for the collection and maintenance of detectability of a plurality of species of microbiological agents in a...
2016/0371465 Generation and Data Management of a Medical Study Using Instruments in an Integrated Media and Medical System
In general, a computer-implemented method is described for receiving one or more requests to generate a medical study, retrieving from one or more data...
2016/0371464 METHODS, SYSTEMS, APPARATUS AND SOFTWARE FOR USE IN ACCEPTANCE AND COMMITMENT THERAPY
Various embodiments of the present disclosure comprise methods, apparatus, systems and software for use in implementing acceptance and commitment therapy...
2016/0371463 ARCHITECTURE, SYSTEM AND METHOD FOR DYNAMIC THERAPY AND PROGNOSIS
Embodiments of systems to dynamically provide therapy to user by providing real time streaming of seminars based a therapy schedule, the therapy schedule based...
2016/0371462 MEDICATION DISPENSING DEVICE AND METHOD
Devices, systems and methods for monitoring patient adherence to treatment regimens are described herein. In some embodiments, a medication dispensing system...
2016/0371461 RADIO FREQUENCY MODULE AND RELATED MANAGEMENT SYSTEM
A radio frequency module coupled to an object is disclosed. The radio frequency module includes an antenna unit, operating in one of a first mode and a second...
2016/0371460 MEDICINE PRESCRIPTION SUPPORT METHOD, MEDICINE PRESCRIPTION SUPPORTING COMPUTER PROGRAM, AND MEDICINE...
A medicine prescription support method in a server which provides information of medicines to a user terminal through a communication network. The server...
2016/0371459 MEDICINE PRESCRIPTION SUPPORT METHOD, MEDICINE PRESCRIPTION SUPPORTING COMPUTER PROGRAM, AND MEDICINE...
A server controls propriety of access to a medicine taking history through a communication network A medicine prescription support method in the server...
2016/0371458 METHOD AND SYSTEM FOR ESTIMATION OF EFFECTIVENESS OF A DRUG
Embodiments of the present disclosure relates to a method for estimation of effectiveness of a drug to be administered on a subject. The method comprises steps...
2016/0371457 System and Method for Data Analyzing of Health-Related Data
A data analyzing system for analyzing health-related data of a patient is provided. The system includes a data repository configured to store a semantic...
2016/0371456 SYSTEMS AND METHODS FOR REPORTING AND DISPLAYING BLOOD FLOW CHARACTERISTICS
Embodiments include a system for displays cardiovascular information for a patient. The system may include at least one computer system configured to receive...
2016/0371455 METHOD AND SYSTEM FOR IMAGE PROCESSING AND PATIENT-SPECIFIC MODELING OF BLOOD FLOW
Embodiments include a system for determining cardiovascular information for a patient. The system may include at least one computer system configured to...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.