Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0379007 Multi-Layered Metadata Management System
A metadata layer management system is presented. Layers of metadata objects can be constructed where each metadata layer object comprises a rights policy. As...
2016/0379006 UICCs EMBEDDED IN TERMINALS OR REMOVABLE THEREFROM
The invention proposes several improvements related to the management of secure elements, like UICCs embedding Sim applications, these secure elements being...
2016/0379005 SYSTEMS AND METHODS FOR SECURING DATA IN MOTION
The systems and methods of the present invention provide a solution that makes data provably secure and accessible--addressing data security at the bit...
2016/0379004 SEMICONDUCTOR DEVICE
Provided are semiconductor devices. A semiconductor device includes processors performing an operation using data stored in a memory; and a memory protector...
2016/0379003 PROTECTION OF SENSITIVE DATA
Particular embodiments described herein provide for an electronic device that can be configured to monitor access to data in a secured area of memory at a...
2016/0379002 Catalog-Based User Authorization to Access to Multiple Applications
Embodiments manage user authorization to access multiple grouped software applications, via a catalog mechanism. Functionality of related software is divided...
2016/0379001 Role Analyzer and Optimizer in Database Systems
Particular embodiments provide a system that analyzes and optimizes roles and authorizations for users of a customer. The system determines which executables...
2016/0379000 DYNAMICALLY MEASURING THE INTEGRITY OF A COMPUTING APPARATUS
The present disclosure includes methods and systems for measuring the integrity of a device. A number of embodiments can include initiating an observatory in a...
2016/0378999 DYNAMIC CONTENT REDACTION
Dynamic content redaction though the generation of redaction schemas associated with document, image, media, or other data files is described. A redaction...
2016/0378998 SYSTEM CONFIGURATIONS FOR ENCRYPTION OF CONTEST DATA PARTS
A method for organizing a secure multi-participant online contest is disclosed. The method includes creating encrypted contest data parts with a set of...
2016/0378997 IMAGE FORMING APPARATUS, METHOD FOR WRITING DATA THEREOF, AND NON-TRANSITORY COMPUTER READABLE RECORDING MEDIUM
An image forming apparatus includes a function unit configured to perform a predetermined function, a volatile memory configured to store data which is...
2016/0378996 ESTABLISHING HARDWARE ROOTS OF TRUST FOR INTERNET-OF-THINGS DEVICES
An Internet-of-Things (IoT) device platform to communicate in a trusted portion of an IoT network is disclosed. The trusted IoT platform can include a secure...
2016/0378995 STATIC SECURITY ANALYSIS USING A HYBRID REPRESENTATION OF STRING VALUES
A hybrid string constructor includes a database configured to store a set of known concretizations. A processor is configured to compare the one or more string...
2016/0378994 SYSTEMS AND METHODS OF RISK BASED RULES FOR APPLICATION CONTROL
In various embodiments, an agent on a digital device may comprise a monitor module, an application identification module, a vulnerability module, a rules...
2016/0378993 SYSTEMS FOR DIAGNOSING AND TRACKING PRODUCT VULNERABILITIES
Systems and methods for tracking telecom computing device vulnerabilities. The system includes a database storing a plurality of entries that describe security...
2016/0378992 AUTHENTICATION SYSTEM AND METHOD
An example method includes receiving an indication of a first level of authentication for an electronic device, the first authentication being associated with...
2016/0378991 SYSTEM AND METHOD FOR REGAINING OPERATIONAL CONTROL OF COMPROMISED REMOTE SERVERS
An apparatus is described herein. The apparatus includes a secure enclave, and the secure enclave comprises a scanning mechanism and a reboot mechanism. The...
2016/0378990 VALIDATING FIRMWARE ON A COMPUTING DEVICE
For validating computing device firmware, systems, apparatus, and methods are disclosed. The apparatus includes a processor, and a memory that stores code...
2016/0378989 APPARATUS AND METHOD FOR MONITORING ANDROID PLATFORM-BASED APPLICATION
An apparatus and method for monitoring an Android platform-based application. The apparatus for monitoring an Android platform-based application includes a...
2016/0378988 ANTI-RANSOMWARE
According to an aspect of the present disclosure, a digital processing system, in response to identifying multiple files opened with write permission by a...
2016/0378987 SELF-REPAIR AND DISTRIBUTED-REPAIR OF APPLICATIONS
A method is provided to instrument applications with an instrumentation policy that is visually configurable and allows for run-time modifications of the...
2016/0378986 Detecting Heap-Spray in Memory Images
A computer is protected from heap spray attacks by identifying blocks in a heap memory, associating the blocks in buckets according to the block sizes,...
2016/0378985 Malware Protection
According to a first aspect of the present invention there is provided a method of protecting a computer system from malware, which malware attempts to prevent...
2016/0378984 Wavelet Decomposition Of Software Entropy To Identify Malware
A plurality of data files is received. Thereafter, each file is represented as an entropy time series that reflects an amount of entropy across locations in...
2016/0378983 MALWARE DETECTION USING A DIGITAL CERTIFICATE
Particular embodiments described herein provide for an electronic device that can be configured to analyze data related to a digital certificate and assign a...
2016/0378982 LOCAL ENVIRONMENT PROTECTION METHOD AND PROTECTION SYSTEM OF TERMINAL RESPONDING TO MALICIOUS CODE IN LINK...
A local environment protection method and system for a terminal against malicious code in link information, which are capable of preventing malicious code from...
2016/0378981 INTRUSION DETECTION FOR SUBMERGED DATACENTERS
Examples of the disclosure provide a datacenter configured for operation while submerged in water. The datacenter includes one or more physically separable...
2016/0378980 ATTACK DETECTION DEVICE, ATTACK DETECTION METHOD, AND NON-TRANSITORY COMPUTER READABLE RECORDING MEDIUM...
For a plurality of events, event stage information is stored which describes an event observed by an information system when an attack against the information...
2016/0378979 DETECTION OF MALICIOUS THREAD SUSPENSION
In an example, there is disclosed a computing apparatus having one or more logic elements providing a security agent operable for: detecting that a first...
2016/0378978 SCORING FOR THREAT OBSERVABLES
Example embodiments disclosed herein relate to determining threat scores for threat observables. Information about multiple threat observables are received...
2016/0378977 SIMULATION OF AN APPLICATION
Particular embodiments described herein provide for an electronic device that can be configured to identify an application, run the application, log the...
2016/0378976 SECURE TRUSTED EXECUTION ENVIRONMENT DATA STORE
Systems, apparatuses and methods may provide for receiving, from a host driver, factory data including one or more of calibration data, platform identifier...
2016/0378975 PROFILING EVENT BASED EXPLOIT DETECTION
Particular embodiments described herein provide for an electronic device that can be configured to execute an application in a system with an operating system,...
2016/0378974 WEAK PASSWORD SUPPORT IN A MULTI-USER ENVIRONMENT
Embodiments of the present invention provide a method, system and computer program product for supporting weak password authentication in a multi-user...
2016/0378973 DYNAMIC SECURITY QUESTION GENERATION
A method of dynamically generating a security question for accessing a resource. The method comprises monitoring a behavior of said user during a monitoring...
2016/0378972 Resumption of Logon Across Reboots
In one embodiment, a user device may reestablish access to a user resource while forgoing use of a user credential during a system reboot. The user device may...
2016/0378971 AUTHENTICATION OF A MULTIPLE PROTOCOL CONNECTION
An apparatus is described herein. The apparatus includes a controller and a proxy entity. The controller is to detect a peripheral device and authenticate the...
2016/0378970 AUTOMATIC DISCOVERY AND INSTALLATION OF SECURE BOOT CERTIFICATES
A method includes a unified extensible firmware interface of a compute node identifying an option ROM or an OS boot loader within the compute node, wherein the...
2016/0378969 METHOD AND APPARATUS FOR OPERATING MOBILE TERMINAL
A method and apparatus for easily restricting a use right and improving use convenience in a mobile terminal are provided. The method includes displaying a...
2016/0378968 TECHNOLOGIES FOR DEPTH-BASED USER AUTHENTICATION
Technologies for depth-based user authentication include a mobile computing device to display a login image including a depth channel on a display of the...
2016/0378967 System and Method for Accessing Application Program
System and method for accessing and launching application programs or applications on electronic devices. In an aspect, when a user enters a password plus an...
2016/0378966 FINGERPRINT GESTURES
User authentication for a user device can leverage one or more fingerprint sensor regions capable of detecting and/or recognizing a user's fingerprints. The...
2016/0378965 ELECTRONIC APPARATUS AND METHOD FOR CONTROLLING FUNCTIONS IN THE ELECTRONIC APPARATUS USING A BIO-METRIC SENSOR
According to various embodiments of the present disclosure, an electronic device may include a biometric sensor configured to detect a contact signal from at...
2016/0378964 System and Method for Detecting Liveness During Biometric Authentication
In certain embodiments of the present disclosure relate to a method for detecting liveness of a user during biometric authentication. The method comprising...
2016/0378963 AUTHENTICATION OF GESTURE INPUT THROUGH RFID SCANS
Systems, apparatuses and methods may provide for receiving one or more radio frequency identifier (RFID) codes from a passive wearable device and identifying...
2016/0378962 Method and Apparatus for Controlling Access to a Resource in a Computer Device
A computer device and method are described for controlling access to a resource. An execution environment executes a user process with access privileges...
2016/0378961 SECURITY SYSTEM, APPARATUS AND METHOD USING ADDITIONAL CODE
The present invention relates to a system and a method for controlling the use of electronic equipment using a code input method and, more specifically, to a...
2016/0378960 Managing Grouped Student Devices With Timed Locks
Systems and methods presented herein can allow a teacher to manage student devices in a classroom setting by grouping student devices on a graphical user...
2016/0378959 INFORMATION PROCESSING APPARATUS, METHOD, AND STORAGE MEDIUM
When a license file holds license type information and the license type is "monthly", a license management system can update expiration timing of the license...
2016/0378958 INFORMATION DISCRIMINATING DEVICE, INFORMATION DISCRIMINATING METHOD, AND NON-TRANSITORY STORAGE MEDIUM STORING...
An information discriminating device includes an information acquiring unit, an information discriminating unit, and an information superimposing unit. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.