Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0161509 Controlling Access to Resources Based on Affinity Planes and Sectors
A first person (which may be a natural person, organization, brand, or other entity) has one or more affinity planes. Each affinity plane represents a distinct...
2017/0161508 MANAGEMENT DEVICE, METHOD EXECUTED BY THE MANAGEMENT DEVICE, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM
A management device of a storage system in which a plurality of pieces of data is stored in a plurality of devices respectively, the management device includes...
2017/0161507 Dual-system Electronic Apparatus and Terminal
A dual-system electronic apparatus and a terminal include an open operating system and an encryption operating system, and further include: a first processor...
2017/0161506 Information Handling System Encrypted Image Display Through Secondary Device
A wearable display presents information to an end user as visual images having restricted access to other viewers, such as at an eyeglass worn by the end user....
2017/0161505 CHAINED SECURITY SYSTEMS
A tiered credentialing approach provides assurance to customers having virtual machines running in a remote environment that the virtual images for these...
2017/0161504 Multimedia File Processing Method, Multimedia File Processing Apparatus, and Computer Readable Storage Medium
A multimedia file processing method and a multimedia file processing apparatus include: according to attributes of an acquired multimedia file, selecting a...
2017/0161503 DETERMINING A RISK INDICATOR BASED ON CLASSIFYING DOCUMENTS USING A CLASSIFIER
Systems and techniques for determining and displaying risk indicators are described. A set of event logs occurring in a time interval and associated with a...
2017/0161502 SECURE REMOTE KERNEL MODULE SIGNING
Implementations for a secure remote kernel module signing are disclosed. In one example, the method includes receiving an indicator of a public key associated...
2017/0161501 TECHNOLOGIES FOR SECURE BOOTSTRAPPING OF VIRTUAL NETWORK FUNCTIONS
Technologies for bootstrapping virtual network functions in a network functions virtualization (NFV) network architecture include a virtual network function...
2017/0161500 APPLICATION SECURITY PROTECTION METHOD, TERMINAL, AND STORAGE MEDIUM
Disclosed are an application security protection method, a terminal, and a storage medium. The method includes the steps of: monitoring whether an application...
2017/0161499 Behaviour Based Malware Prevention
A method of detecting malware present on a computer system. A set of applications is predefined as benign, and profiles are provided for respective benign...
2017/0161498 SYSTEMS AND METHODS FOR DETECTION OF MALICIOUS CODE IN RUNTIME GENERATED CODE
According to an aspect of some embodiments of the present invention there is provided a computer-implemented method for detection of malicious code within...
2017/0161497 RUNTIME VERIFICATION
Example implementations relate to runtime verification. In one example, runtime verification includes a processor, a shared memory storing embedded controller...
2017/0161496 METHOD AND DEVICE FOR IDENTIFYING VIRUS APK
Disclosed are a method and a device for identifying a virus APK. The method comprises: presetting a virus database comprising virus characteristic codes;...
2017/0161495 SYSTEM AND METHOD FOR ZERO-DAY PRIVILEGE ESCALATION MALWARE DETECTION
The various embodiments herein disclose a system and method for detecting zero-day privilege escalation malware at host level. The method identifies whether a...
2017/0161494 INTRUSION ASSESSMENT SYSTEM
An intrusion assessment apparatus includes a memory and a processor. The memory stores first and second records and first, second, and third keywords. The...
2017/0161493 Executing Native-Code Applications in a Browser
Techniques for leveraging legacy code to deploy native-code desktop applications over a network (e.g., the Web) are described herein. These techniques include...
2017/0161492 SYSTEM FOR DETECTING UNAUTHORIZED CODE IN A SOFTWARE APPLICATION
Disclosed is a computerized system for detecting unauthorized code in a software application. The system typically includes a processor, a memory, and a...
2017/0161491 IMPLEMENTING EXTENT GRANULARITY AUTHORIZATION AND DEAUTHORIZATION PROCESSING IN CAPI ADAPTERS
A method, system and computer program product are provided for implementing block extent granularity authorization and deauthorization processing for a...
2017/0161490 Dynamically Updating CAPTCHA Challenges
Systems and methods of dynamically updating CAPTCHA challenges are provided. For instance, a request to access an online resource can be received from a user...
2017/0161489 Permission Management Method, Apparatus, and Terminal
A permission management method, apparatus, and terminal. The permission management method includes obtaining an installation package of a first application...
2017/0161488 METHODS FOR GENERATING RANDOM DATA USING PHASE CHANGE MATERIALS AND RELATED DEVICES AND SYSTEMS
Devices and systems operable to generate random numbers are disclosed and described. Such include an array of phase change material cells electrically coupled...
2017/0161487 Proxy Bypass Login for Applications on Mobile Devices
In one embodiment, an intermediate server receives a request with a secure ID to authorize a software application, transmits the secure ID to a system,...
2017/0161486 APPARATUS AND METHOD FOR API AUTHENTICATION USING TWO API TOKENS
An application programming interface (API) authentication method using two API tokens which includes issuing a general API token and providing information...
2017/0161485 METHODS AND APPARATUSES FOR VALIDATING SUPPLY CHAIN FOR ELECTRONIC DEVICES USING SIDE-CHANNEL INFORMATION IN A...
Some embodiments described herein include a method to validate supply chains for electronic devices using side-channel information in a signature analysis. The...
2017/0161484 System and Method for Motion Gesture Access to an Application and Limited Resources of an Information Handling...
An information handling system includes a processor that determines a first orientation from orientation sensors and a sensor hub for detecting a motion...
2017/0161483 COMPUTER SYSTEM AND OPERATING METHOD THEREFOR
Code upgrades for computer components. After being powered on, a central processing unit (CPU) of a computer system loads a start-up authenticated code module...
2017/0161482 Device and Method for Authentication by A Biometric Sensor
There is described an electronic device comprising a biometric authentication sensor and a control circuit, and a method thereof. The biometric authentication...
2017/0161481 CONTROL METHOD AND ELECTRONIC DEVICE
For performing a function of an electronic device in response to a target fingerprint, methods and apparatus are disclosed. The method includes acquiring a...
2017/0161480 CONCEALED DATA MATCHING DEVICE, CONCEALED DATA MATCHING PROGRAM, AND CONCEALED DATA MATCHING METHOD
A concealed data matching method for a computer including: registering a first concealed vector obtained by concealing registered data and key data based on a...
2017/0161479 Biometric Authentication, and Near-Eye Wearable Device
Biometric authentication can comprise: obtaining, in response to an access request, verification information for biometric authentication and at least one...
2017/0161478 Active Authentication of Users
Embodiments herein disclose a method and system for actively authenticating users of an electronic device in a continuous manner using a plurality of factors...
2017/0161477 Image Based CAPTCHA Challenges
Systems and methods of determining image characteristics are provided. More particularly, a first image having an unknown characteristic can be obtained. The...
2017/0161476 ELECTRONIC DEVICE AND CONNECTION METHOD
A digital camera adapted to be used with an SD card, which has a security-lock function, includes a password inputting part configured to input a password for...
2017/0161475 SECONDARY SECURITY AUTHORITY
Techniques to facilitate protecting control programs used in an industrial automation environment are disclosed herein. In at least one implementation, control...
2017/0161474 METHOD AND SYSTEM FOR INITIATING A LOGIN OF A USER
The invention relates to a method for initiating a login (L) of a user into a system, the login (L) being passed by inputting a username into a username field,...
2017/0161473 SECURE PAIRING OF PERSONAL DEVICE WITH HOST DEVICE
An example method provides a unique input instruction to a single personal device in communication range of a host device, the unique input instruction being...
2017/0161472 METHOD TO DETECT CLONED SOFTWARE
Method to detect cloned software being used on a client user unit. An initialization phase comprises: defining a tag value as being equal to an initial random...
2017/0161471 Managing Heterogeneous Product Features Using a Unified License Manager
An information handling system includes a device, a controller, and a license manager subsystem. The controller is configured to determine whether the device...
2017/0161470 License Sharing Method and Apparatus
A license sharing method and apparatus are disclosed. The method includes receiving, by a license server, a first registration request sent by a first...
2017/0161469 Drug Efficacy Analysis System and Drug Efficacy Analysis Method
The present invention enables statistical analysis of medical practice data with a small number of samples. The following steps are included: a model creation...
2017/0161468 CELL INFORMATION ACQUISITION APPARATUS, CELL INFORMATION ACQUISITION METHOD, AND CELL INFORMATION ACQUISITION...
The invention provides a cell information acquisition apparatus, a cell information acquisition method, and a cell information acquisition program capable of...
2017/0161467 APPARATUS FOR COLLECTING FINGERPRINTS AND BUCCAL SWABS
Disclosed are devices and methods for collection, labeling and matching biological samples containing nucleic acid in conjunction with collecting at least one...
2017/0161466 CELL PROCESSING METHOD
The present invention provides improved methods for maintaining the physical separation and identity integrity of a biological cellular sample from a patient...
2017/0161465 SYSTEM AND METHOD FOR MONITORING CONTAINMENT OF AN EPIDEMIC
A system and method is disclosed for monitoring the containment of an epidemic in relation to a location-based restriction using an anonymized database of...
2017/0161464 ACTIVITY RECORDING SYSTEM, ACTIVITY RECORDING APPARATUS, ACTIVITY RECORDING METHOD, AND PROGRAM
An activity recording system includes an activity recording apparatus that detects information corresponding to motion of a user and records the detected...
2017/0161463 REMOTE DIAGNOSIS MANAGEMENT SYSTEM AND METHOD FOR OPERATING THE SAME
A remote diagnosis management system and a method for operating the same are disclosed. The remote diagnosis management system is utilized for at least one...
2017/0161462 Monitoring Adherence to Healthcare Guidelines
Systems and methods are disclosed for monitoring adherence to healthcare guidelines defining a recommended level of physical activity. Metabolic Equivalent...
2017/0161461 REMOTE DATA MANAGEMENT FOR MEDICAL DEVICES
A system and method for patient data management may include a patient device (720, 730, 740), server (710), and computing device (760). The patient device...
2017/0161460 Application Development System for Medical Pumps
An application authoring tool and application program system for medical pumps provides each pump with a standardized hardware interface abstracting the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.