Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0235968 INFORMATION PROCESSING SYSTEM AND INFORMATION PROCESSING METHOD
An information processing system includes: a search system to search, for an image to be found, a database according to a search request and based on...
2017/0235967 BEHAVIORAL-BASED CONTROL OF ACCESS TO ENCRYPTED CONTENT BY A PROCESS
Securing an endpoint against exposure to unsafe content includes encrypting files to prevent unauthorized access, and monitoring an exposure state of a process...
2017/0235966 PROCESS-LEVEL CONTROL OF ENCRYPTED CONTENT
Securing an endpoint against malicious activity includes encrypting a plurality of files on an endpoint to prevent unauthorized access to the plurality of...
2017/0235965 PREVENTION OF A PREDETERMINED ACTION REGARDING DATA
According to an example, a performance of a predetermined action with regard to a data may be prevented. In the method, a first system call pertaining to the...
2017/0235964 USER AUTHENTICATION
According to an example, to authenticate a user of a computing device, a user login request with at least one primary credential is received from a computing...
2017/0235963 METHOD, APPARATUS, SYSTEM AND NON-TRANSITORY COMPUTER READABLE MEDIUM FOR CODE PROTECTION
A code protection method may include storing, using a processor of a computer, a package file that includes files for an application on a storage device of the...
2017/0235962 Secure Electronic Keypad Entry
An electronic device and method for securely receiving and communicating confidential information. The device comprises a user-defined variable and...
2017/0235961 TRUST ARCHITECTURE AND RELATED METHODS
A pluggable trust architecture addresses the problem of establishing trust in hardware. The architecture has low impact on system performance and comprises a...
2017/0235960 INTELLIGENT SYSTEM FOR FORECASTING THREATS IN A VIRTUAL ATTACK DOMAIN
A system for forecasting one or more threats on a Virtual Attack Domain of a Local Area or Wide Area Network, with a system comprising of: at least one Virtual...
2017/0235959 CODE VALIDATION
Methods and apparatus for validating a system include reading protected record data for a section of the system from a secure storage element, and verifying...
2017/0235958 METHODS, SYSTEMS AND APPARATUS TO INITIALIZE A PLATFORM
Methods, apparatus, systems and articles of manufacture are disclosed to initialize a platform. An example disclosed apparatus includes a boot loader manager...
2017/0235957 CONTROLLED SECURE CODE AUTHENTICATION
Systems, methods, circuits and computer-readable mediums for controlled secure code authentication are provided. In one aspect, a non-transitory ...
2017/0235956 CONTROLLED SECURE CODE AUTHENTICATION
Systems, methods, circuits and computer-readable mediums for controlled secure code authentication are provided. In one aspect, a method performed by a host...
2017/0235955 Access Management and Credential Protection
Secure computer architectures, systems, and applications are provided herein. An exemplary system includes a legacy environment which is an off-the-shelf...
2017/0235954 DETECTING NON-HUMAN USERS ON COMPUTER SYSTEMS
A method including collecting, by a processing device, raw data regarding an input to fill a form field. The method further includes converting, by the...
2017/0235953 Systems and Methods for Providing Dynamic File System Awareness on Storage Devices
Systems and methods for providing awareness of a host file system on a storage device are described. In one embodiment, a storage device includes a host...
2017/0235952 SYSTEM AND METHOD FOR PROVIDING NETWORK SECURITY TO MOBILE DEVICES
A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected...
2017/0235951 VIRTUAL MACHINE SECURITY
A virtual machine transmits local files to a secure virtual machine hosted by a hypervisor for malware detection. When malware is detected, the secure virtual...
2017/0235950 SELF-HEALING VIRTUALIZED FILE SERVER
In one embodiment, a system for managing a virtualization environment comprises a plurality of host machines, one or more virtual disks comprising a plurality...
2017/0235949 Security of Computer Resources
There is provided a method for improving security of computer resources, including obtaining raw memory snapshots of a computer memory of one or more computing...
2017/0235948 SYSTEM AND METHOD IN A VIRTUAL UNIVERSE FOR IDENTIFYING SPAM AVATARS BASED UPON AVATAR MULTIMEDIA CHARACTERISTICS
A system and method in a virtual universe (VU) system for identifying spam avatars based upon the avatars' multimedia characteristics may have a table that...
2017/0235947 IDENTIFYING SPAM AVATARS IN A VIRTUAL UNIVERSE BASED UPON TURING TESTS
A virtual universe system has a system and method for identifying spam avatars based upon the avatar's behavior characteristics through the use of Turing...
2017/0235946 TRUSTED COMPUTING HOST
A trusted computing host is described that provides various security computations and other functions in a distributed multitenant and/or virtualized computing...
2017/0235945 MALICIOUS CODE ANALYSIS DEVICE AND METHOD BASED ON EXTERNAL DEVICE CONNECTED VIA USB CABLE
A malicious code analysis device and method used on an external device connected via a USB cable. The malicious code analysis method includes connecting a...
2017/0235944 Hacking-Resistant Computer Design
A computer architecture is disclosed for implementing a hacking-resistant computing device. The computing device, which could be a mainframe computer, personal...
2017/0235943 Application Access Control Method and Apparatus
An application access control method and apparatus includes acquiring a graphic input by a user; generating an access strategy graphic according to the...
2017/0235941 KEY GENERATING METHOD AND APPARATUS USING CHARACTERISTIC OF MEMORY
A key generating method includes obtaining a first error correcting code (ECC) for original data, obtaining read data from a cell array of a memory comprising...
2017/0235940 ENHANCED TASK SCHEDULING FOR DATA ACCESS CONTROL USING QUEUE PROTOCOLS
A system and method for scheduling tasks associated with controlling access to databases. The system and method relate to scheduling tasks for data requesting...
2017/0235939 SECURITY ENHANCEMENT OF CUSTOMER REPLACEABLE UNIT MONITOR (CRUM)
A component subsystem and a method for authenticating the component subsystem. The component subsystem may be installed in a host device. The method can...
2017/0235938 AUTHENTICATION OF IMAGES EXTRACTED FROM UNCLONABLE OBJECTS
An authentication system for a computing environment uses physically unclonable functions (PUFs) to authenticate requests to perform an action in the...
2017/0235937 HARDWARE TOOLS AND METHODS FOR CAPACITIVE SENSOR ENABLED AUTHENTICATION
A hardware tool for authenticating with a capacitive sensor includes a set of capacitive interaction volumes, each including a conductive capacitive contact...
2017/0235936 SECURE CREDENTIAL SERVICE FOR CLOUD PLATFORM APPLICATIONS
A system, apparatuses, and methods for enabling a third party application installed on a multi-tenant platform to utilize an external service, where that...
2017/0235935 MOBILE TERMINAL, SMART WATCH, AND METHOD OF PERFORMING AUTHENTICATION WITH THE MOBILE TERMINAL AND THE SMART WATCH
The present invention relates to a mobile terminal and a method capable of performing authentication using a smart watch, including: detecting a request for...
2017/0235934 METHOD AND APPARATUS FOR IDENTITY AUTHENTICATION
Apparatuses and methods are disclosed for identity authentication. An exemplary method may include obtaining biometric information for authentication collected...
2017/0235933 WEARABLE COMPUTING DEVICE
The present disclosure describes a wearable computing device (WCD) in the form of a ring that can be worn on the finger of a human user.
2017/0235932 AUTHENTICATION DEVICE, AUTHENTICATION SYSTEM, AND AUTHENTICATION METHOD
To provide an authentication device capable of performing authentication accurately even when biological information changes with time. An authentication...
2017/0235931 SYSTEMS AND METHODS FOR DISCERNING EYE SIGNALS AND CONTINUOUS BIOMETRIC IDENTIFICATION
Apparatus, systems, and methods are provided for substantially continuous biometric identification (CBID) of an individual using eye signals in real time. The...
2017/0235930 CONTENT PROTECTION VIA ONLINE SERVERS AND CODE EXECUTION IN A SECURE OPERATING SYSTEM
A computer system comprising a processor and a memory for storing instructions, that when executed by the processor performs a copy protection method. The copy...
2017/0235929 Systems And Methods For Expedited Entitlement Checks
Systems and methods for managing access data are disclosed. One method can comprise receiving prediction information relating to one or more content options...
2017/0235928 LICENSE MANAGEMENT IN PRE-BOOT ENVIRONMENTS
Systems and methods for enabling license management in pre-boot environments are described. In some embodiments, a method may include: loading, by a Basic...
2017/0235927 METHOD AND SYSTEM FOR CONTROLLING MEDIA CONVEYANCE BY A DEVICE TO A USER BASED ON CURRENT LOCATION OF THE DEVICE
A method for execution by a customer premises receiver, comprising: receiving a signal that carries an original media stream; determining a location of the...
2017/0235926 METHODS AND DEVICES FOR DISTRIBUTING CONTENT TO AN ELECTRONIC DEVICE
Methods and devices for distributing and receiving content are provided. In one example aspect, a method comprises: receiving a command on a first electronic...
2017/0235925 SYSTEM AND METHODS FOR SECURE COLLABORATIVE COMMUNICATION
The invention generally relates to a tool for secure sharing and collaborative editing of content over a communication network. The invention provides systems...
2017/0235924 System and Network for Controlling Content and Accessibility
Systems and/or devices for controlling access to a content distribution system and/or controlling content distributed via the system are provided. In some...
2017/0235923 DEVICE AND METHOD OF SELECTING PATHWAY OF TARGET COMPOUND
Provided are a method and a device for selecting a pathway for a target compound by combining biochemical and chemical processes together, wherein an input of...
2017/0235922 Wearable Device Assembly Having Athletic Functionality and Milestone Tracking
A wearable device assembly has a housing supporting a controller, display and indicator system thereon. The controller has at least one sensor wherein activity...
2017/0235921 SYSTEM TO ASSESS PATIENT FUNCTION
A pedometer that records the number of steps over a defined period of time and a moment sensor that records the moments experienced by a prosthesis are used in...
2017/0235920 INFORMATION TRANSMITTER ATTACHED TO MEDICATION CONTAINER
The present disclosure relates to an information transmitter having an electronics circuit, said electronics circuit has a transmitter; an antenna operably...
2017/0235919 INFORMATION PROVIDER SYSTEM
The present invention relates to an information provider system having a sheet material comprises printed visual information of a product and at least one...
2017/0235918 SYSTEMS AND METHODS FOR DETERMINING COMPLIANCE AND EFFICACY OF A DOSING REGIMEN FOR A PHARMACEUTICAL AGENT
Embodiments of the present invention relate generally to determining compliance and/or efficacy of a dosing regimen of a pharmaceutical or other monitored...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.