Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0357815 CODE OBFUSCATION AND UNIQUE INSTANCES
Obfuscation transforms original code into an obfuscated code that is less intelligible, but behaves like the original. In one embodiment, a code representation...
2017/0357814 METHODS AND SYSTEMS FOR BLOCKING THE INSTALLATION OF AN APPLICATION TO IMPROVE THE FUNCTIONING OF A MOBILE...
Methods and systems are provided for sharing information and improving the functioning of devices by blocking the installation of an application based on an...
2017/0357813 Avoidance of Malicious Content in Nested Files
A nested file having a primary file and at least one secondary file embedded therein is parsed using at least one parser of a cell. The cell assigns a...
2017/0357812 SYSTEMS AND APPARATUSES FOR ARCHITECTURE ASSESSMENT AND POLICY ENFORCEMENT
Example embodiments are disclosed herein for asset architecture evaluation and security enforcement within an enterprise computing platform. One example method...
2017/0357811 HIERARCHICAL RUNTIME ANALYSIS FRAMEWORK FOR DEFINING VULNERABILITIES
A runtime analysis framework (RTA) stores a hierarchical list of input tags and a hierarchical list of output tags. The RTA stores defined vulnerabilities that...
2017/0357810 RUNTIME ANALYSIS OF SOFTWARE SECURITY VULNERABILITIES
During runtime of the software application, the runtime analysis framework may assign input tags to objects associated with the user requests. The input tags...
2017/0357809 SYSTEMS AND METHODS FOR FLAW ATTRIBUTION AND CORRELATION
In a system for attributing one or more vulnerabilities in a software application to one or more developers, information identifying the source of a...
2017/0357808 SECURED CYBER-PHYSICAL SYSTEMS
Disclosed are devices, systems, apparatus, methods, products, and other implementations, including a method that includes causing at least one reset for one or...
2017/0357807 Deployment of Machine Learning Models for Discernment of Threats
A mismatch between model-based classifications produced by a first version of a machine learning threat discernment model and a second version of a machine...
2017/0357806 PROCESS CATEGORIZATION USING CROWDSOURCING
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for categorizing a process using crowdsourcing are...
2017/0357805 Macro-Script Execution Control
An agent inserts one or more hooks into a sub-execution runtime environment that is configured to include a script and/or targeted to include the script. The...
2017/0357804 METHOD AND APPARATUS FOR PREVENTING INJECTION-TYPE ATTACK IN WEB-BASED OPERATING SYSTEM
The present disclosure relates to a communication technique for fusing a 5G communication system for supporting a high data transmission rate after a 4G system...
2017/0357803 USB-C USAGE INDICATION
A method includes establishing a power link between a power source and a computing device using a cable assembly, the cable assembly including at least one...
2017/0357802 PROTECTING CONTENT ON A MOBILE DEVICE FROM MINING
Systems and methods prevent or restrict the mining of content on a mobile device. For example, a method may include identifying a mining-restriction mark in...
2017/0357801 ISOLATION SYSTEM FOR CYBERSECURITY
The disclosed embodiments provide a method and apparatus for protecting a critical computer system from malware intrusions. An isolator containing access...
2017/0357800 Method for dynamically generating a long password after successful biometric verification and updating all...
Method for dynamically generating a long password after successful biometric verification and updating all services associated to the user's account with the...
2017/0357799 Tracking and managing multiple time-based one-time password (TOTP) accounts
A host machine has a web browser. A user of the host machine also has a mobile device. A time-based, one-time password (TOTP) authentication scheme leverages a...
2017/0357798 REMOVAL OF CREDENTIALS FROM AN ELECTRONIC DEVICE
Systems, methods, and computer-readable media for managing credentials are provided. In one example embodiment, a method may include terminating the...
2017/0357797 ACCESSORY AUTHENTICATION FOR ELECTRONIC DEVICES
Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches...
2017/0357796 TOUCHSCREEN UNLOCKING METHOD AND APPARATUS
A touchscreen unlocking method and apparatus are disclosed. The method includes receiving an unlocking instruction triggered by a user by sliding a control on...
2017/0357794 STEGANOGRAPHIC ACCESS CONTROLS
Various features described herein may allow an authorized user to provide a guest with access to a secured location through use of an encoded image containing...
2017/0357793 PASSNUMBER AND IMAGE BASED METHOD AND COMPUTER PROGRAM PRODUCT TO AUTHENTICATE USER IDENTITY
An authentication process is disclosed which uses categories of icons to create an easy to remember passnumber for use with an electronic platform. The process...
2017/0357792 Login With Linked Wearable Device
Disclosed is a login method for controlling user access into a restricted access environment requiring a login device, which may be a wearable device, to...
2017/0357791 USING SENSOR DATA TO AUTHENTICATE A USER FOR A COMPUTER DEVICE
It is presented a method for conditionally authenticating a user for access to a computer device, the method being performed in an access control device...
2017/0357790 BIOMETRIC AUTHENTICATED CONTENT
A method for biometric authentication has the steps of sending a confidential communication to an intended recipient through the system, the intended recipient...
2017/0357789 METHOD AND DEVICE FOR TRIGGERING APPLICATION
An application triggering method and device are provided in the field of terminals. The terminal device sets at least two different triggering passwords for at...
2017/0357788 UNLOCKING A DEVICE
Techniques and systems for unlocking a first device based on signals transmitted between the first device and a second device are disclosed. A disclosed...
2017/0357787 Application Code Hiding Apparatus Using Dummy Code And Method Of Hiding Application Code Using The Same
An application code hiding apparatus includes a secret code dividing part, a secret code caller generating part, a code analyzing part, a dummy code generating...
2017/0357786 METHOD AND APPARATUS FOR LIMITING ACCESS TO DATA BY PROCESS OR COMPUTER FUNCTION WITH STATELESS ENCRYPTION
Systems and methods related to DRM content usage mechanisms for both online and offline usage of content are disclosed, including systems providing secure...
2017/0357785 METHOD, APPARATUS AND SYSTEM FOR PROTECTING CONTENT BASED ON OPEN LICENCE
A method, apparatus and system for protecting content based on an open license is disclosed. The method for protecting content based on an open license...
2017/0357784 METHOD AND SYSTEM FOR LICENSE MANAGEMENT
A method for license management. The method includes making a first determination by a local license server of a coordination point that a feature license that...
2017/0357783 METHOD AND SYSTEM FOR LICENSE MANAGEMENT OF NETWORK ELEMENTS
A method for license management. The method includes receiving a first license request for a feature from a network element and in response to the first...
2017/0357782 DETECTION OF UNAUTHORIZED CONTENT IN LIVE MULTIUSER COMPOSITE STREAMS
Systems and methods described herein relate to detecting the existence of unauthorized content in multiuser composite media stream. In particular, multiuser...
2017/0357781 FILE ORIGIN DETERMINATION
A file validation method and system is provided. The method includes retrieving from an authoritative source system, an artifact file. Identification...
2017/0357780 FILE ORIGIN DETERMINATION
A file validation method and system is provided. The method includes retrieving from an authoritative source system, an artifact file. Identification...
2017/0357779 System for Interactive Matrix Manipulation Control of Streamed Data and Media
An interactive streaming media and application service provider system can securely stream high resolution, multiple formats of video and data. Different data...
2017/0357778 TRANSPARENCY TRACKER
The clinical trial data management system disclosed herein provides for a transparency tracker with an integrated lifecycle workflow dashboard that navigates...
2017/0357777 HYBRID SYSTEM FOR COLLECTING AND UTILIZING PATIENT GENERATED INFORMATION
A hybrid of traditional paper-based (analog) data collection forms and content, in combination with a set of digital software services is provided. This system...
2017/0357776 MEDICAMENT TRAINING DEVICE AND SYSTEM
In one embodiment, a medicament system configured to communicate information about a medicament device or about a use of a medicament device, or a combination...
2017/0357775 SMART PILL DISPENSER
The invention is related to a smart pill dispenser which is used in a household, on a desktop, by keeping the different types of and different dosed medication...
2017/0357774 AUTOMATED PRESCRIPTION COMMUNICATION SYSTEM AND METHOD
The invention relates to an automated system and method of communication between a pharmacy and a patient, preferably via text messaging, voice messaging or...
2017/0357773 METHOD AND SYSTEM FOR PROCESSING IMAGES TO DETERMINE BLOOD FLOW CHARACTERISTICS
Embodiments include systems and methods for determining cardiovascular information for a patient. A method includes receiving patient-specific data regarding a...
2017/0357772 METHOD OF PLANNING AN EXAMINATION, METHOD OF POSITIONING AN EXAMINATION INSTRUMENT, TOMOSYNTHESIS SYSTEM AND...
A method for planning an examination of an examination object by a tomosynthesis machine includes: Raw data of the examination object are acquired from defined...
2017/0357771 PATIENT RISK SCORING & EVALUATION SYSTEM
A method of facilitating health of a patient includes determining, based on patient information, a risk score. The patient information includes clinical...
2017/0357770 HEALTH RISK CLOUD ANALYSIS SYSTEM CAPABLE OF INTEGRATING GENE INFORMATION AND ACQUIRED LIFESTYLE
A health risk cloud analysis system capable of integrating gene information and acquired lifestyle, includes: a cloud analysis server, a lifestyle assessment...
2017/0357769 Connecting Consumers with Service Providers
A request is received from a consumer of services to consult with a service provider having a service provider profile that satisfies at least some attributes...
2017/0357768 METHOD AND SYSTEM FOR MICROBIOME-DERIVED DIAGNOSTICS AND THERAPEUTICS FOR LOCOMOTOR SYSTEM CONDITIONS
A method for at least one of characterizing, diagnosing, and treating a locomotor system condition in at least a subject, the method comprising: receiving an...
2017/0357767 METHOD AND SYSTEM FOR MICROBIOME-DERIVED DIAGNOSTICS AND THERAPEUTICS FOR LOCOMOTOR SYSTEM CONDITIONS
A method for at least one of characterizing, diagnosing, and treating a locomotor system condition in at least a subject, the method comprising: receiving an...
2017/0357766 Medical System Having Plug And Play Function
A medical system is disclosed, which can be useable in particular for monitoring and/or controlling at least one bodily function of a user. The medical system...
2017/0357765 USER INTERFACE FOR CONFIGURABLY DISPLAYING REAL-TIME DATA FOR MULTIPLE PATIENTS
A configurable web-based user interface allows a clinical staff person to monitor real-time or near real-time patient data for selected multiple patients. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.