Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0075267 SYSTEM OF INJECTABLE FULLY-MONOLITHIC WIRELESS BIO-SENSING
Systems are provided for a wireless system-on-chip (SoC) with integrated antenna, power harvesting, and biosensors. An illustrative SoC can have a dimension of...
2018/0075266 INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND PROGRAM
Provided is an information processing device including: an access control unit configured to control access to a data storage location in which data can be...
2018/0075265 NON-CONTACT COMMUNICATION DEVICE, NON-CONTACT COMMUNICATION METHOD, PROGRAM, AND NON-CONTACT COMMUNICATION SYSTEM
The present technology relates to a non-contact communication device, a non-contact communication method, a program, and a non-contact communication system...
2018/0075264 VIDEO SIGNAL MONITORING METHOD, VIDEO SIGNAL MONITORING DEVICE, AND DISPLAY DEVICE
A video signal monitoring device includes a sensor installed in a display device and configured to detect luminance and/or chromaticity in a predetermined...
2018/0075263 CARD READER
A card reader may include a card insertion port; a magnetoresistive (MR) sensor, and a disturbing magnetic field generator, wherein the card may include a...
2018/0075262 NUTS
A lock node for storing data and a protected storage unit. The lock node includes an input section which provides a plurality of key maps, each corresponding...
2018/0075261 MANAGING CONTENT PROCESSED BY DEVICE
A computer implemented method for managing a content processed by a device includes: enabling a first content to be written to the device, the first content...
2018/0075260 SYSTEMS AND METHODS FOR GENERATING AND MANAGING DYNAMIC CUSTOMIZED ELECTRONIC TOKENS FOR ELECTRONIC DEVICE...
Systems and methods are provided for generating and managing dynamic customized electronic tokens for electronic device interactions. A system for transferring...
2018/0075259 SYSTEMS AND METHODS FOR SECURE MACHINE FOR HARDWARE SECURITY MODULE (HSM) ADAPTER
A new approach is proposed that contemplates systems and methods to support a secure machine environment on a HSM adapter, which enables an end user of the HSM...
2018/0075258 SYSTEMS AND METHODS FOR DYNAMICALLY ASSIGNING DOMAIN IDENTIFIERS FOR ACCESS CONTROL
A master domain assignment controller includes a first plurality of registers corresponding to a first processor including a first register corresponding to a...
2018/0075257 EVENT LOG TAMPER DETECTION
Embodiments are described for generating, by a processor, a first event record in response to an event being performed by a computer; and generating, by the...
2018/0075256 DETECTION AND BLOCKING OF WEB TRACKERS FOR MOBILE BROWSERS
A method for blocking web page trackers by a web browser of a mobile device, including loading a web page on a mobile device, scanning the web page to detect...
2018/0075255 SYSTEM FOR ANONYMIZING AND AGGREGATING PROTECTED INFORMATION
A system for anonymizing and aggregating protected information (PI) from a plurality of data sources includes a master index server coupled to a data...
2018/0075254 AUTOMATED CLASSIFICATION AND DETECTION OF SENSITIVE CONTENT USING VIRTUAL KEYBOARD ON MOBILE DEVICES
A system and method for identifying sensitive information on a mobile device is provided. A virtual keyboard is presented in an text editing application on the...
2018/0075253 STRUCTURED DATA FOLDING WITH TRANSMUTATIONS
A method of processing data includes at least one processor accessing a data storage unit, the data storage unit providing at least one input data object and...
2018/0075252 ACCESS CONTROL THROUGH DATA STRUCTURES
A data structure includes data that allows specific users to access data items that are part of the data structure and allows the users to store data items in...
2018/0075251 NATURAL LANGUAGE PROCESSOR EXTENSION TRANSMISSION DATA PROTECTION
A natural language query can be received at a main natural language processor inside a data protection compliance boundary in a computer system. The natural...
2018/0075250 PROVIDING WEB APPLICATION COMPONENTS WITHIN REMOTE SYSTEMS
Disclosed are examples of systems, apparatus, methods and computer program products for providing components for building web applications within remote...
2018/0075249 BEHAVIORAL-BASED CONTROL OF ACCESS TO ENCRYPTED CONTENT BY A PROCESS
Securing an endpoint against exposure to unsafe content includes encrypting files to prevent unauthorized access, and monitoring an exposure state of a process...
2018/0075248 MANAGING PRIVILEGES TO ACCESS DATA IN A DATABASE
There is provided a method that includes (a) transmitting to a first user device, a license to access data in a database, (b) receiving the license from a...
2018/0075247 Architecture For Access Management
Disclosed are techniques that use user devices and a server system to process employee generated requests to allow guest access registration. A server system...
2018/0075246 SECURELY AND EFFICIENTLY SHARING DATA EXCHANGE RECORDS
A data exchange is stored between two parties as one or more data exchange records. A data exchange record locator for locating the one or more data exchange...
2018/0075245 IDENTIFYING STORED SECURITY VULNERABILITIES IN COMPUTER SOFTWARE APPLICATIONS
Identifying stored security vulnerabilities in computer software applications by providing via a first interface of a computer software application during...
2018/0075244 Safety Information Management Method, Device and Terminal
A safety information management method, a safety information management device, and a terminal are provided. The method includes: detecting whether a terminal...
2018/0075243 SYSTEM AND METHOD FOR MODELING AND ANALYZING THE IMPACT OF CYBER-SECURITY EVENTS ON CYBER-PHYSICAL SYSTEMS
A system and method for systematically undertaking model-based security analysis of a cyber physical system (CPS) is provided. In one example, a cyber model...
2018/0075242 Customer-Owned Trust of Device Firmware
Systems and methods for providing and verifying customer-owned trust of device firmware are described. In some embodiments, an Information Handling System...
2018/0075241 FIRMWARE MAP DATA
An example method includes retrieving, based on firmware map data stored in a firmware map, first portions of a system firmware while omitting retrieval of...
2018/0075240 METHOD AND DEVICE FOR DETECTING A SUSPICIOUS PROCESS BY ANALYZING DATA FLOW CHARACTERISTICS OF A COMPUTING DEVICE
Disclosed are methods and devices for detecting a suspicious process. Test values of data flow direction characteristics of a to-be-detected host and sample...
2018/0075239 Techniques for Ransomware Detection and Mitigation
An attacker who gains control of a computer system using malicious software (malware) may be able to do anything to the data on the system. One type of...
2018/0075238 SYSTEMS AND METHODS FOR DETECTING MALICIOUS PROCESSES ON COMPUTING DEVICES
The disclosed computer-implemented method for detecting malicious processes on computing devices may include (i) identifying a portion of data on a computing...
2018/0075237 ANTIVIRUS SCAN DURING A DATA SCRUB OPERATION
For an antivirus scan during a data scrub operation, the antivirus scan is concurrently performed as an overlap with the data scrub operation, wherein the data...
2018/0075236 STORAGE DEVICE AND METHOD FOR PROTECTING AGAINST VIRUS/MALWARE THEREOF AND COMPUTING SYSTEM HAVING THE SAME
Disclosed is an operating method of a storage device, which includes detecting virus/malware, performing an authentication operation with a host device when...
2018/0075235 Abnormality Detection System and Abnormality Detection Method
An abnormality detection system is configured to (a) convert, based on a prescribed rule, a time-sequential event included in a log output by a monitoring...
2018/0075234 Techniques for Detecting Encryption
Encryption operations may be performed by a computer system for various reasons. It is often unclear, however, whether one of the many processes executing on a...
2018/0075233 SYSTEMS AND METHODS FOR AGENT-BASED DETECTION OF HACKING ATTEMPTS
In a system for protecting user accessible software applications, an application is executed in coordination with a security agent, and the security agent can...
2018/0075232 IMPLEMENTING EXTENT GRANULARITY AUTHORIZATION AND DEAUTHORIZATION PROCESSING IN CAPI ADAPTERS
A method, system and computer program product are provided for implementing block extent granularity authorization and deauthorization processing for a...
2018/0075231 SINGLE SIGN-ON FUNCTIONALITY FOR A MULTI-TENANT IDENTITY AND DATA SECURITY MANAGEMENT CLOUD SERVICE
A cloud-based identity and access management system that implements single sign-on ("SSO") receives a first request for an identity management service...
2018/0075230 IDENTITY AUTHENTICATION METHOD AND APPARATUS
Embodiments of the present disclosure disclose an identity authentication method performed at a computing device, the method including: obtaining a sequence of...
2018/0075229 Electronic Barcode Badge for Employee Access
An electronic security clearance system and method that comprises generating an electronic badge, sending the digital badge to an employee, and verifying the...
2018/0075228 MESSAGE SENDER SECURITY IN MESSAGING SYSTEM
Some embodiments include a method of providing security and privacy for a message sender. The method can include a messaging application determining that a...
2018/0075227 SYSTEMS AND METHODS FOR SURVEILLANCE OF USER ACCESS TO A SECURITY CRITICAL RESOURCE
A method for surveillance of user access to a security critical resource is described. The method includes receiving a request to access the security critical...
2018/0075225 INPUT AUTHENTICATION METHOD
An input authentication method for verifying an accuracy of a password data inputted by a user, comprising the steps providing a sensing unit for sensing and...
2018/0075224 VIEW-BASED EXPIRATION OF SHARED CONTENT
Techniques related to view-based expiration of shared content are described. An online content management system receives a view access request from a client...
2018/0075223 POINT OF CARE TESTING (POCT) SYSTEM
Disclosed are a system architecture and a method to enable workflow solutions via remote configuration services for the configuration management of point of...
2018/0075222 ANALYTE METER
A portable data-management system based on an analyte testing device which communicates wirelessly with a mobile device. The mobile device runs an application...
2018/0075221 Interventional Radiology Structured Reporting Workflow Utilizing Anatomical Atlas
A computer-implemented method and system are provided for interventional radiology (IR). The method and system store multiple structured reports associated...
2018/0075220 Methods for Processing Submission and Fulfillment of Pharmaceutical Prescriptions in Real Time
A system and methods for automatically processing healthcare data associated with submission and fulfillment of pharmaceutical prescriptions by providers in...
2018/0075219 THERAPEUTIC SYSTEM AND REMOTE PATIENT MONITORING DEVICE
The present disclosure relates to a smoking cessation therapeutic system and remote patient monitoring device. The smoking cessation therapeutic system is...
2018/0075218 WELLNESS DATA MANAGEMENT
Disclosed aspects relate to wellness data management. A wellness engine detects a triggering event which indicates an anticipated nourishment event that...
2018/0075217 RENAL THERAPY MACHINE AND SYSTEM WITH BLOOD PRESSURE MONITOR
A renal therapy machine with a blood pressure monitor is disclosed. In an example, a renal therapy machine includes a dialysis fluid pump a control processor...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.