Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0089445 ACCESS CONTROL DEVICE, METHOD AND PROGRAM
It is very useful for a bank having offices in a plurality of countries to construct a system that enables bank employees in the offices to share information...
2018/0089444 OUTLIER DETECTION BASED ON DISTRIBUTION FITNESS
In an example, a submission of a confidential data value of a first confidential data type is received from a first user with one or more attributes. A...
2018/0089443 INTERNAL DATASET-BASED OUTLIER DETECTION FOR CONFIDENTIAL DATA IN A COMPUTER SYSTEM
In an example, a submission of a confidential data value of a first confidential data type is received from a first user with one or more attributes. A...
2018/0089442 EXTERNAL DATASET-BASED OUTLIER DETECTION FOR CONFIDENTIAL DATA IN A COMPUTER SYSTEM
In an example, a plurality of segments of percentile information indicating submitted confidential data values from users matching at least one attribute of a...
2018/0089441 USING BIOMETRIC VERIFICATION TO GRANT ACCESS TO REDACTED CONTENT
Some embodiments provide an electronic device with a novel content redaction engine. The content redaction engine of some embodiments determines whether to...
2018/0089439 DETECTION OF IPC-BASED MOBILE VULNERABILITIES DUE TO INSUFFICIENT CALLER PERMISSIONS
Provided herein is a system, method, and computer program product for determining vulnerabilities in a target application of a mobile device. Determining...
2018/0089438 BOOT IMAGES FOR UNITS UNDER TEST
Example implementations relate to boot images for units under test. In an example implementation, responsive to a unit under test (UUT) being booted to a...
2018/0089437 AUTOMATED SECURITY TESTING FOR A MOBILE APPLICATION OR A BACKEND SERVER
Techniques that facilitate automated security testing of one or more mobile applications and/or one or more backend servers for the one or more mobile...
2018/0089436 Methods And Apparatus To Facilitate Blockchain-based Boot Tracking
A device with support for blockchain-based boot tracking comprises at least one processor, non-volatile storage responsive to the processor, and at least one...
2018/0089435 Methods And Apparatus To Use A Security Coprocessor For Firmware Protection
A data processing system (DPS) provides protection for firmware. The DPS comprises (a) a host module comprising a management engine and (b) a security module...
2018/0089434 PRESERVING TRUST DATA DURING OPERATING SYSTEM UPDATES OF A SECURE ELEMENT OF AN ELECTRONIC DEVICE
Systems, methods, and computer-readable media for preserving trust data during operating system updates of a secure element of an electronic device are provided.
2018/0089433 PHOTON EMISSION ATTACK RESISTANCE DRIVER CIRCUITS
Some embodiments include apparatuses having diffusion regions located adjacent each other in a substrate, and connections coupled to the diffusion regions. The...
2018/0089432 SYSTEM AND METHOD FOR CHARACTERIZING MALWARE
An embodiment may create a memory image including a representation of a thread environment block (TEB) and representation of a process environment block (PEB)...
2018/0089431 MOBILE APPLICATION MANAGEMENT
Code of a particular application is analyzed against a semantic model of a software development kit of a particular platform. The semantic model associates a...
2018/0089430 COMPUTER SECURITY PROFILING
Certain examples described herein relate to security profiling files on a computer system, including determining a similarity between two executable program...
2018/0089429 DERIVING A SECURITY PROFILE FOR SESSION-BASED SECURITY IN DATA CENTERS
In one embodiment, a computer program product includes a computer readable storage medium having program instructions stored thereon. The program instructions...
2018/0089428 DETECTING SCRIPT-BASED MALWARE USING EMULATION AND HEURISTICS
The subject disclosure is directed towards running script through a malware detection system including an emulator environment to detect any malware within the...
2018/0089427 RETURN ADDRESS ENCRYPTION
Disclosed in some examples are methods, systems, and machine readable media for encrypting return addresses with a cryptographic key. The call and return...
2018/0089426 SYSTEM, METHOD, AND APPARATUS FOR RESISTING HARDWARE TROJAN INDUCED LEAKAGE IN COMBINATIONAL LOGICS
In one embodiment, the invention is a method and apparatus for designing combinational logics with resistance to hardware Trojan induced data leakage. The...
2018/0089425 SYSTEM, APPARATUS AND METHOD FOR PLATFORM PROTECTION AGAINST COLD BOOT ATTACKS
In an embodiment, an apparatus includes: an interface circuit to receive thermal information from a system memory; a calculation circuit to determine a rate of...
2018/0089424 METHODS AND APPARATUS TO IMPROVE FEATURE ENGINEERING EFFICIENCY WITH METADATA UNIT OPERATIONS
Methods, apparatus, systems and articles of manufacture are disclosed to improve feature engineering efficiency. An example method disclosed herein includes...
2018/0089423 MALICIOUS CODE AVOIDANCE USING TRANSPARENT CONTAINERS
A method, computer program product, and system for managing container security, the method including consuming a recipe queue on a first checker container,...
2018/0089422 TECHNOLOGIES FOR DETERMINISTIC CODE FLOW INTEGRITY PROTECTION
Technologies for code flow integrity protection include a static analyzer that identifies a potential gadget in an atomic code path of a protected code. A...
2018/0089421 IDENTIFYING EXPLOITABLE CODE SEQUENCES
A system and method for identifying exploitable code sequences. In one implementation, a first processing device identifies an executable portion of a program...
2018/0089420 ACCESS CONTROL FOR INTEGRATED CIRCUIT DEVICES
Security systems for microelectronic devices physically lock the hardware itself and serve as a first line of defense by preventing overwriting, modification,...
2018/0089419 DIGITAL IDENTITY SYSTEM
The disclosure relates to a digital identity system including an enrolment module executing on a processor configured to receive a data item from an enrolling...
2018/0089418 RETURN MATERIAL AUTHORIZATION FULFILLMENT SYSTEM FOR NETWORK DEVICES WITH SPECIFIC CRYPTOGRAPHIC CREDENTIALS
A method for removing credentials from a smart grid device includes: receiving, by a receiving device, a removal request, wherein the removal request includes...
2018/0089417 EYE GAZING PASSCODE GENERATION CROSSING AUGMENTED REALITY (AR) AND VIRTUAL REALITY (VR) DEVICES
In one embodiment, a method includes receiving an eye gaze of a source user generated by a source augmented reality or virtual reality device (source AR/VR...
2018/0089416 SECURE INDUSTRIAL CONTROL SYSTEM
A secure industrial control system is disclosed herein. The industrial control system includes a plurality of industrial elements (e.g., modules, cables) which...
2018/0089415 USER TRUSTED DEVICE FOR DETECTING A VIRTUALIZED ENVIRONMENT
A computer to boot from a user trusted device, the user trusted device comprising a connection interface enabling connection with said computer, the method...
2018/0089414 USER TRUSTED DEVICE FOR DETECTING A VIRTUALIZED ENVIRONMENT
A computer to boot from a user trusted device, the user trusted device comprising a connection interface enabling connection with said computer, the method...
2018/0089413 SERVER GRANTING LICENSE TO IMAGE FORMING APPARATUS, METHOD OF MANAGING LICENSE, AND LICENSE MANAGEMENT SYSTEM
A license management server is connected with a plurality of image forming apparatuses. The server includes a memory that stores a limited license for enabling...
2018/0089412 AUTHENTICATING A RESPONDENT TO AN ELECTRONIC SURVEY
This disclosure generally covers systems and methods that, in some embodiments, provide an electronic survey template for creating a user customizable...
2018/0089411 Distributed Trust as Secondary Authentication Mechanism
A computer system supports secondary authentication mechanism for authentication of a user, where the computer system may provide a variety of services...
2018/0089410 SECURITY AND IDENTIFICATION SYSTEM AND METHOD USING DATA COLLECTION AND MESSAGING OVER A DYNAMIC MESH NETWORK...
Data is acquired across a deployed encrypted mesh network, using a digital security controlled, identification badge or tag or sensors, in a dual protocol...
2018/0089409 Method for Improving Unlocking Speed and Mobile Terminal
A method for improving unlocking speed and a mobile terminal are provided. The method is applicable to the mobile terminal in a screen-off state and includes...
2018/0089408 BIOMETRIC AUTHENTICATION BASED ON GAIT PATTERN OR WRITING MOTION WITH AN INERTIAL MEASUREMENT UNIT
The present invention relates to use an Inertial Measurement Unit (IMU) to record the acceleration trajectory of a person's gait or pen-less handwriting motion...
2018/0089407 VOICE AUTHENTICATION WITHIN MESSAGING SYSTEMS
A user is initially trained for voice authentication within a messaging platform session. After training and during the same session or a different session...
2018/0089406 PASSWORD AUTHENTICATING DEVICE FOR PREVENTING LEAKAGE OF PASSWORDS
Provided is a password-authenticating device that does not allow a password to be perceived from the hand movement of an operator while entering a password....
2018/0089405 PASSWORD AUTHENTICATING DEVICE FOR PREVENTING LEAKAGE OF PASSWORDS
Provided is a password-authenticating device in which a password is not perceived from the hand movements of an operator during entry of a password. The...
2018/0089404 AUTHENTICATING APPARATUS FOR EXECUTING USER AUTHENTICATION
Provided is an authenticating apparatus that by a simple method improves security when entering a password. The authentication-processing unit executes user...
2018/0089403 Multifactor Authentication from Messaging Systems
A user is assigned an initial risk score during a session with a messaging platform. During the session, the user attempts an operation with an external...
2018/0089402 IMAGE CAPTURING CONTROL METHOD, IMAGE CAPTURING CONTROL SYSTEM, AND IMAGE CAPTURING CONTROL SERVER
An image capturing control server receives permitted terminal identification information being first terminal identification information identifying a first...
2018/0089401 CALCULATING CONSECUTIVE MATCHES USING PARALLEL COMPUTING
Methods and systems for determining consecutive matches are provided. According to one embodiment, a class definition and a data stream are received by a...
2018/0089400 DIGITAL RIGHTS MANAGEMENT FOR HTTP-BASED MEDIA STREAMING
Techniques and mechanisms described herein facilitate the management of digital rights for media content item presentation. According to various embodiments, a...
2018/0089399 Method for predicting the solubility of a molecule in a polymer at a given temperature
The invention provides an improved method to predict the solubility of a drug or other molecule in a solid polymer or other matrix at any temperature. The...
2018/0089398 Method for predicting the solubility of a molecule in a polymer at a given temperature
The invention provides an improved method to predict the solubility of a drug or other molecule in a solid polymer or other matrix at any temperature. The...
2018/0089397 Method for Predicting the solubility of a molecule in a polymer at a given temperature
The invention provides an improved method to predict the solubility of a drug or other molecule in a solid polymer or other matrix at any temperature. The...
2018/0089396 Customizing Recipe Recommendations
A method for customizing recipe recommendations may include receiving a target number of calories for a user, receiving physical movement data of the user from...
2018/0089395 PERSONALIZING PRESET MEAL SIZES IN INSULIN DELIVERY SYSTEM
A method may include displaying at least three icons on a user interface of a mobile device, including a first icon associated with the at least three icons...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.