Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0096150 SYSTEM AND METHOD FOR DETECTION AND PREVENTION OF DATA BREACH AND RANSOMWARE ATTACKS
The embodiments herein disclose a system and method for detecting a ransomware and preventing data breach. The method identifies whether a process for file...
2018/0096149 DETECTING MALWARE WITH HASH-BASED FINGERPRINTS
Detecting malware includes monitoring an event stream for an executable program, where the event stream includes a plurality of events such as API call events....
2018/0096148 DETECTING MALICIOUS SCRIPTS
Systems and methods normalize an executable script. A file can be received that potentially contains an executable script. The characters in the file are...
2018/0096147 SYSTEM, APPARATUS AND METHOD FOR PERFORMING ON-DEMAND BINARY ANALYSIS FOR DETECTING CODE REUSE ATTACKS
In one embodiment, a binary translator to perform binary translation of code is to: perform a first binary analysis of a first code block to determine whether...
2018/0096146 METHOD AND APPARATUS FOR IDENTIFYING MALICIOUS SOFTWARE
A method and apparatus are disclosed for identifying malicious software in the technical field of computers. The method includes: obtaining, according to a...
2018/0096145 SYSTEM AND METHOD USING FUNCTION LENGTH STATISTICS TO DETERMINE FILE SIMILARITY
A file similarity vector for an executable file or executable object can be determined using function lengths of functions in the executable file or data...
2018/0096144 METHOD, SYSTEM, AND DEVICE FOR INFERRING MALICIOUS CODE RULE BASED ON DEEP LEARNING METHOD
A method, a system and a terminal device for inferring a malicious code rule based on a deep learning method. The method comprises: performing twice training...
2018/0096143 SECURE CHANGE LOG FOR DRIVE ANALYSIS
According to some embodiments an electronic processing system may include a processor, memory coupled to the processor, and security code stored on the memory...
2018/0096142 SYSTEM AND METHOD FOR DETERMINING A SECURITY CLASSIFICATION OF AN UNKNOWN APPLICATION
This application describes a system and method for determining a security classification that is to be accorded to an unknown application using a trained...
2018/0096141 MALICIOUS CODE AVOIDANCE USING TRANSPARENT CONTAINERS
A method, computer program product, and system for managing container security, the method including consuming a recipe queue on a first checker container,...
2018/0096140 DETECTION OF RETURN ORIENTED PROGRAMMING ATTACKS IN A PROCESSOR
In an embodiment, a processor for Return Oriented Programming (ROP) detection includes at least one execution unit; a plurality of event counters, each event...
2018/0096139 METHOD AND SYSTEM FOR DEFENSE AGAINST RETURN ORIENTED PROGRAMMING (ROP) BASED ATTACKS
Embodiments of the application provide method and system for defense against ROP attacks. The method comprises: identifying a substitutable instruction pair in...
2018/0096138 Securing Data on Untrusted Devices
One example method for securing data on untrusted devices includes the steps of identifying, by a first process, a command in a command queue, the command from...
2018/0096137 USING A SECOND DEVICE TO ENROLL A SECURE APPLICATION ENCLAVE
A method, apparatus, and computer-readable medium are provided to determine whether to enroll a computing device as a provider of a secure application enclave...
2018/0096136 TECHNOLOGIES FOR OBJECT-ORIENTED MEMORY MANAGEMENT WITH EXTENDED SEGMENTATION
Technologies for memory management with memory protection extension include a computing device having a processor with one or more protection extensions. The...
2018/0096135 COGNITIVE PASSWORD PATTERN CHECKER TO ENFORCE STRONGER, UNREPEATABLE PASSWORDS
A method for determining a password strength is provided. The method may include receiving a user-entered password. The method may also include identifying a...
2018/0096134 COGNITIVE PASSWORD PATTERN CHECKER TO ENFORCE STRONGER, UNREPEATABLE PASSWORDS
A method for determining a password strength is provided. The method may include receiving a user-entered password. The method may also include identifying a...
2018/0096133 COGNITIVE PASSWORD PATTERN CHECKER TO ENFORCE STRONGER, UNREPEATABLE PASSWORDS
A method for determining a password strength is provided. The method may include receiving a user-entered password. The method may also include identifying a...
2018/0096132 METHOD AND APPARATUS FOR PROGRAM VERIFICATION
A disclosed program verification method includes: reading out, from a first storage unit, a first value that was calculated before shutdown of the computer for...
2018/0096131 CONFIRMING THE IDENTITY OF INTEGRATOR APPLICATIONS
An application service system receives, from a merchant service system, an application program code comprising identifying information. The identifying...
2018/0096130 ASSOCIATING MULTIPLE E-LEARNING DEVELOPMENT ENVIRONMENTS WITH A SINGLE USER
Disclosed are examples of systems, apparatus, methods and computer program products for associating multiple e-learning development environments with a single...
2018/0096129 NETWORK COMMUNICATION METHOD AND NETWORK COMMUNICATION SYSTEM
[Objective] To provide a technique for allowing, in a network communication system consisting of a first server for sending contents to a client and a second...
2018/0096128 NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM, COMMUNICATION MANAGEMENT METHOD, AND COMMUNICATION...
A non-transitory computer-readable recoding medium having stored therein a communication management program that causes a communication management device to...
2018/0096127 ASSOCIATING MULTIPLE E-LEARNING IDENTITIES WITH A SINGLE USER
Disclosed are examples of systems, apparatus, methods and computer program products for associating multiple e-learning identities with a single user. A...
2018/0096126 AURAL CUING PATTERN BASED MOBILE DEVICE SECURITY
When visual focus on a mobile device is limited, aural cues can be used to aid in entering a pattern based access code. The mobile device displays a plurality...
2018/0096125 SECURE DATA ENTRY
A method and associated computing device. A first arrangement of numeric characters 0-9 is displayed, on a touch screen of the computing device, for an entry...
2018/0096124 GAME CONTROLLER-BASED CAPTCHA
A CAPTCHA is presented on a display and a user of a hand-held controller such as a computer game controller is prompted to respond to the image. A correct...
2018/0096123 COMMUNICATION DEVICE CAPABLE OF PERFORMING A WIRELESS COMMUNICATION ACCORDING TO NFC (ABBREVIATION OF NEAR...
A communication device may receive a first specific signal not including authentication information from a first terminal device via an NFC interface, change...
2018/0096122 COMPUTERIZED SYSTEM AND METHOD FOR ASSOCIATING RF SIGNALS
A computerized system for associating RF signals, the system including at least one sensor configured to sense a plurality of RF signals at at least a...
2018/0096121 SYSTEMS AND METHODS FOR SECURE PERSON TO DEVICE ASSOCIATION
An association management system for establishing, maintaining, and monitoring associations between a personal identifier and an electronic device, includes a...
2018/0096120 EARPIECE WITH BIOMETRIC IDENTIFIERS
A method of verifying an identity of a user using a set of earpieces includes communicating a first sound toward a tympanic membrane of the left ear,...
2018/0096119 BIOMETRIC INFORMATION ACQUISITION METHOD AND DEVICE FOR SAME
A method for a device to acquire biometric information includes acquiring a plurality of images including an ocular region using an infrared ray (IR) image...
2018/0096118 Enhanced Biometric User Authentication
Methods and apparatuses for enhanced user biometric authentication are described. In one example, authenticating a user includes storing user authentication...
2018/0096117 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND USER AUTHENTICATION METHOD
An information processing apparatus includes a storage unit and a processing unit. The storage unit stores therein first authentication information...
2018/0096116 TECHNOLOGIES FOR AUTHORIZING A USER TO A PROTECTED SYSTEM
Technologies for user authorization include a compute device configured to determine one or more physical attributes of a non-electronic physical object and...
2018/0096115 PROVIDING TEMPORARY CONTACT INFORMATION
Contact information associated with a user is identified. Temporary contact information, exclusive of the contact information, is generated and associated with...
2018/0096114 PROVIDING TEMPORARY CONTACT INFORMATION
Contact information associated with a user is identified. Temporary contact information, exclusive of the contact information, is generated and associated with...
2018/0096113 Content Protection for a Screen Sharing Experience
Techniques for content protection for a screen sharing experience are described. According to various embodiments, a user that is sharing their screen with...
2018/0096112 METHOD FOR DETERMINING THREE-DIMENSIONAL STRUCTURES OF DYNAMIC MOLECULES
The present invention relates to a method for determining three-dimensional structures of molecules, particularly, but not exclusively, dynamic organic...
2018/0096111 PREDICTIVE TELEREHABILITATION TECHNOLOGY AND USER INTERFACE
Embodiments of a system and method for evaluating or predicting therapy adherence are generally described herein. A system may include a display and a...
2018/0096110 System And Method Of Medical Device Alarm Management
Systems and methods of medical device alarm management include receiving alarm data from a plurality of medical devices. The alarm data includes a plurality of...
2018/0096109 System and Method for Data Tracking Within a Network of Devices
System and method for data tracking. In one embodiment, a method of tracing at least one health-related data record representative of at least one...
2018/0096108 METHOD AND SYSTEM FOR CONTROL OF AN ELECTROMECHANICAL MEDICAL DEVICE
A control system, a control method, and a computer readable medium having stored thereon a computer executable program code for controlling electromechanical...
2018/0096107 SYSTEM AND METHOD FOR PERSONALIZED MIGRAINE PREDICTION POWERED BY MACHINE LEARNING
The present disclosure relates to a system, method, and computer program for predicting migraines using machine learning. More specifically, the system...
2018/0096106 BLOOD MANAGEMENT METHOD, BLOOD MANAGEMENT SERVER APPARATUS, AND BLOOD MANAGEMENT SYSTEM
A blood management method, a blood management server apparatus, and a blood management system are provided. The blood management method includes acquiring...
2018/0096105 DATA PROCESSING SYSTEMS AND METHODS IMPLEMENTING IMPROVED ANALYTICS PLATFORM AND NETWORKED INFORMATION SYSTEMS
An analytics platform and architecture is disclosed that improves the capture, extraction, and reporting of data required for certain measures, provides...
2018/0096104 DISEASE MANAGEMENT SYSTEM
A system, a method, and a computer program for providing COPD and similar management service are disclosed. The system may include three main branches:...
2018/0096103 Verification of Clinical Hypothetical Statements Based on Dynamic Cluster Analysis
A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions...
2018/0096102 Redaction of Sensitive Patient Data
Mechanisms are provided to redact sensitive data from a payload. The mechanisms analyze data types in the payload, where the data types correspond to...
2018/0096101 METHODS AND APPARATUS TO LABEL RADIOLOGY IMAGES
Methods and apparatus are disclosed to label radiology images are disclosed. An example apparatus, includes: means for obtaining user input identifying a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.