Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0107844 DISABLING COUNTERFEIT CARTRIDGES
A method for disabling counterfeit cartridge operation is provided. The method includes detecting a cartridge in a blade enclosure. The method includes...
2018/0107843 Multiple Message Retrieval for Secure Electronic Communication
Techniques for multiple message retrieval for secure electronic communication are described. The techniques, for instance, utilize a server and computing...
2018/0107842 RELATIONSHIP-BASED IMAGE MODIFICATION
For relationship-based image modification, a processor determines a relationship level for a requester of an image of a plurality of images. The processor...
2018/0107841 SECURE HIGH SPEED DATA STORAGE, ACCESS, RECOVERY, AND TRANSMISSION
A method for storing a first data object includes: decomposing the first data object into a first fragment associated with a first original record locator and...
2018/0107840 METHOD OF RESTORING A SECURE ELEMENT TO A FACTORY STATE
The invention is a method for restoring to a factory state a secure element which is embedded in a first device and which comprises a set of data. The method...
2018/0107839 INFORMATION PRIVACY IN VIRTUAL REALITY
Systems and methods are described that are configured to obtain tracking data corresponding to a plurality of users accessing a virtual reality environment....
2018/0107838 DATA PROTECTION WITHIN AN UNSECURED STORAGE ENVIRONMENT
A backup or storage management system is provided that can secure data within a primary storage environment that stores data in an unsecured format. The...
2018/0107837 RESOLVING DETECTED ACCESS ANOMALIES IN A DISPERSED STORAGE NETWORK
A method for execution by a storage unit of a dispersed storage network includes receiving an access request from a requestor. An access anomaly of the access...
2018/0107836 SYSTEM AND METHOD FOR SIGNATURE PATHWAY AUTHENTICATION AND IDENTIFICATION
A computer-implemented security system and method provides signature pathway authentication and identification. The system and method include establishing a...
2018/0107835 SYSTEM LEVEL VIRTUAL REALITY PRIVACY SETTINGS
Computer-implemented systems and methods are described for configuring a plurality of privacy properties for a plurality of virtual objects associated with a...
2018/0107834 AUTOMATIC FILE ENCRYPTION
A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors....
2018/0107833 DYNAMIC CHANGE IN PLURALITY OF SECURITY LAYERS BASED ON PROJECTED RISK
A method and associated system. Before allowing a user to use a secured resource, a first security check may be performed with respect to the user and/or the...
2018/0107832 TABLE PRIVILEGE MANAGEMENT
Various examples are directed to systems and methods for table privilege management. A database management system (DBMS) may receive a first client request...
2018/0107831 SECURING DATA GATHERING DEVICES OF A PERSONAL COMPUTING DEVICE WHILE PERFORMING SENSITIVE DATA GATHERING...
A functional library can secure data gathering devices of a personal computing device on behalf of a secure application program to provide a more secure...
2018/0107830 Object-Centric Video Redaction
Techniques are described for video redaction. In one aspect, techniques include receiving a video for redaction; analyzing the video to generate an appearance...
2018/0107829 NETWORK ENTITY AND OPERATION METHOD OF THE SAME
Disclosed is a network entity configured to receive a package access (PA) message associated with signaling for consuming a media package from a sending...
2018/0107828 METHOD AND SYSTEM FOR UTILIZING SECURE PROFILES IN EVENT DETECTION
The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g.,...
2018/0107826 TECHNIQUES FOR TRUSTED APPLICATION FUZZING MITIGATION
Techniques for mitigating attacks on an application operating in a trusted execution environment of a computing device are provided. An example method...
2018/0107825 Verifying Firmware Binary Images Using a Hardware Design and Formal Assertions
Described herein are hardware monitors arranged to detect illegal firmware instructions in a firmware binary image using a hardware design and one or more...
2018/0107824 SYSTEMS AND METHODS FOR DETECTING RANSOMWARE INFECTION
The present disclosure is directed at systems and methods for detecting ransomware infection in filesystems. These systems and methods may enable a computer...
2018/0107823 Programmable Hardware Security Counters
Embodiments include computing devices and methods implemented by computing devices for using programmable hardware security counters for detecting malicious...
2018/0107822 METHOD OF MANAGING A SECURE ELEMENT
The invention is a method for managing a secure element that comprises an operating system and a software application including an executable part which is...
2018/0107821 CODE INSTRUMENTATION FOR RUNTIME APPLICATION SELF-PROTECTION
A method for runtime self-protection of an application program includes, before running the application program, identifying input and output points in runtime...
2018/0107820 DETECTING LOCAL USER SECURITY-RELATED ANOMALIES USING ACTIVE SCANS
Embodiments are directed to monitoring local users' activity without installing an agent on a monitored machine. Periodic scans of the local users' directory...
2018/0107819 LOGIN TO A SUSPENDED ACCOUNT
A first request to log in to a suspended account is received. The first request includes an operation code. A determination is made that the operation code...
2018/0107818 Method for Generating a Signed Electronic Document with an Anti-Tamper Function
A method is to be implemented by a network server, and includes: receiving input information associated with a handwritten signature inputted on an original...
2018/0107817 VEHICLE AUTHORIZATION BASED ON NEAR FIELD COMMUNICATION
In an approach for automated vehicle authorization. A processor receives a first set of credentials from at least a first near field communication device,...
2018/0107816 VIRTUAL REALITY IDENTITY VERIFICATION
Interaction characteristics of a user interacting with a virtual reality (VR) terminal are obtained through preset sensing hardware in response to a request...
2018/0107815 SERVICE CONTROL AND USER IDENTITY AUTHENTICATION BASED ON VIRTUAL REALITY
A method for service control and user identity authentication includes recognizing a voice command of a virtual reality (VR) device user for initiating a...
2018/0107814 USER IDENTITY AUTHENTICATION USING VIRTUAL REALITY
A method for user identity authentication using virtual reality includes presenting one or more virtual elements on a virtual reality (VR) scenario of a VR...
2018/0107813 User Authentication Persistence
Methods and apparatuses for user authentication are described. In one example, an active condition of an authenticator device is detected and the identity of...
2018/0107812 SECURITY MODEL FOR NETWORK INFORMATION SERVICE
Systems and methods for providing information security in a network environment are disclosed. The method includes initiating processing, invoked by a user, of...
2018/0107811 DIRECT AUTHENTICATION SYSTEM AND METHOD VIA TRUSTED AUTHENTICATORS
Systems and methods are provided for enabling online entities to determine whether a user is truly the person who he says using a "two-factor" authentication...
2018/0107810 CONTROLLING ACCESS TO AN INTERFACE WITH A DONGLE
A dongle (100) for controlling access to an interface (200) is provided. The dongle (100) includes a dongle memory (120) configured to communicatively couple...
2018/0107809 VIDEO FILE ATTRIBUTION
Methods, computer program products, and systems are set forth herein and can include examining a video file using content of an authorship attribution...
2018/0107808 METHOD FOR OPERATING A COMPUTER SYSTEM TO AUTHORIZE USE OF SOFTWARE ON A PROCESS COMPUTER
In a method for operating a process computer that is at least intermittently connected to a user computer that executes a configuration program that can...
2018/0107807 ACCESSING INFORMATION ASSOCIATED WITH A MOBILE GAMING DEVICE TO VERIFY THE MOBILE GAMING DEVICE IS IN...
To verify that a mobile gaming device is in communications with an intended server that provides activities and/or services to a player through the mobile...
2018/0107806 HYBRID DIGITAL RIGHTS MANAGEMENT SYSTEM AND RELATED DOCUMENT ACCESS AUTHORIZATION METHOD
A digital rights management system includes two digital rights management servers (RMS servers) connected to a client computer. The two RMS servers implement...
2018/0107805 Digital Rights Management in Virtual and Augmented Reality
Digital rights management techniques are described that address traits of a behavior of a user population that is to interact with digital content as part of a...
2018/0107804 Methods and Apparatus for Sharing, Transferring and Removing Previously Owned Digital Media
The invention provide systems and methods for management of digital media objects, comprising first and second client digital data processors (e.g., personal...
2018/0107803 CORRELATING OLFACTORY PERCEPTION WITH MOLECULAR STRUCTURE
Predicting human olfactory perception based on molecular structure is described. Molecular descriptor data indicative of molecular descriptors associated with...
2018/0107802 COMPUTER IMPLEMENTED METHOD AND SYSTEM, AND COMPUTER PROGRAM PRODUCT, FOR COLLECTING AND DISPLAYING HEALTH...
A computer implemented system and method, and a computer program product, for collecting and displaying crowd sourced health status information. For example,...
2018/0107801 AUTOMATIC DISEASE DETECTION FROM UNSTRUCTURED TEXTUAL REPORTS
Automatic detection of disease presence from combining disease-specific measurements with textual descriptions of disease and its severity in unstructured...
2018/0107800 SECURE DATABASE SYSTEMS AND METHODS FOR DELIVERING HEALTH CARE TREATMENT
Databases comprising autonomous or semi-autonomous platforms for the diagnosis and treatment of patient conditions are disclosed. A CarePod is configured to be...
2018/0107799 THERMAL TAGS FOR REAL-TIME ACTIVITY MONITORING AND METHODS FOR DETECTING THE SAME
A thermal tag includes a power source to generate current along a resistive path and a plurality of infrared-emitting features positioned along the resistive...
2018/0107798 METHOD FOR AIDING A DIAGNOSIS, PROGRAM AND APPARATUS
A method for aiding a diagnosis for diagnosing a patient with a medical condition, the method comprising: determining a plurality of factors having values that...
2018/0107797 SYSTEMS AND METHODS FOR AUTOMATED ROUTE CALCULATION AND DYNAMIC ROUTE UPDATING
Systems and methods are provided for automated routing in a facility. A system may comprise at least one processor, and a storage medium comprising executable...
2018/0107796 SYSTEM AND METHOD OF PREDICTING AND ANALYZING UNDIAGNOSED MEDICAL CONDITIONS
A computerized system and method for analyzing encounter data representing encounters between patients and health care providers to predict whether one or more...
2018/0107795 Tracking and Controlling Inter-System Processing Events Using Event Tokens
Methods, systems, computer-readable media, and apparatuses for using event tokens to track and control inter-system processing events associated with...
2018/0107794 AGGREGATION SERVERS PROVIDING INFORMATION BASED ON RECORDS FROM A PLURALITY OF DATA PORTALS AND RELATED METHODS...
A method in an aggregation server may provide healthcare information based on electronic healthcare records from a plurality of data portals. A master record...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.