Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0157877 DETERMINING COMPATIBILITY OF COMPONENTS FOR ASSEMBLING APPROVED PERSONAL PROTECTION CONFIGURATIONS
This disclosure relates generally to methods and systems for determining whether at least a first component and a second component of a personal protection...
2018/0157876 BATTERY-FREE TOUCH-AWARE USER INPUT USING RFID TAGS
Aspects of the present disclosure describe a battery-free touch sensing user interface (UI) for Internet of Things (IoT) and other smart spaces employing Radio...
2018/0157875 FRACTAL PLASMONIC SURFACE READER
Plasmonic-surface antenna systems are described in which resonators, or cells, are closely arranged but do not touch. At least a portion of a radiating surface...
2018/0157874 METHOD FOR RETRIEVING A SHUT STATE AND/OR A LOCATION OF A CLOSABLE CONTAINER
The invention relates to closable containers and a method for retrieving a shut state and/or a location of a closable container, wherein the container has at...
2018/0157873 PROCESS FOR RFID CERTIFICATION OF CARTON CONTENT
A process for RFID certification of carton content. Cartons may be packed with a number of RFID-tagged items and sealed. A carton may then be placed in the...
2018/0157872 CONTROL OF RFID READER EMISSIONS WHICH MAY CAUSE INTERFERENCE WITH SYSTEMS USING RFID TAGS
Methods and systems are provided for controlling an RFID emission within an environment including a sensitive object whose operation may be affected by RFID...
2018/0157871 CAPACITIVE INTRUSION DETECTION ON SMARTCARD READER
A device is disclosed. The device comprises a secure microcontroller, a smart card reader module coupled to the secure microcontroller, a smart card connector...
2018/0157870 Apparatus and Method of Reducing Movement of an Insertable Device During Temperature Cycles
Apparatus and method for electronic card insertion detection in an electronic device includes, for example, a spring or detection element positioned in a...
2018/0157869 SECURE AND EXTENSIBLE PAY PER ACTION ONLINE ADVERTISING
Systems and methods are provided to allow advertisers to make ads available to publishers through an advertising system. The advertising system provides tamper...
2018/0157868 PARSING, PROCESSING, AND/OR SECURING STREAM BUFFERS
Described are examples for securely storing stream data received from a stream source. Stream data can be received from the stream source for storing in one or...
2018/0157867 Secure Field-Programmable Gate Array (FPGA) Architecture
Method and systems using stateful encryption for non-bypassable FPGA configuration including receiving, at an FPGA, FPGA-configuration data comprising a...
2018/0157866 AUTOMATED MANUFACTURING SYSTEM WITH ADAPTER SECURITY MECHANISM AND METHOD OF MANUFACTURE THEREOF
A method of operation of an automated assembly system includes: detecting a socket adapter having an adapter identifier and an adapter cryptographic chip;...
2018/0157865 SMART CARD AUTHENTICATED DOWNLOAD
Described herein are systems and methods for providing a targeted and secure software image or other data to a television receiver. The data item can be...
2018/0157864 WELLNESS REGISTRY
The present disclosure relates to receiving and sharing wellness data. The wellness data can be received by a user device from any number of sensors external...
2018/0157863 METHOD AND APPARATUS FOR STORING PRIVACY INFORMATION BASED ON APPLICATION
The present disclosure provides a method and an apparatus for storing privacy information based on an application. The method includes: after monitoring that...
2018/0157862 SECURE START SYSTEM FOR AN AUTONOMOUS VEHICLE
A secure start system for an autonomous vehicle (AV) can transmit credentials to an authentication system based on detecting startup of the autonomous vehicle....
2018/0157861 AUTOMATIC REMOVAL OF GLOBAL USER SECURITY GROUPS
A system for automatically replacing a user security group-based computer security policy by a computer security policy based at least partially on actual...
2018/0157860 HANDLING PERMISSIONS FOR VIRTUALIZED FILE SERVERS
Examples of systems described herein include a file server virtual machine of a virtualized file server configured to manage storage of a plurality of storage...
2018/0157859 PRIORITIZED LINK ESTABLISHMENT FOR DATA TRANSFER USING TASK SCHEDULING
A system and method for scheduling data transfers between systems. One or more data requesting systems may request access to particular data. The request for...
2018/0157858 System and Methods for Context-Aware and Situation-Aware Secure, Policy-Based Access Control for Computing Devices
A system and methods for context-aware and situation-aware secure, policy-based access control for computing devices. The invention enhances the previously...
2018/0157857 Automatic Protection of Partial Document Content
Protecting a fragment of a document includes automatically detecting the fragment without user intervention based on the content of the fragment and/or the...
2018/0157856 FILE MANAGEMENT APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM
A file management apparatus includes a receiving unit and a display controller. The receiving unit receives plural pieces of identification information of...
2018/0157855 IMAGE PROCESSING APPARATUS, METHOD OF NOTIFICATION OF THE NUMBER OF IC CARD PROCESSES FOR THE IMAGE PROCESSING...
An image processing apparatus for a public key cryptography-based system using an IC card comprises: a job execution portion that executes a job given by a...
2018/0157854 SYSTEM AND METHODS FOR USING CIPHER OBJECTS TO PROTECT DATA
Systems, methods, and devices configured to build and utilize an intelligent cipher transfer object are provided. The intelligent cipher transfer object...
2018/0157853 REDUNDANT KEY MANAGEMENT
A data storage service redundantly stores data and keys used to encrypt the data. Data objects are encrypted with first cryptographic keys. The first...
2018/0157852 SECURE CLOUD-BASED STORAGE OF DATA SHARED ACROSS FILE SYSTEM OBJECTS AND CLIENTS
Techniques to provide secure cloud-based storage of data shared across file system objects and clients are disclosed. In various embodiments, a primary...
2018/0157851 SYSTEMS AND METHODS FOR AUTHENTICATION OF ACCESS BASED ON MULTI-DATA SOURCE INFORMATION
An authentication method includes receiving a single electronic file of member data elements from multiple member data sources. The method can include...
2018/0157850 Pistol Activity Recording Device
A device mountable on a pistol holster configured for detecting when a pistol is removed from the holster and, when removed, for activating a controller to...
2018/0157849 ANTI-THEFT IN FIRMWARE
Methods, systems and storage media are disclosed for enhanced system boot processing that authenticates boot code based on biometric information of the user...
2018/0157848 MEMORY MANAGEMENT
A system on a chip (SoC) and method of operation are described. A data processor has a processor data word size of p.times.octets and is configured to handle...
2018/0157847 SYSTEM AND METHOD FOR PERFORMING SENSITIVE GEO-SPATIAL PROCESSING IN NON-SENSITIVE OPERATOR ENVIRONMENTS
Methods and systems are disclosed including dividing a sensitive geographic region into three or more work regions; selecting geo-referenced aerial images for...
2018/0157846 Information processing method, electronic device and computer storage medium
Embodiments of the present disclosure provide an information processing method, an electronic device and a computer storage medium, the electronic device...
2018/0157845 Detection of Vulnerable Code
A machine learning model is applied to at least determine whether a computer program includes vulnerable code. The machine learning model is trained to...
2018/0157844 Consolidating static analysis tool warnings using dynamic programming
A static analysis tool is augmented to provide a mechanism by which a large set (and potentially all) security warnings output from the tool may be represented...
2018/0157843 DETECTION OF COMPILER INJECTED SECURITY FLAWS
A computer-implemented method is provided for detecting compiler-injected security flaws. The computer-implemented method includes receiving source code,...
2018/0157842 Amalgamating Code Vulnerabilities Across Projects
Mechanisms are provided for correlating security vulnerability detection across multiple applications. The mechanisms perform a security vulnerability analysis...
2018/0157841 SYSTEM AND METHOD FOR SECURE BOOT OF ENGINE MANAGEMENT SYSTEM
The present invention relates to a system and a method for secure boot of an engine management system, in which the system for secure boot of an engine...
2018/0157840 ROLLBACK RESISTANT SECURITY
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for rollback resistant security are disclosed. In one...
2018/0157839 SYSTEMS AND METHODS FOR TAMPER-RESISTANT VERIFICATION OF FIRMWARE WITH A TRUSTED PLATFORM MODULE
Embodiments disclosed herein describe systems and methods for tamper-resistant verification of firmware with a trusted platform module. Embodiments may be...
2018/0157838 FEATURE AND BOUNDARY TUNING FOR THREAT DETECTION IN INDUSTRIAL ASSET CONTROL SYSTEM
According to some embodiments, a threat detection model creation computer may receive a series of normal monitoring node values (representing normal operation...
2018/0157837 Information Security Techniques Including Detection, Interdiction and/or Mitigation of Memory Injection Attacks
Methods of detecting malicious code injected into memory of a computer system are disclosed. The memory injection detection methods may include enumerating...
2018/0157836 METHOD AND SYSTEM FOR PROACTIVE DETECTION OF MALICIOUS SHARED LIBRARIES VIA A REMOTE REPUTATION SYSTEM
A method for proactively detecting shared libraries suspected of association with malware includes the steps of determining one or more shared libraries loaded...
2018/0157835 ALERTS BASED ON ENTITIES IN SECURITY INFORMATION AND EVENT MANAGEMENT PRODUCTS
An enterprise threat detection (ETD) pattern is executed against received log event data from one or more computing systems. Using the ETD pattern, an event...
2018/0157834 PROTECTION SYSTEM AND METHOD FOR PROTECTING A COMPUTER SYSTEM AGAINST RANSOMWARE ATTACKS
A protection system and a protection method for protecting a computer system against ransomware attacks is provided. The system and method effectively detect...
2018/0157833 IDENTIFICATION OF ENTITY PERFORMING OPERATION ON LOCAL FILE(S) AND NOTIFICATION TO REDUCE MISUSE RISK
Identification of an entity performing a deletion or modification action on locally stored files and notification to mitigate risks to cloud stored files is...
2018/0157832 COMPUTING PLATFORM SECURITY METHODS AND APPARATUS
Computing platform security methods and apparatus are disclosed. An example apparatus includes a security application to configure a security task, the...
2018/0157831 AUTOMATED ATTACK LOCALIZATION AND DETECTION
According to some embodiments, a threat detection computer platform may receive a plurality of real-time monitoring node signal values over time that represent...
2018/0157830 SYSTEM AND METHOD FOR MONITORING THE INTEGRITY OF A COMPONENT DELIVERED TO A CLIENT SYSTEM BY A SERVER SYSTEM
The present invention relates to a system for monitoring the integrity of a component delivered to a client system by a server system and processable and/or...
2018/0157829 DETECTION AND MITIGATION OF MALICIOUS INVOCATION OF SENSITIVE CODE
Particular embodiments described herein provide for an electronic device that can be configured to identify regions of code to be monitored, probe and lock...
2018/0157828 HYPERVISOR ENFORCEMENT OF CRYPTOGRAPHIC POLICY
Techniques for restricting the execution of algorithms contained in applications executing on virtual machines executing within a computer system are described...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.