Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0173889 SYSTEMS, METHODS, AND DEVICES FOR SECURING DATA STORED IN A CLOUD ENVIRONMENT
Devices, systems, and methods for performing particularized encryption of confidential information within real-world data files that are subsequently stored...
2018/0173888 SYSTEMS, METHODS, AND APPARATUS TO PROVIDE PRIVATE INFORMATION RETRIEVAL
Systems, methods, and apparatus to provide private information retrieval are disclosed. An example apparatus includes a protected data enclave to store a first...
2018/0173887 ENABLING SECURE BIG DATA ANALYTICS IN THE CLOUD
Methods are provided for enabling secure big data analytics in the cloud. A method includes reading a secure file, by a Secure Distributed File System in a...
2018/0173886 Collaborative Database to Promote Data Sharing, Synchronization, and Access Control
An organization of database functionality provides for at least three types of databases or database logical partitions: a master database with controlled...
2018/0173885 SECURE COMMUNICATIONS BETWEEN VIRTUAL COMPUTING INSTANCES
Method and apparatus for virtualized environment where virtual computing instances interface a service platform operated on a physical computing apparatus are...
2018/0173884 APPLICATION-TO-APPLICATION MESSAGING OVER AN INSECURE APPLICATION PROGRAMMING INTERFACE
Disclosed are various approaches for a secure communication session between applications installed on a client device. The secure communication session can be...
2018/0173883 SYSTEM FOR SECURE CONTEXT-AWARE PASSWORD MANAGEMENT
A method, electronic device, and computer readable storage medium, for secure context-aware management of passwords stored in a password manager application in...
2018/0173882 PRIVACY-BASED DEGRADATION OF ACTIVITY SIGNALS AND AUTOMATIC ACTIVATION OF PRIVACY MODES
Methods, systems, and computer program products are provided that address issues related to data privacy by enabling users to elect various levels of data...
2018/0173881 METHOD FOR ENFORCING ENDPOINT HEALTH STANDARDS
An approach for enforcing standards regarding security vulnerabilities for an endpoint user device associated with a user includes collecting, at an inline...
2018/0173880 VERIFYING PROPER OPERATION OF THE INSTRUCTION EXECUTION PROTECTION ARCHITECTURE
A computer-implemented method includes executing one or more tests on a computing device. The computing device has Instruction Execution Protection (IEP), and...
2018/0173879 Detection of cyber machinery attacks
A method of cyber protection of a machine based on acquiring acoustic signals from a vicinity of the machine, while the machine is operative. The method...
2018/0173878 Safe Mounting of External Media
Mounting a filesystem for media. The method includes detecting that media has been connected to a computing device. The method further includes causing a...
2018/0173877 SYSTEM AND METHOD FOR DETECTING ACTIVITES WITHIN A COMPUTERIZED DEVICE BASED ON MONITORING OF ITS POWER CONSUMPTION
The invention relates to a system for protecting a computerized device from a malicious activity resulting from a malicious code, which comprises: (a) a first...
2018/0173876 DECEIVING ATTACKERS IN ENDPOINT SYSTEMS
Endpoints in a network execute a sensor module that intercepts commands. The sensor module compares a source of commands to a sanctioned list of applications...
2018/0173875 IDENTIFYING RANDOMLY GENERATED CHARACTER STRINGS
Examples relate to identifying randomly generated character strings. In one example, a computing device may: receive a character string that includes two or...
2018/0173874 INTELLIGENT BACKUP AND VERSIONING
There is disclosed in one example a computing apparatus, including: an interface to a backup source in a current state; a backup storage having stored thereon...
2018/0173873 ANOMALY DETECTION IN ENTERPRISE THREAT DETECTION
A selection of data types is defined from available log data for an evaluation of events associated with an entity. One or more evaluations associated with the...
2018/0173872 PROVIDING SEMANTIC CONNECTIVITY BETWEEN A JAVA APPLICATION SERVER AND ENTERPRISE THREAT DETECTION SYSTEM USING...
A log processing job executing on a log producing computing system is initiated for processing log data associated with the log producing computing system. Log...
2018/0173871 Systems and Methods for Registering and Acquiring E-Credentials using Proof-of-Existence and Digital Seals
Described is a system and methods for registering and acquiring e-credentials using personal devices and an identity registry system that combines the method...
2018/0173870 INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, PROGRAM, AND STORAGE MEDIUM
The information processing device includes a registration information obtaining unit, a data generating unit and a transmission processing unit. The...
2018/0173869 HARDWARE-BASED DEVICE AUTHENTICATION
A domain identifier of a first domain of a plurality of domains is identified, the domain identifier included in a domain certificate received from the first...
2018/0173868 DEVICE RESTRICTIONS DURING EVENTS
A system and method for controlling functions on devices is disclosed. An occurrence of a start of an event is determined. Based on determining the occurrence...
2018/0173867 METHOD AND ELECTRONIC DEVICE FOR PROVIDING MULTI-LEVEL SECURITY
A method and electronic device for providing multi-level security is provided. The method includes detecting a type of a gesture performed by a user on a...
2018/0173866 SYSTEMS AND METHODS FOR PROVIDING LOCATION-BASED SECURITY AND/OR PRIVACY FOR RESTRICTING USER ACCESS
Exemplary embodiments are disclosed of systems and methods for providing location-based security and/or privacy for restricting user access. In an exemplary...
2018/0173865 Method and Apparatus for Invoking Fingerprint Identification Device, and Terminal
A method and an apparatus for invoking a fingerprint identification device are provided. The method includes the following. When a request of a current...
2018/0173864 Background Enrollment and Authentication of a User
An electronic device can include a processing device operatively connected to a biometric sensing device. The biometric sensing device may capture a biometric...
2018/0173863 BIOMETRIC AUTHENTICATION OF A USER
The present invention relates to an electronic device. In particular, the present invention relates to an electronic device comprising a first and a second...
2018/0173862 Fingerprint Recognition Method and Mobile Terminal
A fingerprint recognition method includes obtaining, by the mobile terminal, verification information and to-be-verified fingerprint information in a first...
2018/0173861 ACCESS CONTROL OF SOFTWARE APPLICATIONS BASED ON BIOMETRIC IDENTIFIERS
In one implementation, the present invention is directed to a method for controlling access to a software application using one or more processors configured...
2018/0173860 SETTING APPARATUS, SETTING METHOD, STORAGE MEDIUM, AND TERMINAL APPARATUS
A setting apparatus according to an aspect of the present invention includes an authenticator configured to authenticate an operator using a setting apparatus,...
2018/0173859 SYSTEM AND METHOD FOR PROVIDING A CONTENT CONSUMPTION JOURNAL TO USERS IN A MULTI-DEVICE ENVIRONMENT
A system and method for providing content consumption data to users in a multi-device environment. Activity data from a plurality of UE devices associated with...
2018/0173858 IMAGE PROCESSING SYSTEM, SERVER APPARATUS, CONTROLLING METHOD THEREOF, AND PROGRAM
An image processing system includes a terminal apparatus(es), and a server apparatus that connects to the terminal apparatus(es). The terminal apparatus...
2018/0173857 PREVENTION OF UNAUTHORIZED RESOURCE UPDATES
Embodiments include method, systems and computer program products for preventing unauthorized resource updates. In some embodiments, it may be determined that...
2018/0173856 METHOD AND APPARATUS FOR TRANSMITTING, ACTIVATING, PURCHASING AND ACCESSING PROTECTED CONTENT AND SERVICES FROM...
An approach is provided for providing digital rights management within a connected service and content ecosystem. The approach involves receiving a request for...
2018/0173855 SYSTEMS AND METHODS FOR DISPENSING A STATIN MEDICATION OVER THE COUNTER
Systems and methods are provided for over the counter statin delivery to a subject. Survey results from the subject are run against a first plurality of...
2018/0173854 MONITORING PREDICTIVE MODELS
Methods, systems, and computer-readable media for a system and method are provided for assessing the value of predictive models monitoring medical conditions....
2018/0173853 COGNITIVE ADAPTATIONS FOR WELL-BEING MANAGEMENT
Disclosed aspects relate to cognitive adaptations for well-being management in a living environment. A set of sensor-derived data for the living environment...
2018/0173852 Biologically Inspired Intelligent Body Scanner
An intelligent medical imaging scanner system includes an image scanner, an operator interface, a database, processors, and a storage medium. The database...
2018/0173851 Measuring Apparatus
Measuring apparatus (1) for tracking human and/or animal tissues comprising: a working area (2) for receiving a tissue; a detecting unit (5) configured to...
2018/0173850 System and Method of Semantic Differentiation of Individuals Based On Electronic Medical Records
This document presents a system and method to extract highly meaningful terms from unstructured fields in an EMR that distinguish two different patient...
2018/0173849 COMPUTER-IMPLEMENTED METHOD FOR DESIGNING SYNTHETIC DNA, AND TERMINAL, SYSTEM AND COMPUTER-READABLE MEDIUM FOR...
A method, comprising displaying indicia, broadcasting data, or transmitting instructions, to solicit collection of or to access data uniquely representative...
2018/0173848 GENERATION AND USE OF SIMULATED GENOMIC DATA
Embodiments of the invention utilize a graph-based approach for simulating genomic datasets from large scale populations. Genomic data may be represented as a...
2018/0173847 ESTABLISHING A MACHINE LEARNING MODEL FOR CANCER ANTICIPATION AND A METHOD OF DETECTING CANCER BY USING...
A method of establishing a machine learning model for cancer anticipation includes collecting test results of a plurality of tumor markers of a plurality of...
2018/0173846 Systems and Methods for Detection of Aneuploidy
Provided herein are improved methods for detecting aneuploidy in a sample. The methods in certain embodiments are used for the analysis of circulating DNA in...
2018/0173845 Systems and Methods for Detection of Aneuploidy
Provided herein are improved methods for detecting aneuploidy in a sample. The methods in certain embodiments are used for the analysis of circulating DNA in...
2018/0173844 ADAPTIVE NANOPORE SIGNAL COMPRESSION
Techniques described herein relate to systems and methods for parallel DNA molecules sequencing. A preprocessor can receive raw data frames from a sensor chip...
2018/0173843 ENHANCED AMPLICON SEQUENCING ANALYSIS
An Amplicon Sequencing Analysis Pipeline (ASAP) system (120, 600) characterizes a genetic sample. The ASAP system (120, 600) receives assay configuration data...
2018/0173842 SYSTEMS AND METHODS FOR CREATION OF PERSONAL GENETIC PROFILE PRODUCTS
Presented herein are systems and methods related to a scalable and platform-agnostic framework that facilitates the creation of personal genetic profile...
2018/0173841 COMPUTER AIDED-METHOD FOR A QUICK PREDICTION OF VORTEX TRAJECTORIES ON AIRCRAFT COMPONENTS
A computer-aided method suitable for assisting in the design of an object zone, such as a CROR engine of an aircraft subjected to high vorticity and/or low...
2018/0173840 COMPUTER AIDED-METHOD FOR A QUICK PREDICTION OF VORTEX TRAJECTORIES ON AIRCRAFT COMPONENTS CHECKING HIGH...
A computer-aided method suitable for assisting in the design of an object zone such as a CROR engine of an aircraft subjected to high vorticity and/or low...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.