Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0268169 Security Systems and Methods for Encoding and Decoding Digital Content
Systems and methods may be provided for masking data on public networks. At a publishing node, the system may monitor data input fields in a webpage, and...
2018/0268168 ANONYMIZATION OF GEOGRAPHIC ROUTE TRACE DATA
A trace comprising location data about a computing device is received at a mapping server, where the trace stores the location data about the computing device...
2018/0268167 EVENT PROCESSING SYSTEM
User events of a platform are processed to extract aggregate information about users of the platform at an event processing system. A query relating to the...
2018/0268166 EVENT PROCESSING SYSTEM
User events of a platform are processed to extract aggregate information about users of the platform at an event processing system. A query relating to the...
2018/0268165 PROCESS FOR COLLECTING ELECTRONIC PROTECTED HEALTH INFORMATION WITHOUT A LOGIN
An efficient and secure process by which users may enter sensitive information into an electronic information system. When information is required from a user,...
2018/0268164 INFORMATION MANAGEMENT TERMINAL DEVICE
An information management terminal device includes a health information acquisition means, a health information storage means that stores health information...
2018/0268163 CONTEXT MODULE BASED PERSONAL DATA PROTECTION
Systems and methods are provided for context-module-based personal data protection. Systems and methods provide a user device's user interface with two or more...
2018/0268162 PERSONAL LEDGER BLOCKCHAIN
A system, method, and computer readable storage medium configured for storing encrypted data in a blockchain. To write additional data in a blockchain, a...
2018/0268161 IDENTIFYING AND BLOCKING PROHIBITED CONTENT ITEMS IN A CONTENT MANAGEMENT SYSTEM
To identify whether a content item is prohibited, a content management system can generate a content item fingerprint for the content item and then compare the...
2018/0268160 DEVICES WITH PROFILE-BASED OPERATING MODE CONTROLS
A device (e.g., a phone) can be provided by an entity (e.g., a business) to a user (e.g., an employee). The device includes a profile manager that allows the...
2018/0268159 Method and System for Policy Based Real Time Data File Access Control
A method and system for file content protection and policy-based access control in a networked environment are provided. It includes an endpoint module which...
2018/0268158 IDENTIFYING PERMITTED ILLEGAL ACCESS OPERATIONS IN A MODULE SYSTEM
Techniques for identifying permitted illegal access operations in a module system are disclosed. An operation, expressed in a first module, that attempts to...
2018/0268157 DOCUMENT MANAGEMENT SYSTEM AND MANAGEMENT APPARATUS
A document management system includes one or more processing apparatuses and a management apparatus. Each processing apparatus is located on one of local...
2018/0268155 DOCUMENT MANAGEMENT SYSTEM AND PROCESSING APPARATUS
A document management system includes a management apparatus and plural processing apparatuses. Each of the plural processing apparatuses includes an...
2018/0268154 TENANT TABLE SHARING WITH CONTENT SEPARATION
Implementations include providing a database system that a plurality of tenant systems interact with, providing a shared database schema and a plurality of...
2018/0268153 Location-Based Security Rules
Location based security rules are provided for preventing unauthorized access to a device, application, system, content, and/or network, etc. The...
2018/0268152 COGNITIVE BLOCKCHAIN AUTOMATION AND MANAGEMENT
A blockchain of transactions may be referenced for various purposes and may be later accessed by interested parties for ledger verification and information...
2018/0268151 AUTOMATIC GENERATING ANALYTICS FROM BLOCKCHAIN DATA
A blockchain of transactions may be referenced for various purposes and may be later accessed by interested parties for ledger verification and information...
2018/0268150 SECURE DISTRIBUTION OF AN IMAGE
A method for the display of an image in a display area, the method comprising: requesting, from a server, a scrambled image file using an image identifier, the...
2018/0268149 DYNAMIC SECURITY POLICIES
Approaches presented herein enable dynamic security policies through a plurality of application profiles. More specifically, a mobile device can open a profile...
2018/0268148 MANAGEMENT APPARATUS AND DOCUMENT MANAGEMENT SYSTEM
A management apparatus includes an assignment unit, a receiver, and a storage unit. The assignment unit assigns issuance privilege key information representing...
2018/0268147 PROTECTING COMPUTING DEVICES FROM UNAUTHORIZED ACCESS
Methods and systems for performing an authenticated boot; performing a continuous data protection; performing automatic protection and optionally a...
2018/0268146 SYSTEM AND METHOD TO ENFORCE THE SECURE BOOT POLICY OF A PLATFORM ON A VIRTUAL MACHINE
A method to enforce secure boot policy in an IHS configured with a plurality of virtual machines. The method includes detecting a request for a virtual machine...
2018/0268145 CONTINUED RUNTIME AUTHENTICATION OF INFORMATION HANDLING SYSTEM (IHS) APPLICATIONS
Systems and methods for continued runtime authentication of Information Handling System (IHS) applications. In an illustrative, non-limiting embodiment, an IHS...
2018/0268144 SYSTEMS AND METHODS FOR USB/FIREWIRE PORT MONITORING, FILTERING, AND SECURITY
A device for securing USB or Firewire port interconnections includes a microcontroller comprising a processor; a first connector/lead in communication with the...
2018/0268143 DISARMING MALWARE IN PROTECTED CONTENT
Systems and methods of disarming malicious code in protected content in a computer system having a processor are provided. The method includes determining that...
2018/0268142 UNSUPERVISED ANOMALY-BASED MALWARE DETECTION USING HARDWARE FEATURES
Disclosed are devices, systems, apparatus, methods, products, media and other implementations, including a method that includes obtaining current hardware...
2018/0268141 IDENTIFYING SIGNATURES FOR DATA SETS
Examples relate to identifying signatures for data sets. In one example, a computing device may: for each of a plurality of first data sets, obtain a data set...
2018/0268140 IDENTIFYING A SIGNATURE FOR A DATA SET
Examples relate to identifying a signature for a data set. In one example, a computing device may: receive a data set that includes a plurality of data units;...
2018/0268139 VIRUS DETECTION METHOD, TERMINAL AND SERVER
A virus detection method, a terminal, and a server are provided. The method includes performing preprocessing on an obtained to-be-processed file according to...
2018/0268138 SCANNING FILES USING ANTIVIRUS SOFTWARE
In some implementations, a method includes receiving files provided for analysis by users, generating, from the received files, a batch including multiple...
2018/0268137 IDENTIFYING MALICIOUS ACTIVITY USING DATA COMPLEXITY ANOMALIES
Examples relate to identifying malicious activity using data complexity anomalies. In one example, a computing device may: receive a byte stream that includes...
2018/0268136 PROTECTION AGAINST DATABASE INJECTION ATTACKS
Examples relate to protection against database injection attacks. The examples disclosed herein enable intercepting a current database query prior to being...
2018/0268135 DETECTING DATA BREACHES
The subject matter of this specification generally relates to data security. In some implementations, a method includes receiving, from data owners, a first...
2018/0268134 METHOD AND APPARATUS FOR IMPROVING SECURITY OF JAVA SANDBOX
A method and apparatus for improving security of a Java sandbox is provided. The method includes performing a permission check on a to-be-checked code,...
2018/0268133 SYSTEMS AND METHODS FOR GENERATING POLICIES FOR AN APPLICATION USING A VIRTUALIZED ENVIRONMENT
Provided herein are systems and methods for generating policies for a new application using a virtualized environment. Prior to allowing a new application to...
2018/0268132 HARDWARE ISOLATED SECURE PROCESSING SYSTEM WITHIN A SECURE ELEMENT
Systems and methods are provided that allow a secure processing system (SPS) to be implemented as a hard macro, thereby isolating the SPS from a peripheral...
2018/0268131 Method for Operating a Computer Unit, and Such a Computer Unit
A method is supplied for operating a computer unit, wherein on the computer unit an application can be executed which can access the functions of a crypto API,...
2018/0268130 SYSTEM, METHOD AND COMPUTER READABLE MEDIUM FOR SOFTWARE PROTECTION VIA COMPOSABLE PROCESS-LEVEL VIRTUAL MACHINES
According to some illustrative embodiments, a method for blending the data of an execution environment and the data of the protected application includes...
2018/0268129 DETECTING SUSPICIOUS APPLICATION OVERLAYS ON A DEVICE
Systems and methods detect suspicious application overlays on a device. An overlay detection unit can detect if a first foreground application has been...
2018/0268128 WEB-BASED ELECTRONIC DOCUMENT SERVICE APPARATUS CAPABLE OF AUTHENTICATING DOCUMENT EDITING AND OPERATING METHOD...
The present invention provides a web-based electronic document service apparatus, which is capable of authenticating the edit of a document, and an operating...
2018/0268127 METHODS AND APPARATUS FOR CONTROLLING ACCESS TO SECURE COMPUTING RESOURCES
A computing device has first and second operating systems with access to first and second memories, respectively. The second memory is provided for secure...
2018/0268126 DYNAMICALLY CONTROLLING ACCESS TO DEVICES
Access to devices can be controlled dynamically. A device control driver can function as an upper filter driver so that it can intercept I/O requests that...
2018/0268125 SYSTEM FOR AUTOMATED LOGIN INITIALIZATION ON DETECTION OF IDENTIFICATION DEVICE
A system for automating a data device login procedure having a network, a system backend communicable with the network having a backend processor configured to...
2018/0268124 INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING APPARATUS
An information processing system includes multiple information processing apparatuses for providing a multitenant service. The information processing system is...
2018/0268123 Method For Controlling Unlocking And Terminal Device
A method for controlling unlocking is provided. A password matching process is performed on a screen unlock password, an interrupt request is triggered and an...
2018/0268122 Method For Improving Unlocking Speed And Mobile Terminal
A method for improving unlocking speed and a mobile terminal are provided. The method is applicable to the mobile terminal in a screen-off state and equipped...
2018/0268121 Method For Unlocking Screen Of Terminal Having Fingerprint Identification Sensors And Terminal
A method and a terminal for unlocking a screen of a terminal having fingerprint sensors are provided. The method includes the following. A press instruction on...
2018/0268120 Method And Apparatus For Invoking Fingerprint Identification Device, And Mobile Terminal
A method and an apparatus for invoking a fingerprint identification device are provided. The method includes the following. When a request of a current...
2018/0268119 SYSTEM AND METHOD FOR SMART WEAPON IMPLEMENTATION AND DEPLOYMENT
A weapon is equipped with processing capabilities and can include, inter alia, communication technology, geographic positioning systems, a camera, memory and...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.