Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0276395 Skull Conduction-Based Telephonic Conversation Management
Managing access to confidential content is provided. An indication of an identity of a teleconference participant is received via a voice communication headset...
2018/0276394 EXTENDING A ROOT COMPLEX TO ENCOMPASS AN EXTERNAL COMPONENT
In accordance with embodiments disclosed herein, there is provided systems and methods for extending a root complex to encompass an external component. A...
2018/0276393 OBFUSCATION OF USER CONTENT IN STRUCTURED USER DATA FILES
Systems, methods, and software for data obfuscation frameworks for user applications are provided herein. An exemplary method includes providing user content...
2018/0276392 METHOD AND SYSTEM FOR OPERATING A CACHE IN A TRUSTED EXECUTION ENVIRONMENT
A data processing system having rich execution environment (REE) and a trusted execution environment (TEE) is provided. In the data processing system, an...
2018/0276391 INTEGRITY CHECKING FOR COMPUTING DEVICES
A computing device may perform integrity checks on a closed operating system defining a preconfigured user portion and a preconfigured system portion using an...
2018/0276390 DISARMING MALWARE IN DIGITALLY SIGNED CONTENT
Systems and methods for disarming malicious code in digitally-signed content are provided. An example method includes determining that content is associated...
2018/0276389 DETERMINING MALWARE PREVENTION BASED ON RETROSPECTIVE CONTENT SCAN
The disclosed embodiments include a method for retroactively analyzing original input content to detect malicious content in a computer system, in which the...
2018/0276388 ENABLING A SECURE BOOT FROM NON-VOLATILE MEMORY
A system may include a host that may include a processor coupled to a non-volatile memory over a secure communication protocol, As a result, prior to release...
2018/0276387 System and Method for Secure Boot of an Information Handling System Using Verification Signature and Including...
A verification for a secure boot process may include determining a determined signature for a compendium stored in a memory where the compendium includes a...
2018/0276386 PERSISTENT ENROLLMENT OF A COMPUTING DEVICE BASED ON A TEMPORARY USER
Systems and methods are included for causing a computing device to implement a management policy prior to a user logging into an operating system on initial...
2018/0276385 SYSTEM AND METHOD FOR RESTORATION OF A TRUSTED SYSTEM FIRMWARE STATE
Operations include restoring a trusted system firmware state. A system stores a set of self-contained secure code in a secure code store. The system stores a...
2018/0276384 SECURE DOCUMENT IMPORTATION VIA PORTABLE MEDIA
System, method and medium for securely transferring untrusted files from a portable storage medium to a computer. The invention can filter, scan and detonate...
2018/0276383 AUTOMATIC DETECTION OF SOFTWARE THAT PERFORMS UNAUTHORIZED PRIVILEGE ESCALATION
Automatic detection of software that performs unauthorized privilege escalation is disclosed. The techniques cause a programmable device to obtain a trace...
2018/0276382 System and Method for Automation of Malware Unpacking and Analysis
An information handling system includes a storage and a processor. The storage is configured to store malware samples and malware signatures. The processor is...
2018/0276381 SYSTEMS AND METHODS FOR A VIRUS SCANNING ROUTER
A virus scanning router may manages a local network, including routing network traffic between devices on the network and routing network traffic being sent to...
2018/0276380 ENDPOINT MALWARE DETECTION USING AN EVENT GRAPH
A data recorder stores endpoint activity on an ongoing basis as sequences of events that causally relate computer objects such as processes and files, and...
2018/0276379 ENDPOINT MALWARE DETECTION USING AN EVENT GRAPH
A data recorder stores endpoint activity on an ongoing basis as sequences of events that causally relate computer objects such as processes and files, and...
2018/0276378 LABELING OBJECTS ON AN ENDPOINT FOR ENCRYPTION MANAGEMENT
Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple...
2018/0276377 SECURITY MITIGATION ACTION SELECTION BASED ON DEVICE USAGE
Examples disclosed herein relate to selecting a security mitigation action based on device usage. In one implementation, a processor selects a security...
2018/0276376 SYSTEM AND METHOD FOR HIGH FREQUENCY HEURISTIC DATA ACQUISITION AND ANALYTICS OF INFORMATION SECURITY EVENTS
This document discloses a heuristic data analytics method and system for analysing potential information security threats in information security events. In...
2018/0276375 SYSTEM AND METHOD FOR DETECTING A CYBER-ATTACK AT SCADA/ICS MANAGED PLANTS
System for detecting a cyber-attack of a SCADA system managed plant. Each industrial computerized device of the system comprises a processor configured with a...
2018/0276374 Checking a security value calculated for a part of a program code
An apparatus includes a first processing resource to execute a program code, and a second processing resource separate from the first processing resource. The...
2018/0276373 Method for Providing a Security-Critical Software Application on a Computer Unit
A method is provided for providing a software application on a computer unit. The method comprises the following steps: carrying out an AOT compilation of the...
2018/0276372 SYSTEM AND METHODS FOR SANDBOXED MALWARE ANALYSIS AND AUTOMATED PATCH DEVELOPMENT, DEPLOYMENT AND VALIDATION
A system and methods for sandboxed malware analysis and automated patch development, deployment and validation, comprising a business operating system,...
2018/0276371 SAMPLE-SPECIFIC SANDBOX CONFIGURATION BASED ON ENDPOINT TELEMETRY
A method for determining sandbox configurations for malware analysis is described. In one embodiment, the method may include receiving a plurality of files,...
2018/0276370 BRINGING A NON-ISOLATED APPLICATION INTO AN ISOLATION LAYER WITH AN ISOLATED APPLICATION
Bringing a non-isolated computer application into an isolation layer with an isolated computer application. In one embodiment, a method may include isolating a...
2018/0276369 OS Security Filter
A system and method for protecting against the unauthorized use of operating system level commands is disclosed. The system includes a computer module...
2018/0276368 AUTHENTICATION MANAGEMENT
Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing...
2018/0276367 MODIFYING SECURITY STATE WITH SECURED RANGE DETECTION
In some embodiments, a first device performs ranging operations to allow a user to access the first device under one of several user accounts without providing...
2018/0276366 METHOD AND SYSTEM FOR AUTHENTICATING IDENTITY USING VARIABLE KEYPAD
The present invention relates to a system for authenticating a financial transaction, and a combination password and signature information identity...
2018/0276365 ACCESS CONTROL TO PROTECTED RESOURCE BASED ON IMAGES AT CHANGING LOCATIONS IDENTIFIABLE BY THEIR TYPE
A method is provided for controlling access to a protected resource in a computing system, which includes storing an indication of a selection of an access...
2018/0276364 SECURING CREDENTIALS WITH OPTICAL SECURITY FEATURES FORMED BY QUASI-RANDOM OPTICAL CHARACTERISTICS OF...
Systems and methods are described for securing credentials with optical security features formed by quasi-random optical characteristics (QROCs) of credential...
2018/0276363 TRUSTED DEVICE
A trusted device, such as a wristwatch, is provided with authentication circuitry, used to perform an authentication operation to switch the trusted device...
2018/0276362 SYSTEM AND METHOD FOR REAL WORLD BIOMETRIC ANALYTICS THROUGH THE USE OF A MULTIMODAL BIOMETRIC ANALYTIC WALLET
A system and method for real world biometric analytics through the use of a multimodal analytic wallet. The system includes a biometric wallet comprising a...
2018/0276361 THREE-DIMENSIONAL FINGERPRINT SCANNER
A method and/or computer system generates a three-dimensional image of a fingerprint. One or more sensors detect a first user's finger being pressed against a...
2018/0276359 SYSTEM AND METHOD FOR POWERING ON ELECTRONIC DEVICES
This disclosure relates generally to electronic devices, and more particularly to system and method for powering ON electronic devices. In one embodiment, the...
2018/0276358 IC CARD AND METHOD FOR CONTROLLING IC CARD
An integrated circuit (IC) card of an embodiment includes a communicator, a storage storing a plurality of pieces of biometric authentication information, an...
2018/0276357 IC CARD AND METHOD FOR CONTROLLING IC CARD
An integrated circuit (IC) card of an embodiment includes a communicator, a storage storing biometric authentication information, an acquirer, and a processor....
2018/0276356 TERMINAL DEVICE AND METHOD FOR PERFORMING USER AUTHENTICATION BY MEANS OF BIOMETRIC DATA
The present invention provides an authentication which is performed by means of simultaneously inputting biometric data such as fingerprint, iris and the like...
2018/0276355 DATA PROCESSING SYSTEMS AND COMMUNICATIONS SYSTEMS AND METHODS FOR INTEGRATING PRIVACY COMPLIANCE SYSTEMS WITH...
A privacy compliance monitoring system, according to particular embodiments, is configured to track a user's system inputs and responses to questions regarding...
2018/0276354 IMAGE PROCESSING APPARATUS AND METHOD, INCLUDING USER AUTHENTICATION, AND STORAGE MEDIUM
An image processing apparatus which is capable of realizing security improvements without degrading the usability. A user is authenticated, and an operation...
2018/0276353 SETTING AND TERMINATING RESTRICTED MODE OPERATION ON ELECTRONIC DEVICES
A first electronic device is configured to operate in a restricted mode of operation, which restricted mode may be terminated or continued by one or more...
2018/0276352 USER INTERFACE SWITCHING METHOD AND TERMINAL
The application provides a user interface switching method and a terminal. After the terminal triggers a TUI display request of a CA according to a first...
2018/0276351 SYSTEM AND METHOD FOR EVENT-BASED VEHICLE OPERATION
Embodiments of a method and/or system for facilitating event-based vehicle operation can include determining a vehicle route; determining geographic regions...
2018/0276350 MESSAGING SECURITY
Disclosed herein is a method for obscuring, from a recipient, at least a portion of media and enabling the recipient to observe the obscured media when the...
2018/0276349 DIGITAL CONTENT EDITING APPARATUS, DIGITAL CONTENT PLAYBACK APPARATUS, DIGITAL CONTENT DECRYPTING APPARATUS,...
A digital content editing apparatus includes: a digital content generating unit for processing data and generating digital content constituted by a group of...
2018/0276348 PRODUCING CHEMICAL FORMULATIONS WITH COGNITIVE COMPUTING
A cognitive computing system for producing chemical formulations, in some embodiments, comprises: neurosynaptic processing logic; and one or more information...
2018/0276347 Processing method and processing apparatus for efficacy of combined drug
Provided are a processing method and a processing apparatus for efficacy of a combined drug. The processing method includes: obtaining dose-effect curve band...
2018/0276346 Networks For Organic Reactions And Compounds
A method for analyzing a collection of organic chemical reactions and compounds reported in the literature in the form of a complex network in either a normal,...
2018/0276345 SYSTEM AND METHOD TO MONITOR MENTAL HEALTH IMPLICATIONS OF UNHEALTHY BEHAVIOR AND OPTIMIZE MENTAL AND PHYSICAL...
A method including: receiving physiological and external data of a user; predicting that the user is gravitating towards an undesirable mental state based on...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.