Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0285584 METHOD AND SYSTEM FOR ANONYMOUS USER DATA STORAGE AND CONTROLLED DATA ACCESS
Methods and systems are configured to store user data and control access to the user data, wherein the data is stored remotely from the user (such as external...
2018/0285583 FILE ENCRYPTING APPARATUS, FILE DECRYPTING APPARATUS, SYSTEM AND PROGRAM
A file encrypting apparatus includes: an encryption key acquiring unit that acquires one or more encryption keys determined for respective ones of one or more...
2018/0285582 VERIFIABLE KEYED ALL-OR-NOTHING TRANSFORM
Systems and methods for encrypting and decrypting data in a dispersed storage network are disclosed. One encryption approach involves generating a random...
2018/0285581 System and Method for Protecting Information from Unauthorized Access
In a digital computing environment, a method of protecting stored and transmitted computer files from unauthorized access, by rearranging the internal...
2018/0285580 COGNITIVE INTERNET OF THINGS (IOT) GATEWAYS FOR DATA SECURITY AND PRIVACY PROTECTION IN REAL-TIME CONTEXT-BASED...
A cognitive IoT gateway may receive real-time data associated with a user from sensor devices that are detecting user data in real-time. The real-time data is...
2018/0285579 METHODS AND SYSTEMS FOR ENFORCING SECURITY SETTINGS FOR PRINTING CONFIDENTIAL DOCUMENTS
Disclosed are methods and printer drivers for printing confidential documents. The method includes receiving a document for printing via an application running...
2018/0285578 TEMPORALLY ISOLATING DATA ACCESSED BY A COMPUTING DEVICE
Embodiments of the present invention provide a method to temporally isolate data accessed by a computing device so that the data accessed by the computing...
2018/0285577 COMPUTING DEVICE AND METHOD FOR INPUT SITE QUALIFICATION
A computing device, method and computer program product are provided to qualify an instruction based upon the input site of the instruction. In the context of...
2018/0285576 SYSTEM AND METHOD FOR PRESERVING PRIVACY OF DATA IN THE CLOUD
A system and method for preserving the privacy of data while processing of the data in a cloud. The system comprises a computer program application and a...
2018/0285575 DATA CRYPTOGRAPHY ENGINE
Examples include a system comprising a processing resource and a memory resource. Examples include a cryptography engine arranged in-line with the processing...
2018/0285574 ELECTRONIC SYSTEM AND METHOD FOR MANAGING DIGITAL CONTENT RELATING TO WORKS OF ART
The present invention concerns an electronic system and a method for managing digital content relating to works of art adapted for preventing the uncontrolled...
2018/0285573 VISUAL CRYPTOGRAPHY AND OBFUSCATION USING AUGMENTED REALITY
A method and user device for preventing unauthorized viewing of at least one entity, e.g. character, digit, image and/or shape, is provided. The method...
2018/0285572 AUTOMATIC DETECTION OF AN INCOMPLETE STATIC ANALYSIS SECURITY ASSESSMENT
Embodiments include method, systems and computer program products for automatic detection of an incomplete static analysis security assessment. In some...
2018/0285571 AUTOMATIC DETECTION OF AN INCOMPLETE STATIC ANALYSIS SECURITY ASSESSMENT
Embodiments include method, systems and computer program products for automatic detection of an incomplete static analysis security assessment. In some...
2018/0285570 Method and Apparatus for Secure Computing Device Start Up
The present invention provides methods and devices for secure computing device start up. The method includes generating a public/private key pair and signing a...
2018/0285569 METHOD FOR INITIALIZING A COMPUTERIZED SYSTEM AND COMPUTERIZED SYSTEM
A method for initializing a computerized system by executing a boot-script having an associated private security key, wherein the computerized system comprises...
2018/0285568 SANCTIONED BOOTLOADER UNLOCKING
An unlockable bootloader of an electronic device may be unlocked by a user of the electronic device using a sanctioned bootloader unlocking process. An...
2018/0285567 Methods and Systems for Malware Analysis and Gating Logic
A network and its devices may be protected from non-benign behavior, malware, and cyber attacks by configuring a computing device to repeatedly or recursively...
2018/0285566 MANAGING READS AND WRITES TO DATA ENTITIES EXPERIENCING A SECURITY BREACH FROM A SUSPICIOUS PROCESS
Provided are a computer program product, system, and method for managing reads and writes to data entities experiencing a security breach from a suspicious...
2018/0285565 MALWARE DETECTION IN APPLICATIONS BASED ON PRESENCE OF COMPUTER GENERATED STRINGS
An executable file can be determined to be malicious based, at least in part, on the presence of a computer generated text string as a function name, method...
2018/0285564 DETECTING AN ATTEMPT TO EXPLOIT A MEMORY ALLOCATION VULNERABILITY
Various techniques for detection of malware that attempt to exploit a memory allocation vulnerability are disclosed. In some embodiments, a system, process,...
2018/0285563 TECHNIQUES FOR SERVICE ASSURANCE USING FINGERPRINTS ASSOCIATED WITH EXECUTING VIRTUALIZED APPLICATIONS
Examples include techniques for a service assurance using fingerprints associated with execution of virtualized applications. Examples include receiving...
2018/0285562 COMPUTING SYSTEM WITH PROTECTION AGAINST MEMORY WEAR OUT ATTACKS
Technology for a computing system is described. The computing system can include memory, a controller, and a security management module. The controller can...
2018/0285561 METHOD AND SYSTEM FOR DETECTING KERNEL CORRUPTION EXPLOITS
Methods and systems provide for detecting exploitation of kernel vulnerabilities which typically corrupt memory. The methods and systems are implemented, for...
2018/0285560 System, Apparatus And Method For Providing Locality Assertion Between A Security Processor And An Enclave
In one embodiment, a system includes a processor having one or more cores and a security processor coupled to the processor. The security processor may be...
2018/0285559 STACK PIVOT DETECTION SYSTEMS AND METHODS
The present disclosure is directed to systems and methods for detecting stack-pivot attacks in a processor-based device. Processor circuitry executes one or...
2018/0285558 DEVICE AND METHOD FOR PASSWORD GENERATION IN A USER DEVICE
A device (100) and a method for password generation. When password generation is triggered (S20), a processor (110) of the device (100) applies (S21) a...
2018/0285557 SERVER AND NON-TRANSITORY COMPUTER-READABLE MEDIUM HAVING INSTRUCTIONS
A server includes a controller performs determining whether a first local area network and a second local area network match; determining, in a case where the...
2018/0285556 Method and system for securing user access, data at rest and sensitive transactions using biometrics for mobile...
Biometric data are obtained from biometric sensors on a stand-alone computing device, which may contain an ASIC, connected to or incorporated within it. The...
2018/0285555 AUTHENTICATION METHOD, DEVICE AND SYSTEM
The present invention provides methods, devices, and systems for device identity authentication. A method for identity authentication comprises: obtaining, by...
2018/0285554 AUTHENTICATED DISCOVERABILITY OF UNIVERSAL WINDOWS APPLICATIONS TO WIN32 DESKTOP APPLICATIONS
There are presently no solutions that address Universal Windows Platform (UWP) application discoverability in a secure and/or company-specific fashion....
2018/0285553 SOFTWARE PROTECTION SYSTEM AND METHOD
A software protection system includes a user terminal and a server. According to an authorization request from the user terminal as to target software, the...
2018/0285551 AUTHENTICATION METHOD FOR A COMPUTING DEVICE USING INTERACTIVE GAME BOARD AND GAME PIECE IMAGES
An authentication method and system includes a computing device, such as a smart phone, which includes a display for presenting a graphical and interactive...
2018/0285550 SHOULDER-SURFING RESISTANT AUTHENTICATION METHODS AND SYSTEMS
A shoulder-surfing resistant authentication method and system includes a computing device, such as a smart phone, which includes a display for presenting an...
2018/0285549 AUTHORIZATION OF VIRTUAL REALITY INTERACTIONS USING CONTROLLED RANDOMIZATION
Embodiments of the disclosure are directed to the use of controlled randomization in authorizing virtual reality interactions. More specifically, a user of a...
2018/0285548 Information Handling System Display Security Access Through Totem Interactions
An information handling system security system presents a combination lock user interface at a display with numbers depicted at a perimeter of a totem placed...
2018/0285547 DYNAMIC KEYPAD FOR ACCESS CODE INPUT
A method to generate a dynamic keypad for access code input includes identifying a screen size of display of a computer device by accessing a configuration...
2018/0285546 TOKEN
The invention provides a token configured to show a time-dependent code produced by an algorithm, e.g. a pseudorandom code produce by a hash-based algorithm. A...
2018/0285545 UTILIZATION OF BIOMETRIC DATA
A method of capturing and storing a plurality of biometric data by a user on a device for a future authentication request is presented. The method includes...
2018/0285544 METHOD FOR ADAPTIVE AUTHENTICATION AND ELECTRONIC DEVICE SUPPORTING THE SAME
An electronic device and method are disclosed herein. An electronic device includes one or more biometric sensors, a memory configured to store an...
2018/0285543 ROBOT SYSTEM HAVING BIOMETRIC AUTHENTICATION FUNCTION
A robot system includes a robot, and an RF tag, the RF tag including a detection device for detecting biometric authentication information of an individual, a...
2018/0285542 METHOD AND DEVICE FOR AUTHENTICATING IDENTIFY BY MEANS OF FUSION OF MULTIPLE BIOLOGICAL CHARACTERISTICS
Provided are a method and device for authenticating an identity based on fusion of multiple biological characteristics. The method includes: collecting at...
2018/0285541 Methods and Systems for Providing Online Verification and Security
The methods and systems are designed to utilize an integrated combination of just in time, just in place, and just on device actions connected to an image...
2018/0285540 ELECTROENCEPHALOGRAPHY (EEG) BASED AUTHENTICATION
An authentication method, system, and computer program product for decoding brain activity into a brain pattern sequence, applying brain dialogue to interact...
2018/0285539 MULTIFACTOR STRONG AUTHENTICATION
Techniques are disclosed relating to multi-factor authentication of a user. In one embodiment, a computing device presents a one-time password to a user that...
2018/0285538 AUTHENTICATION METHODS AND SYSTEMS USING INTERACTIVE THREE-DIMENSIONAL ENVIRONMENTS
An authentication method and system, includes a display to present interactive three-dimensional (3D) virtual environments. The manner or sequence in which a...
2018/0285537 DIFFERENCE ATTACK PROTECTION
In one embodiment, a method for preventing a difference attack on watermarked video content is implemented on at least one computing device and includes:...
2018/0285536 DETERMINING A DATABASE SIGNATURE
A method, a computer program product, and a data processing system for determining a database signature of a database includes determining a set of...
2018/0285535 Digital Image Processing including Refinement Layer, Search Context Data, or DRM
Techniques and systems are described to support digital image processing through use of an image repository, e.g., a stock image database or other storage. In...
2018/0285534 METHODS AND APPARATUS FOR DOUBLE-INTEGRATION ORTHOGONAL SPACE TEMPERING
The orthogonal space random walk (OSRW) algorithm is generalized to be the orthogonal space tempering (OST) method via the introduction of the orthogonal space...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.