Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0330122 IDENTIFYING STOLEN DATABASES
A method, computer system, and a computer program product for identifying a hacked database is provided. The present invention may include generating a marked...
2018/0330121 IDENTIFYING STOLEN DATABASES
A method, computer system, and a computer program product for identifying a hacked database is provided. The present invention may include generating a marked...
2018/0330120 Stacked Encryption
Various embodiments of the present technology generally relate to file sharing, encryption, and protection of digital assets. More specifically, some...
2018/0330119 Security Systems and Methods for Encoding and Decoding Content
Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data...
2018/0330118 METHODS AND SYSTEMS FOR INTELLIGENTLY CONDUCTING ENCRYPTION IN CHAT ROOM COMMUNICATIONS
According to embodiments of the invention, systems and methods are directed to an intelligent, real-time security protocol for encrypting certain...
2018/0330117 MOBILE OBJECT AND ANTENNA AUTOMATIC ALIGNMENT METHOD AND SYSTEM THEREOF
An antenna automatic alignment method for a rotor unmanned aerial vehicle (UAV) includes acquiring current feature information of a plurality of antennas of...
2018/0330116 METHODS AND APPARATUS USING HUMAN ELECTROCARDIOGRAM TO PROTECT ELECTRONIC DATA
In a method for protecting electronic data, a data processing system (20, 20A, 20B) uses (a) a master electrocardiogram (ECG) identifier (44) for an authorized...
2018/0330115 MOBILE DEVICE MANAGEMENT AT A HEALTHCARE FACILITY
A method includes receiving, at a mobile device management (MDM) server, a message indicating a location at a healthcare facility. The method also includes...
2018/0330114 CONTROLLING ACCESS TO PROTECTED INFORMATION
Controlling access to protected information stored in a database. Certain records in the database can be designated as master records. Master records are...
2018/0330113 CONTROLLING ACCESS TO PROTECTED INFORMATION
Controlling access to protected information stored in a database. Certain records in the database can be designated as master records. Master records are...
2018/0330112 MEDIA STREAMING
A media playback system for presenting to a user a composition of a plurality of media streams. It has a media selection component configured to receive a...
2018/0330111 DEVICE WITH COMMUNICATION INTERFACE AND METHOD FOR CONTROLLING DATABASE ACCESS
The invention relates to a device that is set up for device-internal handling of data in a text format, that has a communication interface set up to...
2018/0330110 Systems and Methods to Control Access to Components of Virtual Objects
A computing system and method to implement a three-dimensional virtual reality world having user created virtual objects. A platonic object identifies a list...
2018/0330109 CRYPTOGRAPHIC UNIT FOR PUBLIC KEY INFRASTRUCTURE (PKI) OPERATIONS
A module such as an M2M device or a mobile phone can include a removable data storage unit. The removable data storage unit can include a nonvolatile memory, a...
2018/0330108 UPDATING MONITORING SYSTEMS USING MERGED DATA POLICIES
An example system includes a processor to monitor a data asset and associated access policies to be synchronized to detect a trigger. The processor is to also...
2018/0330107 UPDATING MONITORING SYSTEMS USING MERGED DATA POLICIES
An example system includes a processor to monitor a data asset and associated access policies to be synchronized to detect a trigger. The processor is to also...
2018/0330106 Access Control Lists for High-Performance Naming Service
A naming service for a hierarchical namespace. The naming service includes a database system with a first table having first records. Each of the first records...
2018/0330105 Data Anonymity
The present invention may be a method, a system, and a computer program product. An embodiment of the present invention provides a method for ensuring...
2018/0330104 Data Anonymity
The present invention may be a method, a system, and a computer program product. An embodiment of the present invention provides a method for ensuring...
2018/0330103 Automatic Generation of Data-Centric Attack Graphs
Generating an attack graph to protect sensitive data objects from attack is provided. The attack graph that includes nodes representing components in a set of...
2018/0330102 Using the Same Query Language for Static and Dynamic Application Security Testing Tools
A computer program is evaluated for security vulnerabilities by formulating a query in a query language and receiving into a memory of a computer source code...
2018/0330101 IDENTIFYING COMPUTER PROGRAM SECURITY ACCESS CONTROL VIOLATIONS USING STATIC ANALYSIS
Techniques for identifying computer program security access control violations using static program analysis are provided. In one example, a ...
2018/0330100 PRIVACY RISK ASSESSMENTS
Example implementations relate to privacy risk assessments. Some implementations may include a privacy risk identification engine to automatically identify...
2018/0330099 DETECTING VULNERABILITIES IN A WEB APPLICATION
Examples relate to detecting vulnerabilities in a web application. One example enables identifying a set of inputs in a web application input form. The set of...
2018/0330098 METHOD TO VERIFY THE EXECUTION INTEGRITY OF AN APPLICATION IN A TARGET DEVICE
A method to verify, by a verification server, an execution integrity of an application in a target device, comprising the steps of sending to the target device...
2018/0330097 IDENTIFYING COMPUTER PROGRAM SECURITY ACCESS CONTROL VIOLATIONS USING STATIC ANALYSIS
Techniques for identifying computer program security access control violations using static program analysis are provided. In one example, a ...
2018/0330095 COLLATED MULTI-IMAGE CHECK IN SYSTEM-ON-CHIPS
Various additional and alternative aspects are described herein. In some aspects, the present disclosure provides a method of authenticating executable images...
2018/0330094 SYSTEMS AND METHODS FOR SECURELY MANAGING PROGRAM EXECUTION
Disclosed are various embodiments securing the execution of unauthorized applications on a computing device. A file system stored in a storage device includes...
2018/0330093 PERFORMING AN ACTION BASED ON A PRE-BOOT MEASUREMENT OF A FIRMWARE IMAGE
Examples disclosed herein relate to performing an action based on a pre-boot measurement of a firmware image. In an example, at a firmware component in a...
2018/0330092 Method and Apparatus for Trusted Execution of Applications
A system and methodology for providing trusted execution of applications is provided. The computing system includes system hardware including memory. A Trusted...
2018/0330091 SYSTEM AND METHOD FOR MONITORING POWER CONSUMPTION TO DETECT MALWARE
A system and method (referred to as the system) detects malware, viruses, and/or malicious activity by generating a direct current source power consumption...
2018/0330090 SYSTEM AND METHOD FOR DISARMING MALICIOUS CODE
The disclosed embodiments include a method for disarming malicious code in a computer system having a processor. The method comprises accessing, by the...
2018/0330089 SYSTEM AND METHOD FOR PROTECTING SYSTEMS FROM MALICIOUS ATTACKS
The disclosed embodiments include a method of disarming malicious code in a computer system having a processor. The method comprises receiving, by the computer...
2018/0330088 SYSTEMS AND METHODS FOR AUTOMATIC SNAPSHOTTING OF BACKUPS BASED ON MALICIOUS MODIFICATION DETECTION
The present disclosure describes systems and methods for detection and mitigation of malicious activity regarding user data by a network backup system. In a...
2018/0330087 Image Storage with In-Situ Image-Searching Capabilities
A preferred image storage with in-situ image-searching capabilities comprises a plurality of storage-processing units (SPU), with each SPU comprising at least...
2018/0330086 METHOD, DEVICE AND PROGRAM FOR CHECKING AND KILLING A BACKDOOR FILE, AND READABLE MEDIUM
A method, device and program for checking and killing a backdoor file and a readable medium, wherein the method comprises: acquiring a historical deletion...
2018/0330085 Systems and Methods of Application Control in Virtualized Environments
Described systems and methods enable enforcing application control remotely and automatically, on a relatively large number of client systems (e.g., a...
2018/0330084 MEMORY ATTACK DETECTION
Technologies are generally described for systems, devices and methods effective to detect a potential attack on a memory of a memory device. In some examples,...
2018/0330083 ANOMALY FORECASTING AND EARLY WARNING GENERATION
The example embodiments are directed to a system and method for forecasting anomalies in feature detection. In one example, the method includes storing feature...
2018/0330082 PRESERVING SYSTEM INTEGRITY USING FILE MANIFESTS
A system is described for preserving integrity of computing devices. A manifest that uniquely identifies files on a computing device is periodically captured...
2018/0330081 EXECUTION ENVIRONMENT VIRTUALIZATION METHOD AND APPARATUS AND VIRTUAL EXECUTION ENVIRONMENT ACCESS METHOD AND...
The present disclosure provides an execution environment virtualization method. The method includes: creating an ordinary virtual machine and a trusted virtual...
2018/0330080 ISOLATED REMOTELY-VIRTUALIZED MOBILE COMPUTING ENVIRONMENT
Isolated remotely-virtualized computing environment for a mobile device. The mobile device is configured to connect with a virtualized mobile system (VMS)...
2018/0330079 ENCLAVE POOL MANAGEMENT
The public enclave key of each enclave in an enclave pool may be registered in an enclave pool registry, and the registry updated each time there is an enclave...
2018/0330078 ENCLAVE POOL SHARED KEY
In one example, an enclave pool is formed. The enclave pool may include a plurality of enclaves. Each enclave may have a private enclave key and a public...
2018/0330077 ENCLAVE POOLS
The disclosed technology is generally directed to secure transactions. In one example of the technology, an enclave pool is formed. The enclave pool may...
2018/0330076 Hacking-Resistant Computer Design
A computer architecture is disclosed for implementing a hacking-resistant computing device. The computing device, which could be a mainframe computer, personal...
2018/0330075 TIMER AND CONTENT SECURITY
A method, computer system, and a computer program product for timing secured content is provided. The present invention may include receiving a connection...
2018/0330074 SYSTEMS AND METHODS FOR TRACKING AND AUTHENTICATING DATA
The system assigns an automatically determined value to a first set of data at a first point in time, where the value is adjusted based on an independent...
2018/0330073 AUTHENTICATION DEVICE AND SYSTEM
A public key architecture (160) includes a dual certificate hierarchy which facilitates two independent authentication functions. One of the authentication...
2018/0330072 SYSTEMS AND METHODS FOR INTEGRATING WITH A NATIVE COMPONENT USING A NETWORK INTERFACE
Embodiments as disclosed herein may provide systems and methods for component integration and security. In particular, in one embodiment, a native component...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.