At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
2019/0005248 |
SYSTEM AND METHOD FOR SELECTIVE DYNAMIC ENCRYPTION The invention relates to a computer-implemented system and method for selective dynamic encryption and decryption of data. The method may comprise the steps of... |
2019/0005247 |
CONTENT PROTECTION METHOD A method for displaying content received from a communication server on a display of a user terminal, receiving an unused terminal confirmation signal from the... |
2019/0005246 |
System for Virtual Patching Security Vulnerabilities in Software
Containers An example computer-implemented method of preventing exploitation of software vulnerabilities includes determining that a software container is susceptible to... |
2019/0005245 |
EXECUTING PROTECTED CODE In some examples, in response to a reset of an electronic device, a method disables hardware write locking of a first region in a non-volatile memory, and... |
2019/0005244 |
EXECUTING ENCRYPTED BOOT LOADERS A secure boot mechanism is described. The secure boot mechanism can operate in environments not originally designed to support such a mechanism. Downstream... |
2019/0005243 |
SEGREGATING EXECUTABLE FILES EXHIBITING NETWORK ACTIVITY Systems, computer readable media, apparatuses, and methods are disclosed for segregating executable files exhibiting network activity. An example apparatus... |
2019/0005242 |
Determining the Similarity of Binary Executables In some implementations, a computing device can determine the similarity of binary executables. For example, the computing device can receive an application,... |
2019/0005241 |
MEMORY LAYOUT BASED MONITORING Techniques for monitoring based on a memory layout of an application are disclosed. A memory layout may be received, obtained, and/or generated from an... |
2019/0005240 |
RESET ATTACK DETECTION An apparatus has a number of data holding elements for holding data values which are reset to a reset value in response to a transition of a signal at a reset... |
2019/0005239 |
ELECTRONIC DEVICE FOR ANALYZING MALICIOUS CODE AND METHOD THEREFOR The present disclosure relates to a method for analyzing a malicious code by an electronic device, the method comprising the steps of: receiving an executable... |
2019/0005238 |
NORMALIZING ENTRY POINT INSTRUCTIONS IN EXECUTABLE PROGRAM FILES Systems and methods for normalizing entry point instructions include receiving a scope of instructions starting at an entry point of executable code. For each... |
2019/0005237 |
METHOD AND APPARATUS FOR IDENTIFYING, PREDICTING, PREVENTING NETWORK
MALICIOUS ATTACKS One embodiment of this invention describes a method and apparatus for identifying, predicting, and preventing malicious attacks against low complexity sensors... |
2019/0005236 |
ACCELERATED CODE INJECTION DETECTION USING OPERATING SYSTEM CONTROLLED
MEMORY ATTRIBUTES Methods for accelerated code injection detection using operating system controlled memory attributes are performed by systems and apparatuses. The methods... |
2019/0005235 |
Advanced File Modification Heuristics Examples of the present disclosure describe systems and methods for providing advanced file modification heuristics. In aspects, software content is selected... |
2019/0005234 |
Discrete Processor Feature Behavior Collection Examples of the present disclosure describe systems and methods for discrete processor feature behavior collection and analysis. In aspects, a monitoring... |
2019/0005233 |
SECURE CODE OPTIMIZATION METHOD AND SYSTEM A method of automatically generating secure code includes: receiving source code and security constraints for the source code, the security constraints... |
2019/0005232 |
ELECTRONIC CONTROL UNIT An electronic control unit includes: a memory saving a program that has a call/return to/from a function represented as a control flow together with the... |
2019/0005231 |
MITIGATION OF CODE REUSE ATTACKS BY RESTRICTED INDIRECT BRANCH INSTRUCTION A method, computer program product and/or system is disclosed. According to an aspect of this invention, one or more processors receive an indirect jump... |
2019/0005230 |
MITIGATION OF CODE REUSE ATTACKS BY RESTRICTED INDIRECT BRANCH INSTRUCTION A method, computer program product and/or system is disclosed. According to an aspect of this invention, one or more processors receive an indirect jump... |
2019/0005229 |
MOBILE DEVICE HAVING TRUSTED EXECUTION ENVIRONMENT A mechanism for securing a mobile app for execution on a mobile device. The mechanism includes loading a non-trusted portion of the mobile app from a... |
2019/0005228 |
TRUSTED AND UNTRUSTED CODE EXECUTION IN A WORKFLOW Methods, systems, and computer program products are described herein for implementing a workflow development system that enables users to incorporate custom... |
2019/0005227 |
SANDBOX BASED INTERNET ISOLATION IN A TRUSTED NETWORK Methods and systems are disclosed for sandbox based internet isolation system in a trusted network. A networked computer system may include a trusted local... |
2019/0005226 |
AUTOMATIC UNPACKING OF EXECUTABLES Provided are methods and systems for unpacking and analyzing malware for purposes of identification and investigation. A malicious executable or an application... |
2019/0005225 |
DETECTION OF ATTACKS IN THE CLOUD BY CROWD SOURCING SECURITY SOLUTIONS Methods are provided for building and tuning a correlation data structure. The correlation data structure includes relationship correlations with relationship... |
2019/0005224 |
Trust Based Computing A method, an apparatus and a computer program product for trust based computing in a network infrastructure including computing resources. In at least one... |
2019/0005223 |
METHOD TO RECOVER DATA FROM A LOCKED DEVICE FOR UPLOAD TO A SERVICE A method for recovering a digital file from a locked device is provided. An identity token is received at a recovery app on the locked device. The recovery app... |
2019/0005222 |
Face-Controlled Liveness Verification Techniques for implementing face-controlled liveness verification are provided. In one embodiment, a computing device can present, to a user, a sequential... |
2019/0005221 |
AUTHENTICATION USING PRISM MEMBER A prism member of an authentication apparatus includes a living body contact surface in contact with a visible light-radiated living body, and an imaging... |
2019/0005220 |
SLEEP DATA CHAIN OF CUSTODY A wearable device includes one or more biometric sensors, each of the one or more biometric sensors gathering biological data from a wearer of the wearable... |
2019/0005219 |
INFORMATION PROCESSING APPARATUS AND METHOD An information processing apparatus displays a control, based on generation instructions of the control to accept a user operation, such that information... |
2019/0005218 |
AUTHENTICATION DEVICE AND AUTHENTICATION METHOD An authentication device that uses biometric authentication includes an acquisition unit configured to acquire first biometric information of a user, a storage... |
2019/0005217 |
USER AUTHENTICATION METHOD AND APPARATUS USING INFRARED RAY (IR) IMAGE Provided is a user authentication method and apparatus that obtains first environmental information indicating an environmental condition in which an input... |
2019/0005216 |
METHOD FOR AUTHENTICATING USER OF HEAD MOUNTED DISPLAY DEVICE AND HEAD
MOUNTED DISPLAY DEVICE A method of authenticating a user of a head mounted display (HMD) device includes measuring a characteristic value of a head shape of the user who wears the... |
2019/0005215 |
METHOD FOR AUTHORISING AN ACTION BY INTERACTIVE AND INTUITIVE
AUTHENTICATION OF A USER AND ASSOCIATED DEVICE A method for authorizing an action via authentication of a user for a device comprising sensors and emitters, a processor, and a memory. The method comprises:... |
2019/0005214 |
METHOD OF PROVIDING CONTENT ACCESS PERMISSION TO A USER AND A DEVICE
THEREOF The method and device of present disclosure relates providing content access permission to a user of the device. The device comprises an image capturing unit... |
2019/0005213 |
AUTOMATED AUTHENTICATION AND ACCESS A method and system for improving automated software execution is provided. The method includes receiving in real time from a video retrieval device, visual... |
2019/0005212 |
DIRECT AUTHENTICATION SYSTEM AND METHOD VIA TRUSTED AUTHENTICATORS Systems and methods are provided for enabling online entities to determine whether a user is truly the person who he says using a "two-factor" authentication... |
2019/0005211 |
CONTROL APPARATUS, AUTHENTICATION APPARATUS, CONTROL SYSTEM, AND CONTROL
METHOD There is provided a control apparatus including: a secure storage unit; and a processing unit configured to control a control target on a basis of... |
2019/0005210 |
CENTRALIZED CONSENT MANAGEMENT A consent management system (CMS) manages a number of individual consent data records of data subjects. The CMS stores predefined consent templates to be... |
2019/0005209 |
AUTHORISING USE OF A COMPUTER PROGRAM A method of authorising use of a computer program only able to be used when an authorised message is received from an authorising system includes providing an... |
2019/0005208 |
PROVISION OF SECURE CONTENT TO A DISPLAY RECEIVER DEVICE WITHOUT
TRANSCRIPTION Embodiments include apparatuses, methods, and systems including a wireless display system to provide digital right management secure content to a display... |
2019/0005207 |
APPARATUS AND METHOD OF LAYERED LICENSING A methodology and apparatus for layered licensing is described. A licensable item is detected on a device. A legacy license associated with the licensable item... |
2019/0005206 |
SYSTEMS AND METHODS TO ANALYZE OPEN SOURCE COMPONENTS IN SOFTWARE PRODUCTS Considering the number of OSS components and the number of OSS license types available today, the number of license attributes to be considered for analyzing a... |
2019/0005205 |
COMPUTER SYSTEM PROVIDING VIRTUAL COMPUTING SESSION LICENSE DISTRIBUTION
FEATURES AND RELATED METHODS A system may include a license publishing server and a plurality of licensing servers arranged in a cluster and configured to communicate with the license... |
2019/0005204 |
DIGITAL MEDIA REPRODUCTION AND LICENSING Systems and methods for monetizing the reproduction of digital media content for the rights-holders of the digital media content. Embodiments of the present... |
2019/0005203 |
SYSTEMS AND METHODS FOR VIDEO CONTENT RESTRICTION CATEGORIZATION AND
EVALUATION A method of media content discovery and playback, the method including receiving a query for media content items from a search client, the query including one... |
2019/0005202 |
Atomic Structure Optimization Computer system provided with a control module for controlling ab initio atomic structure modules for simulating the behavior of structures and materials at... |
2019/0005201 |
COGNITIVE DIABETIC REGULATOR The disclosure provides systems and methods for determining, customizing, and communicating dietary recommendations, particularly for patients suffering from... |
2019/0005200 |
METHODS AND SYSTEMS FOR GENERATING A PATIENT DIGITAL TWIN Methods and apparatus providing a patient digital twin are disclosed. An example apparatus includes a processor and a memory. The example processor is to... |
2019/0005199 |
Highlighting Best-Matching Choices Of Acquisition And Reconstruction
Parameters Systems and methods are provided for indicating recommended settings for data acquisition in a medical scanner. A scan protocol including a first parameter is... |