Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0005248 SYSTEM AND METHOD FOR SELECTIVE DYNAMIC ENCRYPTION
The invention relates to a computer-implemented system and method for selective dynamic encryption and decryption of data. The method may comprise the steps of...
2019/0005247 CONTENT PROTECTION METHOD
A method for displaying content received from a communication server on a display of a user terminal, receiving an unused terminal confirmation signal from the...
2019/0005246 System for Virtual Patching Security Vulnerabilities in Software Containers
An example computer-implemented method of preventing exploitation of software vulnerabilities includes determining that a software container is susceptible to...
2019/0005245 EXECUTING PROTECTED CODE
In some examples, in response to a reset of an electronic device, a method disables hardware write locking of a first region in a non-volatile memory, and...
2019/0005244 EXECUTING ENCRYPTED BOOT LOADERS
A secure boot mechanism is described. The secure boot mechanism can operate in environments not originally designed to support such a mechanism. Downstream...
2019/0005243 SEGREGATING EXECUTABLE FILES EXHIBITING NETWORK ACTIVITY
Systems, computer readable media, apparatuses, and methods are disclosed for segregating executable files exhibiting network activity. An example apparatus...
2019/0005242 Determining the Similarity of Binary Executables
In some implementations, a computing device can determine the similarity of binary executables. For example, the computing device can receive an application,...
2019/0005241 MEMORY LAYOUT BASED MONITORING
Techniques for monitoring based on a memory layout of an application are disclosed. A memory layout may be received, obtained, and/or generated from an...
2019/0005240 RESET ATTACK DETECTION
An apparatus has a number of data holding elements for holding data values which are reset to a reset value in response to a transition of a signal at a reset...
2019/0005239 ELECTRONIC DEVICE FOR ANALYZING MALICIOUS CODE AND METHOD THEREFOR
The present disclosure relates to a method for analyzing a malicious code by an electronic device, the method comprising the steps of: receiving an executable...
2019/0005238 NORMALIZING ENTRY POINT INSTRUCTIONS IN EXECUTABLE PROGRAM FILES
Systems and methods for normalizing entry point instructions include receiving a scope of instructions starting at an entry point of executable code. For each...
2019/0005237 METHOD AND APPARATUS FOR IDENTIFYING, PREDICTING, PREVENTING NETWORK MALICIOUS ATTACKS
One embodiment of this invention describes a method and apparatus for identifying, predicting, and preventing malicious attacks against low complexity sensors...
2019/0005236 ACCELERATED CODE INJECTION DETECTION USING OPERATING SYSTEM CONTROLLED MEMORY ATTRIBUTES
Methods for accelerated code injection detection using operating system controlled memory attributes are performed by systems and apparatuses. The methods...
2019/0005235 Advanced File Modification Heuristics
Examples of the present disclosure describe systems and methods for providing advanced file modification heuristics. In aspects, software content is selected...
2019/0005234 Discrete Processor Feature Behavior Collection
Examples of the present disclosure describe systems and methods for discrete processor feature behavior collection and analysis. In aspects, a monitoring...
2019/0005233 SECURE CODE OPTIMIZATION METHOD AND SYSTEM
A method of automatically generating secure code includes: receiving source code and security constraints for the source code, the security constraints...
2019/0005232 ELECTRONIC CONTROL UNIT
An electronic control unit includes: a memory saving a program that has a call/return to/from a function represented as a control flow together with the...
2019/0005231 MITIGATION OF CODE REUSE ATTACKS BY RESTRICTED INDIRECT BRANCH INSTRUCTION
A method, computer program product and/or system is disclosed. According to an aspect of this invention, one or more processors receive an indirect jump...
2019/0005230 MITIGATION OF CODE REUSE ATTACKS BY RESTRICTED INDIRECT BRANCH INSTRUCTION
A method, computer program product and/or system is disclosed. According to an aspect of this invention, one or more processors receive an indirect jump...
2019/0005229 MOBILE DEVICE HAVING TRUSTED EXECUTION ENVIRONMENT
A mechanism for securing a mobile app for execution on a mobile device. The mechanism includes loading a non-trusted portion of the mobile app from a...
2019/0005228 TRUSTED AND UNTRUSTED CODE EXECUTION IN A WORKFLOW
Methods, systems, and computer program products are described herein for implementing a workflow development system that enables users to incorporate custom...
2019/0005227 SANDBOX BASED INTERNET ISOLATION IN A TRUSTED NETWORK
Methods and systems are disclosed for sandbox based internet isolation system in a trusted network. A networked computer system may include a trusted local...
2019/0005226 AUTOMATIC UNPACKING OF EXECUTABLES
Provided are methods and systems for unpacking and analyzing malware for purposes of identification and investigation. A malicious executable or an application...
2019/0005225 DETECTION OF ATTACKS IN THE CLOUD BY CROWD SOURCING SECURITY SOLUTIONS
Methods are provided for building and tuning a correlation data structure. The correlation data structure includes relationship correlations with relationship...
2019/0005224 Trust Based Computing
A method, an apparatus and a computer program product for trust based computing in a network infrastructure including computing resources. In at least one...
2019/0005223 METHOD TO RECOVER DATA FROM A LOCKED DEVICE FOR UPLOAD TO A SERVICE
A method for recovering a digital file from a locked device is provided. An identity token is received at a recovery app on the locked device. The recovery app...
2019/0005222 Face-Controlled Liveness Verification
Techniques for implementing face-controlled liveness verification are provided. In one embodiment, a computing device can present, to a user, a sequential...
2019/0005221 AUTHENTICATION USING PRISM MEMBER
A prism member of an authentication apparatus includes a living body contact surface in contact with a visible light-radiated living body, and an imaging...
2019/0005220 SLEEP DATA CHAIN OF CUSTODY
A wearable device includes one or more biometric sensors, each of the one or more biometric sensors gathering biological data from a wearer of the wearable...
2019/0005219 INFORMATION PROCESSING APPARATUS AND METHOD
An information processing apparatus displays a control, based on generation instructions of the control to accept a user operation, such that information...
2019/0005218 AUTHENTICATION DEVICE AND AUTHENTICATION METHOD
An authentication device that uses biometric authentication includes an acquisition unit configured to acquire first biometric information of a user, a storage...
2019/0005217 USER AUTHENTICATION METHOD AND APPARATUS USING INFRARED RAY (IR) IMAGE
Provided is a user authentication method and apparatus that obtains first environmental information indicating an environmental condition in which an input...
2019/0005216 METHOD FOR AUTHENTICATING USER OF HEAD MOUNTED DISPLAY DEVICE AND HEAD MOUNTED DISPLAY DEVICE
A method of authenticating a user of a head mounted display (HMD) device includes measuring a characteristic value of a head shape of the user who wears the...
2019/0005215 METHOD FOR AUTHORISING AN ACTION BY INTERACTIVE AND INTUITIVE AUTHENTICATION OF A USER AND ASSOCIATED DEVICE
A method for authorizing an action via authentication of a user for a device comprising sensors and emitters, a processor, and a memory. The method comprises:...
2019/0005214 METHOD OF PROVIDING CONTENT ACCESS PERMISSION TO A USER AND A DEVICE THEREOF
The method and device of present disclosure relates providing content access permission to a user of the device. The device comprises an image capturing unit...
2019/0005213 AUTOMATED AUTHENTICATION AND ACCESS
A method and system for improving automated software execution is provided. The method includes receiving in real time from a video retrieval device, visual...
2019/0005212 DIRECT AUTHENTICATION SYSTEM AND METHOD VIA TRUSTED AUTHENTICATORS
Systems and methods are provided for enabling online entities to determine whether a user is truly the person who he says using a "two-factor" authentication...
2019/0005211 CONTROL APPARATUS, AUTHENTICATION APPARATUS, CONTROL SYSTEM, AND CONTROL METHOD
There is provided a control apparatus including: a secure storage unit; and a processing unit configured to control a control target on a basis of...
2019/0005210 CENTRALIZED CONSENT MANAGEMENT
A consent management system (CMS) manages a number of individual consent data records of data subjects. The CMS stores predefined consent templates to be...
2019/0005209 AUTHORISING USE OF A COMPUTER PROGRAM
A method of authorising use of a computer program only able to be used when an authorised message is received from an authorising system includes providing an...
2019/0005208 PROVISION OF SECURE CONTENT TO A DISPLAY RECEIVER DEVICE WITHOUT TRANSCRIPTION
Embodiments include apparatuses, methods, and systems including a wireless display system to provide digital right management secure content to a display...
2019/0005207 APPARATUS AND METHOD OF LAYERED LICENSING
A methodology and apparatus for layered licensing is described. A licensable item is detected on a device. A legacy license associated with the licensable item...
2019/0005206 SYSTEMS AND METHODS TO ANALYZE OPEN SOURCE COMPONENTS IN SOFTWARE PRODUCTS
Considering the number of OSS components and the number of OSS license types available today, the number of license attributes to be considered for analyzing a...
2019/0005205 COMPUTER SYSTEM PROVIDING VIRTUAL COMPUTING SESSION LICENSE DISTRIBUTION FEATURES AND RELATED METHODS
A system may include a license publishing server and a plurality of licensing servers arranged in a cluster and configured to communicate with the license...
2019/0005204 DIGITAL MEDIA REPRODUCTION AND LICENSING
Systems and methods for monetizing the reproduction of digital media content for the rights-holders of the digital media content. Embodiments of the present...
2019/0005203 SYSTEMS AND METHODS FOR VIDEO CONTENT RESTRICTION CATEGORIZATION AND EVALUATION
A method of media content discovery and playback, the method including receiving a query for media content items from a search client, the query including one...
2019/0005202 Atomic Structure Optimization
Computer system provided with a control module for controlling ab initio atomic structure modules for simulating the behavior of structures and materials at...
2019/0005201 COGNITIVE DIABETIC REGULATOR
The disclosure provides systems and methods for determining, customizing, and communicating dietary recommendations, particularly for patients suffering from...
2019/0005200 METHODS AND SYSTEMS FOR GENERATING A PATIENT DIGITAL TWIN
Methods and apparatus providing a patient digital twin are disclosed. An example apparatus includes a processor and a memory. The example processor is to...
2019/0005199 Highlighting Best-Matching Choices Of Acquisition And Reconstruction Parameters
Systems and methods are provided for indicating recommended settings for data acquisition in a medical scanner. A scan protocol including a first parameter is...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.