Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0042805 TECHNOLOGIES FOR SECURE ENUMERATION OF USB DEVICES
Technologies for secure enumeration of USB devices include a computing device having a USB controller and a trusted execution environment (TEE). The TEE may be...
2019/0042804 ENFORCING SECURE DISPLAY VIEW FOR TRUSTED TRANSACTIONS
In embodiments, an apparatus to enforce secure display view for trusted transactions may include a first input interface to receive from an application, via a...
2019/0042803 FUEL DISPENSER USER INTERFACE SYSTEM ARCHITECTURE
A vending machine user interface can include a first controller operatively connected to an input device capable of receiving payment or account information....
2019/0042802 Systems, Methods, And Apparatus For Combatting Direct Memory Access Attacks
A data processing system includes technology to detect a memory attack. The data processing system comprises a processing core, a memory controller, a memory...
2019/0042801 SECURELY EXPOSING AN ACCELERATOR TO PRIVILEGED SYSTEM COMPONENTS
Various embodiments are generally directed to securing systems that include hardware accelerators, such as FPGA-based accelerators, and privileged system...
2019/0042800 TECHNOLOGIES FOR AUTHENTICATED USB DEVICE POLICY ENFORCEMENT
Technologies for USB device policy enforcement include a computing device having a USB controller and secure enclave support. On boot, a firmware enclave...
2019/0042799 MEMORY TAGGING FOR SIDE-CHANNEL DEFENSE, MEMORY SAFETY, AND SANDBOXING
A system may use memory tagging for side-channel defense, memory safety, and sandboxing to reduce the likelihood of successful attacks. The system may include...
2019/0042798 METHOD AND APPARATUS FOR SECURE EXECUTION USING A SECURE MEMORY PARTITION
A processor capable of secure execution. The processor contains an execution unit and secure partition logic that secures a partition in memory. The processor...
2019/0042797 Security Hardware Access Management
In one example, a system for managing access to hardware components includes a processor to manage a transition of a component from a known trusted first state...
2019/0042796 TECHNOLOGIES FOR VERIFYING MEMORY INTEGRITY ACROSS MULTIPLE MEMORY REGIONS
Technologies for verifying the integrity of regions of physical memory allocated among multiple domains are described. In embodiments the technologies include...
2019/0042795 COMPRESSED INTEGRITY CHECK COUNTERS IN MEMORY
System and techniques for compressed integrity check counters in memory are described herein. A set of counters may be maintained for data areas in memory. A...
2019/0042794 SYSTEMS AND METHODS FOR AUTHENTICATING AND PROTECTING THE INTEGRITY OF DATA STREAMS AND OTHER DATA
Systems and methods are disclosed for enabling a recipient of a cryptographically-signed electronic communication to verify the authenticity of the...
2019/0042793 ACTOR MIGRATION
A method and a corresponding runtime environment for migrating an instance of an actor of an application are provided. An initiating runtime environment...
2019/0042792 TECHNIQUE USED IN TEXT ANALYSIS IN A SAFE MANNER
A first character string in a logic, wherein the logic is a rule which analyzes input text and extracts additional information used for the text analysis, used...
2019/0042791 Electronic Medical Record Datasifter
A method is presented for generating a data set from a database. The method involves iterative data manipulation that stochastically identifies candidate...
2019/0042790 METHOD AND SYSTEM TO PREVENT INFERENCE OF PERSONAL INFORMATION USING PATTERN NEUTRALIZATION TECHNIQUES
A method for neutralizing a pattern of user activity, comprises collecting data corresponding to the user activity, generating a user distribution over a...
2019/0042789 METHOD FOR CONFIGURING MOBILE ONLINE SERVICES
A method for configuring mobile online services for use with a transportation vehicle including providing a configuration system which assigns data contents to...
2019/0042788 PRIVACY-PRESERVING MULTI-CLIENT AND CLOUD COMPUTATION WITH APPLICATION TO SECURE NAVIGATION
Described is a system for cloud-based privacy-preserving navigation operations between multiple parties. The system performs a two-party computation (2PC)...
2019/0042787 ELECTRONIC DEVICE INCLUDING DISPLAY AND METHOD OF APPLYING PRIVACY FILTER
A method of applying a privacy filter to information on the display of the electronic device includes applying the privacy filter to information for display on...
2019/0042786 Query Processing with Adaptive Risk Decisioning
Provided are methods and systems for query processing with adaptive risk decisioning. An example method includes receiving a query by a client in communication...
2019/0042785 METHODS AND SYSTEMS FOR IMPLEMENTING PARENTAL CONTROLS
Methods and systems for a media guidance application that provides advanced parental control features such as allowing parents to establish parental controls...
2019/0042784 METHOD AND SYSTEM TO PREVENT ULTRASOUND DATA LEAKS IN MOBILE DEVICES
A system, method and program product for implementing an ultrasound security system for a mobile device. A system is described that includes: an app flow...
2019/0042783 EDGE CLOUD DATA PROTECTION
An embodiment of a semiconductor apparatus may include technology to receive data with a unique identifier, and bypass encryption logic of a media controller...
2019/0042782 Systems and Methods for Securing an Entity-Relationship System
A computer implemented method of securing information stored in an entity relationship database system comprising at least one entity relationship database,...
2019/0042781 Secure Storage Device
Described systems and methods allow protecting a host system against computer security threats, and in particular against ransomware and unauthorized access to...
2019/0042780 TECHNIQUES TO PROVIDE HARDWARE ENFORCED PROTECTION ENVIRONMENT FOR A SYSTEM MANAGEMENT MODE
Various embodiments are generally directed to an apparatus, method and other techniques to detect an access request to access a computing resource while in a...
2019/0042779 TRUSTWORTHY PERIPHERAL TRANSFER OF OWNERSHIP
Systems and techniques for trustworthy peripheral transfer of ownership are described herein. A unique peripheral identifier may be received from an ownership...
2019/0042778 Methods And Apparatus To Protect Digital Content With Computer-Mediated Reality
A data processing system includes technology for protecting digital content using computer-mediated reality (CMR). The system comprises a processor, first and...
2019/0042777 SYSTEM AND METHOD FOR CONTROLLING REVIEWS IN AN APPLICATION STORE
Disclosed are systems and methods for blocking access to interface elements of a page of an application in an applications store. In one exemplary aspect, a...
2019/0042776 SECURE DATA PARSER METHOD AND SYSTEM
The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention...
2019/0042775 METHOD FOR OPERATING AN ACCESS CONTROL SYSTEM COMPRISING A SERVER, AT LEAST ONE ACCESS CONTROL DEVICE AND AT...
A method of operating an access control system comprising a server (3), a control device (4) and a point of sales device (1) for access permissions to a...
2019/0042774 MOBILE DEVICE AUTHENTICATED PRINT
An authenticated print session allows a mobile device to authenticate an encrypted file for printing at a print device sent by a base computer. The base...
2019/0042773 INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND DISTRIBUTED COMPONENT
Disclosed are an information processing device, information processing method, and a distributed component. The information processing device according to one...
2019/0042772 COLLECTION FOLDER FOR COLLECTING FILE SUBMISSIONS
A content management system for collecting files from one or more authenticated submitters in a collection folder. A collector, who generates the collection...
2019/0042771 COLLECTION FOLDER FOR COLLECTING FILE SUBMISSIONS
A content management system for collecting files from one or more submitters in a collection folder. A collector, who generates the collection folder, can...
2019/0042770 SYSTEMS AND METHODS FOR ATTACHED DIGITAL STORAGE DEVICES
Systems and methods for attached digital storage devices are provided. In some embodiments, a method of operation of a storage device includes receiving a...
2019/0042769 PRIVACY ASSEMBLY FOR IMAGE CAPTURE DEVICE
Techniques and apparatus for preventing unauthorized use of an image capture device are described. In one embodiment, for example, an apparatus may include an...
2019/0042768 RELIABLY RECOVERING STORED DATA IN A DISPERSED STORAGE NETWORK
A method begins by a processing module of a dispersed storage network (DSN) determining a fault domain for a portion of the DSN and generating a local...
2019/0042767 ENCRYPTED SEARCH INDEXES
In one example, a method includes defining a token protocol, creating, based on the token protocol, a set of tokens, each of the tokens being associated with...
2019/0042766 System, Apparatus And Method For Configurable Trusted Input/Output Access From Authorized Software
In one embodiment, an apparatus includes: a memory encryption circuit to encrypt data from a protected device, the data to be stored to a memory; and a filter...
2019/0042765 SECURITY DEVICES, ELECTRONIC DEVICES AND METHODS OF OPERATING ELECTRONIC DEVICES
A security device includes a secure processor, a mail box, a cryptographic intellectual property (IP), a secure direct memory access (DMA) circuit, and an...
2019/0042764 Cryptographic Memory Ownership Table For Secure Public Cloud
In a public cloud environment, each consumer's/guest's workload is encrypted in a cloud service provider's (CSP's) server memory using a consumer-provided key...
2019/0042763 MODEL TRAINING METHOD AND APPARATUS BASED ON DATA SHARING
Techniques for data sharing between a data miner and a data provider are provided. A set of public parameters is downloaded from the data miner. The public...
2019/0042762 RUNTIME ANALYSIS OF SOFTWARE SECURITY VULNERABILITIES
During runtime of the software application, the runtime analysis framework may assign input tags to objects associated with the user requests. The input tags...
2019/0042761 TECHNIQUES TO DETECT PERTURBATION ATTACKS WITH AN ACTOR-CRITIC FRAMEWORK
Embodiments discussed herein may be generally directed to systems and techniques to generate a quality score based on an observation and an action caused by an...
2019/0042760 COMPILING TECHNIQUES FOR HARDENING SOFTWARE PROGRAMS AGAINST BRANCHING PROGRAMMING EXPLOITS
Technologies are provided in embodiments for using compiling techniques to harden software programs from branching exploits. One example includes program...
2019/0042759 TECHNOLOGIES FOR FAST LAUNCH OF TRUSTED CONTAINERS
Technologies for fast launch of trusted containers include a computing device having a trusted platform module (TPM). The computing device measures a container...
2019/0042758 A METHOD OF VERIFYING THE INTEGRITY OF AN ELECTRONIC DEVICE, AND A CORRESPONDING ELECTRONIC DEVICE
A method and devices for verifying the integrity of an electronic device having connected thereto at least one connectable or disconnectable component. The...
2019/0042757 MECHANISMS FOR BOOTING A COMPUTING DEVICE AND PROGRAMMABLE CIRCUIT
Apparatus, systems, or methods for a programmable circuit to facilitate a processor to boot a computing device having the processor. A programmable circuit may...
2019/0042756 TECHNOLOGIES FOR PRE-BOOT BIOMETRIC AUTHENTICATION
A method of providing authentication services for a hardware component within a secure execution environment during a pre-boot process is provided. The method...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.