Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0042755 System and Method to Isolate Host and System Management in an Information Handling System
An information handling system includes a central processing unit, a memory, and a service processor. The central processing unit executes an operating system...
2019/0042754 AUTHENTICATING A BOOT PATH UPDATE
A method and an information handling system (IHS) for authenticating boot path updates in an IHS. The method includes initializing, by an image loader of the...
2019/0042753 VALIDATING AN IMAGE USING AN EMBEDDED HASH IN AN INFORMATION HANDLING SYSTEM
A method, an information handling system (IHS) and a validation system for validating an image using an embedded hash. The method includes retrieving, via a...
2019/0042752 METHODS AND APPARATUS FOR PLATFORM FIRMWARE RESILIENCE
Methods, apparatus, systems and articles of manufacture for platform firmware resilience are disclosed. An example apparatus includes a baseboard management...
2019/0042751 FIRMWARE MODULE ENCRYPTION
Examples associated with firmware encryption are described. One example device firmware includes a base module. The base module controls a base function of the...
2019/0042750 PLUGGABLE TRUST ARCHITECTURE
A pluggable trust architecture addresses the problem of establishing trust in hardware. The architecture has low impact on system performance and comprises a...
2019/0042749 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PROTECTING A COMPUTER SYSTEM FROM ATTACKS
A system for protecting a computer system interfacing with peripheral elements via a generic port associated with an open standard interface, the system...
2019/0042748 USING LSTM ENCODER-DECODER ALGORITHM FOR DETECTING ANOMALOUS ADS-B MESSAGES
A method for detecting anomalous ADS-B messages in airplanes and air-traffic control system, comprising: extracting features from application level data, which...
2019/0042747 CONTROLLED INTRODUCTION OF UNCERTAINTY IN SYSTEM OPERATING PARAMETERS
The present disclosure is directed to systems and methods for mitigating or eliminating the effectiveness of a side channel attack, such as a Meltdown or...
2019/0042746 METHODS, SYSTEMS AND APPARATUS TO DETECT POLYMORPHIC MALWARE
The disclosed embodiments generally relate to detecting malware through detection of micro-architectural changes (morphing events) when executing a code at a...
2019/0042745 DEEP LEARNING ON EXECUTION TRACE DATA FOR EXPLOIT DETECTION
Technologies disclosed herein provide for converting a first data of a first control flow packet to a first pixel, where the first data indicates one or more...
2019/0042744 RANSOMWARE ATTACK ONSET DETECTION
A method of detecting the onset of a ransomware attack is presented. In an example embodiment, file backup metadata for each of a plurality of computing...
2019/0042743 MALWARE DETECTION AND CLASSIFICATION USING ARTIFICIAL NEURAL NETWORK
An apparatus for computing is presented. In embodiments, the apparatus may include a converter to receive and convert a binary file into a multi-dimensional...
2019/0042742 MOVING TARGET DEFENSES FOR DATA STORAGE DEVICES
Systems and methods for actively securing data storage devices utilize the technique of storage virtualization. In embodiments, would-be cyberattackers are...
2019/0042741 TECHNOLOGIES FOR CONTROL PLANE SEPARATION IN A NETWORK INTERFACE CONTROLLER
Technologies for control plane separation at a network interface controller (NIC) of a compute device configured to transmit, by a resource of the compute...
2019/0042740 SYSTEM AND METHOD TO IDENTIFY A NO-OPERATION (NOP) SLED ATTACK
Particular embodiments described herein provide for an electronic device that can be configured to help with the identification of a no-operation (NOP) sled...
2019/0042739 TECHNOLOGIES FOR CACHE SIDE CHANNEL ATTACK DETECTION AND MITIGATION
Technologies for cache side channel attack detection and mitigation include an analytics server and one or more monitored computing devices. The analytics...
2019/0042738 PHYSICS-BASED APPROACH FOR ATTACK DETECTION AND LOCALIZATION IN CLOSED-LOOP CONTROLS FOR AUTONOMOUS VEHICLES
Methods and apparatus relating to a physics-based approach for attack detection and/or localization in closed-loop controls for autonomous vehicles are...
2019/0042737 INTRUSION DETECTION SYSTEM ENRICHMENT BASED ON SYSTEM LIFECYCLE
Techniques are described for automatically incorporating lifecycle information for a secured environment (SE) into an intrusion detection system monitoring the...
2019/0042736 IINTRUSION DETECTION SYSTEM ENRICHMENT BASED ON SYSTEM LIFECYCLE
Techniques are described for automatically incorporating lifecycle context information for a secured environment into an intrusion detection system monitoring...
2019/0042735 MITIGATING SIDE-CHANNEL ATTACKS USING EXECUTABLE ONLY MEMORY (XOM)
Thus, the present disclosure is directed to systems and methods that include side channel defender circuitry to protect shared code pages in executable only...
2019/0042734 METHODS AND ARRANGEMENTS FOR IMPLICIT INTEGRITY
Logic may implement implicit integrity techniques to maintain integrity of data. Logic may perform operations on data stored in main memory, cache, flash, data...
2019/0042733 SECURING UNTRUSTED CODE USING MEMORY PROTECTION KEY AND CONTROL FLOW INTEGRITY
Systems, apparatuses and methods may provide technology for securing untrusted code using memory protection keys and control flow integrity, by applying a...
2019/0042732 TECHNOLOGIES FOR USB CONTROLLER STATE INTEGRITY PROTECTION
Technologies for USB controller state integrity protection are disclosed. A computing device reserves an isolated memory region in system memory and programs a...
2019/0042730 Systems, Methods, And Apparatus For Detecting Control Flow Attacks
After a heuristic event counter in a processor has triggered a performance monitoring interrupt (PMI) when the processor was executing a target program in user...
2019/0042729 TECHNOLOGIES FOR USB CONTROLLER STATE INTEGRITY PROTECTION WITH TRUSTED I/O
Technologies for USB controller state integrity protection with trusted I/O are disclosed. A computing device includes an I/O controller, a channel identifier...
2019/0042728 Data packet generator for generating passcodes
A data packet generator periodically generates a data packet including a passcode comprising a plurality of characters. The data packet is sent to a server or...
2019/0042727 Database access monitoring with selective session information retrieval
A database access control system is augmented to enable an external security device to fully assess a database query against a security policy even when the...
2019/0042726 MANAGEMENT SYSTEM, VEHICLE, AND INFORMATION PROCESSING METHOD
Provided is a management system including vehicles and authentication servers. A vehicle includes a communication circuit, multiple electronic control units...
2019/0042725 System, Apparatus And Method For Independently Recovering A Credential
In one embodiment, an apparatus includes a non-volatile storage to store a seed value and a signature that is based on an iterative execution of a function for...
2019/0042724 METHOD AND DEVICE FOR UNLOCKING TERMINAL
A method that includes displaying a masking image layer on a terminal screen when receiving a start instruction used to start an application; receiving an...
2019/0042723 MULTI-FACTOR AUTHENTICATION SYSTEM AND METHOD
A system and method of multi-factor authentication are described. In some embodiments, a first device provides an initial authentication data to a second...
2019/0042722 SYSTEMS AND METHODS FOR SECURING OPERATION OF AN ULTRASOUND SCANNER
The present embodiments relate generally to systems and methods for securing operation of an ultrasound scanner for use with a multi-use electronic display...
2019/0042721 BIOMETRICS AUTHENTICATION SYSTEM
A biometrics authentication system having a small and simple configuration and being capable of implementing both of biometrics authentication and position...
2019/0042720 APPARATUS FOR AUTHENTICATING PACKAGE DELIVERY
The various embodiments herein provide an improved apparatus for authenticating a consignee of a consignment. The apparatus is configured to be used by any...
2019/0042719 ELECTRONIC IDENTITY VERIFICATION
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for obtaining identity verification information of a...
2019/0042718 BIOMETRIC AUTHENTICATION TECHNIQUES
Techniques are disclosed relating to biometric authentication, e.g., facial recognition. In some embodiments, a device is configured to verify that image data...
2019/0042717 METHOD FOR AUTHENTICATING A USER OF AN ELECTRONIC DEVICE
An electronic device includes a display area, at least one signal source, and at least one biometric sensor. Authenticating a user of the electronic device...
2019/0042716 BIOMETRIC SIGNATURE SYSTEM AND BIOMETRIC CERTIFICATE REGISTRATION METHOD
This biometric signature system comprises: a biometric certificate storage module that stores a biometric certificate generated on the basis of a user's...
2019/0042715 DISTRIBUTED BIOMETRIC IDENTIFICATION SYSTEM FOR A MOBILE ENVIRONMENT
A method and mobile device for identifying a current user of the mobile device as a trusted user is provided. The mobile device determines that a current user...
2019/0042714 DIGITAL AUTHENTICATION SYSTEM
A digital authentication system includes an authentication device and a central computer device. The authentication device includes a signal identification...
2019/0042713 SECURING APPLICATIONS ON MOBILE DEVICES
A system and methods for securing an application package of a software application prior to installation and during the usage of the software application on...
2019/0042712 SOFTWARE INTELLECTUAL PROPERTY PROTECTION SYSTEMS AND METHODS FOR EMBEDDED PLATFORMS
Presented are software IP protection systems and methods that prevent potential attackers as well as customers from having access to plain text versions of...
2019/0042711 DYNAMIC FUNCTIONAL OBFUSCATION
An apparatus includes a trigger generator and at least one multiplexer. The trigger generator is configured to generate a non-periodic trigger output. The at...
2019/0042710 APPLICATION BASED CHECKPOINTING CONTROL FOR STORAGE DEVICE
An embodiment of a semiconductor apparatus may include technology to receive an application-related checkpoint request corresponding to a file of a file system...
2019/0042709 Technique for Enabling Nominal Flow of an Executable File
A technique for enabling nominal flow of an executable file on a client is described. The executable file comprises executable code lacking at least one...
2019/0042708 SYSTEMS AND METHODS FOR SECURE ELEMENT REGISTRATION AND PROVISIONING
A method for registering and provisioning an electronic device is provided. The method includes a step of inserting a first keypair into a secure element of...
2019/0042707 GENERATING LICENSE FILES IN AN INFORMATION HANDLING SYSTEM
A method, an information handling system (IHS) and a license file generating system for generating a license file. The method includes receiving, via a...
2019/0042706 DISPLAY OF PROTECTED CONTENT USING TRUSTED EXECUTION ENVIRONMENT
The present disclosure is directed to secure processing and display of protected content. The use of a trusted execution environment (TEE) to handle...
2019/0042705 REALIZATION METHOD FOR COMPUTER-AIDED SCREENING OF SMALL MOLECULE COMPOUND TARGET APTAMER
The invention relates to a realization method for computer-aided screening of target aptamers and small molecule compounds, which is realized by adopting a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.