Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0080099 PERFORMING OPERATIONS ON INTELLIGENT STORAGE WITH HARDENED INTERFACES
A storage device can include processing and cryptographic capability enabling the device to function as a hardware security module (HSM). This includes the...
2019/0080098 SYSTEM AND METHOD TO PROTECT USER PRIVACY IN MULTIMEDIA UPLOADED TO INTERNET SITES
A system and method for protecting user privacy in multimedia uploaded to Internet sites. Briefly stated, the method includes receiving, by a server hosting an...
2019/0080097 METHODS AND SYSTEMS FOR RENDERING HOLOGRAPHIC CONTENT
Embodiments for rendering holographic content by one or more processors are described. A security level associated with holographic content is determined. A...
2019/0080096 EXECUTION PROCESS OF BINARY CODE OF FUNCTION SECURED BY MICROPROCESSOR
In this method, a securing hardware module of a microprocessor: 1) verifies (176) the integrity and the authenticity of a cryptogram contained in a code line...
2019/0080095 SECURITY RISK MANAGEMENT SYSTEM, SERVER, CONTROL METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM
A security risk management system (305) of the present disclosure includes a server (310) and an agent unit (320) included in a terminal. The server (310)...
2019/0080093 SECURE SELECTIVE LOAD OF DYNAMIC PAGED SEGMENTS IN MEMORY CONSTRAINED SYSTEMS
Techniques for the secure loading of dynamic paged segments are provided. An example method according to the disclosure includes determining a first hash value...
2019/0080092 SYSTEM AND METHOD FOR SECURING A SERIES OF FIRMWARE FUNCTION CALLS USING SESSION TOKENS
A mechanism for securing a series of related function calls for firmware services using session tokens is discussed.
2019/0080091 METHOD AND DEVICE FOR VERIFYING INTEGRITY BY USING TREE STRUCTURE
A method of verifying integrity of an Internet of Things (IoT) system including a hub device and a plurality of end-node devices includes: determining, by the...
2019/0080090 METHOD AND APPARATUS FOR DETECTING DYNAMICALLY-LOADED MALWARE WITH RUN TIME PREDICTIVE ANALYSIS
In an aspect, an apparatus obtains a first payload that is dynamically loaded by an application program of the apparatus. For example, the first payload may be...
2019/0080089 ADVERSARIAL ATTACK PREVENTION AND MALWARE DETECTION SYSTEM
Systems and methods may be used to classify incoming testing data, such as binaries, function calls, an application package, or the like, to determine whether...
2019/0080088 SYSTEM AND METHOD OF PROTECTING CLIENT COMPUTERS
A threat response platform to act as a bridge between non-inline security programs and inline security programs. The threat response platform receives event...
2019/0080087 SYSTEM AND METHOD OF PROTECTING CLIENT COMPUTERS
A threat response platform to act as a bridge between non-inline security programs and inline security programs. The threat response platform receives event...
2019/0080086 SYSTEM AND METHOD FOR PROTECTING MEMORY PAGES
Disclosed are systems and methods for protecting memory pages of a computing device using a hypervisor. An exemplary method comprises: in response to receiving...
2019/0080085 MULTIPLEXED - PROACTIVE RESILIENCY SYSTEM
Methods for machine-learned detection and removal of malicious software within a network are provided. Methods may record environment behavior of an...
2019/0080084 Virtual Network Function Audit Method and Apparatus
A virtual network function (VNF) audit method and apparatus, used to audit a VNF generated by a platform that includes an authentication and authorization...
2019/0080083 PROCESSING SYSTEM, AND PROCESSING METHOD AND PROGRAM
To reliably protect users or systems from a program prepared by a malicious developer. Provided is a processing system configured to process a program...
2019/0080082 SECURE STACK OVERFLOW PROTECTION VIA A HARDWARE WRITE-ONCE REGISTER
Systems and methods are disclosed for providing stack overflow protection on a system on chip via a hardware write-once register. An exemplary embodiment of an...
2019/0080081 Computer Device and Method for Controlling Process Components
There is described a computer device 100, including at least a processor and a memory, configured to control process components on the computer device 100, the...
2019/0080080 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT
According to an embodiment, an information processing apparatus includes one or more processors. One or more processors acquire first distinctive information...
2019/0080079 METHOD AND DEVICE FOR VERIFYING SECURITY OF APPLICATION
The present disclosure provides a method and device for verifying security of an application. The method comprises acquiring the application; determining a...
2019/0080078 SECURE MANAGEMENT OF PROCESS PROPERTIES
An endpoint has a tamper protection cache that identifies protected computing objects, along with a process cache that stores information for processes...
2019/0080077 PORTABLE APPLIANCE
A portable appliance may be provided. It may comprise a storage device operable for storing at least one application software program, a processor operable for...
2019/0080076 METHOD FOR TRIGGERING A SECURITY-RELEVANT FUNCTION OF A SYSTEM, AND SYSTEM
A method for triggering a security-relevant function of a system by a terminal including generating or selecting an input pattern by the system; inputting a...
2019/0080075 Token execution system for access control
According to an example aspect of the present invention, there is provided an apparatus comprising: a memory configured to store a user key specific to a...
2019/0080074 SERVER DEVICE, SERVICE METHOD, PROGRAM, AND NON-TRANSITORY COMPUTER-READABLE INFORMATION RECORDING MEDIUM
A server device (100) receives access from an application (31) running on a terminal device (200). The server device (100) authenticates the application (31)...
2019/0080073 Method for Screen Unlocking of Terminal Based on Fingerprint Identification and Terminal
A method for screen unlocking of a terminal based on fingerprint identification and a terminal are provided. User operation instruction on a designated...
2019/0080072 IMPLEMENTATION OF BIOMETRIC AUTHENTICATION
The present disclosure relates generally to implementing biometric authentication, including providing user interfaces for: a biometric enrollment process...
2019/0080071 IMPLEMENTATION OF BIOMETRIC AUTHENTICATION
The present disclosure relates generally to implementing biometric authentication, including providing user interfaces for: a biometric enrollment process...
2019/0080070 IMPLEMENTATION OF BIOMETRIC AUTHENTICATION
The present disclosure relates generally to implementing biometric authentication, including providing user interfaces for: a biometric enrollment process...
2019/0080069 OPERATION PERMISSION AUTHENTICATION DEVICE
The device includes: a storage unit configured to store biological information on an autonomous driving permitted person; a driver qualification information...
2019/0080068 BIOMETRIC RECOGNITION FOR UNCONTROLLED ACQUISITION ENVIRONMENTS
A computer-implemented method of registering image data in the context of a biometric security system includes receiving an indication of image data, detecting...
2019/0080067 STORAGE DEVICE WITH BIOMETRIC MODULE
A storage device with a biometric module comprises a hub module, a first external transmission module, a biometric module, a control module and a storage...
2019/0080066 IMPLEMENTATION OF BIOMETRIC AUTHENTICATION
The present disclosure relates generally to implementing biometric authentication. In some examples, a device provides user interfaces for a biometric...
2019/0080065 DYNAMIC INTERFACE FOR CAMERA-BASED AUTHENTICATION
A dynamic interface for camera-based authentication. An input device captures an image of a user during an instance of camera-based authentication. The input...
2019/0080064 VERIFYING A USER'S IDENTITY BASED ON ADAPTIVE IDENTITY ASSURANCE LEVELS
The disclosed embodiments provide a system that manages access to a computer-based resource. During operation, the system obtains a request for the...
2019/0080063 DE-IDENTIFICATION ARCHITECTURE
The present disclosure relates to techniques for processing personally identifiable information (PII). The techniques may include accessing a log data storage...
2019/0080062 CLIENT CALL VALIDITY ENFORCEMENT FOR MICROSERVICES
Techniques described herein provide for consistent and efficient construction of modularized software applications, using microservices. Microservice clients...
2019/0080061 METHOD FOR SECURE KEY INPUT
The present invention relates to a method for secure key input that enables key input of a unit value of authentication information without any change in a...
2019/0080060 USER AUTHENTICATION METHOD AND AUTHENTICATION SYSTEM USING MATCH WITH JUNK DATA
The present invention relates to a technique of authenticating a user by using junk data randomly generated when a password is inputted. According to the...
2019/0080059 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT
According to an embodiment, an information processing apparatus includes one or more processor. The processor is configured to run a process and a process...
2019/0080058 VERIFICATION SYSTEM FOR SECURE TRANSMISSION IN A DISTRIBUTED PROCESSING NETWORK
A verification system, includes: an arithmetic/logic unit ("ALU") to perform one or more mathematical operations and compare selected variables; a register to...
2019/0080057 TOXICITY OR ADVERSE EFFECT OF A SUBSTANCE PREDICTING AUTOMATED SYSTEM AND METHOD OF TRAINING THEREOF
A system of generating a suitability and/or toxicity score for a compound of interest is described. The system may be trained by obtaining physical properties...
2019/0080056 SYSTEMS AND METHODS FOR REMOTE PATIENT MONITORING AND EVENT DETECTION
Methods, systems, computer-readable media, and apparatuses for remote patient monitoring and event detection are presented. For example, one method includes...
2019/0080055 COGNITIVE HEALTH STATE LEARNING AND CUSTOMIZED ADVICE GENERATION
Embodiments for generating personalized advice to a user by a processor. A health state of a user may be learned from feedback information collected from a...
2019/0080054 CLOUD-TO-LOCAL, LOCAL-TO-CLOUD SWITCHING AND SYNCHRONIZATION OF MEDICAL IMAGES AND DATA
A method for updating a system that synchronizes medical data between a cloud repository on a cloud server and a plurality of local repositories on a plurality...
2019/0080053 Cloud-to-Local, Local-to-Cloud Switching and Synchronization of Medical Images and Data
A method for updating a system that synchronizes medical data between a cloud repository on a cloud server and a plurality of local repositories on a plurality...
2019/0080052 PERPETUAL BIOINFORMATICS AND VIRTUAL COLORIMETER EXPERT SYSTEM
A perpetual bioinformatics and virtual colorimeter expert system platform is disclosed to remotely measure dermal and epidermal properties with precision and...
2019/0080051 Methods And Systems For Profiling Personalized Biomarker Expression Perturbations
The disclosed methods and systems allow for a systematic quantification of the heterogeneity of disease states between different subjects on a molecular (e.g.,...
2019/0080050 METHODS FOR GENOME ASSEMBLY AND HAPLOTYPE PHASING
The disclosure provides methods to assemble genomes of eukaryotic or prokaryotic organisms. The disclosure further provides methods for haplotype phasing and...
2019/0080049 SYSTEM AND PROCESS FOR DATA-DRIVEN DESIGN, SYNTHESIS, AND APPLICATION OF MOLECULAR PROBES
The disclosure provides methods and systems for designing and synthesizing probes to capture a representative sample of genomic variants of a target genome...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.