Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0121980 METHOD AND APPARATUS OF DYNAMIC LOADING FILE EXTRACTION FOR AN APPLICATION RUNNING IN AN ANDROID CONTAINER
Provided is a method and apparatus of dynamic loading file extraction. The method for extracting a specific dynamic generated file of an application running in...
2019/0121979 Policy-based detection of anomalous control and data flow paths in an application program
Anomalous control and data flow paths in a program are determined by machine learning the program's normal control flow paths and data flow paths. A subset of...
2019/0121978 METHODS FOR BEHAVIORAL DETECTION AND PREVENTION OF CYBERATTACKS, AND RELATED APPARATUS AND TECHNIQUES
A security engine may use event-stream processing and behavioral techniques to detect ransomware. The engine may detect process behavior associated with...
2019/0121977 SYSTEM AND METHOD OF DETECTING A MALICIOUS FILE
Disclosed herein are methods and systems of detecting malicious files. According to one aspect, a method comprises receiving one or more call logs from...
2019/0121976 SYSTEM AND METHOD OF ADAPTING PATTERNS OF DANGEROUS BEHAVIOR OF PROGRAMS TO THE COMPUTER SYSTEMS OF USERS
Disclosed are systems and methods for adapting a pattern of dangerous behavior of programs. A teaching module may load into an activity monitor the pattern and...
2019/0121975 SYSTEM AND METHOD FOR ADAPTING PATTERNS OF MALICIOUS PROGRAM BEHAVIOR FROM GROUPS OF COMPUTER SYSTEMS
Disclosed are systems and methods for adapting a pattern of dangerous behavior of programs. A teaching module may load into an activity monitor the pattern and...
2019/0121974 MIGRATION SERVICE METHOD AND MODULE FOR SOFTWARE MODULES
A migration service and module for software modules are disclosed. The migration service detects a security flaw in a first environment in which the software...
2019/0121973 SYSTEM AND METHOD FOR DETECTING SECURITY RISKS IN A COMPUTER SYSTEM
A system and method are provided for identifying security risks in a computer system. The system includes an event stream generator configured to collect...
2019/0121972 DETECTION OF MALICIOUS INTENT IN PRIVILEGED IDENTITY ENVIRONMENTS
A computer-implemented method includes receiving a request to authenticate a user to remotely access a secure device and establishing, in response to the user...
2019/0121971 GRAPH MODEL FOR ALERT INTERPRETATION IN ENTERPRISE SECURITY SYSTEM
A computer-implemented method for implementing alert interpretation in enterprise security systems is presented. The computer-implemented method includes...
2019/0121970 GRAPH MODEL FOR ALERT INTERPRETATION IN ENTERPRISE SECURITY SYSTEM
A computer-implemented method for implementing alert interpretation in enterprise security systems is presented. The computer-implemented method includes...
2019/0121969 Graph Model for Alert Interpretation in Enterprise Security System
A computer-implemented method for implementing alert interpretation in enterprise security systems is presented. The computer-implemented method includes...
2019/0121968 KEY GENERATION SOURCE IDENTIFICATION DEVICE, KEY GENERATION SOURCE IDENTIFICATION METHOD, AND COMPUTER READABLE...
A key generation source identification device (10) is provided with a key identification unit (11) to cause malware to execute an encryption process, acquire...
2019/0121967 DATA PROCESSING
Data processing circuitry comprises a set of two or more computational units to perform respective computational operations; an instruction decoder to decode...
2019/0121966 METHOD AND DEVICE FOR PROTECTING INFORMATION FROM SIDE CHANNEL ATTACK
Provided is a method, performed by a device, of protecting information from a side channel attack, the method including: loading a library shared by at least...
2019/0121965 CLOUD APPLICATION DETECTION METHOD AND CLOUD APPLICATION DETECTION APPARATUS
Embodiments of this application disclose a cloud application detection method, including: obtaining at least one application instance corresponding to a...
2019/0121964 TECHNOLOGIES FOR OBJECT-ORIENTED MEMORY MANAGEMENT WITH EXTENDED SEGMENTATION
Technologies for memory management with memory protection extension include a computing device having a processor with one or more protection extensions. The...
2019/0121963 BROWSER APPLICATION IMPLEMENTING SANDBOX BASED INTERNET ISOLATION
Methods and systems are disclosed for an internet isolation system implemented using a browser application. The host computer system may be configured to...
2019/0121962 CONFIGURABLE INTERNET ISOLATION AND SECURITY FOR MOBILE DEVICES
Systems, methods, and instrumentalities are disclosed for providing configurable and customizable internet isolation and security schemes for a mobile device....
2019/0121961 CONFIGURABLE INTERNET ISOLATION AND SECURITY FOR LAPTOPS AND SIMILAR DEVICES
Methods and systems are disclosed for internet isolation and security schemes for a host computer system having an internet isolation system. The internet...
2019/0121960 Secure Processor-Based Control Plane Function Virtualization in Cloud Systems
A secure processor-based enclave is used to protect to one or more software defined control functions or elements in a cloud environment, such as a...
2019/0121959 System, Method, and Apparatus for Computer Security
A system for protecting a computer from malicious software uses a whitelist to determine is a program is safe to run. As new malicious software is created,...
2019/0121958 METHODS AND SYSTEMS FOR IDENTITY CREATION, VERIFICATION AND MANAGEMENT
An embodiment of a method of providing identity services includes: receiving identity data for an individual for which the identity provider has provided an...
2019/0121957 NON-REPUDIATION OF BROADCAST MESSAGING
A method performed by a computing system includes receiving from a publishing entity a message and a first piece of evidence that the message was sent by the...
2019/0121956 SYSTEM, DEVICE, AND METHOD OF RECOVERY AND RESETTING OF USER AUTHENTICATION FACTOR
Devices, systems, and methods of password recovery and password reset, as well as resetting or recovering other types of user-authentication factor. A system...
2019/0121955 KEY GENERATION FROM AN IMAGING SENSOR
There is disclosed a method of handling a sensor, comprising the steps of: challenging a subset of sensor components under uniform conditions; receiving output...
2019/0121954 ELECTRONIC DEVICE AND METHOD OF STARTING THE SAME
A method of starting an electronic device includes: receiving a first wireless signal carrying a first identification data by a wireless receiver before the...
2019/0121953 Deep Learning for Targeted Password Generation with Cognitive User Information Understanding
An approach is provided that receives a set of user information pertaining to a user. The received set of information is encoded into a neural network and the...
2019/0121952 Fingerprint Sensor Pixel Array and Methods of Forming Same
A device package includes a sensor die, one or more additional dies adjacent the sensor die, and a molding compound encircling the sensor die and the one or...
2019/0121951 A METHOD FOR ONLINE SIGNATURE VERIFICATION USING WRIST-WORN DEVICES
A signature verification system, which comprises a plurality of worn devices of signing users, each provided with one or more motion sensors, and a processor...
2019/0121950 CONTEXTUAL DEVICE UNLOCKING
Examples associated with contextual device unlocking are described. One example storing sets of contextual state information associated with unlock events...
2019/0121949 Voice Unlocking Method For Terminal And Terminal
A method includes: randomly displaying a string of text characters on a lock screen of the terminal, where the text characters include a first-type character...
2019/0121948 WRISTWATCH AND METHOD APPLICABLE TO WRISTWATCH FOR INPUTTING PASSWORD
A wristwatch and a method applicable to the wristwatch for inputting a password are provided. The wristwatch includes a transparent conductive film attached to...
2019/0121947 Method And Computer Program Product For Providing Authentication To Control Access To A Computer System Using...
A system and method for authentication to control access to a computer system includes receiving a first input from a measuring device formed as part of a...
2019/0121946 CREDENTIAL LICENSING SERVICE
A system includes a credential service operable to store a URL for reaching the credential service and a mobile library on a mobile device operable to...
2019/0121945 Electronic Medical Record Visual Recording and Display System
The invention is a system and method for recording and displaying electronic medical records. This EMR system enables doctors to represent medical issues of a...
2019/0121944 INSURANCE-COMPLIANT ELECTRONIC ORDERING OF BIOLOGICAL SAMPLE TESTING
A computer implemented method of ordering a laboratory test for a biological sample collected from a patient includes obtaining multiple sets of payor-specific...
2019/0121943 Crypto-based ACL for Patient Treatment And Follow-Up Care
Systems and methods of a cipher-based system for tracking a patient within a clinical pharmacy workflow, the system includes providing a meshed network having...
2019/0121942 SYSTEM FOR GENERATING GENOMICS DATA, AND DEVICE, METHOD, AND SOFTWARE PRODUCT FOR USE THEREIN
There is provided a system (900) for generating output genomics data (970) from biological genetic material (930). The system (900) includes: (i) a genetic...
2019/0121941 ALGORITHMS FOR SEQUENCE DETERMINATIONS
The invention provides methods of determining a consensus sequence from multiple raw sequencing reads of a nucleic acid target. The nucleic acid target...
2019/0121940 HIGH RESOLUTION ALLELE IDENTIFICATION
Provided herein are methods for accurately determining the alleles present at a locus that is broadly applicable to any locus, including highly polymorphic...
2019/0121939 DAISY CHAIN FOR PHASING POLYPLOID
A computer-implemented method is provided for phasing polyploids. The method includes assembling, by a processor, haplotypes in polyploid genomes of two or...
2019/0121938 TRIE-BASED POLYPLOID PHASING
A computer-implemented method, computer program product, and computer processing system are provided for phasing polyploids. The method includes receiving, by...
2019/0121937 Systems and Methods For RNA Analysis In Functional Confirmation Of Cancer Mutations
Contemplated systems and methods integrate genomic/exomic data with transcriptomic data by correlating a cancer associated mutation in the genome/exome with...
2019/0121936 Methods for Retrievable Information Storage Using Nucleic Acids
A method of storing information using monomers such as nucleotides is provided including converting a format of information into a plurality of bit sequences...
2019/0121935 PHENOTYPIC PERSONALIZED MEDICINE: ADAPTIVE OPTIMIZATION OF PATIENT-SPECIFIC COMBINATION THERAPY
An initial phenotypic map is derived for a patient subjected to an initial therapeutic regimen including a first drug, based on values of a therapeutic outcome...
2019/0121933 METHOD OF PERFORMING METROLOGY OPERATIONS AND SYSTEM THEREOF
One or more metrology objects and one or more metrology operations may be identified. A design-based representation of a first metrology object of the one or...
2019/0121932 COVERGROUP NETWORK ANALYSIS
This application discloses performing functional verification on a circuit design describing an electronic device and a computing system to determine...
2019/0121931 LAYOUT FOR INTEGRATED CIRCUIT AND THE INTEGRATED CIRCUIT
A layout of an integrated circuit includes: a first layout device; a second layout device abutting the first layout device at a boundary between the first...
2019/0121930 METHOD OF YIELD PREJUDGMENT AND BUMP RE-ASSIGNMENT AND COMPUTER READABLE STORAGE MEDIUM
A method of yield prejudgment and bump re-assignment for a die is provided. The die includes a plurality of areas. Each area is electrically connected to a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.