Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,317,718 Security device with programmable systolic-matrix cryptographic module and programmable input/output interface
A system includes programmable systolic cryptographic modules for security processing of packets from a data source. A first programmable input/output interface...
US-9,317,717 Separate cryptographic keys for protecting different operations on data
The disclosed embodiments provide a system that processes data. During operation, the system uses a first key to protect a write operation on the data. Next,...
US-9,317,716 Privacy protection-type data providing system
An information providing apparatus for collecting data including personal information and distributing the data to a user terminal performs anonymization...
US-9,317,715 Data protection compliant deletion of personally identifiable information
The disclosure generally describes computer-implemented methods, software, and systems for modeling and deploying decision services. One computer-implemented...
US-9,317,714 Storing user data in a service provider cloud without exposing user-specific secrets to the service provider
Subscriber (user) data is encrypted and stored in a service provider cloud in a manner such that the service provider is unable to decrypt and, as a...
US-9,317,713 Obstructing user content based on location
Example embodiments disclosed herein relate to displaying private user content (420) of a first user (430) on a large interactive display (410) of a multi-user...
US-9,317,712 Providing secure communication and/or sharing of personal data via a broadband gateway
A broadband gateway may manage confidential data associated with users in a home network managed and/or serviced by the broadband gateway. The broadband gateway...
US-9,317,711 Privacy restrictions for columnar storage
In privacy restrictions for columnar storage, a query including operations on one or more protected columns is received. The one or more protected columns are...
US-9,317,710 System and method for specification and enforcement of a privacy policy in online services
A method for implementing a privacy policy includes receiving code for an application which includes definitions for a set of classes of records and for each of...
US-9,317,709 System and method for detecting and integrating with native applications enabled for web-based storage
A cloud storage system provides remote access to a file associated with the cloud storage system. In response to a request to access the file, the cloud storage...
US-9,317,708 Hardware trust anchors in SP-enabled processors
A trust system and method is disclosed for use in computing devices, particularly portable devices, in which a central Authority shares secrets and sensitive...
US-9,317,707 Method and system for protecting a driver
Various examples of the present disclosure provide a method and a system for protecting a driver. The method includes encrypting a program file, and sending an...
US-9,317,706 Multi-tenant system
Method(s) and system(s) for identifying an application behavior of a multi-tenant application for a tenant are described herein. The method includes determining...
US-9,317,705 Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-9,317,704 System and method for initially establishing and periodically confirming trust in a software application
Systems and methods for providing trust provisioning are disclosed. A utilization request requesting to utilize data stored by a secure element associated with...
US-9,317,703 Enhanced security setup for media encryption
Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by...
US-9,317,702 System and method for providing secure inter-process communications
A user device provides a mechanism for securing messages communicated between trusted processes along an established Inter-Process Communication (IPC) channel....
US-9,317,701 Security methods and systems
A system/method for preventing a computer virus from accessing message addresses is described. The system comprises an interception component or client plug-in...
US-9,317,700 Preventing malicious observance of private information
A technique for preventing malicious observance of private information includes receiving an instruction of entering a mode of inputting private information;...
US-9,317,699 Preventing malicious observance of private information
A technique for preventing malicious observance of private information includes receiving an instruction of entering a mode of inputting private information;...
US-9,317,698 System and method for providing information access on a portable device
A system and method of providing information stored in a memory is provided. The system comprises an information repository for storing information and an...
US-9,317,697 Processing of restricted access data
Embodiments related to processing of restricted-access data. An aspect includes receiving a request for data from a user by a storage system infrastructure...
US-9,317,696 Data detection and protection policies for e-mail
Systems and/or methods for deploying and implementing data loss prevention (DLP) policy definition that may encapsulate the requirements, control objectives and...
US-9,317,695 System and method for automated remedying of security vulnerabilities
In a binary patching system for alleviating security vulnerabilities in a binary representation of a software application, a binary code portion determined to...
US-9,317,694 Directed execution of dynamic programs in isolated environments
A test object that includes at least one computer program that includes dynamic executable code is obtained. The at least one computer program is transformed...
US-9,317,693 Systems and methods for advanced dynamic analysis scanning
The field of the invention relates to systems and methods for advanced dynamic analysis scanning for vulnerabilities using a universal translator. In an...
US-9,317,692 System and method for vulnerability risk analysis
Embodiments of the present invention are directed to a method and system for automated risk analysis. The method includes accessing host configuration...
US-9,317,691 Pre-boot software verification
Methods and systems for implementing pre-boot software verification may involve using an embedded controller (EC) and a basic input/output system (BIOS) to...
US-9,317,690 System and method for firmware based anti-malware security
A system for securing an electronic device includes a non-volatile memory, a processor coupled to the non-volatile memory, a resource of the electronic device,...
US-9,317,689 Method and apparatus for secure application execution
Systems, methods, apparatuses, and computer-readable media are described for securely installing, executing and/or migrating a security sensitive application in...
US-9,317,688 Method and apparatus for providing machine-to-machine service
A method and an apparatus for providing service are provided. A method of providing service by a Machine-to-Machine (M2M) device includes transmitting a request...
US-9,317,687 Identifying rootkits based on access permissions
A method for monitoring for malware includes, during a boot process on an electronic device, determining a portion of memory, determining that the portion of...
US-9,317,686 File backup to combat ransomware
Operating system events are monitored and a file change request of a process is detected. If the process is suspicious, then the file to be changed is backed up...
US-9,317,685 Method and system for access request alerts for protected information
Access request alerts for protected information is described. A request is received, from an access requestor, to access protected information. Identifying data...
US-9,317,684 Protecting against polymorphic cheat codes in a video game
Embodiments are directed towards protecting against polymorphic cheat codes in a video game environment. A detour analyzer analyzes game code in client memory...
US-9,317,683 Dynamic media content previews
A sandboxed process is initiated in response to a request for a preview of dynamic media content. A stream of frames is generated in a preview specific format...
US-9,317,682 Library-based method for information flow integrity enforcement and robust information flow policy development
Described is a system, method, and computer program product for preventing security flaws in untrusted computer source code by implementing information flow...
US-9,317,681 Information processing apparatus, information processing method, and computer program product
According to an aspect of the embodiment, an information processing unit includes a browser unit that receives page files and execute a web application; an...
US-9,317,680 Method and system for protecting against unknown malicious activities by determining a reputation of a link
A method and system for protecting against unknown malicious activities by determining a reputation of a link are disclosed. A reputation server queries a...
US-9,317,679 Systems and methods for detecting malicious documents based on component-object reuse
A computer-implemented method for detecting malicious documents based on component-object reuse may include (1) identifying a plurality of malicious documents,...
US-9,317,678 System and method for managing logins in a network interface
A system and method for managing logins and/or conducting data storage transactions, for example in a network interface. One exemplary embodiment comprises a...
US-9,317,677 Access control for content delivery networks
Content items are distributed to a content delivery network using identifiers that expresses relationships between the content items and at least one associated...
US-9,317,676 Image-based CAPTCHA exploiting context in object recognition
Techniques for an image-based CAPTCHA for object recognition are described. The disclosure describes adding images to a database by collecting images by...
US-9,317,675 Smartcard, smartcard system and method for configuring a smartcard
According to an aspect of the invention, a smartcard is conceived that comprises at least two pre-installed applications and an application user interface...
US-9,317,674 User authentication based on fob/indicia scan
Embodiments of the invention are directed to systems, methods and computer program products for receiving a request from a user for access to at least one...
US-9,317,673 Providing authentication using previously-validated authentication credentials
Embodiments of the invention are directed to systems, methods and computer program products for providing authentication using previously-validated...
US-9,317,672 Online account access control by mobile device
Systems and methods for controlling access to an online account are described. An access control message including an action to be performed on an online...
US-9,317,671 System and method for shared folder creation in a network enviornment
A method includes receiving a request over a network from a user to mount a shared folder, which is configured to store electronic data to be selectively...
US-9,317,670 Security based on usage activity associated with user device
A method includes receiving usage data associated with a user device. The usage data includes information based on at least one usage activity associated with...
US-9,317,669 Verifying ownership of content
Systems and methods of verifying ownership of content can receive and process requests for access to digital content associated with the items. Verifying...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.