Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,336,415 Device for securing a capacitive keypad and corresponding terminal
A securing device is provided for securing a capacitive keypad of an electronic payment terminal having at least one processor for managing keys of the...
US-9,336,414 Method of activating a mechanism, and device implementing such a method
A method of activating a function such as unlocking a mobile telephone keypad by an instruction sequence {x.sub.i, . . . , x.sub.n} of a length n given to a...
US-9,336,413 Method and system for fast permission changes for virtual addresses
A method for accessing shared memory, the method includes loading a private context ID into a private context ID register, where the first private context ID...
US-9,336,412 Storage system and method for controlling storage system
The storage system according to the present invention has a function to encrypt write data from the host and store the same in a storage media. Further,...
US-9,336,411 System on chip
In a system on chip responder units comprise one or more responder elements and is associated with one or more protection units. A request analysis unit is...
US-9,336,410 Nonvolatile memory internal signature generation
A nonvolatile memory device generates a signature using a private key and contents within the memory device. The signature is stored in a secure area within the...
US-9,336,409 Selective security masking within recorded speech
A marker is derived from an interaction between a person and an agent of a business and the agent's user interface. A part of a speech signal that corresponds...
US-9,336,408 Solution for continuous control and protection of enterprise data based on authorization projection
Extracting data from a source system includes generating an authorization model of the data protection controls applied to the extracted data by the source...
US-9,336,407 Dynamic data masking system and method
A system and method for providing dynamic data masking for databases through a data masking apparatus.
US-9,336,406 Multiprotocol access control list with guaranteed protocol compliance
An approach to multiprotocol ACL implementation with guaranteed protocol compliance is described. In one approach, a method of access rights validation for a...
US-9,336,405 Photographic copy prevention of a screen image
A method for preventing photographic capture of a displayed image on an electronically controlled screen using a photographic capture device is provided. The...
US-9,336,404 Privacy-protective data transfer and storage
A method is performed at a computer system having one or more processors and memory storing one or more programs executed by the one or more processors. The...
US-9,336,403 Managing restricted tagged content elements within a published message
A computer encrypts only a restricted tag element from among a plurality of content elements to be electronically published as a message for access by a...
US-9,336,402 Secure data in removable storage devices via encryption token(s)
Systems, methods, and devices that secure data on removable storage devices are presented. A token component can interface with a communication port on a host...
US-9,336,401 Implementing enhanced security with storing data in DRAMs
A method, system and memory controller for implementing enhanced security in a memory subsystem including DRAM in a computer system. A memory includes a...
US-9,336,400 Information asset placer
A computer-implemented method for the placing of information assets, including: discovering information about a new or changed information asset; determining...
US-9,336,399 Information asset placer
A computer-implemented method for the placing of information assets, including: discovering information about a new or changed information asset; determining...
US-9,336,398 Apparatus and method for manifesting event to verify security of mobile application
An apparatus and method for manifesting an event to verify the security of a mobile application are provided. The apparatus for manifesting an event to verify...
US-9,336,397 Combining type-analysis with points-to analysis for analyzing library source-code
In general, in one aspect, the invention relates to a method for statically analyzing a library that includes obtaining native method annotations associated...
US-9,336,396 Method and system for generating an enforceable security policy based on application sitemap
A system for generating a security policy for protecting an application-layer entity. The system comprises a security sitemap generator for generating a...
US-9,336,395 Boot driver verification
An example system in accordance with the present disclosure includes a secure hash calculation engine to intercept and calculate a secure hash for a pre-boot...
US-9,336,394 Securely recovering a computing device
A method and an apparatus for establishing an operating environment by certifying a code image received from a host over a communication link are described. The...
US-9,336,393 System and method for protecting files stored on an electronic device
An electronic device includes a security system which provides for protection of designated files stored on an electronic device. For example, an electronic...
US-9,336,392 Verification of intellectual property core trusted state
Secure initialization of the state of an electronic circuit. A processor determines the trusted state of one or more architecture state registers of an...
US-9,336,391 Verification of intellectual property core trusted state
Secure initialization of the state of an electronic circuit. A processor determines the trusted state of one or more architecture state registers of an...
US-9,336,390 Selective assessment of maliciousness of software code executed in the address space of a trusted process
System and method for detection of malicious code injected into processes associated with known programs. Execution of processes in a computer system is...
US-9,336,389 Rapid malware inspection of mobile applications
Disclosed are various embodiments for inspecting malware with little or no user interruption. A first computing device may compare a source code of an...
US-9,336,388 Method and system for thwarting insider attacks through informational network analysis
One embodiment of the present invention provides a system for detecting insider attacks in an organization. During operation, the system collects data...
US-9,336,387 System, method, and computer program product for detecting access to a memory device
Discrete events that take place with respect to a hard disk drive or other I/O device or port are indicated to logic that implements Self-Monitoring Analysis...
US-9,336,386 Exploit detection based on heap spray detection
Various techniques for exploit detection based on heap spray detection are disclosed. In some embodiments, exploit detection based on heap spray detection...
US-9,336,385 System for real-time threat detection and management
A system and method for threat detection and management. The method includes: comparing the observed activity with a threat profile; generating a threat...
US-9,336,384 Systems and methods for replacing application methods at runtime
A computer-implemented method for replacing application methods at runtime may include identifying an application at runtime that includes a target method to...
US-9,336,383 Mitigating just-in-time spraying attacks in a network environment
An example method for mitigating JIT spraying attacks in a network environment is provided and includes protecting an output of a just-in-time (JIT) compiler...
US-9,336,382 Systems, methods, and apparatus for securing user documents
The invention is directed to systems, methods and apparatus for securing documents. The system comprises a server having a processor and a data storage device...
US-9,336,381 Entropy-based detection of sensitive information in code
Techniques are described for identifying security credentials or other sensitive information based on an entropy-based analysis of information included in...
US-9,336,380 Applying activity actions to frequent activities
Activities of users of a service often involve one or more resources, such as uploading or downloading files in a file system of an FTP server. The activities...
US-9,336,379 Reputation-based safe access user experience
Reputation-based resource lookup may include determining the reputation of resources that are to be accessed. Based on the reputation of the resource, a user...
US-9,336,378 Credential sharing
A credential can be shared by one user with other users when sharing conditions are met. Sharing conditions can include a time, time range, date, date range and...
US-9,336,377 Synchronized sign-on methods for non-programmatic integration systems
Methods and systems for automatically signing a user on to an integration application when a user signs on to another application and signing a user off when...
US-9,336,376 Multi-touch methods and devices
The present disclosure relates to a multi-touch method, configured to a touch panel. The method comprises: applying a first object to touch a first image on the...
US-9,336,375 Restricting access to data on portable storage media based on access to a private intranet
Systems, products, and methods are disclosed for enabling access to encrypted data stored on a portable storage medium. In one embodiment, an attempt to...
US-9,336,374 Method, module, and computer program product for identifying user of mobile device
A module for authenticating a user of a mobile device. The mobile device has an orientation sensor and a touch screen sensor. The module includes: a behavioral...
US-9,336,373 User biometric pattern learning and prediction
A user device collects timing data that indicates screen touch timing behavior during multiple touch events associated with at least one of a hold time for a...
US-9,336,372 Lost account information recovery method and associated apparatus and system
A method, apparatus and system for securely managing account information are disclosed. In some embodiments, the method is performed at a computer system having...
US-9,336,370 Method and apparatus for dynamic obfuscation of static data
A method and an apparatus that provide rewriting code to dynamically mask program data statically embedded in a first code are described. The program data can...
US-9,336,369 Methods of licensing software programs and protecting them from unauthorized use
In one embodiment, a method for controlling use of a software licensed product is provided. The method comprises tracking a usage of the software licensed...
US-9,336,368 License install support system, license install support method
A license install support method includes receiving input of a first license identifier used for receiving license data, the license data being used by an...
US-9,336,367 Site directed management of audio components of uploaded video files
A system, method and various software tools enable a video hosting website to automatically identified unlicensed audio content in video files uploaded by...
US-9,336,366 Method and apparatus for identifying installed software and regulating access to content
A system and method for controlling use of content in accordance with usage rights associated with the content and determined in accordance with the environment...
US-9,336,365 Digital rights management with irregular network access
There is a performing of digital rights management (DRM), operable in an offline mode with respect to a communications network. The performing includes...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.