Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,342,717 Tamper detection system and method
A tamper detection system and method which uses a reader and one or more tags to detect tampering near a card reader slot or any other device subject to...
US-9,342,716 Software-defined multi-mode RFID read devices
Devices and methods for reading multiple types of RFID tags having different frequencies and/or encoding schemes are disclosed. One or more search signals...
US-9,342,715 Marking paper products
Methods of marking paper products and marked paper products are provided. Some methods include irradiating the paper product to alter the functionalization of...
US-9,342,714 Method for reproducing and using a bar code symbol
A segmented 2D matrix symbol may be formed by dividing data into a plurality of segments, separately encoding the plurality of segments as corresponding arrays...
US-9,342,713 Unlocking a storage device
An electronic device has a lower power state in which power to a storage device is disabled. Predetermined information stored in a memory is useable to unlock...
US-9,342,712 Method and system for accelerating cryptographic processing
A method, an apparatus, and a non-transitory computer readable medium for accelerating cryptographic processing are presented. A cryptographic algorithm is...
US-9,342,711 Systems and methods for controlling access to peripherals of a computer system by software applications
In general, the invention provides a computer architecture designed for enhanced data security. In embodiments, the architecture comprises two sub-systems, each...
US-9,342,710 Electronic tamper detection
An apparatus, method and package for electronic tamper detection. In one example, an apparatus, device or package for electronic tamper detection includes: a...
US-9,342,709 Pattern detection
Data is moved through a pipeline as processing of the data unrelated to detection of pattern is performed. The detector detects the pattern within the data at a...
US-9,342,708 Management of application access
Concepts and technologies are disclosed herein for management of application access. A security management application can be configured to set access controls...
US-9,342,707 Searchable encryption for infrequent queries in adjustable encrypted databases
Methods, systems, and computer-readable storage media for selecting columns for selecting encryption to perform an operator during execution of a database...
US-9,342,706 Secure desktop applications for an open computing platform
Example secure desktop applications for an open computing platform are disclosed. An example secure desktop method for a computing platform disclosed herein...
US-9,342,705 Systems and methods for searching shared encrypted files on third-party storage systems
A computer-implemented method for searching shared encrypted files on third-party storage systems may include (1) receiving, at a server-side computing system,...
US-9,342,704 Allocating memory access control policies
Enabling access control caches for co-processors to be charged using a VMX-nonroot instruction. As a result a transition to VMX-root is not needed, saving the...
US-9,342,703 Managing storage permissions for logical volume managers
A logical volume manager (LVM) may manage a plurality of logical volumes and a plurality of drives in a logical data storage using metadata stored on the...
US-9,342,702 Controlling an analysis system of biological samples
A method for controlling an analysis system is presented. The method comprises receiving, by an encryption unit, authentication data of a user. In the case of a...
US-9,342,701 Digital rights management system and methods for provisioning content to an intelligent storage
The present invention relates to digital rights management (DRM) for content that downloaded and saved to a storage device. The storage may be a disk drive, or...
US-9,342,700 Implementing enhanced security with storing data in DRAMs
A method, system and memory controller for implementing enhanced security in a memory subsystem including DRAM in a computer system. A memory includes a...
US-9,342,699 Method and apparatus for controlling access to encrypted data
A method and apparatus for controlling access to encrypted data is provided. The device comprises: a processor and a memory, the processor configured to:...
US-9,342,698 Providing privacy enhanced resolution system in the domain name system
An apparatus and a non-transitory computer-readable medium may perform a method of minimizing the disclosure of a domain name contained in a DNS query. The...
US-9,342,697 Scalable security policy architecture for data leakage prevention
One embodiment relates to an apparatus for creating and managing security policies for data leakage prevention. The apparatus includes a database which stores...
US-9,342,696 Attesting use of an interactive component during a boot process
A method for attesting use of an interactive component during a boot process, comprising the steps of: reading, in response to determining use of the...
US-9,342,695 Secured automated or semi-automated systems
Secured automated or semi-automated systems are provided herein. In one embodiment, a sensor system includes a sensor, a legacy computing environment that is...
US-9,342,694 Security method and apparatus
In accordance with an example embodiment of the present invention, there is provided an apparatus, comprising: at least one processor; and at least one memory...
US-9,342,693 System and method of monitoring and controlling application files
A system and method for updating a system that controls files executed on a workstation. The workstation includes a workstation management module configured to...
US-9,342,692 Neutralizing propagation of malicious information
Methods and arrangements for controlling a spread of malicious information in a network. A viral spread of information is tracked, in a network comprising...
US-9,342,691 Internet protocol threat prevention
Blocking high-risk IP connections in real-time while allowing tailoring of an acceptable risk profile to match the security requirements of network resources....
US-9,342,690 Method and apparatus for a scoring service for security threat management
A method and system for providing a security threat scoring service to identify and prioritize potential security threats to an online service. The method and...
US-9,342,689 File system access for one or more sandboxed applications
Methods, systems, and machine-readable storage medium are described wherein identifiers are used to allow access to files or folders in a restricted operating...
US-9,342,688 Apparatus and method for inheriting a non-secure thread context
Disclosed is a method for inheriting a non-secure thread context. In the method, a first secure monitor call associated with a first non-secure thread of a...
US-9,342,687 Detecting synthetic keystrokes
Detecting synthetic keystrokes by maintaining a record of one or more keystrokes of physical keyboard input detected by an operating system of a computer,...
US-9,342,686 Systems and methods for updating scanning rules
Systems and methods are provided for updating one or more scanning rules. For example, one or more first operation records being uploaded are obtained; scanning...
US-9,342,685 Electric circuit and terminal
In a system, there is communication between an electric circuit and a terminal within a scope of a terminal session, wherein the electric circuit has a current...
US-9,342,684 Flexible real-time inbox access
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a...
US-9,342,683 Stateless attestation system
A method includes assessing a trustworthiness level of a user computer by communication between the user computer and a first server. A record indicating the...
US-9,342,682 Portable electronic device
A portable electronic device includes a display unit; an input detection unit that detects an input to the display unit, and a lock control unit that sets or...
US-9,342,681 Authentication with secondary approver
Techniques are provided for giving access to restricted content on a first device from a second device through a wireless network. In one embodiment, the first...
US-9,342,680 Security token, data processing system and method of processing data
According to an aspect of the invention, a security token is conceived, in particular a smart card, comprising a tactile sensing user interface, wherein said...
US-9,342,679 Password authentication
A user credential comprising a user password and a one-time password (OTP) may be provided to access a computing system. The user password is authenticated and...
US-9,342,678 Method for controlling content and digital device using the same
The present specification discloses a method for controlling a thumbnail image page including thumbnail images with respect to visual information for which...
US-9,342,677 Method and apparatus to provide continuous authentication based on dynamic personal information
An authentication method, system and device are provided to continuously collect dynamic personal identification data (DPID) samples through a user device by...
US-9,342,675 Identity verification for online education
A computer-implemented method includes prompting a user to provide an authentication typing sample by entering an authentication phrase on a keyboard, in order...
US-9,342,674 Man-machine interface for controlling access to electronic devices
This application relates to devices, methods and computer readable media that allow users using a first device to be easily authenticated. For example, while...
US-9,342,673 Method for user authentication in a device comprising a touch screen
A method for user authentication in a device comprising a touch screen is provided. In operation, the device stores a user authentication code corresponding to...
US-9,342,672 Computer-implemented method for managing at least one data element in control unit development
A computer-implemented method for managing at least one data element in control unit development, the method allows uniform management of data elements over the...
US-9,342,671 Password by touch-less gesture
A device and method to use a password by touch-less gesture are described. The device includes two or more ambient light sensors arranged at respective surface...
US-9,342,670 Content monitoring and host compliance evaluation
Evaluating content is disclosed. Evaluating includes determining a host policy associated with one or more host policy rules, wherein the host policy specifies...
US-9,342,669 Systems and methods of licensing and identification of virtual network appliances
Systems and methods of licensing and identification of a virtual network appliance. The systems and methods obtain information specific to an instance of a...
US-9,342,668 Signaling and handling content encryption and rights management in content transport and delivery
An apparatus comprising a memory, a processor coupled to the memory and configured to obtain a protection description for media content comprising a plurality...
US-9,342,667 Extended OAuth architecture
Method, device, and storage medium to receive a request to authorize a release of protected resource data, wherein the request includes one or more indicators...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.