Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,349,018 Preventing content data leak on mobile devices
Preventing enterprise or other protected content data from "leaking" from being under secure management on a device, for example by virtue of being viewed using...
US-9,349,017 System and method for authentication
A multi-functional device is attached to a secure network and includes a control circuit. The control circuit receives indications as to whether a user is...
US-9,349,016 System and method for user-context-based data loss prevention
In one embodiment, a method includes determining a user context of at least one user device currently accessing an enterprise communication platform. The method...
US-9,349,015 Programmatically detecting collusion-based security policy violations
Sets of multiple software programs selected from a set of candidate software programs are evaluated to determine if the applications can collude to violate a...
US-9,349,014 Determining an indicator of aggregate, online security fitness
A computer-implemented method comprising: accessing, by one or more computer systems, internal security information indicative of customer account activity of a...
US-9,349,013 Vulnerability-based remediation selection
A machine-actionable memory comprises one or more machine-actionable records arranged according to a data structure. Such a data structure may include links...
US-9,349,012 Distributed processing system, distributed processing method and computer-readable recording medium
A distributed processing system 100 is used in which a plurality of machines including a virtual machine constructed by cloud computing perform distributed...
US-9,349,011 Methods and apparatus to identify a degradation of integrity of a process control system
Methods and apparatus to identify a degradation of integrity of a process control system are disclosed. An example method includes identifying a file on a file...
US-9,349,010 Managing update attempts by a guest operating system to a host system or device
Attempts to update confirmation information or firmware for a hardware device can be monitored using a secure counter that is configured to monotonically adjust...
US-9,349,009 Method and apparatus for firmware based system security, integrity, and restoration
Methods and systems for firmware based system security, integrity, and restoration are disclosed, including (a) determining in a pre-boot environment which mode...
US-9,349,008 Safe printing
Approaches for processing a digital file in a manner designed to minimize exposure of any malicious code contained therein. A digital file resides with a...
US-9,349,007 Web malware blocking through parallel resource rendering
Apparatus and method for transforming Web resources into safe versions such that malicious code on the resources cannot attack the client viewing the resources....
US-9,349,006 Method and device for program identification based on machine learning
A method and device perform program identification based on machine learning. The method includes: analyzing an inputted unknown program, and extracting a...
US-9,349,005 Preventing re-patching by malware on a computer
Preventing re-patching by malware on a computer by detecting a request to modify a write-protection attribute of a memory location within a memory of a computer...
US-9,349,004 Predicting the actions and evaluating the risk of a software install program
Provided are techniques for predicting the actions and evaluating the risk of a software install program including downloading a software installation program...
US-9,349,003 Detecting application behavior
There is provided a method including generating, by a security application executed in a processing device, an application list including one or more...
US-9,349,002 Android application classification using common functions
Known malicious Android applications are collected and their functions are extracted. Similarity values are calculated between pairs of functions and those...
US-9,349,001 Methods and systems for minimizing latency of behavioral analysis
The various aspects include methods, systems, and devices configured to make use of caching techniques and behavior signature caches to improve processor...
US-9,349,000 Web service sandbox system
A web service sandbox system. The web service sandbox system provides a secure mechanism with little to no risk to an origination domain hosting a user agent...
US-9,348,999 User terminal, reliability management server, and method and program for preventing unauthorized remote operation
It is possible to effectively prevent an unauthorized remote operation of a terminal. A user terminal provides a user with higher precision information related...
US-9,348,998 System and methods for detecting harmful files of different formats in virtual environments
Disclosed are systems, methods and computer program products for detection of harmful files of different formats. An example method includes: receiving a...
US-9,348,997 Symmetric keying and chain of trust
The present disclosure is directed to sealing data using chain of trust key derivation. In at least one embodiment, a chain of trust may be used to derive...
US-9,348,996 Method and device for the authentication of at least two agricultural devices coupled via a data bus
A method for the authentication of at least two agricultural devices coupled via a data bus includes subjecting the each of the agricultural devices to...
US-9,348,995 Nonvolatile memory device having authentication, and methods of operation and manufacture thereof
A memory device package encloses two separate die, one being a standard nonvolatile memory integrated circuit ("IC") die, and the other being any suitable...
US-9,348,994 Information processor and system that associate job and user information based on job identifier
An information processor is connected via a network to an output apparatus and configured to control a job outputting process of the output apparatus. The...
US-9,348,993 Segment authentication for dynamic adaptive streaming
A method comprising generating a segment signature for a segment of a media content based on the segment, trusted information contained in a media presentation...
US-9,348,992 Linked identities
Methods and systems to automatically respond to make a Super Identity by linking two identities and methods and systems to use the identities include a...
US-9,348,991 User management of authentication tokens
A computer implemented method, a computer program product, and a data processing system manage a set of federated log-in authentications at secure web sites. A...
US-9,348,990 Range based user identification and profile determination
An embodiment includes a main compute node that detects the physical presence of a first user and subsequently loads a profile for the first user. The main...
US-9,348,989 Contemporaneous gesture and keyboard entry authentication
A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to...
US-9,348,988 Biometric authorization for real time access control
A method of providing biometric authorization comprising enabling a user to log into an account, and determining whether there is a hold on the account. When...
US-9,348,987 Electronic device including finger-operated input device based biometric matching and related methods
An electronic device may include a finger-operated input device, and a finger sensor carried by the finger-operated input device to sense a user's finger. The...
US-9,348,986 Authentication server apparatus, authentication server apparatus-use program and authentication method
An authentication server apparatus is capable of simply and accurately assessing whether a user terminal is being operated by a person. In the authentication...
US-9,348,985 Behavioral fingerprint controlled automatic task determination
A computationally implemented method includes, but is not limited to: determining a behavioral fingerprint associated with a network-accessible user, the...
US-9,348,984 Method and system for protecting confidential information
A method for computer workstation based information protection is presented, the method comprises: a) monitoring user's actions on the computer workstation, b)...
US-9,348,983 Method for controlling the access to a specific type of services and authentication device for controlling the...
A method and device for controlling access to a specific type of services among a plurality of type of services proposed by a service supplier. The method...
US-9,348,982 Information processing system, an operating device, and a computer-readable storage medium
An information processing system, an operating device, and computer-readable storage medium. The operating device acquires, from an operation application...
US-9,348,981 System and method for generating user authentication challenges
A system and method for generating user authentication challenges based on risk level is provided. A login request from a user is received. The login request...
US-9,348,980 Methods, systems and application programmable interface for verifying the security level of universal resource...
The present disclosure discloses a method of allowing WebView to verify the security level of a web content and inform the user with regards to the security and...
US-9,348,979 Privacy sensitive persona management tools
The disclosed tools include enhanced and flexible tools to enable users who may be business competitors to share non-generic data in a substantially generic and...
US-9,348,978 Universal content traceability
Techniques for universal content traceability are presented. A piece of content is tagged with one or more content identifiers and with a unique instance...
US-9,348,977 Detecting malware in content items
Disclosed are various systems, methods, and other embodiments directed to detection of malware in content items. To detect the malware, for example, one or more...
US-9,348,976 Information processing method and electronic device
An information processing method and an electronic device are provided. The method is applied to the electronic device. The electronic device includes a frame...
US-9,348,975 Optimizing therapy outcomes for peritoneal dialysis
Peritoneal dialysis therapy outcomes have been calculated for a variety of dwell times of peritoneal dialysis fluids in the peritoneal cavities of dialysis...
US-9,348,974 Remote management of therapy programming
The disclosure is directed to techniques for remote management of information relating to therapy delivered to a patient by an implantable medical device (IMD)....
US-9,348,973 Method and system providing improved data matching for virtual planning
A scanning structure having at least one surface with a shape adapted to conform to a portion of a craniofacial space is described. The scanning structure...
US-9,348,972 Method of assessing risk of multiple births in infertility treatments
Provided is a multiple birth prognostic tool that is used to analyze data in order to predict a multiple birth event in a female human patient undergoing an...
US-9,348,971 Two way short message service (SMS)-enabled blood glucose meter and related communications systems and methods
A system and method for two way short message service (SMS)-enabled BGM and related communications is presented. The method includes receiving, by a processing...
US-9,348,970 System and method for providing access to electronically stored medical information
A method and system for storing medical information of an individual with a service provider and providing access to that medical information to first...
US-9,348,969 System and method for personalized biomedical information research analytics and knowledge discovery
A Health Information Virtual Exchange (HIVE) BIOMED SYSTEM includes an originating exchange unit including circuitry configured to transmit, to a receiving...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.