Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,355,267 Integrated file level cryptographical access control
Provided herein are systems and methods for an Integrated File Level Cryptographical Access Control (IFLCAC). The system comprises, on a local computer, an...
US-9,355,266 Input by tracking gestures
A computing device arranged for tracking an object in an image stream provided by a camera, said computing device comprising a memory and a controller, wherein...
US-9,355,265 Computer data protection lock
An information handling system includes a lock, a switch, and a south bridge. The lock is configured to receive a key and to alternate between a locked position...
US-9,355,264 Secretly transmitting messages over public channels
An apparatus and a method for secretly transmitting messages over public channels is described. Data from a first enterprise service bus (ESB) of a first...
US-9,355,263 Verifying authorization to destroy a physical document before destroying the physical document
A document processing system allows specifying disposition of a paper document at the time a reservation for the document is created in the document processing...
US-9,355,262 Modifying memory permissions in a secure processing environment
Embodiments of an invention for modifying memory permissions in a secure processing environment are disclosed. In one embodiment, a processor includes an...
US-9,355,261 Secure data management
The disclosed subject matter includes a method. The method includes determining, by a module running on a computer platform in communication with non-transitory...
US-9,355,260 Method and system for securing access to configuration information stored in universal plug and play data models
A method and system for securing access to configuration information stored in universal plug and play data models are provided. The method includes receiving a...
US-9,355,259 Method and apparatus for accessing sensitive information on-demand
Exposure of sensitive tenant information is minimized in a multi-tenant/multi-user environment. A unique encryption key is provided for each tenant. The tenant...
US-9,355,258 System and method for database privacy protection
The invention relates to a system and a method for privacy preservation of sensitive attributes stored in a database. The invention reduces the complexity and...
US-9,355,257 Sanitization of virtual machine images
Sanitizing a virtual machine image of sensitive data is provided. A label for a sensitivity level is attached to identified sensitive data contained within each...
US-9,355,256 Sanitization of virtual machine images
Sanitizing a virtual machine image of sensitive data is provided. A label for a sensitivity level is attached to identified sensitive data contained within each...
US-9,355,255 System and method of facilitating compliance with information sharing regulations
The present invention provides a system and method of facilitating compliance to one or more information sharing regulations. The present invention provides a...
US-9,355,254 Apparatus, system and method for preventing data loss
A device and method are provided for a device that communicates security information to a user entering content into the device. In an aspect, the device may...
US-9,355,253 Set top box architecture with application based security definitions
A media processing device, such as a set top box, having selectable hardware and software components for forming media pathways compliant with security...
US-9,355,252 Hosting architecture
A service provider can maintain one or more host computing devices which may be utilized as bare metal instances by one or more customers of the service...
US-9,355,251 Efficient data transfer in a virus co-processing system
Circuits and methods are provided for detecting, identifying and/or removing undesired content. According to one embodiment, a method for virus co-processing is...
US-9,355,250 Method and system for rapidly scanning files
The present embodiments provide a method and system for rapidly scanning a file, wherein the method includes obtaining a data packet, the data packet comprising...
US-9,355,249 Securing thermal management parameters in firmware from cyber attack
Methods and systems may provide for identifying a thermal management setting in a computing system, and comparing the thermal management setting to valid...
US-9,355,248 Container and image scanning for a platform-as-a-service system
Implementations provide for container and image scanning for a Platform-as-a-Service (PaaS) system. A method of the disclosure includes initiating, by a...
US-9,355,247 File extraction from memory dump for malicious content analysis
Techniques for malicious content detection using memory dump are described herein. According to one embodiment, a monitoring module is configured to monitor...
US-9,355,246 Tuning sandbox behavior based on static characteristics of malware
An emulator on a host computer includes a static analysis module that analyzes executable code of a suspicious sample to determine whether the code identifies...
US-9,355,245 Systems and methods for reporter-based filtering of electronic communications and messages
Methods and apparatuses for filtering electronic communications in a communication system. The method includes receiving a message report from a user in...
US-9,355,244 Systems and methods for password reset
Systems and methods are provided for password reset. For example, a first server receives a request operation instruction from a user terminal, wherein the...
US-9,355,243 Method and system for program authentication
A method and a system for authenticating a program are provided. A user system receives a program developed by a developer system and an authentication key,...
US-9,355,242 Method and apparatus for managing and accessing personal data
Managing and accessing personal data is described. In one example, an apparatus has an application processor, a memory to store data, a receive and a transmit...
US-9,355,241 Method for providing a dynamic code via a telephone
A user provides an identifier to a computer server operating an online service by means of a network terminal connected to the computer server by a digital...
US-9,355,240 Multi-device single network sign-on
Methods, systems and computer readable media for multi-device single network sign-on are described. For example, a method can include authenticating a first...
US-9,355,239 Image-based unlock functionality on a computing device
Utilizing an image on a computing device to serve as a template for locking/unlocking the computing device. The image includes a plurality of portions that are...
US-9,355,238 Secure authentication at a self-service terminal
A method of providing secure authentication of a service user at a self-service terminal is described. The method comprises: detecting attempted access by the...
US-9,355,237 User verification using touch and eye tracking
A method includes receiving at a processor, an indication of a user touching a point on a data entry device, receiving at the processor, an indication of a user...
US-9,355,236 System and method for biometric user authentication using 3D in-air hand gestures
A method authenticates users. During user enrollment, a computing device records 3D gesture samples captured by a depth sensor as performed by a first user....
US-9,355,235 Validating a user of a virtual machine for administrator/root access
In one example, a method for controlling access to data includes receiving, by an authenticator, a request from a user for access to a backup of data associated...
US-9,355,234 Authentication involving selection among different biometric methods dynamically
An authentication technique involves obtaining, by processing circuitry, a set of suitability factors from a user device of a user. The authentication technique...
US-9,355,233 Password reset using hash functions
Systems and methods disclosed herein may be utilized for resetting passwords to restore access to all or part of a computer system. A user receives a...
US-9,355,232 Methods for governing the disclosure of restricted data
Described is a method, whereby a creator of an asset at an asset management system selects an identifier corresponding to information related to the asset. The...
US-9,355,231 Frictionless multi-factor authentication system and method
A frictionless multi-factor authentication system and method ("FMFA system") that facilitates verification of the identity of a website user, registrant or...
US-9,355,230 Method and system for controlling access to applications on mobile terminal
Various embodiments provide methods and systems for controlling an access to applications on a mobile terminal. In an exemplary method, an opened application...
US-9,355,229 Method for protecting an application program and related computer program product
A Method for protecting an application program executable on a computer against reverse engineering, said application is created to run with at least one...
US-9,355,228 System and method for policy driven protection of remote computing environments
A system that incorporates teachings of the subject disclosure may include, for example, receiving multiple software agents and configuring a network of the...
US-9,355,227 Dynamic document display personalization implemented in a digital rights management system
A method for displaying a digital document to a user where the display sequence of the pages of the document is personalized based on the user's past...
US-9,355,226 Digital rights management system implemented on a scanner
In a digital rights management system where a scanner is connected to a rights management server, the process of applying digital rights protection is performed...
US-9,355,225 Smart super-distribution of rights-protected digital content
Disclosed is a system and method for super-distribution of rights-protected digital content. A first terminal offers digital content to a second terminal, using...
US-9,355,224 System and method for dynamic adjustment of expiration date for authorization key for antivirus products
A system for a dynamic adjustment of expiration date of an authorization key, the system comprising: a security product that will be installed on a...
US-9,355,223 Providing a managed browser
Methods, systems, computer-readable media, and apparatuses for providing a managed browser are presented. In various embodiments, a computing device may load a...
US-9,355,222 System and apparatus for item management
Item-management systems, apparatus, and methods are described, preferably for management of items such as medicaments. In embodiments, an item-management system...
US-9,355,221 Methods for item management
Item-management systems, apparatus, and methods are described, preferably for management of items such as medicaments. In a method embodiment, a method of...
US-9,355,220 Medication dispensing cabinet systems and methods
A medication dispensing cabinet provides controlled access to medications and supplies stored in it. The cabinet may include at least one lockable storage...
US-9,355,219 Dispensing cabinet with articulating arm
It may be advantageous to equip a medication dispensing cart with an adjustable user interface. An exemplary dispensing device may include a cabinet having one...
US-9,355,218 Secure medication transport and administration system
A portable medication dispensing system is described. In some embodiments, the system includes a portable medication tote comprising a securable compartment...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.