Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,361,467 Owner-controlled access control to released data
Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for receiving, from a computing device used by an...
US-9,361,466 Printer consumable locking
In one example, a printer consumable is locked to a content provider. A document that includes content restricted by a provider is printed if the printer...
US-9,361,465 Privacy-enhanced car data distribution
In accordance with some embodiments, data may be collected from vehicles, and then reported to various subscribers with different levels of access privileges...
US-9,361,464 Versatile log system
A versatile log system is disclosed for producing logs for documents or other objects. The system allows authorized users to configure a log table and at least...
US-9,361,463 Detection of anomalous events
A system is described for receiving a stream of events and scoring the events based on anomalousness and maliciousness (or other classification). The system can...
US-9,361,462 Associating a signing key with a software component of a computing platform
A method and system is provided for operatively associating a signing key with a software component of a computing platform. The computing platform includes a...
US-9,361,461 Method and apparatus for detecting malware and recording medium thereof
A method of detecting malware in a terminal, the method including: generating a plurality of virtual machines in the server, the plurality of virtual machines...
US-9,361,460 Detecting malware through package behavior
A file on a computer system is evaluated against trust criteria to determine whether the file is compatible with the trust criteria. Responsive to the file...
US-9,361,459 Methods and systems for malware detection based on environment-dependent behavior
The present disclosure is directed to methods and systems for malware detection based on environment-dependent behavior. Generally, an analysis environment is...
US-9,361,458 Locality-sensitive hash-based detection of malicious codes
Malicious code is detected in binary data by disassembling machine language instructions of the binary data into assembly language instructions. Opcodes of the...
US-9,361,457 Use of decoy data in a data store
Disclosed are various embodiments for identifying a table of non-decoy data matching a set of criteria. Decoy data is inserted into the table of non-decoy data....
US-9,361,456 Secure computing device using a library of programs
A computing device includes a central processing resource, memory, a network interface, and a security control module. The security control module determines...
US-9,361,455 Security management in a networked computing environment
An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a...
US-9,361,454 Methods for restricting resources used by an application based on a base profile and an application specific...
In response to a request for launching an application within an operating system of a data processing system, one or more extended entitlements are extracted...
US-9,361,453 Validating an untrusted native code module
A system that validates a native code module. During operation, the system receives a native code module comprised of untrusted native program code. The system...
US-9,361,452 Mobile credential revocation
Managing validity status of at least one associated credential includes providing a credential manager that selectively validates associated credentials for at...
US-9,361,451 System and method for enforcing a policy for an authenticator device
A system and method including defining at least one device authentication policy; at a policy engine, initializing authentication policy processing for an...
US-9,361,450 Authentication using mobile devices
Technologies are generally described for authentication systems. In an example, an authentication system can be built among devices by sharing an image that is...
US-9,361,449 Platform integrity verification system and information processing device
A platform integrity verification system capable of executing platform integrity verification by a trusted boot without causing a delay of system startup time....
US-9,361,448 Enabling authentication and/or effectuating events in virtual environments based on shaking patterns and/or...
Shaking patterns and/or environmental information associated with real-world handheld devices may form a basis for enabling authentication and/or effectuating...
US-9,361,447 Authentication based on user-selected image overlay effects
A processing device comprises a processor coupled to a memory and is configured to implement an overlay effects selection interface for use in conjunction with...
US-9,361,446 Token based automated agent detection
Service providers may operate one or more services configured to detect requests generated by automated agents. A CAPTCHA may be transmitted in response to...
US-9,361,445 Multiline one time password
A credential such as a One Time Password (OTP) can be proffered as a matrix of characters provided by a user. The verifier can accept that credential if it...
US-9,361,444 Card for interaction with a computer
A smart card comprising: a memory for storing information; at least one transmitting or receiving antenna; and a low frequency circuit, for handling...
US-9,361,443 Method and apparatus for token-based combining of authentication methods
According to one embodiment, an apparatus may store a first and second subject token that indicate a first authentication method performed by the user and a...
US-9,361,442 Triggering actions on a user device based on biometrics of nearby individuals
Methods, systems, and computer program products for automatically triggering actions on a user device based on biometrics of nearby individuals are provided...
US-9,361,441 Multiple application chip card having biometric validation
A smart card includes a plurality of application circuits that are each related to at least one application service securely contained within the card, each...
US-9,361,440 Secure off-chip processing such as for biometric data
In a biometric sensor system and method, storage of acquired biometric data and/or processing of that data may be shifted from specialized secure processing...
US-9,361,439 Virtual verification
An automatic machine implemented identification and data processing, gathering and storage system and method. A system, method and computer program product for...
US-9,361,438 System and method for accepting user input using asynchronous authentication
A method and system for accepting user inputs over a network. The user is provided with an input widget on a client system to collect and send an input and user...
US-9,361,437 System and method for querying data
In one embodiment, a method includes maintaining, by a computer system, a plurality of data and at least one classification for each of the plurality of data....
US-9,361,436 Multiple profile authentication
A system and method includes a service provider registering a plurality of profile IDs with a central authority and providing the profile IDs to an institution...
US-9,361,435 Multi-tier digital supply chain management
Several embodiments enable management of a bulk package of licenses at a distribution server. The distribution server can store a fulfillment record of a set of...
US-9,361,434 Shortcut management unit and method, and storage medium
A shortcut management device capable of improving user-friendliness of a portal application. The shortcut management device is capable of executing shortcuts...
US-9,361,433 Enterprise leasing license algorithm
Embodiments of the present invention are directed toward an improved enterprise leasing license algorithm and system thereof. A licensing algorithm for...
US-9,361,432 Configuring a security setting for a set of devices using a security policy
A system and method for configuring security settings for devices is described. The system determines a security policy to regulate the use of a set of devices,...
US-9,361,431 Methods and systems to secure control and enhance medication adherence
Embodiments of the invention provide systems and methods to provide safe, secure and accurate point-to-point delivery of prescription and non-prescription drugs...
US-9,361,430 Determining disease state of a patient by mapping a topological module representing the disease, and using a...
A medical general intelligence computer system and computer-implemented methods analyze morpho-physiological numbers for determining a risk of an emergent...
US-9,361,429 Multi-parameter diabetes risk evaluations
Methods, systems and circuits evaluate a subject's risk of developing type 2 diabetes or developing or having prediabetes using at least one defined...
US-9,361,428 System and method for electronically managing medical data files
A network server arrangement including a processor with a machine readable storage encoded with software for execution by the processor. The network server...
US-9,361,427 Scar-less multi-part DNA assembly design automation
The present invention provides a method of a method of designing an implementation of a DNA assembly. In an exemplary embodiment, the method includes (1)...
US-9,361,426 Copy number analysis of genetic locus
Systems and methods for analyzing copy number of a target locus, detecting a disease associated with abnormal copy number of a target gene or a carrier thereof.
US-9,361,425 Method and apparatus for modeling multi-terminal MOS device for LVS and PDK
A method comprises identifying a semiconductor device layout region comprising a first n-type metal oxide semiconductor (MOS) device having a first pair of...
US-9,361,424 Integrated circuit layout design methodology with process variation bands
A system for analyzing IC layouts and designs by calculating variations of a number of objects to be created on a semiconductor wafer as a result of different...
US-9,361,423 RC corner solutions for double patterning technology
A method includes selecting a process corner, determining model parameters for forming an integrated circuit, and generating a file using the model parameters...
US-9,361,422 Fragmentation point and simulation site adjustment for resolution enhancement techniques
A method of performing a resolution enhancement technique such as OPC on an initial layout description involves fragmenting a polygon that represents a feature...
US-9,361,421 Method and apparatus for placing and routing partial reconfiguration modules
A method for designing a system on a target device includes assigning resources on the target device to static logic modules and partial reconfigurable (PR)...
US-9,361,420 System and method for optimization of an imaged pattern of a semiconductor device
In a method, a layout of a device having a pattern of features is provided. The method continues to include identifying a first portion of at least one feature...
US-9,361,419 Constrained placement of connected elements
An improved method for the placement and routing of compound elements, each comprising a series/parallel combination of nominally identical elements, is...
US-9,361,418 Nanowire or 2D material strips interconnects in an integrated circuit cell
An integrated circuit design tool includes a cell library. The cell library includes entries for a plurality of cells, entries in the cell library including...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.