Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,367,710 Watch identification and authentication system and method
A method and system for creating and storing an identifier for a timepiece having at least one gemstone. The method includes determining one or more...
US-9,367,709 Mobile terminal
Disclosed is a mobile terminal. The mobile terminal according to the present inventive concept, comprises: a case; a printed circuit board (PCB), which is...
US-9,367,708 Method for producing a hardware device and hardware device
A method for producing a hardware device, in particular a trusted platform module for the execution of at least one cryptographic algorithm, the hardware device...
US-9,367,707 System and method for using file hashes to track data leakage and document propagation in a network
The system and method described herein may use file hashes to track data leakage and document propagation in a network. For example, file systems associated...
US-9,367,706 Computation to gain access to service
Access to some aspect of a service may be limited until a user has invested in performing some amount of computation. Legitimate users typically have excess...
US-9,367,705 Methods and systems for implementing security policies on a mobile device
Methods and devices for implementing security policies on a wireless device. The wireless device may include a non-volatile memory comprising a security type...
US-9,367,704 Apparatus and methods for displaying information regarding objects
Apparatus, and methods utilizing such apparatus, are described for displaying information regarding an object including a terminal for collecting, manipulating,...
US-9,367,703 Methods and systems for forcing an application to store data in a secure storage location
The present application is directed to methods and systems for redirecting write requests issued by trusted applications to a secure storage. Upon redirecting...
US-9,367,702 Automatic file encryption
A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The...
US-9,367,701 Systems and methods for maintaining integrity and secrecy in untrusted computing platforms
A method for operating a computing system with a trusted processor include generating a secret cryptographic key based on a physically unclonable function in at...
US-9,367,700 System and method for establishing a shared secret for communication between different security domains
Embodiments may include generating an initial verifier for a first process, the initial verifier generated based on a trusted image of the first process....
US-9,367,699 Automating the creation and maintenance of policy compliant environments
Embodiments of the present invention provide for a method, system, and apparatus for creating a publishable computer file. The method includes selecting a first...
US-9,367,698 Apparatus and method for performing different cryptographic algorithms in a communication system
A communication apparatus performs encryption on data transmitted from another communication apparatus by using first or second cryptographic algorithm, or...
US-9,367,697 Data security with a security module
A security module securely manages keys. The security module is usable to implement a cryptography service that includes a request processing component. The...
US-9,367,696 Interoperability between a plurality of data protection systems
A system is disclosed for providing interoperability between a plurality of data protection systems. The system includes an ontology (3) configured to store...
US-9,367,695 Software vulnerability notification via icon decorations
A computer identifies computer software applications installed on a computer. The computer sends an electronic request to a program on a server computer that...
US-9,367,694 Probabilistic cyber threat recognition and prediction
Generally discussed herein are systems, apparatuses, or processes to recognize that a cyber threat exists or predict a future track of a cyber threat in a...
US-9,367,693 Bitstream confirmation for configuration of a programmable logic device
A bitstream for configuration of a programmable logic device is received, the bitstream comprising a data segment and authentication data associated with the...
US-9,367,692 System and method for validating components during a booting process
A method and system for validating components during a booting process of a computing device are described herein. The method can include the steps of detecting...
US-9,367,691 Modify executable bits of system management memory page table
A computing device to create a system management memory page table in response to the computing device powering on. The system management memory page table...
US-9,367,690 Encryption and decryption methods applied on operating system
An encryption and decryption methods applied on an operating system kernel are disclosed, where a hash result is obtained from a computation between a booting...
US-9,367,689 Apparatus and method for securing BIOS in a trusted computing system
An apparatus including a BIOS read only memory (ROM) and a tamper detector. The BIOS ROM includes BIOS contents stored as plaintext, and an encrypted message...
US-9,367,688 Providing geographic protection to a system
In one embodiment, a method includes determining a location of a system responsive to location information received from at least one of a location sensor and a...
US-9,367,687 Method for malware detection using deep inspection and data discovery agents
A method of detecting malware is provided. The method includes (a) from a database of historic network traffic, identifying a suspect file that traveled through...
US-9,367,686 System and method for antivirus checking of native images of software assemblies
Disclosed is a system and method for antivirus checking of native images of software assemblies. An example method includes for detecting malicious native...
US-9,367,685 Dynamically optimizing performance of a security appliance
A device may identify a set of features associated with the unknown object. The device may determine, based on inputting the set of features into a threat...
US-9,367,684 Data security seeding system
In one aspect of the invention there is provided a system for tracking seed data that has been inserted into a secured private information database listing. The...
US-9,367,683 Cyber security
Systems and methods that use probabilistic grammatical inference and statistical data analysis techniques to characterize the behavior of systems in terms of a...
US-9,367,682 Content management system for securely managing static and dynamic data content
A computer-implemented method manages data content, the data content including static data and dynamic data. The content management method includes analyzing...
US-9,367,681 Framework for efficient security coverage of mobile software applications using symbolic execution to reach...
A method is described that involves receiving an application and generating a representation of the application that describes states of the application and...
US-9,367,680 System and method for mobile communication device application advisement
This disclosure is directed to a system and method for providing advisement about applications on mobile communication devices such as smartphones, netbooks,...
US-9,367,679 Input information authentication device, server device, input information authentication system, and program of...
At the time of input of authentication information, even when the hand and the input screen are seen from the third person, guess of authentication information...
US-9,367,678 Password authentication
A user credential comprising a user password and a one-time password (OTP) may be provided to access a computing system. The user password is authenticated and...
US-9,367,677 Systems and methods for user authentication using eye movement and pupil size change matching
A system for eye movement and pupil size change matching for user authentication includes an ocular sensor that is configured to sense eyes of a user and...
US-9,367,676 System and method for confirming location using supplemental sensor and/or location data
A system, apparatus, method, and machine readable medium are described for performing authentication using environmental data. For example, one embodiment of a...
US-9,367,675 Method for verifying and calibrating time
A method for verifying and calibrating time is provided. The method includes: receiving a password and related information sent by a client, obtaining related...
US-9,367,674 Multi mode operation using user interface lock
A system and a method are disclosed for a computer implemented method to unlock a mobile computing device and access applications (including services) on a...
US-9,367,673 Privileged shared account password sanitation
Sanitizing passwords used in a shared, privileged account includes providing a password of a shared account to a user; identifying a first machine logged into...
US-9,367,672 Method of locking an application on a computing device
A computer-implemented method entails steps of receiving user input signifying that an application on a computing device is to be locked and, in response to the...
US-9,367,671 Virtualization system with trusted root mode hypervisor and root mode VMM
A first component of a Hypervisor is loaded into the memory upon start up. The first component is responsible for context switching and some interrupt handling....
US-9,367,670 Managing a software item on a managed computer system
A method and system is provided of managing a current software item on a managed computer system connectable to a management computer system via a computer...
US-9,367,669 Content source identification using matrix barcode
A system for fingerprinting audiovisual content. The system includes a content receiver and a display device in communication with the content receiver. The...
US-9,367,668 Dynamic fitness equipment user interface adjustment
A method and exercise system obtain at least one parameter of ongoing exercise on a fitness equipment unit and adjust at least one operational characteristic of...
US-9,367,667 Method and system for advanced aneurysm analysis
An automated method for aneurysm analysis including: extracting shape descriptors from test vessel data; generating an aneurysm probability map for the test...
US-9,367,666 Mapping cognitive to functional ability
Methods, systems, and apparatus, including medium-encoded computer program products, for mapping cognitive to functional ability include receiving data...
US-9,367,665 Management of pharmacy kits
A system for managing pharmacy kits comprises a reading station configured to read tag information from a plurality of radio frequency identification (RFID)...
US-9,367,664 Mobile apparatus for executing sensing flow for mobile context monitoring, method of executing sensing flow...
A mobile apparatus includes a sensing handler and a processing handler. The sensing handler includes a plurality of sensing operators. The sensing operator...
US-9,367,663 Methods and processes for non-invasive assessment of genetic variations
Provided herein are methods, processes and apparatuses for non-invasive assessment of genetic variations.
US-9,367,662 Fault injection of finFET devices
A device layout tool includes a gate electrode layer, wherein the gate electrode layer is configured to define a three dimensional gate structure over a fin...
US-9,367,661 Apparatus and method for e-beam writing
A method of preparing mask data, the method begins with performing a logic operation to a design layout, and an optical proximity correction (OPC) is performed...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.