Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,378,371 Systems and methods for account recovery using a platform attestation credential
Described herein is technology for restoring access to a user account. In particular, systems and methods for account recovery using a platform attestation...
US-9,378,370 Scanning files for inappropriate content during synchronization
The present invention extends to methods, systems, and computer program products for scanning files for inappropriate content during file synchronization....
US-9,378,369 Detection of file modifications performed by malicious codes
File modifications performed by malicious codes are detected by detecting a file modification for an original file before the file modification is performed on...
US-9,378,368 System for automatically collecting and analyzing crash dumps
A system for automatically collecting and analyzing crash dumps to determine if a security exploit was unsuccessful and generating a report.
US-9,378,367 Systems and methods for identifying a source of a suspect event
A computer-implemented method for identifying a source of a suspect event is described. In one embodiment, system events may be registered in a database. A...
US-9,378,366 Deceptive indicia notification in a communications interaction
Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for monitoring deceptive indicia in communications...
US-9,378,365 Recording activity-triggered computer video output
An application that is capable of monitoring Internet or network traffic and performing recordings of computer video output based on one or more violations of...
US-9,378,364 Technologies for managing security threats to a computing system utilizing user interactions
Technologies for managing security threats on a computing system include detecting a security threat to the computing system, determining a plurality of...
US-9,378,363 Noise injected virtual timer
Techniques are described for injecting noise in a timer value provided to an instruction requesting the timer value. A plurality of tasks may execute on a...
US-9,378,362 System and method of monitoring attacks of cross site script
The present disclosure provides techniques for monitoring a cross site scripting attack. These techniques may receive and reply to, by a computing device, a...
US-9,378,361 Anomaly sensor framework for detecting advanced persistent threat attacks
A threat detection system for detecting threat activity in a protected computer system includes anomaly sensors of distinct types including user-activity...
US-9,378,360 Secure if antecedent
Hostile attacks against a computer program are prevented when the program is executed in a computing environment that is controlled by the attacker. A...
US-9,378,359 Gateway for controlling mobile device access to enterprise resources
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application...
US-9,378,358 Password management system
A password management system includes a character string conversion unit that converts an input character string to a character string different from the input...
US-9,378,357 Timing of password change requirements based on ambient intelligence
A user's required password change is postponed according to context information determined to indicate that the current password change timing is at an...
US-9,378,356 Two factor authentication using a one-time password
Methods and systems for online authentication eliminate the common username plus password combination, using instead a novel two-factor authentication that...
US-9,378,355 Electronic device and access controlling method
A method for controlling access to an electronic device, the electronic device displays an image on a display device of the electronic device, when the...
US-9,378,354 Systems and methods for assessing security risk
Systems and methods for providing identification tests. In some embodiments, a system and a method are provided for generating and serving to a user an animated...
US-9,378,353 Methods and systems for determining a user identity by analysis of reflected radio frequency signals received...
An exemplary method includes a user identification system associated with a computing device transmitting a radio frequency ("RF") signal from a transmitting...
US-9,378,352 Barcode authentication for resource requests
Mobile device, client device and server associated with client-server authentication are described. In embodiments, the mobile device may comprise a camera and...
US-9,378,351 System and method for enrolling in a biometric system
The present invention is a system and method of enrolling potential system users for a biometric system for identity verification. Potential system user...
US-9,378,350 Facial capture managing access to resources by a device
Disclosed are various embodiments for controlling access to resources by a client device. Methods may include receiving a user request to access a resource on...
US-9,378,349 Enabling secure transactions between spoken web sites
Techniques for enabling a secure transaction with a remote site that uses voice interaction are provided. The techniques include authenticating a remote site to...
US-9,378,348 Adding biometric identification to the server security infrastructure for an enterprise service bus system
An enterprise service bus server receives a user's biometric information from a client. The enterprise service bus server requests authentication of the user by...
US-9,378,347 Computer terminals biometrically enabled for network functions and voice communication
The invention provides a handset that includes a finger-image sensor that provides finger-image-related signals or data for authentication purposes and...
US-9,378,346 Optimized biometric authentication method and system
An efficient exchange of messages in a system for authenticating access to a base device is facilitated through the selection of a particular biometric template...
US-9,378,345 Authentication using device ID
A system for authenticating a customer is disclosed. The customer may attempt to access protected resources located at an authentication server. The customer...
US-9,378,344 Method and apparatus for protecting information based on data card
The present invention discloses a method and apparatus for protecting information based on a data card, and the method comprises: selecting information which...
US-9,378,343 Automatic detection of required network key type
Methods and apparatuses in automatic detection of a required network key type are described. In one embodiment, a client device prompts a user for a pass...
US-9,378,342 Context analysis at an information handling system to manage authentication cycles
Context captured with sensors of an information handling system is applied to selectively lock access to currently unlocked information, with conditions for...
US-9,378,341 Electronic device and audio processing method
An audio processing method for an electronic device includes a first audio file, a second audio file, and a first digital watermark to perform an audio...
US-9,378,340 Methods and systems for upgrade and synchronization of securely installed applications on a computing device
Embodiments of the present disclosure provide for upgrades and synchronization of applications installed on a device, such as a mobile device. In one...
US-9,378,339 System, method, and device for delivering communications and storing and delivering data
A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is...
US-9,378,338 System, method, and computer program for validating receipt of digital content by a client device
A system, method, and computer program product are provided for validating receipt of digital content by a client device. In one embodiment, a transmission of...
US-9,378,337 Data item deletion in a database system
Example systems and methods of deleting data stored in a database system are presented. In one example, a plurality of data items is received from an...
US-9,378,336 Optical data capture of exercise data in furtherance of a health score computation
A computer implemented method for managing health-related data captures an image from a display of an exercise machine using a camera, has the images processed...
US-9,378,335 Risk factor engine that determines a user health score using a food consumption trend, and predicted user weights
A method for processing risk factors for a user is disclosed. The method may include receiving protocol data for creating a risk factor engine by an application...
US-9,378,334 Medical pump providing customizable programming permissions
A method and apparatus for delivering intravenous drugs to a patient provides for remote loading and programming of IV pumps that may be shipped in a loaded and...
US-9,378,333 Display for pump
This document discusses, among other things, an apparatus comprising a pump configured to deliver insulin, a processor, and a user interface including a...
US-9,378,332 Processing and detecting baseline changes in signals
Systems and methods for detecting the occurrence of events from a signal are provided. A signal processing system may analyze baseline changes and changes in...
US-9,378,331 Annotation and assessment of images
Annotations of medical images may be generated using one or more lexicons so that terminology is consistent across multiple exams, users, facilities, etc....
US-9,378,329 Immunity to inline charging damage in circuit designs
Approaches for checking a design of an integrated circuit using an antenna rule are provided. A method includes determining a figure of merit for a transistor...
US-9,378,328 Modeling multi-patterning variability with statistical timing
Systems and methods for modeling multi-patterning variability with statistical timing analysis during IC fabrication are described. The method may be provided...
US-9,378,327 Canonical forms of layout patterns
Aspects of the disclosed technology relate to techniques for determining canonical forms of layout patterns. Coordinates of vertices of geometric elements in a...
US-9,378,326 Critical region identification
A method and system to identify a region of a design block of an integrated circuit for redesign are described. The method includes dividing the design block...
US-9,378,325 Method and apparatus for performing integrated circuit layout verification
A method of performing layout verification for an integrated circuit (IC) layout is described. The method comprises receiving layout information for the IC...
US-9,378,324 System and method of detecting design rule noncompliant subgraphs in circuit netlists
An automated system and method of performing electronic design rule checking on the netlist of an integrated circuit composed of a plurality of subgraphs. The...
US-9,378,323 Methods for retargeting vias and for fabricating semiconductor devices with retargeted vias
Methods for retargeting a via and for fabricating a semiconductor device with a retargeted via are provided. In one embodiment, a method for retargeting a via...
US-9,378,322 Preparing layouts for semiconductor circuits
According to a method of preparing a layout of semiconductor circuit elements, a computer processor determines a first value of a distance metric that describes...
US-9,378,321 Apparatus and methods for partitioning an integrated circuit design into multiple programmable devices
Methods and systems for partitioning a design across a plurality of programmable logic devices such as Field Programmable Gate Arrays (FPGAs) are provided. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.