Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,390,268 Software program identification based on program behavior
Operations performed by a software application instance executed by a computing device are monitored. A determination is made that a particular operation...
US-9,390,267 Systems and methods involving features of hardware virtualization, hypervisor, pages of interest, and/or other...
Systems, methods, computer readable media and articles of manufacture consistent with innovations herein are directed to computer virtualization, computer...
US-9,390,266 System and method of preventing installation and execution of undesirable programs
Disclosed are systems and methods for controlling installation of programs on a computer. An exemplary system is configured to detect installation of an unknown...
US-9,390,265 Anomalous system state identification
A real-time method and data processing apparatus for identifying an anomalous state of a system are described. The system includes a sensor outputting time...
US-9,390,264 Hardware-based stack control information protection
Techniques for protecting contents of a stack associated with a processor are provided. The techniques include a method including receiving a store instruction...
US-9,390,263 Use of an application controller to monitor and control software file and application environments
In embodiments of the present invention, a framework for an extensible, file-based security system is described for determining an appropriate application,...
US-9,390,262 Method for protecting computer programs and data from hostile code
A method that protects computer data from untrusted programs. Each computer's object and process is assigned with trust attributes, which define the way it can...
US-9,390,261 Securing software by enforcing data flow integrity
The majority of such software attacks exploit software vulnerabilities or flaws to write data to unintended locations. For example, control-data attacks exploit...
US-9,390,260 Methods for enforcing control flow of a computer program
One aspect of the invention provides a method of controlling execution of a computer program. The method comprises the following runtime steps: parsing code to...
US-9,390,259 Method for activating an operating system in a security module
A method for activating an operating system in a security module, wherein the security module is operational either by means of a first operating system or by...
US-9,390,258 Systems and methods for verifying the authenticity of an application during execution
In an embodiment, a system includes an electronic device having memory circuitry configured to store an application comprising a plurality of instructions. The...
US-9,390,257 Detection of unexpected server operation through physical attribute monitoring
Technologies are generally presented for identifying inconsistent usage of computing devices in a multiple computing device environment. When software or...
US-9,390,256 System and methods for secure entry of a personal identification number (PIN)
Systems and methods for credential character selection are provided. The system includes one or more sensors configured to detect a character selection and...
US-9,390,255 Privileged account manager, dynamic policy engine
Techniques for managing accounts are provided. An access management system may check out credentials for accessing target systems. For example a user may...
US-9,390,254 Data transmitting system and method, drive unit, access method, data recording medium, recording medium...
A security module is provided in a data recording medium, data to be written to the data recording medium is encrypted with an content key different from one...
US-9,390,253 Method and a system for binding an audio accessory device with a program application
Disclosed are audio accessory devices and systems for being connected to one or more user devices and related methods. The system comprises an audio accessory...
US-9,390,252 Mechanism for associating analog input device gesture with password for account access
A method for associating an analog input device gesture with an account for account access includes creating a user identifier for an account, creating a...
US-9,390,251 Delivering data from a range of input devices over a secure path to trusted services in a secure element
Systems and methods of delivering data from a range of input devices may involve detecting an availability of data from an input device, wherein the input...
US-9,390,250 Mobile terminal and control method thereof
The present invention relates to a mobile terminal and a control method thereof. The mobile terminal displays a plurality of figures arranged in a first...
US-9,390,249 System and method for improving security of user account access
A system and method for providing access to a user account is provided, and in particular for improving the security to a user when entering access details, for...
US-9,390,248 Systems and methods for authenticating access to an operating system by a user before the operating system is...
Certain embodiments herein relate to authenticating access to an operating system by a user before the operating system is booted. Such authentication may be...
US-9,390,247 Information processing system, information processing apparatus and information processing method
An information processing apparatus receives user information and a request, generates authentication information in response to the request, stores the...
US-9,390,246 Creating secure original equipment manufacturer (OEM) identification
A processing device implementing creation of secure Original Equipment Manufacturer (OEM) identifiers (IDs) in a processing device is disclosed. A processing...
US-9,390,245 Using the ability to speak as a human interactive proof
In one embodiment, a human interactive proof portal 140 may use a biometric input to determine whether a user is a standard user or a malicious actor. The human...
US-9,390,244 Temporal security for controlled access systems
A method for gaining access or entry to a system. The method comprises (a) beginning a secure system act by a user; (b) beginning counting of time intervals...
US-9,390,243 Dynamic trust score for evaluating ongoing online relationships
A method is provided for a dynamic trust score for evaluating ongoing online relationships. By considering a plurality of user data variables and using...
US-9,390,242 Determining user authentication requirements based on the current location of the user being within a...
Systems, apparatus, methods, and computer program products are provided for determining a user's authentication requirements/credentials for a specific network...
US-9,390,241 Method for executing an application in a restricted operating environment
A user is presented with one or more user-level permissions in a human understandable language, where the one or more user-level permissions represent one or...
US-9,390,240 System and method for querying data
In one embodiment, a method includes maintaining, by a computer system, a plurality of data and at least one classification for each of the plurality of data....
US-9,390,239 Software system template protection
Various embodiments herein are in the form of at least one of systems, methods, and software for software system template protection. With the help of software...
US-9,390,238 Windowing combined with ion-ion reactions for chemical noise elimination
In a first location of a mass spectrometer, a plurality of ionized molecules of an ion source are selected that have mass-to-charge ratios within a...
US-9,390,237 Test strip and methods and apparatus for reading the same
Embodiments of the present invention provide a method of analyzing a response of an analyte test device, comprising recording, by a device reading device, an...
US-9,390,236 Retrieving and viewing medical images
As medical imaging becomes more affordable, and the diversity of diagnostic modalities and therapeutic treatments increase, the amount of data being stored...
US-9,390,235 Infusion management platform with infusion data grouping logic
An infusion management platform can determine, based on one or more infusion events, whether to group infusions or segments of infusions. Related apparatus,...
US-9,390,234 Computational systems and methods for monitoring medication events
Computer-based systems and computer-implemented methods are described for monitoring medication events for an individual. Computer-based systems include systems...
US-9,390,233 Mapping of literature onto regions of interest on neurological images
A computer implemented method, apparatus, and computer program product for analyzing neurological images. A set of brain scans for a patient is compared to a...
US-9,390,232 Systems and methods for modeling changes in patient-specific blood vessel geometry and boundary conditions
Systems and methods are disclosed for modeling changes in patient-specific blood vessel geometry and boundary conditions resulting from changes in blood flow or...
US-9,390,231 System for providing identification and information, and for scheduling alerts
A device and system for providing identification and medical information are disclosed. The device includes a readable code that contains medical biographical...
US-9,390,230 Radiation treatment planning apparatus and method thereof
A radiation treatment planning apparatus and method thereof are disclosed. The radiation treatment planning apparatus according to an embodiment of the present...
US-9,390,229 Method and apparatus for a health phone
A method and apparatus providing a health phone utilizing a pedometer or accelerometer incorporated into a cellular telephone. The system is designed to receive...
US-9,390,228 System and method for securely storing and sharing information
A method for any community of interest to conduct secure exchange of encrypted data using a three-party security mechanism consisting of key masters, registries...
US-9,390,227 Visualization tool for qPCR genotyping data
Systems and methods are used to display data obtained from a qPCR instrument. Each of two or more samples is probed with a first labeling probe and a second...
US-9,390,226 Methods and systems for detecting sequence variants
The invention provides methods for identifying rare variants near a structural variation in a genetic sequence, for example, in a nucleic acid sample taken from...
US-9,390,225 Family networks
Described embodiments enable identification of family networks using combinations of DNA analysis and genealogical information. Genealogical data is provided by...
US-9,390,224 Systems and methods for automatically determining myocardial bridging and patient impact
Embodiments include computer-implemented methods and systems for reporting the presence of myocardial bridging in a patient, the method comprising detecting,...
US-9,390,223 Method of determining whether a layout is colorable
A method of determining whether a layout is colorable includes assigning nodes to polygon features of the layout. The method includes designating nodes as being...
US-9,390,222 Determining a set of timing paths for creating a circuit abstraction
Systems and techniques for determining a set of timing paths for creating a circuit abstraction are described. During operation, an embodiment can receive a set...
US-9,390,221 Linear complexity prioritization of timing engineering change order failures
A system and a method are disclosed for displaying an output of a static timing analysis. A plurality of timing violations of an integrated circuit is...
US-9,390,220 Bus-based clock to out path optimization
A place and route technique is provided for a programmable logic device to optimize a delay difference between a bus including a plurality of clock to out paths...
US-9,390,219 System for and method of semiconductor fault detection
A method of detecting one or more faults in a semiconductor device that includes generating a first test pattern set from a primary node list and a fault list....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.