At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Visual display of risk-identifying metadata for identity management access
An identity management system is augmented to enable a manager to associate "risk" metadata with different types of access requests representing computer system...
System and methods for secure utilization of attestation in policy-based
decision making for mobile device...
Policy-based client-server systems and methods for attestation in managing and securing mobile computing devices. Attestation provides the means to make...
Extension component for authenticating game data
Disclosed are methods, apparatus and systems, including computer program products, implementing and using techniques for authenticating data for playing a game...
Virus co-processor instructions and methods for using such
Circuits and methods for detecting, identifying and/or removing undesired content are provided. According to one embodiment, a virus processing system includes...
Identifying an evasive malicious object based on a behavior delta
A security device may receive actual behavior information associated with an object. The actual behavior information may identify a first set of behaviors...
Polymorphic treatment of data entered at clients
A computer-implemented method includes identifying, in web code to be served to a client, presence of code for generating a form; generating additional,...
Method and device for optimizing and configuring detection rule
A method and a device for optimizing and configuring a detection rule, where the method includes: a network entity receives network traffic; extracts a packet...
Locked print with intruder detection and management
A printing device includes a user interface, a print module and a locked print module. The locked print module is configured to examine a plurality of print...
Server-side malware detection and classification
A server-side system that detects and classifies malware and other types of undesirable processes and events operating on network connected devices through the...
Managing software deployment
The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of...
Tracking injected threads to remediate malware
Injected threads are tracked to detect malware that injects malicious code into the address space of a legitimate process. Relationships between threads of...
Method for authentication
A client is intended to be authenticated with a server. The present disclosure relates to a method that includes using an algorithm for the client and server,...
Non-numeric personal identification
Various methods and systems are provided for allowing a user to select a non-numeric PIN or password and use that to access content instead of a conventional...
Methods and systems for user authentication in a computer system using
Systems and methods are disclosed for computer-based user authentication to prove user identity or to approve access to a resource such as a computer system, in...
Encrypted image with matryoshka structure and mutual agreement
authentication system and method using the same
The present invention relates to an encrypted image with a matryoshka structure and a mutual agreement authentication system and method using the same. The...
Shuffled passcode authentication for cryptographic devices
A first cryptographic device is configured to generate a passcode for submission to a second authentication device. The second authentication device determines...
Method for managing security of a data processing system with configurable
Techniques for managing security of a data processing system are described herein. According to one embodiment, in response to a request for modifying a...
Various systems and methods for authenticating a user are described herein. A system to includes a biometric scanner to scan an input sequence of biometric...
Image processing apparatus that performs user authentication,
authentication method therefor, and storage medium
An image processing apparatus capable of an authentication technique which enables appropriate user authentication on an application-by-application basic...
Biometric access sensitivity
The present application provides methods and corresponding systems for accessing services on a gaming device which, in certain embodiments, include the step or...
Authentication method for authenticating a first party to a second party
An authentication method authenticates a first party to a second party, where an operation is performed on condition that the authentication succeeds. If the...
Network device, system and method for rendering an interactive multimedia
A device, method, and system for managing authorization for rendering of digital media recordings by a networked rendering device are disclosed. The device...
Method and device for computing molecular isotope distributing and for
estimating the elemental composition of...
The current invention concerns a method for identifying the elemental composition of and/or quantifying the presence of mono-isotopic elements in a molecule in...
Selecting and correlating physical activity data with image data
Example embodiments may relate systems, methods, apparatuses, and computer readable media configured to correlate image data of a user performing physical...
Method for producing patient-specific plate
A method of making a patient specific surgical orthopedic implant includes obtaining a virtual model of the orthopedic implant that is configured to fit over a...
System for defining cuts in eye tissue
A computer-aided system include a data storage (18) with eye data (181), which defines a three-dimensional model of the eye, and a reference generator (113) for...
Detecting and classifying copy number variation
The invention provides a method for determining copy number variations (CNV) of a sequence of interest in a test sample that comprises a mixture of nucleic...
Dynamic pairing of patients to data collection gateways
Systems, devices and methods transmit data from a patient device to a location, for example a remote location, where the patient is monitored. The system may...
User interface for segmented neurostimulation leads
An external control device for use with a neurostimulation system having a plurality of electrodes capable of conveying an electrical stimulation field into...
In-room alarm configuration of nurse call system
A nurse call system includes a room station located in a patient room and having a graphical display. The nurse call system also includes an equipment port...
Method and system for collection and management of perioperative data
Methods and systems for collecting and managing anesthesia perioperative data of a patient are provided. More particularly, a method of the present disclosure...
Image management apparatus
An image management apparatus includes: a display; a storage unit that stores first operation information, input by a first user, performed on a series of...
Method, apparatus and computer program product for receiving digital data
A method, apparatus and computer program product are provided to efficiently receive digital imaging data files, regardless of their size. For a respective data...
Methods for genome assembly and haplotype phasing
The disclosure provides methods to assemble genomes of eukaryotic or prokaryotic organisms. The disclosure further provides methods for haplotype phasing and...
Method of determining RNA integrity
A method of determining a quantitative measure of the integrity of RNA in a sample, the method comprising: (i) assaying a sample containing instances of an RNA...
Discontinuous integration using half periods
Apparatuses and methods of frequency hopping algorithms are described. One method monitors a signal on one or more electrodes of a sense network at a first...
Float remaining volume identification
A method and apparatus for identifying a potential movement of a part containing features. First lines are formed by a computer system on a plane extending from...
Method of performing circuit simulation and generating circuit layout
A method of generating, based on a first netlist of an integrated circuit, a second netlist includes generating layout geometry parameters for at least a...
Simultaneously viewing multi paired schematic and layout windows on
printed circuit board (PCB) design software...
A method according to one embodiment includes receiving a printed circuit board design in a memory; generating, using a processor, multiple schematic windows of...
Methodology for pattern density optimization
The present disclosure relates to a method of improving pattern density with a low OPC (optical proximity correction) cycle time, and an associated apparatus....
Integrated electronic design automation system
An electronic design automation system combines features of discrete EDA/CAD systems and manufacturing systems into a monolithic system to enable a layperson to...
Yield optimization of processor with graphene-based transistors
Techniques described herein generally include methods and systems related to the selection of a combination of graphene and non-graphene transistors in an IC...
FET-bounding for fast TCAD-based variation modeling
A method for analyzing circuits includes identifying one or more device zones in a full device structure. The device zones provide areas of interest to be...
Specifying and implementing relative hardware clocking in a high level
System and method for specifying and implementing relative hardware clocking in a high level programming language. User input specifying a program may be...
Method and apparatus for bitcell modeling
A methodology for the simulation of semiconductor memory devices that exhibits improved accuracy and speed, and the apparatus performing the methodology are...
Simplified device model extension using subcircuits
A system, method, and computer program product for extending device model parameter specification flexibility when using a subcircuit wrapper. Embodiments...
Methods and systems for modeling crowdsourcing platform
Methods and systems for creating statistical model. Values of at least one output parameter corresponding to each combination of values of a set of input...
Distributed approach for feature modeling using principal component
In one embodiment, techniques are shown and described relating to a distributed approach for feature modeling on an LLN using principal component analysis. In...
Method of selecting positions of wells to be drilled for petroleum
A method of selecting the positions of wells to be drilled for the development of a petroleum reservoir from a set of reservoir images. Well configurations are...
Simulator, processing system, damage evaluation method and damage
Disclosed herein is a simulator including: an input section adapted to acquire processing conditions for a given process performed on a workpiece; and a damage...