Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,430,667 Managed wireless distribution network
A managed wireless distribution network includes multiple devices that communicate with one another via multiple wireless networks (e.g., multiple Wi-Fi...
US-9,430,666 Method and system for facilitating data access and management on a secure token
A system for facilitating data access and management on a smart card is provided. According to one exemplary aspect of the system, a storage architecture is...
US-9,430,665 Dynamic authorization to features and data in JAVA-based enterprise applications
Systems and methods are presented for dynamically controlling role-based access to enterprise applications. The access includes both a user's ability to access...
US-9,430,664 Data protection for organizations on computing devices
An application on a device can communicate with organization services. The application accesses a protection system on the device, which encrypts data obtained...
US-9,430,663 Dynamic filtering and precision alteration of query responses responsive to request load
Embodiments relate to processing a request from a user device for access rights for a resource. An access management system can send a request to query a (e.g.,...
US-9,430,662 Provisioning authorization claims using attribute-based access-control policies
Disclosed are methods and devices for provisioning authorization claims, which are enforced to control access of users to objects (resources) in a computer...
US-9,430,661 Image forming apparatus performing control of browsing of a file by a terminal, terminal, file browsing control...
There is provided an image forming apparatus that eliminates the need for separately preparing an encrypted file for each user. To achieve this, the image...
US-9,430,660 Managing access in one or more computing systems
Embodiments pertaining to managing access in one or more computing systems can include an operations controller in communication with the one or more computing...
US-9,430,659 Locating cryptographic keys stored in a cache
Example embodiments provide various techniques for locating cryptographic keys stored in a cache. The cryptographic keys are temporarily stored in the cache...
US-9,430,658 Systems and methods for secure provisioning of production electronic circuits
To securely configure an electronic circuit and provision a product that includes the electronic circuit, a first entity (e.g., a chip manufacturer) embeds one...
US-9,430,657 Data encryption system and method
A data encryption method is implemented by a data encryption system including a processing unit and a plurality of operating units which are electrically...
US-9,430,656 Device for carrying out a cryptographic method, and operating method for same
A device for carrying out a cryptographic method has an input interface for receiving input data, an output interface for outputting output data, and a...
US-9,430,655 Split tokenization
An improved technique involves providing protection of secrets by splitting the secret into secret shares and providing tokens for each secret share. Along...
US-9,430,654 Process of destroying data on units within an organization when they are not functioning or no longer in use
The invention is a process that verifies that the unit that currently holds data or at one time held data has the data destroyed. This invention requires a...
US-9,430,653 Protection of user data in hosted application environments
A method of converting an original application into a cloud-hosted application includes splitting the original application into a plurality of application...
US-9,430,652 Use rule-based tokenization data protection
Use rules are included within tokenized data either before or after tokenization. The use rules can be appended to the data before or after tokenization, can be...
US-9,430,651 Digital rights management license archiving
An arrangement is provided where a media server temporarily stores a DRM license that is associated with downloaded media content prior to copying the DRM...
US-9,430,650 Method for managing memory space in a secure non-volatile memory of a secure element
The invention relates to a method for managing non-volatile memory space in a secure processor comprising a secure non-volatile internal memory, the method...
US-9,430,649 Automatic strong identity generation for cluster nodes
Aspects of the subject matter described herein relate to clusters. In aspects, an image is created to install software onto nodes of the cluster. A root secret...
US-9,430,648 Method and apparatus for near field communication
A method of updating firmware of a near field communication (NFC) device includes copying metadata, which is included in a firmware image file, from an...
US-9,430,647 Peer-aware self-regulation for virtualized environments
Technologies for self-regulation for virtualized environments may include, by a virtual machine on an electronic device, detecting an attempted anti-malware...
US-9,430,646 Distributed systems and methods for automatically detecting unknown bots and botnets
Techniques may automatically detect bots or botnets running in a computer or other digital device by detecting command and control communications, called...
US-9,430,645 Method and system for analysis of security events in a managed computer network
An event retrieval and analysis system compares counts of event data for a device to stored profile counts to determine if alerts should be triggered. Event...
US-9,430,644 Systems, methods, and apparatus to enhance the integrity assessment when using power fingerprinting systems for...
A power fingerprinting system is adopted for assessing integrity of a target computer-based system. In one implementation, the power fingerprinting system may...
US-9,430,643 Detecting malicious computer code in an executing program module
A computer program includes a plurality of different types of computer program instructions. Prior to execution of the computer program, the computer the...
US-9,430,642 Providing virtual secure mode with different virtual trust levels each having separate memory access...
A virtual machine manager (e.g., hypervisor) implements a virtual secure mode that makes multiple different virtual trust levels available to virtual processors...
US-9,430,641 Adapting a mobile application to a partitioned environment
Adapting a mobile or other application ("app") to a partitioned environment is disclosed. In various embodiments, a "secure zone" or other logical partition is...
US-9,430,640 Cloud-assisted method and service for application security verification
A method, device, and system for browser-based application security verification is disclosed. A client device requests a browser-based application from a web...
US-9,430,639 Data de-duplication in a non-volatile storage device responsive to commands based on keys transmitted to a host
A data storage device is configured to perform data de-duplication. A method of operating the data storage device includes receiving a first command and write...
US-9,430,638 Authentication method, authentication apparatus and authentication device
The embodiment of the present document provides an authentication method, an authentication apparatus and an authentication device. The method includes: a first...
US-9,430,637 Service providing system and information gathering method
A service providing system includes a unit that stores management information associating user identification, service identification information, and device...
US-9,430,636 Methods and systems for interactive evaluation using dynamically generated, interactive resultant sets of policies
A method for interactive policy evaluation using dynamically generated, interactive resultant sets of policies includes the step of receiving, by a graphical...
US-9,430,635 Secure display element
Techniques for securely displaying sensitive information against attempts to capture such information via screenshots are introduced. Similar to the pieces of a...
US-9,430,634 Authentication using gesture passwords
A technique provides user authentication using a smart device (e.g., a smart phone, a tablet, etc.). The technique involves displaying, by processing circuitry...
US-9,430,633 Aural cuing pattern based mobile device security
When visual focus on a mobile device is limited, aural cues can be used to aid in entering a pattern based access code. The mobile device displays a plurality...
US-9,430,632 Function performing apparatus and storage medium
A function performing apparatus includes a function performing unit, an operation unit, a processor and memory. The function performing apparatus receives a...
US-9,430,631 Connection control device establishing connection between portable type mobile terminal and information...
A connection control device acquires information on a position in which a user performs manipulation input to information processing device and information on a...
US-9,430,630 Credential-free identification and authentication
A method of authenticating a user so that the user can access a website without entering a unique user credential. A user accesses a target and is presented...
US-9,430,629 Performing biometrics in uncontrolled environments
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving an enrollment biometric identifier of a user....
US-9,430,628 Access authorization based on synthetic biometric data and non-biometric data
A method of selectively authorizing access includes obtaining, at an authentication device, first information corresponding to first synthetic biometric data....
US-9,430,627 Method and system for enforced biometric authentication
A method for biometric authentication of a user by a challenge/response procedure with a mobile station includes authenticating the enrolled user before...
US-9,430,626 User authentication via known text input cadence
A system, method, and computer-readable storage device for receiving data representative of an input sample comprising a user's motion while entering...
US-9,430,625 Method and system for voice match based data access authorization
A request is received to access protected data from a data access requesting party. Authentication text to be read aloud is then generated and transferred to a...
US-9,430,624 Efficient logon
Methods and systems for efficiently logging in or onto a computer system or other restricted system are described. An enterprise device may detect that a user...
US-9,430,623 License management system, license management method, and client device
At the time of license authentication for a PC software product, an inquiry about the license authentication date of an MFP software product included in a...
US-9,430,622 Mini appliance
In one embodiment, a mini appliance comprises: one or more low-power, low-heat, and low sound processors; one or more memories; and one or more software modules...
US-9,430,621 Secure provisioning of network services
Provided are systems and methods for secure provisioning of consumer network services. For example, there is a broadband modem for secure provisioning of a...
US-9,430,620 System and method for securing the life-cycle of user domain rights objects
In a method for enabling support for backwards compatibility in a User Domain, in one of a Rights Issuer (RI) and a Local Rights Manager (LRM), a Rights Object...
US-9,430,619 Media decoding control with hardware-protected digital rights management
Innovations in the area of hardware-protected digital rights management ("DRM") systems are presented. For example, a hardware-protected DRM system includes a...
US-9,430,618 Messaging administration based on digital rights management services
A method for servicing messages with digital documents accessed and displayed by a client application, including the steps of establishing a database of message...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.