At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-9,454,675 |
Apparatus and method for protecting personal information of recorded
image, and computer-readable recording... Disclosed are an apparatus which is capable of easily performing the personal information protection processing without changing the original image recorded in... |
US-9,454,674 |
Data sharing control method and data sharing control terminal Provided is a method and apparatus to detect and control flow of data shared in a terminal. A method to control data sharing may include accessing a program... |
US-9,454,673 |
Searchable encryption for cloud storage A method implements searchable encryption of cloud stored data by appending tokenized keywords to an encrypted file destined for a cloud storage service. In... |
US-9,454,672 |
Message distribution control A method of controlling distribution of content in a message sent by a message sender comprises receiving an indication from the message sender that the message... |
US-9,454,671 |
Selective data transformation and access for secure cloud analytics Providing analytics information from a cloud service includes maintaining an analytics database that is separate from data and servers accessed by users of the... |
US-9,454,670 |
Hybrid file systems Systems and computer program products may provide a virtual system with direct access to one or more sectors of a resource of a computer system. The system and... |
US-9,454,669 |
Dynamically linked content creation in a secure processing environment A method of creating content within a secure processing environment can include detecting a wiki identifier, indicating a phrase, within a parent document. The... |
US-9,454,668 |
Information processing system, information processing apparatus, terminal
apparatus, and control method When a failure of a reply in response to a packet is detected, A terminal apparatus transmits, to a stand-by information processing apparatus, multiple packets... |
US-9,454,667 |
Granting object authority via a multi-touch screen to a collaborator In an embodiment, in response to a gesture by an administrator, a security palette is created and displayed on a multi-touch screen. In response to a move by... |
US-9,454,666 |
Method for protecting data In the present disclosure, a hash function is computed over a known image, for example, an address range in a program. The result of the hash function is known... |
US-9,454,665 |
Retrieving contact information based on image recognition searches A system and method for retrieving contact information based on image recognition searches is disclosed. A requestor takes a picture of a user or retrieves a... |
US-9,454,664 |
Privacy of location information An arrangement for providing privacy settings for determining whether location information for a subscriber can be provided to a requesting party is described.... |
US-9,454,663 |
Data processing method and device A data processing method pertains to a step (E308) including in verifying a criterion indicative of the normal running of the method and a step (E320) including... |
US-9,454,662 |
Method for booting and dumping a confidential image on a trusted computer
system A method for booting a confidential image on a trusted computer system. A trusted computer system loads an encrypted client image key onto a protected area on... |
US-9,454,661 |
Key versioning including hash stick technology The subject disclosure is directed towards providing a computing device with access to key that depends on the current software version, e.g., the software... |
US-9,454,660 |
Security verification device and a security verification method The present invention provides a security verification device and a security verification method which are capable of verifying that elements for implementing... |
US-9,454,659 |
Software vulnerabilities detection system and methods This invention teaches a system and methods of detecting software vulnerabilities in a computer program by analyzing the compiled code and optionally the source... |
US-9,454,658 |
Malware detection using feature analysis A method of identifying sections of code that can be disregarded when detecting features that are characteristic of malware, which features are subsequently... |
US-9,454,657 |
Security access device and method A security system and method is provided. An embodiment includes a security access device that includes a first transmitter for transmitting authentication to a... |
US-9,454,656 |
System and method for verifying status of an authentication device through
a biometric profile A system and method that includes receiving a first biometric profile and associating the first biometric profile with a first application instance that is... |
US-9,454,655 |
Creation of rhythmic password and authentication based on rhythmic
password A method and system for utilizing the biometric factors reflected in the typing as a kind of physiological password, to create a rhythmic password specific to... |
US-9,454,654 |
Multi-server one-time passcode verification on respective high order and
low order passcode portions Multi-server one-time passcode verification is provided for respective high order and low order passcode portions. A user is authenticated by receiving an... |
US-9,454,653 |
Technologies for enhancing computer security A method includes providing a plurality of variables and a variable. The variables differ from each other. The variables differ from the variable. The further... |
US-9,454,652 |
Computer security system and method A method is provided for protecting a computer system, comprising creating an isolated process, then assigning a first process group to the process; creating an... |
US-9,454,651 |
Mobile token driven software licensing A token contains licensing information for software stored on another computer. The token connects to the computer wirelessly, and transmits the licensing... |
US-9,454,650 |
System and method for updating information capable of providing media
content Disclosed herein are a system and method for updating information capable of providing media content, wherein when a service restriction is generated in a DMS... |
US-9,454,649 |
Method and apparatus for making system constraint of a specified
permission in the digital rights management A method and a terminal device for making multi-system constraint of a specified permission in a digital rights. A rights object related to content object is... |
US-9,454,648 |
Distributing token records in a market environment Method and system for distributing token records in market environment is disclosed. At least one token record comprising a unique seed associated with a OTP... |
US-9,454,647 |
Managing assets on a computing device Systems and methods for managing assets on a computing device are described. A computing device obtains one or more relationships between an electronic device... |
US-9,454,646 |
Short imagery task (SIT) research method The present invention relates to biologically and behaviorally based methods of measuring audience response to a short stimulus. |
US-9,454,645 |
Apparatus and method for managing medication adherence A system and method of a clinical trial is provided. The system comprises a summary page providing an overview of each clinical trial participant in a graphical... |
US-9,454,644 |
Downloadable datasets for a patient monitoring system In general, this disclosure describes techniques for remotely monitoring the health of an ambulatory patient. As described herein, an ambulatory patient may... |
US-9,454,643 |
Surface and image integration for model evaluation and landmark
determination Embodiments of the present disclosure provide a software program that displays both a volume as images and segmentation results as surface models in 3D.... |
US-9,454,642 |
Prediction device, prediction method, program, and recording medium The present invention provides a prediction device, a prediction method, a program, and a recording medium, with which whether or not desired aptamer sequences... |
US-9,454,641 |
Systems and methods for modeling and processing functional magnetic
resonance image data using full-brain... Systems and methods for modeling functional magnetic resonance image datasets using a multivariate auto-regressive model which captures temporal dynamics in the... |
US-9,454,640 |
Mammalian cell line models and related methods The invention provides models and methods useful for optimizing cell lines. The invention provides methods and computer readable medium or media containing such... |
US-9,454,639 |
Pharmaco-genomic mutation labeling Electronic label processor compares bioinformatic values to determine pharmaco-genomic mutation associated with host. Label display indicates pharmaco-genomic... |
US-9,454,638 |
Motor design method, motor designed by motor design method, and electric
vehicle provided with motor A motor design method, a motor (11) designed by the motor design method, and an electric vehicle (10) provided with the motor (11) include a first calculation... |
US-9,454,637 |
Validating integrated circuit simulation results A technique validates results from a circuit simulation estimation program. The technique determines whether the estimated results satisfy Kirchhoff's current... |
US-9,454,636 |
Integrated circuit design optimization In one aspect, a method for providing design point recommendations for an integrated circuit (IC) design is disclosed. The method comprises receiving an IC... |
US-9,454,635 |
Virtual layer generation during failure analysis A layout design for a semiconductor chip includes two or more layers, each including a set of shapes, which are used for various fabrication processes during... |
US-9,454,634 |
Methods, systems, and computer program product for an integrated circuit
package design estimator Disclosed are mechanisms for implementing an IC package layout design with an integrated circuit package design estimator. These mechanisms determine an... |
US-9,454,633 |
Via placement within an integrated circuit An integrated circuit layout is formed by performing a routing step forming a routing layout of routing conductors and routing connection vias prior to... |
US-9,454,632 |
Context specific spare cell determination during physical design In some embodiments, a method may be directed towards contextual based spare cell assignment for integrated circuits. The method may include reserving a... |
US-9,454,631 |
Stitch-derived via structures and methods of generating the same Via-level design shapes are mapped into stitch regions of line-level design shapes design in an overlying conductive line level. A via-catching design shape is... |
US-9,454,630 |
Graphical representation of integrated circuits A system for graphics generation includes a processor configured to implement a modeling process and a GUI process. The modeling process is configured to... |
US-9,454,629 |
Fet-bounding for fast TCAD-based variation modeling A method for analyzing circuits includes identifying one or more device zones in a full device structure. The device zones provide areas of interest to be... |
US-9,454,628 |
Scaling memory components of integrated circuit design In one aspect, a method for providing design point recommendations for an integrated circuit (IC) design is disclosed. The method comprises receiving an IC... |
US-9,454,627 |
Systems and methods for optimizing executable models for hardware
synthesis Systems and methods optimize hardware description generated from a graphical model automatically. The system may include an optimizer. The optimizer may add a... |
US-9,454,626 |
Solving an optimization problem using a constraints solver Systems and techniques are described for solving an optimization problem using a constraints solver. A set of constraints that correspond to the optimization... |