Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,460,311 Method and system for on-the-fly anonymization on in-memory databases
The method includes determining, using an in-memory database, a privacy risk associated with a resultant dataset of a query, returning, by the in-memory...
US-9,460,310 Method and apparatus for substitution scheme for anonymizing personally identifiable information
In some embodiments, a system includes a software program capable of performing an aliasing function on the personally identifiable information ("PII") of a...
US-9,460,309 Security pouch for an electronic device
Provided is a pouch for covering a mobile device to block electronic signals and/or provide and antibacterial function. In one example, a pouch includes a...
US-9,460,308 Multi-level privacy evaluation
An multi-level privacy evaluation technology is described for increasing the performance of applications or services that experience high volumes of queries for...
US-9,460,307 Managing sensitive data in cloud computing environments
The illustrative embodiments provide a method, computer program product, and apparatus for managing collectively sensitive data. Collectively sensitive data is...
US-9,460,306 System and method for controlling access of machine code to operating system resources
Disclosed is a system and method for controlling access of a native image of a machine code to resources of an operating system of a device. An example method...
US-9,460,305 System and method for controlling access to encrypted files
Disclosed are systems, methods and computer program products for controlling access to encrypted files. In one aspect, the system detects a request from an...
US-9,460,304 Data services generation
A system for generation of a RESTful data service comprises a processor and a memory. The processor is configured to: receive a business process model; read the...
US-9,460,303 Operating large scale systems and cloud services with zero-standing elevated permissions
Large scale system operation may be provided. Upon receiving an action request from a user, a determination may be made as to whether the user requires elevated...
US-9,460,302 Method and system for shielding data in transit and data in memory
Described herein are techniques related to shielding data in transit and in memory. A method and system for shielding data in transit and in memory may include...
US-9,460,301 Configurable locked printing
Techniques are provided for generating and updating locked print data. An apparatus receives from a first device, document identification data that identifies...
US-9,460,300 Utilizing multiple access control objects to manage access control
Access control systems and methods are described, including receiving a request from a user to access a first object, where first access-control information is...
US-9,460,299 System and method for monitoring and reporting peer communications
A computer-implemented subject monitoring method is provided. The method includes providing an online-monitoring agent configured for monitoring a personal...
US-9,460,298 Sensitive data aliasing
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed...
US-9,460,297 Information processing apparatus, control method for information processing apparatus, and storage medium
An information processing apparatus includes a volatile storage unit, nonvolatile storage unit, and control unit configured, in a case where a factor to shift...
US-9,460,296 Systems, methods and media for selective decryption of files containing sensitive data
Systems, methods and media are provided for selective decryption of files. One method includes monitoring a secure file storage area including at least one file...
US-9,460,295 Deleting information to maintain security level
A method, system, mediation server, client, and computer program for deleting a copied file in which a master file is duplicated while maintaining a certain...
US-9,460,294 Document origin designator
A document rights management system (DRM) defines an unrenderable origin designator in a media item that does not display or alter the physically rendered...
US-9,460,293 Clipboard hardening
A software module executes on a first operating system running. The software module determines that the first operating system has caused data to the written to...
US-9,460,292 Dynamic rendering of a document object model
The present application relates to a computer having a processor configured to execute a set of instructions to render a customised version of a restricted...
US-9,460,291 Detecting stored cross-site scripting vulnerabilities in web applications
A method for detecting security vulnerabilities in web applications can include providing a payload to a web application during a first interaction with the web...
US-9,460,290 Conditional security response using taint vector monitoring
An embodiment or embodiments of a computing system can conditionally trap based on a taint vector. A computing system can comprise at least one taint vector...
US-9,460,289 Securing a virtual environment
Securing a virtual environment includes: in a host device, intercepting a packet addressed to a virtual machine implemented by the host device; redirecting the...
US-9,460,288 Secure app update server and secure application programming interface ("API") server
A coupled set of servers in a server system protect an application programming interface ("API") from unwanted automation facilitated by unauthorized reverse...
US-9,460,287 Efficient data transfer in a virus co-processing system
Circuits and methods are provided for detecting, identifying and/or removing undesired content. According to one embodiment, a processor maintains a page...
US-9,460,286 System, method, and computer program for managing security in a network function virtualization (NFV) based...
A system, method, and computer program product are provided for providing security in a Network Function Virtualization based (NFV-based) communication network....
US-9,460,285 Security policy deployment and enforcement system for the detection and control of polymorphic and targeted malware
The present system and method pertain to the detection of malicious software and processes such as malware. A cloud security policy system receives hashes and...
US-9,460,284 Behavioral malware detection using an interpreter virtual machine
Described systems and methods allow protecting a computer system from computer security threats such as malware and spyware. In some embodiments, a security...
US-9,460,283 Adaptive integrity validation for portable information handling systems
Portable information handling systems dynamically allocate resources to anti-malware functions based upon available resources and threat status. Dynamic...
US-9,460,282 Static security analysis using a hybrid representation of string values
Systems for constructing hybrid string representations include a string parser configured to parse received string information to produce one or more string...
US-9,460,281 Method of securing non-native code
A method to secure a non-native application. The non-native application is processed to obtain an application stub to be triggered within a virtual machine. The...
US-9,460,280 Interception-proof authentication and encryption system and method
An interception-proof authentication and encryption system and method is provided that utilizes passcodes with individual pins that are made up of symbols from...
US-9,460,279 Variable image presentation for authenticating a user
Facilities are provided herein for authenticating a user to use a processing device. A user predefines authenticators of one or more types and associates these...
US-9,460,278 Automatic PIN creation using password
A PIN is automatically generated based on at least one rule when the user enters a password through a user device. In one example, the PIN is a truncated...
US-9,460,277 Identity based auditing in a multi-product environment
An identity of a user performing an operation with respect to an application is propagated, from a point at which the user authenticates, to one or more other...
US-9,460,276 Virtual machine system, confidential information protection method, and confidential information protection program
A virtual machine system that restricts use of confidential information only to the case where an authentication has resulted in success. The virtual machine...
US-9,460,275 Fingerprinting content via a playlist
A system and method for fingerprinting content via a playlist are provided. The system includes a content requestor to receive an indication that a request for...
US-9,460,274 Distributing and sharing licenses across network devices in a virtual private network (VPN)
A device creates a pool of available licenses for secure network resources, and receives an unused license from a network device. The device also provides the...
US-9,460,273 Automatic generation of license terms for service application marketplaces
A processor stores information associated with one or more programming modules, including one or more license terms associated with the one or more programming...
US-9,460,272 Method and apparatus for group licensing of device features
Methods and systems for group licensing of homogeneous and heterogeneous devices features are disclosed. Licensing servers manage the generation and...
US-9,460,271 DRM system
A method of and system for digital rights management, in which access to a piece of content is granted in accordance with a license owned by a license owner to...
US-9,460,270 Generating child virtual machine to execute authorized application with reduced risk of malware attack
When a predetermined application program becomes the target of execution on a virtual machine that is currently being executed, the virtual machine that is...
US-9,460,269 Communications security management
Implementing communications security includes creating levels of permissions for association with inbound communications. The levels of permissions are...
US-9,460,268 Systems and methods for detecting infectious diseases
Systems, methods, and devices for detecting infections in a clinical sample are provided. Small-volume clinical samples obtained at a point-of-service (POS)...
US-9,460,267 Generation and data management of a medical study using instruments in an integrated media and medical system
In general, a computer-implemented method is described for receiving one or more requests to generate a medical study, retrieving from one or more data...
US-9,460,266 System and a method for scoring functional abilities of a patient
A method for scoring one or more functional abilities of a patient that comprises exercising a patient according to an exercising pattern, using at least one...
US-9,460,265 Data-enabled pharmaceutical container and methods for using same
A data-enabled pharmaceutical container and methods for reminding at dose time, then tracking and communicating valid dose events and/or dose exception events...
US-9,460,264 Devices, systems, and methods for automated data collection
Embodiments disclosed herein relate to methods, devices, and computer systems thereof for automated data collection from a subject. In certain embodiments, one...
US-9,460,263 Integrated health data capture and analysis system
The present invention provides an integrated health care surveillance and monitoring system that provides real-time sampling, modeling, analysis, and...
US-9,460,262 Detecting and responding to sentinel events
The present invention is directed to systems, devices, and methods of monitoring at-risk individuals for the occurrence of sentinel events in a custodial care...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.