At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Systems and methods for virtualization and emulation assisted malware
Systems and methods for virtualization and emulation assisted malware detection are described. In some embodiments, a method comprises intercepting an object;...
Systems and methods for identifying malware
A computer-implemented method for identifying malware may include (1) determining, for multiple commands within bytecode associated with a malware program,...
Methods and apparatus for control and detection of malicious content using
a sandbox environment
A non-transitory processor-readable medium storing code representing instructions to cause a processor to perform a process includes code to cause the processor...
Systems, methods, and media for outputting a dataset based upon anomaly
Systems, methods, and media for outputting a dataset based upon anomaly detection are provided. In some embodiments, methods for outputting a dataset based upon...
Techniques for controlling authentication
Techniques for controlling authentication are provided. An enterprise injects a control and/or audit manager into the enterprise environment to control and in...
Computer security system and method
The present invention is a computer security system and method in which the various algorithms not only do not search for or detect the presence of a...
Pre-identifying probable malicious behavior based on configuration
The various aspects include systems and methods for enabling mobile computing devices to recognize when they are at risk of experiencing malicious behavior in...
Systems and methods for SQL query constraint solving
The present invention relates to systems and methods for analyzing SQL queries for constraint violations, which may indicate injection attacks. The systems and...
Returning to a control transfer instruction
In an embodiment, the present invention includes a processor having a decode unit and an execution unit. The decode unit is to decode control transfer...
Relevancy improvement through targeting of information based on data
gathered from a networked device...
A method, apparatus, and system related to relevancy improvement through targeting of information based on data gathered from a networked device associated with...
Embedded authentication systems in an electronic device
This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system...
Transaction card for providing electronic message authentication
A transaction card comprising, such as a credit card or debit card, includes transaction card serial number information that identifies the transaction card,...
System and method for disabling secure access to an electronic device
using detection of a predetermined device...
A system and method for providing secure authorization to an electronic device by combining two or more security features of authentication processed at...
Eye movement based knowledge demonstration
Embodiments of methods, apparatuses, and storage mediums associated with eye movement based knowledge demonstration, having a particular application to...
Apparatus and method for authenticating a combination code using a quick
An apparatus and a method are provided for authenticating a combination code using a Quick Response (QR) code. The apparatus includes a QR code receiver that...
System and method of providing and validating enhanced CAPTCHAs
The invention relates to a system and method of automatically distinguishing between computers and human based on responses to enhanced Completely Automated...
Method and apparatus for differentiated access control
A method for differentiated access control on a computing device, and the computing device, the method including starting a timer on the computing device;...
Method and system for abstracted and randomized one-time use passwords for
A security system and method for authenticating a user's access to a target system is disclosed. The security system receives an authentication request from the...
Optical cognition and visual authentication and authorization for mobile
A system and method is provided for visual authentication and authorization of a user for mobile devices, the system having: a login display on a mobile...
Behavioral biometrics for authentication in computing environments
Techniques for authenticating one or more entities are disclosed. Authentication can be performed based on one or more attributes associated with an image...
Systems and methods for authentication using low quality and high quality
Systems, methods, and devices for authenticating a user are provided. A device includes one or more processors configured to determine if a requested service...
Barter for rights
Selling intangible property rights may include receiving content from a seller and determining one or more potential purchasers for the content's intangible...
Secure access to programming data
Embodiments for preventing data loss and allowing selective data access are provided. In some embodiments, the system and method are configured to receive task...
System and process for monitoring malicious access of protected content
A method detects unauthorized access of data, and includes receiving data from a content provider by a content reproducing device; storing the received data in...
AES-GCM based enhanced security setup for media encryption
Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by...
Managing policy and permissions profiles
Systems, methods, and computer-readable storage media are provided for managing policy and permissions profiles. Individuals or organizations are permitted to...
Method and system for evaluating a physiological state depicting a
Disclosed is a method for evaluating a physiological state depicting a person's resources, in which method the alternatives of physiological states depicting...
Apparatuses and methods for parallel analytics
Methods, apparatus, and software packages for data processing are disclosed. In some embodiments, the method may include receiving a dataset. In some...
Radiology workflow coordination techniques
Systems and methods for coordinating a medical imaging workflow with the use of preparation and coordination actions, and similar pre-processing protocols are...
Bioinformatics systems, apparatuses, and methods executed on an integrated
circuit processing platform
A system, method and apparatus for executing a sequence analysis pipeline on genetic sequence data includes an integrated circuit formed of a set of hardwired...
Systems and methods for detecting the presence of a biological status
A method for determining the presence of a biological entity. The method may include entering into a digital computer, at least a plurality of first input...
Athletic performance monitoring systems and methods in a team sports
Systems, apparatuses, and methods for determining when an athlete is in possession of a ball by analyzing image data are provided. A camera is worn by an...
Surgical guide and method
A method for preparing a surgical guide for positioning of a dental implementation. The method includes positioning a positioning device relative to a model...
Assistance device for steering device and method of assisting steering
A design assistance device for a steering device and a method of assisting a steering device design which assists a design of a steering device including an...
Dynamic and adaptive timing sensitivity during static timing analysis
using look-up table
Methods and systems receive an integrated circuit design into a computerized device and perform an analysis of the integrated circuit design to identify...
Addressing early mode slack fails by book decomposition
A computer implemented method for correcting early mode slack fails in an electronic circuit can include generating a logical description of an electronic...
Method and apparatus for assisted metal routing
A method and apparatus for an assisted metal routing is disclosed. Embodiments may include: determining an initial block mask having a first inner vertex for...
Merging of storage elements on multi-cycle signal distribution trees into
A method, system, and computer program product to merge storage elements on multi-cycle signal distribution trees into multi-bit cells of an integrated circuit...
Optimal stacked transistor placement to increase single event transient
Circuitry may include a substrate with an input and an output circuit coupled in series at an intermediate node. The output circuit may have an output...
Support device, semiconductor device, and non-transitory computer readable
According to an embodiment, a semiconductor device switches circuit forms and circuit configurations of a plurality of analog functional circuits by rearranging...
Method of characterizing and modeling leakage statistics and threshold
An approach includes deriving an uplift factor as a function of a width of the device for each leakage current component based on an amount of uncorrelated...
Determining optimal gate sizes by using a numerical solver
Systems and techniques are described for optimizing a circuit design by using a numerical solver. The gates sizes are optimized by modeling a set of gate...
Parallel execution of function calls in a graphical model
A method, tangible computer-readable medium and apparatus for concurrently executing subsystems in a graphical model is provided. An embodiment can transform a...
Selectively tuning frequency modes of a structure
Selectively tuning frequency modes of a structure, including: identifying, by a finite element analysis module, a plurality of frequency modes of the structure;...
Filter modules for aperture-coded, multiplexed imaging systems
A method for designing the spatial partition of a filter module used in an aperture-multiplexed imaging system. The filter module is spatially partitioned into...
Data generation device for vision sensor and detection simulation system
A data generation device and a detection simulation system, capable of executing offline simulation using a vision sensor, without calibration for associating...
Method of failure analysis
In some methods, a number of input data sets is provided for an integrated circuit (IC) model. A number of scores for the number of input data sets,...
Systems and methods for improved property inspection management
Systems and methods presented herein can allow an inspector or other user to sketch a floor plan on a customized graph template. The graph template can be...
System and method for designing and fabricating string instruments
A computer provides a graphical user interface that allows designers to design string instruments. The dimensions and shape of the string instrument design can...
Methods, systems, and articles of manufacture for implementing
pattern-based design enabled manufacturing of...
Some embodiments correlate various manufacturing or design information or data with patterns used to represent electronic designs and provide pertinent...