Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,530,028 Identifiers for mass serialization
An example method includes generating a set of identifiers for a mass serialization; associating one or more of the identifiers of the set of identifiers with...
US-9,530,027 Device lock for transit
Generally, this disclosure describes providing theft deterrence for a device while in transit. The system may include lock state circuitry configured to receive...
US-9,530,026 Privacy protection for participatory sensing system
Provided is a method that may be used for privacy protection. The method comprises: generating a pseudonym at a user equipment in association with sensed data;...
US-9,530,025 System, method and computer program product for controlling access to protected personal information
A computer-based system, method and computer program product for controlling access to protected personal information is disclosed. Protected personal...
US-9,530,024 Recommendation system for protecting user privacy
One embodiment of the present invention sets forth a technique for providing application command recommendations to a privacy-sensitive client device. The...
US-9,530,023 Reach objects
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a row level security. One of the methods includes receiving,...
US-9,530,022 Protection of designs for electronic systems
In one approach for protecting a design, a plurality of implementations of the design are generated. Each implementation includes an identification function....
US-9,530,021 Portable recording medium, system including the portable recording medium, and data recovery method of the...
A technique of the present invention includes a storage section for storing contents data and an encryption flag indicating that any one of an encryption...
US-9,530,020 Use of freeform metadata for access control
Approaches are described for security and access control for computing resources. Various embodiments utilize metadata, e.g., tags that can be applied to one or...
US-9,530,019 Encapsulated simulation components
Systems and methods are provided for providing protected three-dimensional components for simulation. A three-dimensional component may be accessed, wherein the...
US-9,530,018 Information processing apparatus, information processing system, and non-transitory computer readable medium...
An information processing apparatus includes a file acquiring unit, a generating unit, a data processing unit, and an output unit. The file acquiring unit...
US-9,530,017 Secure printing between printer and print client device
Systems and methods of operating a computing system may involve securely printing a print document sent from a client device to a target printer. In one...
US-9,530,016 Using source taint analysis to reduce false positives in an advanced persistent threat (APT) protection solution
In response to a local Advanced Persistent Threat (APT) agent identifying a potential data exfiltration attack, the binary identified in the attack is sent to a...
US-9,530,015 System, method and computer program product for messaging in an on-demand database service
In accordance with embodiments, there are provided mechanisms and methods for messaging in an on-demand database service. These mechanisms and methods for...
US-9,530,014 Method and a device for making a computer application secure
In one embodiment, a security method for making secure a computer application being executed on a terminal is disclosed. In one embodiment the security method...
US-9,530,013 Supporting the use of a secret key
A first installation stores key identifications with allocation to a respective user and a second installation stores secret keys which each can be found by...
US-9,530,012 Processing extensible markup language security messages using delta parsing technology
Markup language security messages are processed. A template corresponding to a markup language security message is identified. The markup language security...
US-9,530,011 Method and system for provision of cryptographic services
An encryption service system comprises an API for receiving requests from one or more calling applications. Each request comprises information identifying the...
US-9,530,010 Energy usage data management
A method including receiving energy usage data representative of energy usage of a customer during a particular time period. The energy usage data is sign with...
US-9,530,009 Secure execution and update of application module code
A dynamic root of trust can be injected in an application module on a client device using a backend server and can be continuously monitored to ensure...
US-9,530,008 System and method for a processing device with a priority interrupt
In accordance with an embodiment, a method of operating a processor includes operating in a first operating mode that prohibits access to a protected memory...
US-9,530,007 Identifying tamper-resistant characteristics for kernel data structures
Techniques for identifying tamper-resistant characteristics for kernel data structures are disclosed herein. A set of kernel data structures is received, the...
US-9,530,006 Method and system for performing a memory safety check of a program written in an unmanaged programming language
A method for performing a memory safety check of a program coded in an unmanaged programming language includes receiving an intermediate representation (IR) of...
US-9,530,005 Techniques for secure data management in a distributed environment
Techniques for secure data management in a distributed environment are provided. A secure server includes a modified operating system that just allows a kernel...
US-9,530,004 Secure boot method, semiconductor device and recording medium
A secure boot method for a system, the system including a processor and a storage medium configured to store a program, a plurality of first partial hash values...
US-9,530,003 Computer system and method of securely booting a computer system
A computer system includes a data network connection, a reading device, an input component and a security device, wherein the security device establishes a data...
US-9,530,002 Verifying the integrity of a computing platform
Systems and techniques are described for verifying the integrity of a computing platform. Specifically, a software image can be generated that, when executed at...
US-9,530,001 System and method for below-operating system trapping and securing loading of code into memory
A system for protecting an electronic device against malware includes a memory, an operating system configured to execute on the electronic device, and a...
US-9,530,000 Secure privilege level execution and access protection
The subject disclosure is directed towards using one or more of hardware, a hypervisor, and privileged mode code to prevent system mode code from accessing user...
US-9,529,999 Method and system of distinguishing between human and machine
A method and a system of distinguishing between a human and a machine are disclosed. The method includes: when a request for accessing a designated network...
US-9,529,998 Systems and methods for securing virtual machine computing environments
Systems and methods are provided for securing data in virtual machine computing environments. A request is received for a security operation from a first...
US-9,529,997 Centralized platform settings management for virtualized and multi OS systems
A processing device may include a first processor executing an operating system including a configurable setting and an isolated execution environment including...
US-9,529,996 Controlling mobile device access to enterprise resources
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application...
US-9,529,995 Auto discovery of virtual machines
A method and apparatus is disclosed herein for performing auto discovery of virtual machines. In one embodiment, the method includes monitoring, using an...
US-9,529,994 Call stack integrity check on client/server systems
Computer systems and methods in various embodiments are configured for improving the security and efficiency of client computers interacting with server...
US-9,529,993 Policy-driven approach to managing privileged/shared identity in an enterprise
Access to a privileged account is managed by first requiring authentication of a user logging into the account and then performing a policy evaluation to...
US-9,529,992 Security information caching on authentication token
A method of operating a security token to authenticate a user in a multi-factor authentication system is disclosed. The method includes: monitoring user custody...
US-9,529,991 Systems and methods for multi-factor remote user authentication
What is disclosed is a handheld multi-factor remote user authentication card device in the form factor of a prior art one factor of "what you have" security...
US-9,529,990 Systems and methods for validating login attempts based on user location
A computer-implemented method for validating login attempts based on user location may include (1) detecting a login attempt by a user to log into a user...
US-9,529,989 Access requests at IAM system implementing IAM data model
Systems and methods are provided for provisioning access rights to physical computing resources using an IAM system implementing an IAM data model. The IAM data...
US-9,529,988 Dossier packaging
The subject technology discloses configurations for receiving a request from a user to log into a communications server in which the request includes user...
US-9,529,987 Behavioral authentication system using a behavior server for authentication of multiple users based on their...
A method and a corresponding device for authenticating a user for access to protected information, the method comprising generating a behavioral user profile...
US-9,529,986 Utilizing multiple computing devices to verify identity
A tool for identify verification using computing device collaboration. The tool generates a hash based, at least in part, on device specific information for one...
US-9,529,985 Global authentication service using a global user identifier
An authentication device may provide an authentication code to a third party device. The third party device may provide a third party service to which a client...
US-9,529,984 System and method for verification of user identification based on multimedia content elements
A method and system for verifying an identity of a user accessing a user device are provided. The method includes receiving a request to verify the user...
US-9,529,983 Solid state memory unit and method for protecting a memory including verification of a sequence of requests for...
A solid state memory unit and method for protecting a solid state memory having a microprocessor are disclosed. The method may include receiving user-input...
US-9,529,982 Method and apparatus to manage user account of device
A method and apparatus to manage a user account. The method includes: setting a plurality of authorization accounts defining usage right regarding functions of...
US-9,529,981 Methods and systems for setting access to a list of class entities
In an embodiment, a feature is an aspect of a class which represents information, data, behaviors, or capabilities encapsulated by the class. An accessing class...
US-9,529,980 Deduplication of end user license agreements
In a computer-implemented method for deduplicating a plurality of instances of end user licensing agreements (EULAs), an end user licensing agreement (EULA)...
US-9,529,979 Providing content items from alternate sources
Systems and methods for providing content items to users. A computer system may provide to a first user an indication of a plurality of available content items....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.