Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,558,372 Disablement of lost or stolen device
Active disablement of a target device that is reported as lost or stolen, even if the device no longer has a cellular link. A service assembles a list of target...
US-9,558,371 System for network administration and local administration of privacy protection criteria
Cookie files are screened in a client machine, wherein a cookie file includes a cookie file source. A request from a subscriber is received at a server to send...
US-9,558,370 Cloud key directory for federating data exchanges
Embodiments are directed to providing attribute-based data access. In an embodiment, a data request specifies one or more search data attributes describing...
US-9,558,369 Information processing device, method for verifying anonymity and medium
The present invention provides an information processing device that enables a reduction in the processing cost of verifying anonymity during anonymization when...
US-9,558,368 System and methods for identifying compromised personally identifiable information on the internet
In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes...
US-9,558,367 Virtualization input component
One or more systems and/or methods for storing personal information within a first device and/or for providing personal information from the first device to the...
US-9,558,366 Computer system for storing and retrieval of encrypted data items, client computer, computer program product...
A computer system is disclosed herein for storage and retrieval of encrypted data items, such as for storing encrypted data items in the cloud, as well as a...
US-9,558,365 Systems and methods for creating and sharing protected content
Systems and methods for creating and sharing protected content between individuals is disclosed. In one embodiment, a method for creating and sharing protected...
US-9,558,364 Computing machine, access management method, and access management program
When an access occurs to an I/O device from an OS 231a, an I/O allocation unit refers to an I/O allocation table, and determines whether the I/O device is...
US-9,558,363 Systems and methods of context based data access control of encrypted files
In some implementations, encrypted data (e.g., application data, keychain data, stored passwords, etc.) stored on a mobile device can be accessed (e.g.,...
US-9,558,362 Data encryption using an external arguments encryption algorithm
Data encryption using an external arguments encryption algorithm: it is an encryption system which uses symmetrical secret key algorithms but the operating...
US-9,558,361 Flexible role based authorization model
Systems and methods described herein relate to role-based authorization systems which allow customization of role templates as well as the ability, using roles,...
US-9,558,360 Protecting information using policies and encryption
A technique and system protects documents at rest and in motion using declarative policies and encryption. Encryption in the system is provided transparently...
US-9,558,359 Information theoretically secure protocol for mobile proactive secret sharing with near-optimal resilience
Described, is system for mobile proactive secret sharing. The system initializes a RobustShare protocol to distribute a block of secret data among a set of...
US-9,558,358 Random number generator in a virtualized environment
Techniques are described for generating high quality entropy in a software only or a hardware assisted software environment, such as a virtualized environment....
US-9,558,357 Delegation of access rights to an account after the disappearance of the user
A management process for access to secure data includes: storing secure data associated with a first user and authentication data of said first user, managing...
US-9,558,356 Data driven system for responding to security vulnerability
A data-driven system for fast response to security vulnerability, in one example embodiment, comprises a request detector, a content type evaluator, and a...
US-9,558,355 Security scan based on dynamic taint
Example embodiments disclosed herein relate to generating a scanning strategy based on a dynamic taint module. A dynamic taint module associated with an...
US-9,558,354 Method for generating and executing encrypted BIOS firmware and system therefor
A firmware image is received at an information handling system. A symmetric key is generated and stored at a trusted platform module (TPM). The firmware image...
US-9,558,353 Wireless router remote firmware upgrade
A wireless router receives a firmware update from a remote server, and destructively overwrites router firmware in flash memory in a chunk-wise manner, and then...
US-9,558,352 Malicious software detection in a computing system
A computer system identifies malicious Uniform Resource Locator (URL) data items from a plurality of unscreened data items that have not been previously...
US-9,558,351 Processing structured and unstructured data using offload processors
A structured data processing system is disclosed that can include a plurality of XIMM modules connected to a memory bus in a first server, with the XIMM modules...
US-9,558,350 Using power fingerprinting (PFP) to monitor the integrity and enhance security of computer based systems
Procedures are described for enhancing target system execution integrity determined by power fingerprinting (PFP): by integrating PFP into the detection phase...
US-9,558,349 Using power fingerprinting (PFP) to monitor the integrity and enhance security of computer based systems
Procedures are described for enhancing target system execution integrity determined by power fingerprinting (PFP): by integrating PFP into the detection phase...
US-9,558,348 Ranking software applications by combining reputation and code similarity
Disclosed are systems and methods to combine a reputation score for a software application publisher or vendor and code analysis techniques to provide a method...
US-9,558,347 Detecting anomalous user behavior using generative models of user actions
A method for detecting abnormal behavior of users is disclosed. Processors identify from a log of user activity, a first number of actions performed by a user...
US-9,558,346 Information processing systems with security-related feedback
An information processing system implements a security system. The security system comprises a classifier configured to process information characterizing...
US-9,558,345 Storage medium recording display control program for function setting, method for operating display control...
An electronic device includes an authentication section that authenticates a user of the electronic device, an operation section that includes a display section...
US-9,558,344 Proximity based authentication for striped data
An approach for authentication is provided. The approach performs identifying, by one or more computer processors, an account attempting to access striped data....
US-9,558,343 Methods and systems for controlling access to resources and privileges per process
To control privileges and access to resources on a per-process basis, an administrator creates a rule that may be applied to modify a token of a process. The...
US-9,558,342 Secured repair data package
An arrangement for storing a data set in an ECU in a vehicle control system, wherein the arrangement includes a computer connected to the vehicle, where the...
US-9,558,341 Integrated user profile administration tool
A computer system is provided including a single sign-on system with applications and a data store storing user profiles, each including a user ID, wherein each...
US-9,558,340 System and method for implementing a robot proof web site
The invention prevents robots from browsing a Web site beyond a welcome page. When an initial request from an undefined originator is received, the Web site...
US-9,558,339 Method, device, and system of protecting a log-in process of a computerized service
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a cyber-attacker. An end-user...
US-9,558,338 Method and apparatus for performing security control by using captured image
A method for performing security control includes selectively controlling at least one camera module of an electronic device to capture at least one image and...
US-9,558,337 Methods of creating a corpus of spoken CAPTCHA challenges
Methods of creating a corpus of spoken CAPTCHA challenges are disclosed. The methods involve training a computing system with samples of human voices and...
US-9,558,336 Persistent authentication using sensors of a user-wearable device
A user-wearable device includes a housing and a band that straps the housing to a portion of a user's body (e.g., wrist). One or more skin contact sensors in...
US-9,558,335 Systems and methods related to security credentials
A method includes receiving, from a user via an electronic device, input representing a password to be utilized for an account; automatically determining,...
US-9,558,334 Access requests at IAM system implementing IAM data model
Systems and methods are provided for provisioning access rights to physical computing resources using an IAM system implementing an IAM data model. The IAM data...
US-9,558,333 Systems and methods for facilitating the sharing of digital bundles of services between users
Systems and methods are disclosed for allowing a primary user to share a digital service, in a bundle of services implemented by a plurality of different...
US-9,558,332 Virtual communication device interfaces
Systems and methods for virtual communication device interfaces are disclosed. In some embodiments, a method may include receiving identification from a...
US-9,558,331 Application licensing for a centralized system of medical devices
Centralized systems execute one or more applications for monitoring and operating a plurality of network enabled medical devices. An indication to start a...
US-9,558,330 Technologies for digital rights managment of 3D printable models
Technologies for 3D printing digital rights management (DRM) include a 3D printing device communicatively coupled with a 3D model storage server and a rights...
US-9,558,329 License management using a basic input/output system (BIOS)
Methods and systems for license management using a basic input/output system (BIOS) may involve performing license activation, monitoring, and enforcement. The...
US-9,558,327 Trial access for media files from a media list
A portable media device includes a processor and a memory. The memory stores instructions that when executed cause the processor to access a media file stored...
US-9,558,326 Information processing apparatus, program introduction assistance system and computer readable information...
An information processing apparatus that is connected with one or plural apparatuses via a predetermined data transmission path, includes a control part that...
US-9,558,325 Method and system for determining analyte levels
Methods and apparatus for analyte level estimation are provided for filtering measurement data. In an embodiment, a present predicted analyte level estimate is...
US-9,558,324 Artificial general intelligence system/medical reasoning system (MRS) for determining a disease state using graphs
A medical general intelligence computer system and computer-implemented methods analyze morpho-physiological numbers for determining a risk of an emergent...
US-9,558,323 Systems and methods for workflow modification through metric analysis
An example system to manage a radiologist workflow includes a first interface to monitor a distribution status of at least one medical exam. The medical exam is...
US-9,558,322 Secure computing systems and methods
The present disclosure relates to systems and methods for facilitating trusted handling of genomic and/or other sensitive information. Certain embodiments may...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.