Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,569,630 Method and system for providing an encryption proxy
An encryption proxy is instantiated in a first computing environment and includes encryption proxy authentication data for identifying itself to a secrets...
US-9,569,629 Communication between key manager and storage subsystem kernel via management console
System, computer program product, and method embodiments for communication between a kernel operational on a storage subsystem and a key manager (KM) through a...
US-9,569,628 Specialized circuitry for cryptographic authentication and other purposes
To prevent piracy, audiovisual content is encrypted prior to transmission to consumers. A low-cost, high-security cryptographic rights module (such as a...
US-9,569,627 Systems and methods for governing content rendering, protection, and management applications
System and methods are disclosed for governing digital rights management systems and other applications through the use of supervisory governance applications...
US-9,569,626 Systems and methods of reporting content-exposure events
In one embodiment, a method is performed by a computer system. The method includes discovering content in a user environment. The method further includes...
US-9,569,625 Wearable device multi-mode system
Systems and techniques are disclosed for detecting whether a wearable computing device is worn by a user or not. The detection can be made based on whether the...
US-9,569,624 Recording third party content to a primary service provider digital video recorder or other storage medium
Recording of third party content on recording systems of a primary service provider is provided. Third party service providers may provide information about...
US-9,569,623 Secure boot with resistance to differential power analysis and other external monitoring attacks
A computing device includes a secure storage hardware to store a secret value and processing hardware comprising at least one of a cache or a memory. During a...
US-9,569,622 Self-measuring nonvolatile memory device systems and methods
One embodiment describes a computing system that includes a boot device. The boot device includes nonvolatile memory that stores startup routine instructions...
US-9,569,621 Information processing apparatus and information processing apparatus startup control method
An information processing apparatus includes a first processor that is connected to an input/output device and is configured to execute a program for...
US-9,569,620 Method for processing UEFI protocols and system therefor
A Unified Extensible Firmware Interface protocol installer utilizes and modifies a list of global unique identifiers corresponding to Unified Extensible...
US-9,569,619 Systems and methods for assessing internet addresses
A computer-implemented method for assessing Internet addresses may include (1) identifying an Internet Protocol address, (2) identifying a plurality of files...
US-9,569,618 Server and method for attesting application in smart device using random executable code
The present invention discloses an application attestation server and an application attestation method. Specially, there is provided an application attestation...
US-9,569,617 Systems and methods for preventing false positive malware identification
A computer-implemented method for preventing false positive malware identification may include (1) identifying a set of variants of a trusted software program,...
US-9,569,616 Gate-level masking
A method of and system for gate-level masking of secret data during a cryptographic process is described. A mask share is determined, wherein a first portion of...
US-9,569,615 Cyber security
Systems and methods that use probabilistic grammatical inference and statistical data analysis techniques to characterize the behavior of systems in terms of a...
US-9,569,614 Capturing correlations between activity and non-activity attributes using N-grams
Identifying correlations between events recorded in a computer system log, the recorded events are generated by a plurality of processes executing on the...
US-9,569,613 Techniques for enforcing control flow integrity using binary translation
Various embodiments are generally directed to an apparatus, method and other techniques to determine a valid target address for a branch instruction from...
US-9,569,612 Hard object: lightweight hardware enforcement of encapsulation, unforgeability, and transactionality
A hardware-implemented method to support three desirable software properties: encapsulation, referential integrity/capabilities, and transactions. These...
US-9,569,611 Electronic apparatus and screen unlock method thereof
An electronic apparatus and a screen unlock method thereof are provided in the invention. The method includes the following steps. First, when a screen of an...
US-9,569,610 Managing a password
A computer implemented method for managing a password is disclosed. The method can include generating a first hash value corresponding to a first password. The...
US-9,569,609 In-band peripheral authentication
This document describes techniques (300, 400) and apparatuses (100, 500, 600, 700) for in-band peripheral authentication. These techniques (300, 400) and...
US-9,569,608 System and method for component authentication of a secure client hosted virtualization in an information...
A client hosted virtualization system (CHVS) includes a processor to execute code, a security processor, a component that includes a certificate, and a...
US-9,569,607 Security verification method and apparatus
A security verification method includes: starting a monitoring process and monitoring a third-party application in an active state in the monitoring process;...
US-9,569,606 Verification of a pattern based passcode
A method and system for verification of a pattern based passcode. A user input of a series of key inputs is received. A registered pattern for the user of a...
US-9,569,605 Systems and methods for enabling biometric authentication options
A computer-implemented method for enabling biometric authentication options may include (1) identifying a device that includes a biometric authentication option...
US-9,569,604 User access control to a secured application
Embodiments described herein provide approaches for user access control to a secured application. Specifically, a custom authentication tool is configured to...
US-9,569,603 Method and apparatus for operating mobile terminal
A method and apparatus for easily restricting a use right and improving use convenience in a mobile terminal are provided. The method includes displaying a...
US-9,569,602 Mechanism for enforcing user-specific and device-specific security constraints in an isolated execution...
A method and system for receiving from an authenticated user, at an authorization server, via a service provider, an authorization request to perform a...
US-9,569,601 System and method for authenticating and enabling functioning of a manufactured electronic device
A system and method for authenticating and enabling functioning of a manufactured electronic device are disclosed. A particular embodiment includes: an...
US-9,569,600 Information processing apparatus with license information management
A license management system including an information processing apparatus includes a detecting unit and a license update requesting unit. The detecting unit...
US-9,569,599 Systems, methods, software, and components using tamper-proof real-time clock
The write-access control line for an RTC is combined with a clear line for an RTC signature register, so that changes to the RTC will cause subsequent reads to...
US-9,569,598 Software license management in a networked computing environment
An approach for managing licenses for software installations on virtual machine (VM) instances in a networked computing environment (e.g., a cloud computing...
US-9,569,597 Information processing apparatus and method, program, and information processing system
There is provided an information processing apparatus, including a storage section which stores a first image, which is an image of a format requiring license...
US-9,569,596 Secure workflow and data management facility
Disclosed is a computer program that provides a secure workflow environment through a cloud computing facility, wherein the secure workflow environment may be...
US-9,569,595 Dynamic mobile streaming application suppression
A method performed by a network device may include obtaining an Internet Protocol address and a user device identifier associated with a user device,...
US-9,569,594 Methods and apparatus for generating clinical reports
Techniques for documenting a clinical procedure involve transcribing audio data comprising audio of one or more clinical personnel speaking while performing the...
US-9,569,593 Methods and apparatus for generating clinical reports
Techniques for documenting a clinical procedure involve transcribing audio data comprising audio of one or more clinical personnel speaking while performing the...
US-9,569,592 Point-of-care medication dispensing
A medication dispenser is provided, comprising a securable container configured to store one or more doses of one or more medications and an access device...
US-9,569,591 Configurable user interface systems for hospital bed
Configurable user interface systems for a patient support structure are disclosed. As described a control interface comprises the capability to allow limited...
US-9,569,590 Apparatus for measuring biological information and method for communicating data from apparatus for measuring...
The present invention relates to an apparatus for measuring biological information supporting multiplex communication. The apparatus for measuring biological...
US-9,569,589 System, medical item including RFID chip, data collection engine, server and method for capturing medical data
A system includes a plurality of RFID chips affixed to medical items, a data collection engine device, and a server device. The data collection engine...
US-9,569,588 Attached personal information device
An information storage device may be semi-permanently attached to a wearer. The device can include an outer casing configured to be compatible with long term...
US-9,569,587 Multi-services application gateway and system employing the same
An intelligent gateway device provided at a premise (home or business) for providing and managing application services associated with use and support of a...
US-9,569,586 Algorithm for modification of somatic cancer evolution
Most clinically distinguishable malignant tumors are characterized by specific mutations, specific patterns of chromosomal rearrangements and a predominant...
US-9,569,585 Combining RNAi imaging data with genomic data for gene interaction network construction
Embodiments of the invention relate to a method for constructing a gene interaction network by combining two sources of genomic information, namely RNAi imaging...
US-9,569,584 Combining RNAi imaging data with genomic data for gene interaction network construction
Embodiments of the invention relate to a method, system, and computer program product to construct a gene interaction network by combining two sources of...
US-9,569,583 Method and system for computer-aided design of radiation-hardened integrated circuits
A method, system, and computer program product include electronic design automation (EDA) tools used with standard CMOS processes to design and produce...
US-9,569,582 Template matching for resilience and security characteristics of sub-component chip designs
A mechanism is provided for validating overall resilience and security characteristics of a sub-component chip design. For each instance of a resiliency...
US-9,569,581 Logic structure aware circuit routing
A method, executed by a computer, for routing a circuit includes receiving a logic structure for a circuit, retrieving a logic template, determining whether the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.