Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,582,676 Adding or replacing disks with re-key processing
In a network of multiple storage devices, a storage device may become faulty and need to be replaced or additional capacity may need to be added through...
US-9,582,675 Protection of memory areas
A method for loading a program, contained in at least a first memory, into a second memory accessible by an execution unit, in which the program is in a...
US-9,582,674 Risk adaptive information flow based access control
Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the...
US-9,582,673 Separation of duties checks from entitlement sets
A data model in which a set provides an abstraction that isolates the computation of membership from the details of how an enforcement point determines access...
US-9,582,672 Encrypted file storage
Various systems facilitate encrypted file storage. A client device may generate an encrypted version of a file. The client device may obtain at least one...
US-9,582,671 Security and data privacy for lighting sensory networks
In various example embodiments, a system and method are provided for protection customer data collected at sensor nodes within a networked system. A key...
US-9,582,670 Data storage device and data scrambling and descrambling method
A data scrambling and descrambling technology based on logical addresses. A data storage device with the data scrambling and descrambling technology includes a...
US-9,582,669 Systems and methods for detecting discrepancies in automobile-network data
The disclosed computer-implemented method for detecting discrepancies in automobile-network data may include (1) receiving data that indicates at least one...
US-9,582,668 Quantifying the risks of applications for mobile devices
Quantifying the risks of applications ("apps") for mobile devices is disclosed. In some embodiments, quantifying the risks of apps for mobile devices includes...
US-9,582,667 Detecting vulnerability to resource exhaustion
In an aspect of managing resource exhaustion, a method includes receiving a program code that is configured for generating a random number. The generating is...
US-9,582,666 Computer system for improved security of server computers interacting with client computers
A computer system is configured to improve security of server computers interacting with client computers, and comprises: a memory, a processor coupled to the...
US-9,582,665 Technologies for protecting systems and data to prevent cyber-attacks
Technologies for protecting systems and data of an organization from malware include a data integrity server configured to receive a data file for import from...
US-9,582,664 Detection of fault injections in a random number generator
A method for detecting a fault injection in a random number generation circuit, wherein a bit pattern is mixed to a bit stream originating from a noise source...
US-9,582,663 Detection of return oriented programming attacks
In one embodiment, a processor includes at least one execution unit and Return Oriented Programming (ROP) detection logic. The ROP detection logic may determine...
US-9,582,662 Sensor based rules for responding to malicious activity
Systems and techniques are provided for creating sensor based rules for detecting and responding to malicious activity. Evidence corresponding to a malicious...
US-9,582,661 Isolated program execution environment
Embodiments relate to an isolated program execution environment. An aspect includes receiving, by the isolated program execution environment on a computer...
US-9,582,660 Dynamic master data management
A computer-implemented method includes, in a master data management system, receiving a persistent modification request affecting a master data attribute,...
US-9,582,659 Implementing extent granularity authorization and deauthorization processing in CAPI adapters
A method, system and computer program product are provided for implementing block extent granularity authorization and deauthorization processing for a Coherent...
US-9,582,658 Screen unlocking method
A screen unlocking method applied to an electronic device including a touch screen and storing graphic patterns and a plurality of text data is provided. Each...
US-9,582,657 Prevention of pirate products in an elevator control using ID
A system and a method to prevent the use of pirate products in an elevator control are provided. The system includes at least one elevator control, an updating...
US-9,582,656 Systems for validating hardware devices
A computing environment in which devices interoperate with a plurality of hardware components. Inconsistencies in user experience when operating devices that...
US-9,582,655 Electronic device, system for pairing electronic devices and method for pairing electronic devices
An electronic device includes: a data acquiring unit configured to detect an encryption apparatus in a preset distance range and to read preset data in the...
US-9,582,654 Mobile device, and authentication program
A mobile device includes a housing, a sensor and a deformation detecting IC which detect deformation of the housing, a memory which stores a pattern database in...
US-9,582,653 Graphical user passwords
A method includes a computer device receiving a set of images for at least one user; the computer device receiving unique visual clue inputs from the at least...
US-9,582,652 Federation among services for supporting virtual-network overlays
Computerized methods, systems, and computer-readable media for promoting cooperation between a first and second virtual network overlay ("overlay") are...
US-9,582,651 Implementing extent granularity authorization processing in CAPI adapters
A method, system and computer program product are provided for implementing block extent granularity authorization processing for a Coherent Accelerator...
US-9,582,650 Security of program executables and microprocessors based on compiler-architecture interaction
A method, for use in a processor context, wherein instructions in a program executable are encoded with plural instruction set encodings. A method wherein a...
US-9,582,649 Processing data stored in external storage device
An external storage device connectable to an information processing apparatus is provided. The storage device includes: an input/output interface via which data...
US-9,582,648 Method for using a multi-function computer for testing
A system and method facilitate the use of a multi-function computer for an examination. An application implementing the method receives a hash input from a user...
US-9,582,647 Attribute combination discovery for predisposition determination
A method and system are presented in which a query attribute is used as the basis for accessing stored attribute combinations and their frequencies of...
US-9,582,646 Connected patient monitoring system and method to provide patient-centric intelligent monitoring services
A medical system (10) including a remote patient monitoring system (40) and an medical body area network (MBAN) system. The remote patient monitoring system...
US-9,582,645 Networked dialysis system
A dialysis system includes (i) a first home dialysis machine located at a first patient's home; (ii) a second home dialysis machine located at a second...
US-9,582,644 Medication tracking
A system and method is described for printing a label with an RFID tag. The system includes an RFID reader that queries a first RFID tag coupled to a first...
US-9,582,643 Managing user information--source prioritization
Systems, methods, and computer-readable medium are provided for managing user information. For example, data of a particular data type may be received from a...
US-9,582,642 Managing user information--background processing
Systems, methods, and computer-readable medium are provided for managing user information. For example, subscription information may be received from an...
US-9,582,641 Distributed healthcare database system and method
A system and method distributing healthcare database access is disclosed. The system and method interpose a data mapping server (DMS) between a data request...
US-9,582,640 Methods for obtaining a single molecule consensus sequence
Methods obtaining a single molecule consensus sequence for a single template molecule, and for obtaining a plurality of single molecule consensus sequences for...
US-9,582,639 Method and apparatus for mobile disaster victim identification
Mobile telecommunications or personal computing apparatus may be specially programmed for predicting whether an unknown biological specimen of an individual to...
US-9,582,637 Pharmaco-genomic mutation labeling
Electronic label processor compares bioinformatic values to determine pharmaco-genomic mutation associated with host. Label display indicates pharmaco-genomic...
US-9,582,636 Method of constructing a behavior model of an airplane engine
A method of constructing a behavior model (32) of an airplane engine, in particular in order to track the operation of the engine, the method comprising a...
US-9,582,635 Optimizing IC performance using sequential timing
A method of optimizing timing performance of an IC design is provided. The IC design is expressed as a graph that includes several nodes that represent IC...
US-9,582,634 Optimizing IC design using retiming and presenting design simulation results as rescheduling optimization
A method of optimizing timing performance of an IC design is provided. The IC design is expressed as a graph that includes a plurality of paths. Each path...
US-9,582,633 3D device modeling for FinFET devices
Among other things, techniques and systems for 3D modeling of a FinFET device and for detecting a variation for a design layout based upon a 3D FinFET model are...
US-9,582,632 Wiring topology method and information processing device
A wiring topology display method, includes: obtaining layout information indicating positions of components and wiring coupling the components; dividing first...
US-9,582,631 Method and system for template pattern optimization for DSA patterning using graphoepitaxy
A method for design template pattern optimization, comprises receiving a design for a fin field effect transistor (FinFET) device, wherein the design includes a...
US-9,582,630 System and method for creating hybrid resistance and capacitance (RC) netlist using three-dimensional RC...
One or more systems and methods for a cell based hybrid resistance and capacitance (RC) extraction are provided. The method includes generating a layout for a...
US-9,582,629 Methods of generating circuit layouts using self-alligned double patterning (SADP) techniques
At least one method disclosed herein involves creating an overall pattern layout for an integrated circuit that is to be manufactured using a self-aligned...
US-9,582,628 Method and apparatus for performing automatic decoupling capacitor selection for power distribution networks
A method for designing a power distribution network (PDN) for a system implementing a target device includes computing a target PDN impedance value for the PDN....
US-9,582,627 Enhanced parameter tuning for very-large-scale integration synthesis
A method and system are provided for tuning parameters of a synthesis program for a design description. The method includes (a) ranking individual parameter...
US-9,582,626 Using waveform propagation for accurate delay calculation
Accurate timing analysis during STA is performed using detailed waveform information in addition to the traditional slew information. A waveform memory system...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.