Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,589,163 Sensor assembly, device and method for determining vibrations of a measurement object, and measurement object...
A sensor assembly for determining vibrations of a measurement object, which sensor assembly is or can be fastened to the measurement object in a bonded,...
US-9,589,162 Automatic drawer state detection
An inventory system can include radio frequency identification (RFID) tags and RFID tuners that can be brought into interacting proximity with one another to...
US-9,589,161 Substrate with electrically conductive patterns that are readable
One embodiment is a flat card that includes an electrically non-conductive substrate and a plurality of electrical conductors disposed on a surface of the...
US-9,589,160 Working method for smart card reader
A working method for a smart card reader, which comprises that: the card reader is powered on and initialized; a system mode is set according to a type of a...
US-9,589,159 Creating secure communication channels between processing elements
Two processing elements in a single platform may communicate securely to allow the platform to take advantage of the certain cryptographic functionality in one...
US-9,589,158 Programmable intelligent search memory (PRISM) and cryptography engine enabled secure DRAM
Systems comprising a processor and a dynamic random access memory (DRAM). The DRAM comprises a programmable intelligent search memory (PRISM).
US-9,589,157 Protection against access violation during the execution of an operating sequence in a portable data carrier
A method for protecting an operation sequence executed by a portable data carrier from spying out, wherein the data carrier has at least a processor core, a...
US-9,589,156 System and method for intercept of UEFI block I/O protocol services for bios based hard drive encryption support
An information handling system and method performs Unified Extensible Firmware Interface (UEFI) interception and pre-processing of data associated with block...
US-9,589,155 Technologies for verifying components
Technologies for verifying hardware components of a computing device include retrieving platform identification data of the computing device, wherein the...
US-9,589,154 Programming on-chip non-volatile memory in a secure processor using a sequence number
An improved secure programming technique involves reducing the size of bits programmed in on-chip secret non-volatile memory, at the same time enabling the...
US-9,589,153 Securing integrity and consistency of a cloud storage service with efficient client operations
A method for providing integrity and consistency of a cloud storage service to a group of mutually trusted clients may be provided. The cloud storage service...
US-9,589,152 System and method for sensitive data field hashing
Data to be exchanged in a transaction is protected by using a hashing function to transform sensitive data into a scrambled form. The hashing function can use...
US-9,589,151 Techniques and architecture for anonymizing user data
An apparatus may include an interface to receive a multiplicity of user information samples at a respective multiplicity of instances; a processor circuit, and...
US-9,589,150 Managing confidential information
Embodiments of the present application relate to a method, apparatus, and system for managing confidential information. The method includes accessing stored...
US-9,589,149 Combining personalization and privacy locally on devices
A profiling service may determine, local to a device, user profile attributes associated with a device user based on interaction of the device user with the...
US-9,589,148 Systems and methods for securing data in motion
The systems and methods of the present invention provide a solution that makes data provably secure and accessible--addressing data security at the bit...
US-9,589,147 Steganography detection
Systems and methods for detecting potential steganography use to hide content in computer files transmitted via electronic communications are provided. An...
US-9,589,146 Method and system for hiding sensitive data in log files
An approach for hiding sensitive data in log files is provided. The approach uses a background program embedded within an operating system. The background...
US-9,589,145 Attaching web service policies to a group of policy subjects
In one set of embodiments, methods, systems, and apparatus are provided to attach one or more quality of service policies to resources in an enterprise system...
US-9,589,144 System and method for cryptographic suite management
Systems and methods for cryptographic suite management are described. A system for cryptographic suite management has a cryptographic suite management unit...
US-9,589,143 Semi-trusted Data-as-a-Service platform
A system and method provide for shared access to a database in a semi-trusted platform. In the method, for each of a set of users, provision is made for...
US-9,589,142 Apparatus and method for communications in a safety critical system
A safety communication scheme for a safety-critical system which includes two or more higher level units that have voting capabilities and one or two sets of...
US-9,589,141 Copyright detection and protection system and method
A method for detecting against unauthorized transmission of digital works comprises the steps of maintaining a registry of information permitting identification...
US-9,589,140 Digital asset authentication system and method
The invention provides a digital asset authentication system and method. The invention includes a digital asset metadata register storing details of parties...
US-9,589,139 Method and device for altering a unified extensible firmware interface (UEFI) secure boot process in a...
Firmware in a computing device is used to administer and alter a Secure Boot process for the computing device while continuing to provide protection from...
US-9,589,138 Computing device boot software authentication
Various embodiments are generally directed to authenticating a chain of components of boot software of a computing device. An apparatus comprises a processor...
US-9,589,137 Method for detecting unfair use and device for detecting unfair use
An object is to improve detection accuracy of unfair use when a task system is used by using a mobile terminal. There is provided a method for detecting unfair...
US-9,589,136 Method and device for extracting message format
Examples of extracting a message format are disclosed. Extracting the message format may include capturing an execution trace of a malicious program client and...
US-9,589,135 Exploit detection of malware and malware families
According to one embodiment, a computerized method comprises, accessing information associated with one or more observed events, wherein one or more of the...
US-9,589,134 Remediation of security vulnerabilities in computer software
Processing a downgrader specification by constructing a set of candidate downgrader placement locations found within a computer software application, where each...
US-9,589,133 Preventing return-oriented programming exploits
Preventing return-oriented programming exploits by identifying a set of contiguous computer software instructions extending from a first location within a...
US-9,589,132 Method and apparatus for hypervisor based monitoring of system interactions
A security system and method efficiently monitors and secures a computer to defend against malicious intrusions, and includes an in-band software monitor...
US-9,589,131 Method and computer device to control software file downloads
A computer device includes a download unit which downloads one or more files into a storage device. A file logging unit records a resource locator identifying a...
US-9,589,130 Application trust-listing security service
Provided are techniques for controlling access to computing resources comprising generating a first fingerprint corresponding to a first executable file;...
US-9,589,129 Determining source of side-loaded software
A source of side-loaded software is determined. An action may be performed in response to the determination of the source. In one case, the handling of an...
US-9,589,128 User trusted device for detecting a virtualized environment
The present invention is notably directed to a method for enabling a computer (101) to boot from a user trusted device (10), the user trusted device (10)...
US-9,589,127 System and method for collaborative authentication
Systems and methods are disclosed for collaborative authentication of a person based on an interaction with another person. A request for collaborative...
US-9,589,126 Lock control method and electronic device thereof
An electronic device having a lockscreen and a method implementing said lockscreen are disclosed herein, the electronic device including a display, a memory,...
US-9,589,125 3D pass-go
A 3D graphical password authentication method displays a 3D grid upon a user's request to access a restricted resource. The 3D graphical password authentication...
US-9,589,124 Steganographic access controls
Various features described herein may allow an authorized user to provide a guest with access to a secured location through use of an encoded image containing...
US-9,589,123 Mobile authentication using a wearable device
A method of providing a user with an option to access a protected system by satisfying a reduced security measure is disclosed. An attempt by the user to access...
US-9,589,122 Operation processing method and device
A method and a device are provided in the field of network technology. In the method, a first server receives an operation request including a second server...
US-9,589,121 Apparatus and method for enabling fingerprint-based secure access to a user-authenticated operational state of...
A computer-implemented method provides power to a fingerprint reader while the remaining components of the information handling system are held in a low power,...
US-9,589,120 Behavior based authentication for touch screen devices
A method, system, and one or more computer-readable storage media for behavior based authentication for touch screen devices are provided herein. The method...
US-9,589,119 Feedback segmentation based on short codes
A method of processing customer feedback is provided. The method comprises, associating a plurality of short codes to a plurality of portable electronic...
US-9,589,118 Context-based authentication mode selection
A system and method for configuring authentication of a mobile communications device entail detecting user context and device context factors and determining...
US-9,589,117 Computer security system and method
A computer security system comprises a security module adapted to control access to a secure computer resource by a user via a client based on verification of a...
US-9,589,116 Managing heterogeneous product features using a unified license manager
An information handling system includes a device, a controller, and a license manager subsystem. The controller is configured to determine whether the device...
US-9,589,115 Obfuscation assisting apparatus
An obfuscation assisting apparatus assists in the obfuscation of a program. The obfuscation assisting apparatus includes an analyzer which identifies...
US-9,589,114 Policy for digital rights management
This document describes policies for digital rights management that enable distribution of full-function versions of applications that, while fully functional,...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.