Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,600,675 Secure file transfer systems and methods
Certain example embodiments relate to file transfer systems and/or methods that enable a single provider to offer to different customers customizable file...
US-9,600,674 Transaction system for business and social networking
A wireless face-to-face bilateral communication method between at least two users of a service provider, each having a token device, and at least one having a...
US-9,600,673 Method and device for risk evaluation
A risk evaluation method and a risk evaluation device for evaluating an anonymous dataset generated according to an original dataset are provided. The risk...
US-9,600,672 Dynamic function switching
Techniques are described for dynamically enabling or disabling portions of an executing software module based on control data. During compilation of source code...
US-9,600,671 Systems and methods for account recovery using a platform attestation credential
Described herein is technology for restoring access to a user account. In particular, systems and methods for account recovery using a platform attestation...
US-9,600,670 Provisioning location-based security policy
In one embodiment, a system comprises: a processor including at least one core to execute instructions; a plurality of sensors, including a first sensor to...
US-9,600,669 Resource-based action attribution
A system of resource-based action attribution provides a mechanism for tracking actions performed on a resource shared among multiple users of a resource...
US-9,600,668 Method and device for extracting characteristic code of APK virus
Disclosed are a method and a device for extracting a characteristic code of an APK virus. The method comprises: scanning a designated file in an Android...
US-9,600,667 Method for detecting an attempted attack, recording medium, and security processor for said method
This method in which an attempt to attack a security processor is detected by the security processor itself comprises: measurements (50) of several different...
US-9,600,666 Dynamic optimizing scanner for identity and access management (IAM) compliance verification
An identity and access management (IAM) system is associated with a set of data sources from which data is collected. A set of vulnerabilities that the IAM...
US-9,600,665 Monitoring device and monitoring method
A monitoring unit in a monitoring system determines whether or not a program to be executed is a program to be monitored. If it is determined that the program...
US-9,600,664 Monitoring execution environments for approved configurations
Functionality is disclosed herein for monitoring an execution environment to determine if the execution environment is in an approved configuration. Memory used...
US-9,600,663 System and method for protection from buffer overflow vulnerability due to placement new constructs in C++
Systems and methods for protection from buffer overflow vulnerability due to placement new constructs in C++ are provided. A system for protecting from buffer...
US-9,600,662 User configurable profiles for security permissions
Permissions specified within an application permission manifest file of an application may be superseded with customized permissions. A user may customize the...
US-9,600,661 System and method to secure a computer system by selective control of write access to a data storage medium
The present invention relates to a method and system of controlling the writing of data to a computer storage medium such as a hard drive in a computer system...
US-9,600,660 Security bypass environment for circumventing a security application in a computing environment
Exemplary embodiments of the present disclosure are directed to performing an operation in a computing environment that is prohibited by a security application...
US-9,600,659 User activity modelling, monitoring, and reporting framework
A method, system and computer-usable medium are disclosed for identifying risk within an information technology (IT) environment, comprising: analyzing...
US-9,600,658 Generating or changing passwords using a degree of simplicity
A technique for generating passwords. The technique includes displaying objects, enabling a degree of simplicity to be set for a password, and generating a...
US-9,600,657 Dynamic security question generation
A method of dynamically generating a security question for accessing a resource. The method comprises monitoring a behavior of said user during a monitoring...
US-9,600,656 System and method for domain password reset in a secured distributed network environment
Embodiments of systems and method as presented herein allow a user's locally stored authentication credentials to be reset without needing either to contact the...
US-9,600,655 Policy update system and policy update apparatus
According to one embodiment, a policy update system includes a server apparatus configured to be able to provide a plurality of services to a user, the server...
US-9,600,654 Implementing extent granularity authorization and deauthorization processing in CAPI adapters
A method, system and computer program product are provided for implementing block extent granularity authorization and deauthorization processing for a Coherent...
US-9,600,653 Providing time ratio-based password/challenge authentication
Providing registration for password/challenge authentication includes receiving an access code or pattern inputted by a user, recording a time message...
US-9,600,652 Mobile application, identity interface
Techniques for managing identities are provided. In some examples, identity management, authentication, authorization, and token exchange frameworks may be...
US-9,600,651 System and method for determining use of non-human users in a distributed computer network environment
Embodiments of systems and methods as disclosed herein may determine that an initiator of a communication on a distributed computer network is an automated...
US-9,600,650 Apparatus and method for configuring password and for releasing lock
Methods of configuring a different authority for a plurality of users to use at least one application in an electronic device. User inputs are received to set...
US-9,600,649 Authentication method using liveness verification
An authentication method requires receiving an order from a server to perform an act which is then verified by the server for liveness. The act may comprise...
US-9,600,648 Methods and apparatuses for controlling access to computer systems and for annotating media files
Methods and apparatuses for controlling access to computer systems and for annotating media files. One embodiment includes a method including generating a...
US-9,600,647 Multi-factor authentication
Methods, systems and devices for multi-factor authentication (MFA) are described. An MFA device includes a plurality of tiles, a frame to hold the tiles and a...
US-9,600,645 Smart invitation handling at a smart-home
This patent specification relates to apparatus, systems, methods, and related computer program products for providing home security/smart home objectives. More...
US-9,600,644 Method, a computer program and apparatus for analyzing symbols in a computer
The invention provides a computer-implemented method of analyzing symbols in a computer system, the symbols conforming to a specification for the symbols, in...
US-9,600,643 Single login multiplexing
A method and system for providing access to application, where an association of a plurality of passwords with a login for an account of an application is...
US-9,600,642 Implementing extent granularity authorization processing in CAPI adapters
A method, system and computer program product are provided for implementing block extent granularity authorization processing for a Coherent Accelerator...
US-9,600,641 User permissions based control of pooled features on demand activation keys
Embodiments of the invention provide for user permissions based control of pooled FoD activation keys. In an embodiment of the invention, a method for user...
US-9,600,640 Multimedia network system with content importation, content exportation, and integrated content management
This system provides wired and/or wireless access throughout a multimedia network built on a distributed architecture which can be transparent to the user. This...
US-9,600,639 Method for automating the management and interpretation of digital documents and their owners rights metadata...
A method for automating the management and interpretation of digital documents and their rights metadata to generate user access of a document protected by...
US-9,600,638 Information processing apparatus, information processing method, and program
The present invention enables execution of predetermined content usage control processing without depending on a framework of a content playback program...
US-9,600,637 Methods and systems for predictive clinical planning and design and integrated execution services
Systems and methods for predictive clinical planning, design, and integrated execution services are provided. The system may comprise a database, a web server,...
US-9,600,636 Medication compliance capping system, assembly, and method
A medication compliance cap system, cap assembly, and associated methodology enhance compliance of a user's prescribed or scheduled medication regimen. Central...
US-9,600,635 Medication dispensing system
Medication dispensing system for remote monitoring of the daily dispensing of medication and pre/post dispense monitoring of medication effected physiological...
US-9,600,634 Secure medication transport
A smart carrier has a housing comprising one or more docking locations configured to accept a secure receptacle, a wireless interface module disposed within the...
US-9,600,633 Distributed remote asset and medication management drug delivery system
A system and method for communicating and validating patient information including medication delivery information in a care-giving facility is provided. A...
US-9,600,632 Method and system for monitoring intoxication
A method and system for monitoring a user's intoxication including receiving a set of signals, derived from a set of samples collected from the user at a set of...
US-9,600,631 Remote presence system including a cart that supports a robot face and an overhead camera
A tele-presence system that includes a cart. The cart includes a robot face that has a robot monitor, a robot camera, a robot speaker, a robot microphone, and...
US-9,600,630 User installed applications in a physiological parameter display device
A physiological parameter display device displays data representing the current values of one or more physiological parameters of a patient. The device has an...
US-9,600,629 Securing protected health information based on software designation
Methods to perform an operation comprising receiving, from a first process, a request to access content stored in a memory, determining that the content...
US-9,600,628 Automatic generation of semantic description of visual findings in medical images
A method comprising using at least one hardware processor for applying a mapping function to a medical image, to generate a semantic description of a visual...
US-9,600,627 Systems and methods for genomic annotation and distributed variant interpretation
A computer-based genomic annotation system, including a database configured to store genomic data, non-transitory memory configured to store instructions, and...
US-9,600,626 Methods and systems for obtaining a single molecule consensus sequence
Computer systems, computer readable media, and computer methods for obtaining, calling, and assembling nucleic acid sequences are presented. In some aspects the...
US-9,600,625 Systems and methods for processing nucleic acid sequence data
The present disclosure provides systems and methods for nucleic acid sequence analysis. A system for processing raw nucleic acid sequence data from a genomic...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.