Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,607,171 Preventing sharing of sensitive information through code repositories
Methods, systems, and computer program products for preventing sharing of sensitive information through code repositories are provided herein. A method includes...
US-9,607,170 Compromise free cloud data encryption and security
A cloud data encryption and security system includes a central computing authority and a network of computing devices. At least some of the computing devices...
US-9,607,169 Mobile terminal and method for controlling the same
A mobile terminal including a wireless communication unit configured to provide wireless communication; a touch screen; and a controller configured to receive a...
US-9,607,168 Obfuscating a transaction in a dispersed storage system
A method begins by a processing module receiving a data segment for dispersed storage. The method continues with the processing module encoding the data segment...
US-9,607,167 Self-service portal for tracking application data file dissemination
A graphical user interface for uploading an application data file may be generated by a computing platform and communicated to a computing device. The computing...
US-9,607,166 Discretionary policy management in cloud-based environment
Embodiments are disclosed for managing and providing access to a collection of digital resources. One embodiment provides a method comprising receiving a...
US-9,607,165 Watchdog code for virtual machine functions
Methods, systems, and computer program products for initializing a page with watchdog code, by: positioning a first set of instructions in a first address range...
US-9,607,164 Communication apparatus, method of controlling the same, and storage medium
A communication apparatus has an auto-complete function using an LDAP protocol. The apparatus inputs character information, and verifies a certificate of an...
US-9,607,163 Information processing apparatus, control method, and storage medium storing program
An information processing apparatus determines, in response to acceptance of an edit of a file including a plurality of setting items, whether or not the...
US-9,607,162 Implementation of secure communications in a support system
A support system negotiates secure connections on behalf of multiple guest systems using a set of credentials associated with the guest systems. The operation...
US-9,607,161 Optimal re-encryption strategy for joins in encrypted databases
Methods, systems, and computer-readable storage media for selecting columns for re-encryption in join operations. In some implementations, actions include...
US-9,607,160 Method and apparatus for providing string encryption and decryption in program files
A method of providing encryption and decryption of plaintext strings in a program file, includes: at a device having one or more processors and memory: marking...
US-9,607,159 Intelligent key selection and generation
A method, computer program product, and system for selecting and generating a key to perform a cryptographic operation are described. The method includes...
US-9,607,158 Proxy computing system, computing apparatus, capability providing apparatus, proxy computing method, capability...
A computing apparatus outputs .tau..sub.1 and .tau..sub.2 corresponding to a ciphertext x, a capability providing apparatus uses .tau..sub.1 to correctly...
US-9,607,157 Method and device for providing a private page
Methods and devices for providing a private page are provided. A method includes operations of entering a security mode based on a user input; extracting the...
US-9,607,156 System and method for patching a device through exploitation
A system and method that includes identifying a vulnerability in a computing device; accessing a vulnerability exploitation mapped to the identified...
US-9,607,155 Method and system for analyzing an environment
A system for analyzing an environment to identify a security risk in a process, comprising a model engine to generate a model of the environment using multiple...
US-9,607,154 System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies
Access-control and information-flow integrity policies are enforced in a computing system by detecting security-sensitive sinks in software code for an...
US-9,607,153 Apparatus and method for detecting clock tampering
Disclosed is a method for detecting clock tampering. In the method a plurality of resettable delay line segments are provided. Resettable delay line segments...
US-9,607,152 Detect encrypted program based on CPU statistics
Techniques are presented for detecting malware in an executable. The method includes receiving an executable to evaluate for malware, emulating an execution of...
US-9,607,151 Systems and methods involving features of hardware virtualization such as separation kernel hypervisors,...
Systems, methods, computer readable media and articles of manufacture consistent with innovations herein are directed to computer virtualization, computer...
US-9,607,150 Rollback feature
A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area...
US-9,607,149 System and method of monitoring and controlling application files
A system and method for updating a system that controls files executed on a workstation. The workstation includes a workstation management module configured to...
US-9,607,148 Method and apparatus for detecting malware on a computer system
Method, apparatus, and computer readable medium for detecting malware on a target computer system is described. A threat profile is obtained at the target...
US-9,607,147 Method and device for detecting software-tampering
A method and system for detecting software tampering includes: at a device having one or more processors and memory: receiving a software verification...
US-9,607,146 Data flow based behavioral analysis on mobile devices
Methods, devices and systems for detecting suspicious or performance-degrading mobile device behaviors intelligently, dynamically, and/or adaptively determine...
US-9,607,145 Automated vulnerability and error scanner for mobile applications
In an embodiment, a method comprises downloading an application program to a first storage coupled to a first device, wherein the application program comprises...
US-9,607,144 User activity modelling, monitoring, and reporting framework
A method, system and computer-usable medium are disclosed for identifying risk within an information technology (IT) environment, comprising: analyzing...
US-9,607,143 Provisioning account credentials via a trusted channel
Disclosed are various embodiments for provisioning account credentials via a trusted channel. An identification of an account is received. A security credential...
US-9,607,142 Context aware recertification
Mechanisms are provided for facilitating recertification of a user access entitlement. These mechanisms collect, from a system resource of the data processing...
US-9,607,141 Mobile terminal and control method thereof
The present invention relates to a mobile terminal and a control method thereof. The mobile terminal displays a plurality of figures arranged in a first...
US-9,607,140 Authenticating a user of a system via an authentication image mechanism
In an embodiment, the present invention includes a method for receiving a request for user authentication of a system, displaying an authentication image on a...
US-9,607,139 Map-based authentication
Methods, apparatus and articles of manufacture for map-based authentication are provided herein. A method includes establishing a set of cryptographic...
US-9,607,138 User authentication and verification through video analysis
Approaches utilize image information to not only identify a user, but also verify that the user is actually a physical person and not a false representation of...
US-9,607,137 Verbal command processing based on speaker recognition
For verbal command processing, a phoneme module selects recognition phonemes from a phoneme input stream. A user recognition module selects a user profile for a...
US-9,607,136 Secure attention for mobile devices
For a secure attention indicator at a mobile device, a method is disclosed for detecting a secure attention indicator at a mobile computing device, the secure...
US-9,607,135 Asset protection based on redundantly associated trusted entitlement verification
A system and method of managing a plurality of assets by associating a smart card with a compute subsystem by installing a database on the smart card and...
US-9,607,134 System and method for protected publication of sensitive documents
Protected publication of sensitive documents with authentication and accountability enables storing and sharing confidential files, while reducing risk that a...
US-9,607,133 Method and apparatus for watermarking binary computer code
A method and apparatus for inserting a watermark into a compiled computer program. A location process specifies an insertion point in the compiled program and a...
US-9,607,132 Token-based validation method for segmented content delivery
A token-based validation method for delivery of at least part of a segmented content item and a content delivery system configured for executing such method are...
US-9,607,131 Secure and efficient content screening in a networked environment
Methods, devices, and computer program products facilitate the application of a content use policy based on watermarks that are embedded in a content. Watermark...
US-9,607,130 Systems and methods for vessel reactivity to guide diagnosis or treatment of cardiovascular disease
Systems and methods are disclosed for using vessel reactivity to guide diagnosis or treatment for cardiovascular disease. One method includes receiving a...
US-9,607,128 Detection and correction of jumps in real-time PCR signals
Systems, methods, and apparatuses are provided for detecting and potentially invalidating or correcting jump errors in data from growth processes. A jump error...
US-9,607,127 Methods for providing a set of symbols uniquely distinguishing an organism such as a human individual
The present invention relates to methods for providing a set of symbols uniquely distinguishing an organism. Specifically, the present invention relates to such...
US-9,607,126 Information processing system using nucleotide sequence-related information
The present invention provides a highly-safe information processing system that is capable of effectively using nucleotide sequence information differences...
US-9,607,125 Context-aware reliability checks
Embodiments of an electromigration (EM) check scheme to reduce a pessimism on current density limits by checking wire context. This methodology, in an...
US-9,607,124 Method of hierarchical timing closure employing dynamic load-sensitive feedback constraints
The timing analysis of an integrated chip component using dynamic load sensitive timing feedback constraints maintaining the timing accuracy for all the...
US-9,607,123 Method for performing deep n-typed well-correlated (DNW-correlated) antenna rule check of integrated circuit...
A semiconductor monitoring device includes a substrate, a die seal ring formed on the substrate, a deep n-typed well formed in the substrate under the die seal...
US-9,607,122 Timing driven clock tree synthesis
This application discloses performing a static timing analysis on a circuit design with an unbalanced clock tree, for example, to determine data arrival timing...
US-9,607,121 Cascode CMOS structure
A MOS device includes an active area having first and second contacts. First and second gates are disposed between the first and second contacts. The first gate...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.