Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,613,222 Assigning access rights in enterprise digital rights management systems
The present subject matter relates to assigning access rights in enterprise digital rights management (eDRM) systems. In one embodiment, a method includes...
US-9,613,221 Signed application cards
A device that displays signed application cards. The device receives a card object that includes: an application function identifier that identifies an...
US-9,613,220 Secure data parser method and system
The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention...
US-9,613,219 Managing cross perimeter access
In some implementations, a method of managing access to resources in a single device including receiving, from a first resource assigned to a first perimeter, a...
US-9,613,218 Encryption system in a virtualized environment
For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by...
US-9,613,217 Confidential content display in flexible display devices
Confidential content within a file is masked for display on a flexible display device. A legend relating the masking to the confidential content is displayed in...
US-9,613,216 Encryption recommendation method and encryption recommendation device
An encryption recommendation method and an encryption recommendation device are provided. The method includes: scanning user operations on an application in a...
US-9,613,215 Method and system for implementing a secure chain of trust
A method, an integrated circuit and a system for implementing a secure chain of trust is disclosed. While executing secure boot code in a secure boot mode,...
US-9,613,214 Self-measuring nonvolatile memory devices with remediation capabilities and associated systems and methods
Several embodiments of systems incorporating nonvolatile memory devices are disclosed herein. In one embodiment, a system can include a central processor (CPU)...
US-9,613,213 Using telemetry to reduce malware definition package size
Clients send telemetry data to a cloud server, where the telemetry data includes security-related information such as file creations, timestamps and malware...
US-9,613,212 Execution profile assembly using branch records
Technologies for assembling an execution profile of an event are disclosed. The system and method may include recording a plurality of branch records,...
US-9,613,211 Systems and methods for identifying suspicious text-messaging applications on mobile devices
A computer-implemented method for identifying suspicious text-messaging applications on mobile devices may include (1) identifying at least one outgoing text...
US-9,613,210 Evaluating malware in a virtual machine using dynamic patching
Analysis of potentially malicious software samples in a virtualized environment is disclosed. One or more modifications are applied to a first virtual machine...
US-9,613,209 Augmenting system restore with malware detection
An anti-malware program monitors the behavior of a system after a system restore to determine the likelihood of a hidden infection of malicious code still...
US-9,613,208 Trusted security zone enhanced with trusted hardware drivers
An electronic device comprises a processor, a permissive sector, a trusted security zone that is separate from the permissive sector, a hardware driver, a first...
US-9,613,207 Method and apparatus for preventing autorun of portable USB storage
Provided is a technology which creates an autorun file that is used in autorun for preventing the autorun of a USB-based portable storage, thereby allowing an...
US-9,613,206 Authentication mechanism
A computer-implemented method for preventing password leakage into a non-password field includes detecting that a user of an electronic device has entered a...
US-9,613,205 Alternate authentication
A user may utilize an existing digital identity to authorize the user's access to security-enabled device operations, where the security-enabled device...
US-9,613,204 Computer readable storage media for legacy integration and methods and systems for utilizing same
Systems and methods for integrative legacy context management are disclosed herein. An example computer hardware system may include at least one processing unit...
US-9,613,203 Security mechanism for an electronic device
According to some aspects, disclosed methods and systems may include determining, by an electronic device, a value associated with a first parameter configured...
US-9,613,202 System and method for motion gesture access to an application and limited resources of an information handling...
An information handling system includes a processor that determines a first orientation from orientation sensors and a sensor hub for detecting a motion...
US-9,613,201 Access control by a mobile device using an image
A technique provides access control on a mobile device (e.g., a smart phone, a tablet, etc.). The technique involves displaying an image on a touch screen of...
US-9,613,200 Ear biometric capture, authentication, and identification method and system
The current document discloses an ear-biometrics-based authentication and identification system that includes an ear-image-capture subsystem that generates an...
US-9,613,199 Methods and systems for ensuring that an individual is authorized to conduct an activity
A method for ensuring that an individual is authorized to conduct an activity is provided. The method includes conducting, using a processor, an authentication...
US-9,613,198 Apparatus and method for intelligent video surveillance of industrial console operations
A method implemented in an operator console includes receiving a captured image of an operator at the operator console. The method also includes identifying...
US-9,613,197 Biometric user authentication system and a method therefor
The present disclosure relates to a method and a system for authenticating a user. In one embodiment, one or more input and target data samples extracted from a...
US-9,613,196 Protection system including machine learning snapshot evaluation
This disclosure is directed to a protection system including machine learning snapshot evaluation. A device may comprise a machine learning engine (MLE) to...
US-9,613,195 Secondary security authority
Techniques to facilitate protecting control programs used in an industrial automation environment are disclosed herein. In at least one implementation, control...
US-9,613,194 Function control methods and systems for wearable electronic devices
Function control methods and systems for wearable electronic devices are provided. First, a flag having a specific initial value is provided in a wearable...
US-9,613,193 Mechanism for locking a computer display and for unlocking the display when purposely used
A computer system, portable electronic device, and method are provided for preventing accidental enabling of a disabled display and/or graphical user interface...
US-9,613,192 Flexible licensing architecture
An improved technique involves analyzing a system configuration upon a system boot and sending the configuration to a system configuration database that...
US-9,613,191 Access to an electronic asset using content augmentation
Methods, computer program products, and systems are presented and can include for instance: crowdsourcing data from a plurality of users via a computer network,...
US-9,613,190 Systems and methods of secure data exchange
An example method for managing digital rights management (DRM) protected content sharing in a networked secure collaborative computer data exchange environment...
US-9,613,189 Method for processing media content, control point, media server, and media renderer
A method for processing media content is provided. The method includes sending a control command to a media renderer in a home area network, where the control...
US-9,613,188 Neuroimaging database systems and methods
Systems for and methods of utilizing a neuroimaging database are presented. The systems and methods include techniques for analyzing the pathophysiological...
US-9,613,187 Clinical information processing apparatus, method and program
Likelihood ratio between a likelihood of belonging to one classification of a key item and a likelihood of belonging to other classification of the key item...
US-9,613,186 Systems and methods for determining blood flow characteristics using flow ratio
Embodiments include a system for determining cardiovascular information for a patient which may include at least one computer system configured to receive...
US-9,613,185 Influence filtering in graphical models
According to an aspect, influence filtering in a graphical model includes accessing the graphical model in a data store. The graphical model includes a...
US-9,613,184 Analyzing a washout period characteristic for psychiatric disorder therapy delivery
A characteristic of a washout period following the delivery of therapy to a patient according to a therapy program may be determined based on a physiological...
US-9,613,183 Post-authorization transaction bundling control
A data processing control comprising an outgoing payment request control object having 1) user-selectable data records, each user-selectable data record having...
US-9,613,182 Electronic custody and control system for human assay test samples
A system, method, and computer program that may used to more quickly, accurately, and efficiently identify, catalog, and track human assay samples and create...
US-9,613,181 Semiconductor device structure including active region having an extension portion
A semiconductor device structure includes a semiconductor substrate with an active region provided therein, a gate structure, a dummy gate structure and two...
US-9,613,180 Robotic control device and method for manipulating a hand-held tool
Described is a robotic control device for manipulating a gripper-held tool. The device includes a robotic gripper having a plurality of tactile sensors. Each...
US-9,613,179 Method and system for providing an event space associated with a primary virtual space
An approach to facilitate providing an event space associated with a primary virtual space is provided. An event space is provided to users of a primary virtual...
US-9,613,178 Integrated circuit topologies for discrete circuits
Various embodiments that pertain to electronic element matching are described. Having electronic elements, such as transistors, matching can be relatively easy...
US-9,613,177 Methods of generating circuit layouts that are to be manufactured using SADP routing techniques
One method disclosed herein involves, among other things, generating a set of mandrel mask rules, block mask rules and a virtual, software-based ...
US-9,613,176 Buffer chain management for alleviating routing congestion
Systems and techniques for alleviating congestion are described. A set of buffer chains that pass through a congested region of the circuit design can be...
US-9,613,175 Method, computer system and computer-readable storage medium for creating a layout of an integrated circuit
A method includes obtaining a plurality of design rules for an integrated circuit, including a first set of design rules and a second set of design rules. An...
US-9,613,174 Common template for electronic article
One or more techniques or systems for incorporating a common template into a system on chip (SOC) design are provided herein. For example, a common template...
US-9,613,173 Interactive multi-step physical synthesis
A processor-implemented method is provided for placing and routing a circuit design. A first netlist is generated for the circuit design. Placement is performed...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.