Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,734,350 Method and computer program product for order preserving symbol based encryption
Techniques for sorting encrypted data within a software as a service (SaaS) environment. Data is encrypted on a per symbol basis with a symbol based encryption...
US-9,734,349 Harmonized governance system for heterogeneous agile information technology environments
A harmonized governance system for a heterogeneous agile environment affords abstraction and normalization of resources, operations, and roles, and respective...
US-9,734,348 Automatic file encryption
A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The...
US-9,734,347 Retroactive shared content item links
A content management system implementing methodologies providing retroactive shared content item links is disclosed. The content management system and...
US-9,734,346 Device and method for providing security in remote digital forensic environment
An apparatus and method for collecting digital evidence from a target system to be analyzed at a remote location and then providing security in a remote digital...
US-9,734,345 Portable e-wallet and universal card
Universal cards are used in place of all the other traditional cards which a person may want to carry. The universal card can include a short range...
US-9,734,344 Providing control in a multi user environment
A method for receiving a policy is provided. The method includes receiving a policy, determining a context based on the received policy, and applying the...
US-9,734,343 Detection and prevention of sensitive information leaks
Examples of techniques for detecting and preventing sensitive information leaks are described herein. In one example, a method for detection of sensitive...
US-9,734,342 Method and device for supplying of a data set stored in a database
Method and device for supplying of a data set stored in a database to supply of a data set, e.g. the content of a copy protected audio CD, which is stored in a...
US-9,734,341 Systems and methods for protecting computing systems from peripheral devices
A computer-implemented method for protecting computing systems from peripheral devices may include (1) identifying a peripheral device configured to perform a...
US-9,734,340 System and method for providing a high-value identity
Methods include receiving a request for verified data from a requesting entity. Methods also include requesting, from a user, consent to obtain user data...
US-9,734,339 Retrieving system boot code from a non-volatile memory
A controller monitors for an indication from core logic indicating that the core logic is in a state in which the core logic does not access a bus. In response...
US-9,734,338 System on chip to perform a secure boot, an image forming apparatus using the same, and method thereof
A system on chip is provided. The system on chip includes a first memory to store a plurality of encryption keys, a second memory, a third memory to store an...
US-9,734,337 Behavior-based ransomware detection
An anti-malware application detects, stops, and quarantines ransomware. The anti-malware application monitors threads executing on a computing device and...
US-9,734,336 Process security validation
Techniques for process security validation are described herein. In one example, a method includes determining, via a processor, that a process is in a first...
US-9,734,335 Data tracking in user space
A way to track data from an untrusted source as it moves through memory in original or modified form. A probe is placed on a data reception call of a program....
US-9,734,334 Data tracking in user space
A way to track data from an untrusted source as it moves through memory in original or modified form. A probe is placed on a data reception call of a program....
US-9,734,333 Information security techniques including detection, interdiction and/or mitigation of memory injection attacks
Methods of detecting malicious code injected into memory of a computer system are disclosed. The memory injection detection methods may include enumerating...
US-9,734,332 Behavior profiling for malware detection
Provided herein are systems and methods for behavior profiling of targets to determine malware presence. The method includes, in various embodiments, applying a...
US-9,734,331 Render engine, and method of using the same, to verify data for access and/or publication via a computer system
A method and system to verify active content at a server system include receiving, at the server system a communication (e.g., an e-mail message or e-commerce...
US-9,734,330 Inspection and recovery method and apparatus for handling virtual machine vulnerability
An inspection and recovery method and apparatus for handling virtual machine vulnerability, which inspect the security status of a virtual machine in a...
US-9,734,329 Mitigating ROP attacks
Mitigating return-oriented programming attacks. From program code and associated components needed by the program code for execution, machine language...
US-9,734,328 Datum reading error detection method
A method for detecting an error in reading a data, includes in a step a) storing a first copy of the data item in a first area of an electronic memory and...
US-9,734,327 Methods for restricting resources used by an application based on a base profile and an application specific...
In response to a request for launching an application within an operating system of a data processing system, one or more extended entitlements are extracted...
US-9,734,326 Dynamic interrupt stack protection
A protection unit of an interrupt stack accessible by a CPU controlled by one software program, for storing and removing stack frame(s), the stack protection...
US-9,734,325 Hypervisor-based binding of data to cloud environment for improved security
A method includes receiving a request at a first hypervisor from an application within a virtual machine. The virtual machine is executed within a...
US-9,734,324 Managing a password
A computer implemented method for managing a password is disclosed. The method can include generating a first hash value corresponding to a first password. The...
US-9,734,323 Controlling which users from an organization are to be part of a community space in an easy and error-free manner
A method, system and computer program product for controlling which users from an organization are to be part of a community space. A community collaboration...
US-9,734,322 System and method for authenticating RFID tags
A system and method of providing authenticity to a radio frequency identification (RFID) tag are provided. The method comprises generating a plurality of...
US-9,734,321 Method and apparatus for providing federated service accounts
An approach is provided for determining that a user has been authenticated for an access to at least one service using a federated identity (401). The approach...
US-9,734,320 Systems and methods for providing image-based security measures
Systems, methods, and non-transitory computer-readable media can detect an operation that causes a challenge response process to be initiated. An image category...
US-9,734,319 Configurable personal digital identity device with authentication using image received over radio link
A personal digital ID device provides a digital identifier to a service for a predetermined duration in response to user interaction. The user interaction may...
US-9,734,318 Method and apparatus for device unlocking
A method is provided including: generating, by a first device, a first signal indicating a first pattern of movement of the first device; receiving, by the...
US-9,734,317 Biometric identification device with removable card capabilities
A smartcard-enabled BPID Security Device integrates a smartcard reader with a biometric authentication component to provide secured access to electronic...
US-9,734,316 System and method for detecting liveness during biometric authentication
In certain embodiments of the present disclosure relate to a method for detecting liveness of a user during biometric authentication. The method comprising...
US-9,734,315 Wearable terminal
There is disclosed a wearable terminal including a main body, a main board provided in the main body, a first touch pad provided in a rear surface of the main...
US-9,734,313 Security mode prompt method and apparatus
Embodiments of the present disclosure disclose a security mode prompt method and apparatus. The method includes when it is determined that a terminal is...
US-9,734,312 Systems and methods for detecting when users are uninstalling applications
The disclosed computer-implemented method for detecting when users are uninstalling applications may include (1) monitoring, as part of an application installed...
US-9,734,311 Secure authentication of firmware configuration updates
A computing system firmware is provided that includes functionality for securely authenticating a user of the computing system prior to allowing the user,...
US-9,734,310 Authentication method and computer-readable recording medium
To enhance the convenience of authentication when executing an application, an application server: acquires, from a terminal, context information indicating the...
US-9,734,309 Role-based access control assignment
Techniques for assigning roles to users within a computing system are described herein. A matrix representation of a probabilistic assignment of roles to users...
US-9,734,308 Privilege management and revocation
This disclosure relates to management of privileges associated with applications accessible by users of electronic devices. In one aspect, an electronic device...
US-9,734,307 User terminal interworking with peripheral device and method for preventing leakage of information using the same
A user terminal includes a communication circuit, a certification circuit, an execution circuit, and a control circuit. The communication circuit receives a...
US-9,734,306 Information processing apparatus, information processing system, information processing method, and program
Disclosed is a structure that includes: an information processing apparatus that stores content into an information storage device such as a memory card...
US-9,734,305 Fume extraction device having system for validating credentialed filters
A fume extraction apparatus (1) which comprises an identifier module (20a; 20b) capable of communicating a credential signal over an air interface, a receiver...
US-9,734,304 Versatile sensors with data fusion functionality
Apparatuses and methods are disclosed for identifying with a single, small, intelligent activity monitor a particular type of activity from among a plurality of...
US-9,734,303 Controlled inventory refrigerated dispensing system
A vending refrigerator for dispensing pharmaceutical products, such as vials, bottles, syringes, and the like, at a point of distribution, e.g., a doctor's...
US-9,734,302 Medical delivery device with regimen identification feature
A drug delivery system comprising a controller adapted to detect when a given user-actuated operation being part of the expelling of an amount of drug is...
US-9,734,301 Intelligent presentation of alarms and messages in mobile health systems
Systems and methods can support presenting patient alarms to clinical care users. An alarm management system can maintain a mapping of patients to users as well...
US-9,734,300 Diagnosis support apparatus and method of controlling the same
A diagnosis support apparatus which supports diagnosis based on information associated with a diagnosis name in advance is provided. In the diagnosis support...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.