Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,779,264 Method, server and computer program for security management in database
Disclosed is a program for security management in a database, which is stored in a computer readable medium to allow a computer to perform steps including:...
US-9,779,263 Access right estimation apparatus and non-transitory computer readable medium
A access right estimation apparatus includes an extraction unit that extracts at least one first component from a first object which forms a first document, an...
US-9,779,262 Apparatus and method to decrypt file segments in parallel
Disclosed is a method and apparatus to decrypt file segments in parallel. In one embodiment, an integrated circuit may be used with a storage device of a...
US-9,779,261 Entity security implied by an asset in a repository system
Techniques are described for managing access to a repository system storing information (e.g., metadata) about objects (e.g., an application, a process, or a...
US-9,779,260 Aggregation and classification of secure data
In one embodiment, a method includes managing and controlling a plurality of data-access credentials. The method further includes accessing data from a...
US-9,779,259 System and method for application specific locking
An unlocking application limits access to a computer application on a computing device. The unlocking application is configurable with at least one unlocking...
US-9,779,258 Confidential extraction of system internal data
Secure extraction of state information of a computer system is provided. A method includes obtaining, by a security engine of a system, a public encryption key...
US-9,779,257 Orchestrated interaction in access control evaluation
An orchestrated access system is described herein that provides an access control decision function that is augmented by interfacing with a real-time...
US-9,779,256 Iamnotanumber.COPYRGT. card system: an image-based technique for the creation and deployment of numberless card...
IAMNOTANUMBER.COPYRGT. Card System is a software system which uses a specially designed encryption/decryption algorithm for the creation of credit and debit...
US-9,779,255 Split storage and communication of documents
Embodiments for preventing data loss and allowing selective access data include systems and methods that receive a data payload to be stored by the system;...
US-9,779,254 Detection and prevention of sensitive information leaks
Examples of techniques for detecting and preventing sensitive information leaks are described herein. In one example, a method for detection of sensitive...
US-9,779,253 Methods and systems for sharing risk responses to improve the functioning of mobile communications devices
Methods and systems are provided for sharing security risk information between collections of computing devices, such as mobile communications devices, to...
US-9,779,252 Crowd-sourced security analysis
A cloud-based static analysis security tool that is accessible by a set of application development environments is augmented to provide for anonymous knowledge...
US-9,779,251 System, method, and computer program product for monitoring an execution flow of a function
A system, method, and computer program product are provided for monitoring an execution flow of a function. In use, data associated with a function is...
US-9,779,250 Intelligent application wrapper
Disclosed are various embodiments for an application wrapper. Content obtained by an application can be monitored to determine conformation with a content...
US-9,779,249 Launching a secure kernel in a multiprocessor system
In one embodiment of the present invention, a method includes verifying a master processor of a system; validating a trusted agent with the master processor if...
US-9,779,248 Protection of secured boot secrets for operating system reboot
Protecting secured boot secrets while starting an operating system. Embodiments include starting a first operating system using a trusted computing base,...
US-9,779,247 Boot control systems and methods for vehicles
A hardware security module (HSM) transitions a first signal from a first state to a second state and transitions a second signal from a first state to a second...
US-9,779,246 System and method for updating an operating system for a smart card or other secure element
A secure element includes a boot program comprises instructions for the execution a startup step to determine if a non-volatile memory stores an active...
US-9,779,245 System, method, and device having an encrypted operating system
An encryption system and method for a computing device having an encrypted operating system is disclosed. The encryption system includes a pre-operating system...
US-9,779,244 Establishing secure initial state in a processing platform containing both high assurance security and...
A method including initializing the processing platform, wherein initializing the processing platform includes performing a power on self-test (POST) configured...
US-9,779,243 Fuse-enabled secure BIOS mechanism in a trusted computing system
An apparatus for protecting BIOS, including a BIOS ROM, a detector, a generator, JTAG control, a fuse, and a controller. The BIOS ROM stores plaintext and an...
US-9,779,242 Programmable secure bios mechanism in a trusted computing system
An apparatus is provided for protecting a basic input/output system (BIOS) in a computing system. The apparatus includes a BIOS read only memory (ROM), a tamper...
US-9,779,241 Synchronization of UEFI secure boot variables on a managed server
Techniques are provided for actively managing secure boot variables. Such techniques include receiving a request from an entity to modify a portion of a basic...
US-9,779,240 System and method for hypervisor-based security
Aspects of the present invention include hypervisor based security using a hypervisor to monitor a VM. In embodiments of the present invention, the information...
US-9,779,239 Detection of malicious software behavior using signature-based static analysis
According to an aspect of an embodiment, a method may include determining a set of entity instances in a software program. Each entity instance may correspond...
US-9,779,238 Classifying malware by order of network behavior artifacts
The present invention generally relates to systems and methods for classifying executable files as likely malware or likely benign. The techniques utilize...
US-9,779,237 Detection of non-volatile changes to a resource
Policies are communicated to a kernel service of an Operating System (OS) that define resource identifiers and events. When an event is received (from the...
US-9,779,236 Risk assessment modeling
One or more techniques and/or systems are provided for risk assessment. Historical authentication data and/or compromised user account data may be evaluated to...
US-9,779,235 Cognizant engines: systems and methods for enabling program observability and controlability at instruction...
The present invention is directed to system for and methods of real time observing, monitoring, and detecting anomalies in programs' behavior at instruction...
US-9,779,234 Software reputation establishment and monitoring system and method
Knowledge of a module's behavior when the module's reputation is formed is obtained. If the module's behavior changes, this change is detected. In one...
US-9,779,233 Broker-based authentication system architecture and design
A system and method that grants a token to authenticate a user requesting access to an application in a domain is disclosed. The method includes receiving a...
US-9,779,232 Trusted code generation and verification to prevent fraud from maleficent external devices that capture data
A user equipment. The user equipment comprises a processor, a memory, a trusted security zone, wherein the trusted security zone provides hardware assisted...
US-9,779,231 Distribution of ephemeral extension to communication sessions
To allow more non-enterprise communication endpoints to communicate without having to allocate an extension for every non-enterprise communication endpoint, a...
US-9,779,230 System and method for off-host abstraction of multifactor authentication
An information handling system includes a first processor, a second processor, and a third processor. The first processor requests a single-factor...
US-9,779,229 Secure industrial control system
A secure industrial control system is disclosed herein. The industrial control system includes a plurality of industrial elements (e.g., modules, cables) which...
US-9,779,228 Touchscreen unlocking method and apparatus
A touchscreen unlocking method and apparatus are disclosed. The method includes receiving an unlocking instruction triggered by a user by sliding a control on a...
US-9,779,227 Security system using keys encoded in holograms
A system for controlling access to secured resources using a security token having a hologram embossed thereon is provided. A key is split into a user key and a...
US-9,779,225 Method and system to provide access to secure features of a device
A method of providing access to secure features of a device includes detecting motion of a secured device during entry of first access credentials on the...
US-9,779,224 Methods and systems for client-enhanced challenge-response authentication
Methods, systems and apparatus for performing client-server authentication using a device authentication and optional user authentication approach. In a device...
US-9,779,223 Non-intrusive background synchronization when authentication is required
A non-modal notification user interface element is displayed persistently but unobtrusively such that a user may easily determine that authentication...
US-9,779,222 Secure management of host connections
An access gateway monitors a communication session to a first host for commands entered by a user. For example, commands entered in a command line terminal by...
US-9,779,220 Obscuring data using on-the-fly retokenizable tokens
A method includes (a) selecting a first token column or a second token column of a token table as an active token column based upon the value of a current token...
US-9,779,219 Method and system for late binding of option features associated with a device using at least in part license...
A system, method, and computer-readable medium are disclosed for entitling the implementation of a feature associated with a device after it is manufactured. A...
US-9,779,218 Method for model-based determination of a temperature distribution of an exhaust gas post-treatment unit
In a method for a model-based determination of a temperature distribution of an exhaust gas post-treatment unit, a differentiation is made between steady...
US-9,779,217 Method, apparatus, and computer program product for replenishment of articles in a dispensing system
Example embodiments of the present invention may provide an efficient method of replenishing canisters of an automated dispensing device off-line. In...
US-9,779,216 Systems and methods for storing and dispensing medication
A medication storage/dispenser unit comprises a processor connected to medication package storage compartments. The storage compartments comprise a medication...
US-9,779,215 Automatic prescription drug dispenser
An automatic prescription drug dispenser including a remote dispenser, a prescription entry system, and a communications network. The remote dispenser transmits...
US-9,779,214 Systems and methods for personalized de-risking based on patient genome data
The present disclosure describes systems and methods for using patient-specific genomic information to optimize or de-risk therapy for the patient. A user may...
US-9,779,213 System for evaluating a pathological stage of prostate cancer
Clinical information, molecular information and/or computer-generated morphometric information is used in a predictive model for predicting the occurrence of a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.