Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,892,280 Identifying illegitimate accounts based on images
Techniques for restricting access to certain members of an online service are provided. Member accounts include one or more images. Attributes of member...
US-9,892,279 Creating an access control policy based on consumer privacy preferences
A system for generating an access control policy comprises a user interface (1) for enabling a user to indicate a topic (10) and a set of permissions (15). A...
US-9,892,278 Focused personal identifying information redaction
Personal information is retrieved from at least one data source and personal information associated with a first individual is identified. A document is...
US-9,892,277 Device and method for encoding data column
A device and a method for encoding a data column are disclosed. A schema inquiry unit inquires into a schema of an original table which is a data table for...
US-9,892,276 Verifiable data destruction in a database
A computing device may determine that a policy event to initiate data destruction for a first set of data has been triggered. The first set of data may be...
US-9,892,275 Data encryption in a multi-tenant cloud environment
Various embodiments of systems, computer program products, and methods for encrypting data in a multi-tenant cloud environment are described herein. In an...
US-9,892,274 Accessing and providing access to computer files over a computer network
Methods, systems and computer program products are provided that may relate to controlling access to or accessing computer files over a computer network. A file...
US-9,892,273 Provision of RSS feeds based on classification of content
A device that resides behind a firewall and receives content to be further directed towards one or more users, such as high-volume emails. The device captures...
US-9,892,272 System and method for encapsulating and enabling protection through diverse variations in software libraries
A flexible software library in which the software modules are defined as an abstract intermediate representation. The flexible library allows security...
US-9,892,271 Device lock control apparatus and method with device user identification using a thermal signature
A device includes a thermal infrared sensor and a processor, operatively coupled to the thermal IR sensor. The processor is configured to determine that the...
US-9,892,270 System and method for programmably creating and customizing security applications via a graphical user interface
A system and method for programmably creating a security application via a graphical user interface. The method comprises: causing a display of a service stage...
US-9,892,269 Techniques for data monitoring to mitigate transitive problem in object-oriented contexts
Techniques for mitigating the transitive data problem using a secure asset manager are provided. These techniques include generating a secure asset manager...
US-9,892,268 Extensible deployment system
An extensible deployment system is disclosed that provides for flexible deployment and centralized management of a scalable communication system. The scalable...
US-9,892,267 Secure public key acceleration
In an embodiment, a system is provided in which the private key is managed in hardware and is not visible to software. The system may provide hardware support...
US-9,892,265 Protecting virtual machine data in cloud environments
Various systems, methods, and processes to protect virtual machine data in a cloud environment are disclosed. A request for requested data is received at an...
US-9,892,264 System and method for dynamic security provisioning of computing resources
The present invention facilitates the dynamic provisioning of computing and data assets in a commodity computing environment. The invention provides a system...
US-9,892,263 System, method and apparatus to visually configure an analysis of a program
A method extracts views from an application program, where at least some extracted views include at least one view component, and presenting the extracted views...
US-9,892,262 Analyzing target software for security vulnerabilities
A method of analyzing target software for security vulnerabilities comprises, with a processor, scanning a codebase of a target software using a static analysis...
US-9,892,261 Computer imposed countermeasures driven by malware lineage
A system to identify and counter computer malware. The system comprises a processor, a memory, a data store comprising information about known computer malware,...
US-9,892,260 System and method for creating and executing breach scenarios utilizing virtualized elements
A system for analyzing a computing system for potential breach points, the system comprising a memory device having executable instructions stored therein, and...
US-9,892,259 Security protection system and method
A security protection system is provided. The system includes: a vulnerability identification device, to collect patch file information, identify a...
US-9,892,258 Automatic synthesis of unit tests for security testing
Performing security analysis on a computer program under test (CPUT). The CPUT can be analyzed to identify data pertinent to potential security vulnerabilities...
US-9,892,257 Efficient data transfer in a virus co-processing system
Circuits and methods are provided for detecting, identifying and/or removing undesired content. According to one embodiment, a processor maintains a page...
US-9,892,256 Threat defense techniques
In an approach, an intermediary guest manager operates within a virtual machine hosted by a host machine and managed by a hypervisor. The intermediary guest...
US-9,892,255 Presenting service processes
Technical solutions for presenting service processes are provided. In the solutions, operation instructions are received, and in response to the received...
US-9,892,254 Hypervisor enforcement of cryptographic policy
Techniques for restricting the execution of algorithms contained in applications executing on virtual machines executing within a computer system are described...
US-9,892,253 Buffer overflow exploit detection
A call to a memory management application programming interface (API) that results in a buffer overflow due to inaccurate bounds checking could potentially...
US-9,892,252 Systems and methods for sensor-based layer variation on mobile devices
The present disclosure generally relates to visually varying an image using parallax image layers, and more specifically, relates to visually varying...
US-9,892,251 Privacy screen for amobile terminal that displays protected data
A mobile terminal includes: a display; and a controller. The controller puts at least one screen corresponding to the current display screen and having the same...
US-9,892,250 Secure element as a digital pocket
The disclosure includes a system and method in which one or more virtual resources are presented to a secure element; and the one or more virtual resources are...
US-9,892,249 Methods and devices for authorizing operation
A system for authorizing an operation is provided. The system may acquire motion data collected by a wearable device. A mobile terminal may determine whether...
US-9,892,248 Refrigerator and method for measuring body composition using the refrigerator
A refrigerator includes a handgrip arranged on one side of a door to open and close a storage compartments, a measurer configured to measure fingerprints and...
US-9,892,247 Multimodal biometric authentication system and method with photoplethysmography (PPG) bulk absorption biometric
A multimodal biometric authentication system utilizes a bulk absorption characteristic of human tissue that is measurable using a photoplethysmography (PPG)...
US-9,892,246 Security mode prompt method and apparatus
A security mode prompt method and apparatus where the method includes when it is determined that a terminal is currently in a first security mode, acquiring...
US-9,892,245 Method and apparatus for using a multi-factor password or a dynamic password for enhanced security on a device
A method and apparatus for performing authentication may comprise: determining a first value of a dynamic password applicable for a first scenario, the dynamic...
US-9,892,244 System and method for installing authentication credentials on a network device
A method for installing authentication credentials on a network device. An intermediary computing device (e.g., client computer) downloads an application for...
US-9,892,243 Information processing apparatus, information processing method and non-transitory computer readable medium
An information processing apparatus comprises: storage unit that stores a first converted value converted by a one-way function in association with user...
US-9,892,242 Unified enterprise management of wireless devices in a controlled environment
A wireless device enterprise management system and a method for operating the management system in a controlled environment is disclosed. The enterprise...
US-9,892,241 Out-of band tokens for rights access
Access to content may be administered by storing content, the content comprising one or more selections, accessing a passive optical out-of-band token...
US-9,892,240 System and method for providing a content consumption journal to users in a multi-device environment
A system and method for providing content consumption data to users in a multi-device environment. Activity data from a plurality of UE devices associated with...
US-9,892,239 Digital rights management for HTTP-based media streaming
Techniques and mechanisms described herein facilitate the management of digital rights for media content item presentation. According to various embodiments, a...
US-9,892,238 System and method for monitoring a process
A system for monitoring a process determined by a set of process data in a multidimensional process data domain pertaining to process input-output data, the...
US-9,892,237 System and method for characterizing biological sequence data through a probabilistic data structure
A system and method for resolving data through a probabilistic data structure can include initializing a B-field data structure, inserting a key-value element...
US-9,892,236 Automated method of generating reconciliation reports regarding mismatches of clinical data received from...
An automated method is provided of generating a report of data collected from multiple sources during a clinical trial. The data includes a plurality of...
US-9,892,235 Insulin management
A method of managing insulin includes receiving blood glucose measurements on a computing device from a glucometer. The blood glucose measurements are separated...
US-9,892,234 Subcutaneous outpatient management
A method of administering insulin includes receiving subcutaneous information for a patient at a computing device and executing a subcutaneous outpatient...
US-9,892,233 Visualization of a functional sequence of a medical apparatus
Visualization of a functional sequence of a medical apparatus includes accepting a mathematical model describing at least the medical apparatus, and accepting a...
US-9,892,232 System for vending medications from a vending machine in accordance with a dosing schedule that is downloaded...
An automated method is provided for recording contents of medication packages vended from a plurality of vending machines in electronic records, such as an...
US-9,892,231 Automated assertion reuse for improved record linkage in distributed and autonomous healthcare environments...
An assertion acceptance value matrix (300) indicates the reliability of assertions, particularly assertions or decisions whether records match or do not match,...
US-9,892,230 Size-based analysis of fetal or tumor DNA fraction in plasma
A fractional concentration of clinically-relevant DNA in a mixture of DNA from a biological sample is determined based on amounts of DNA fragments at multiple...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.