Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,911,005 Protecting search privacy using policy-based search terms
A processor-implemented method for policy-based search privacy is provided, including a search privacy module and one or more privacy policy configurations. The...
US-9,911,004 Cloud-based hardware architecture
A federated in-memory database system (FIMDB) and a method for operating the same. The system comprises: A plurality of interconnected computing sites (LS),...
US-9,911,003 Dynamic data masking of post-output database data
Dynamic data masking by intercepting data derived from a database, creating a tabular representation of the data, and masking any of the data in accordance with...
US-9,911,002 Method of modifying image including photographing restricted element, and device and system for performing the...
Provided is a user device including: a storage configured to store data; and a controller configured to recognize a person included in an image captured by the...
US-9,911,000 Implementing extent granularity authorization processing in CAPI adapters
A method, system and computer program product are provided for implementing block extent granularity authorization processing for a Coherent Accelerator...
US-9,910,999 Methods and apparatus for encrypted indexing and searching encrypted data
In some embodiments, an apparatus includes a memory and a processor. The processor is configured to receive an index file that associates a characteristic in a...
US-9,910,998 Deleting information to maintain security level
A method, system, mediation server, client, and computer program for deleting a copied file in which a master file is duplicated while maintaining a certain...
US-9,910,997 Secure credential storage
Securing a credential is disclosed. A reference to the credential that will provide access to a service is stored in a credential store. The credential from the...
US-9,910,996 Mass storage device memory encryption methods, systems, and apparatus
Mass storage devices and methods for securely storing data are disclosed. The mass storage device includes a communication interface for communicating with a...
US-9,910,995 System and method for secure file transmission
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for file transmission. In one aspect, a system includes at...
US-9,910,994 System for assuring security of sensitive data on a host
Described are techniques for determining and mitigating leakage of sensitive data into log data. An application programming interference (API) is instrumented...
US-9,910,993 Simulation and virtual reality based cyber behavioral systems
A cybersecurity system for managing cyber behavior associated with cyber actors such that the cyber behavior can be computed and predicted and cyber...
US-9,910,992 Presentation of user interface elements based on rules
Example embodiments disclosed herein relate to present part of a web application with one or more user interface elements of the part highlighted based on...
US-9,910,991 Event-based apparatus and method for securing bios in a trusted computing system during execution
An apparatus is provided for protecting a basic input/output system (BIOS) in a computing system. The apparatus includes a BIOS read only memory (ROM), an event...
US-9,910,990 Security controlled multi-processor system
Embodiments of the present disclosure provide systems and methods for implementing a secure processing system having a first processor that is certified as a...
US-9,910,989 Malware removal method and system, and computer storage medium
A method, device, and a computer storage medium are provided. The method includes: starting a core file and building an environment after running an operation...
US-9,910,988 Malware analysis in accordance with an analysis plan
Techniques for malware detection are described. Herein, a system, which detects malware in a received specimen, comprises a processor and a memory....
US-9,910,987 Malware detection method and apparatus
According to a first aspect of the present invention there is provided a malware detection method implemented within a computer. The method includes, for a...
US-9,910,986 Methods and apparatus for machine learning based malware detection
Apparatus and methods describe herein, for example, a process that can include receiving a potentially malicious file, and dividing the potentially malicious...
US-9,910,985 Apparatus and method for identifying similarity via dynamic decimation of token sequence N-grams
An apparatus for identifying related code variants or text samples includes processing circuitry configured to execute instructions for receiving query binary...
US-9,910,984 Methods and systems for on-device high-granularity classification of device behaviors using multi-label models
Various aspects include methods and computing devices implementing the methods for evaluating device behaviors in the computing devices. Aspect methods may...
US-9,910,983 Malware detection
A method of detecting suspicious code that has been injected into a process. The method includes identifying suspicious executable memory areas assigned to the...
US-9,910,982 Large-scale, time-sensitive secure distributed control systems and methods
Large-scale, time-sensitive secure distributed control systems and methods are disclosed. According to an aspect, a method includes detecting an anomaly at a...
US-9,910,981 Malicious code infection cause-and-effect analysis
A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer...
US-9,910,980 Cyber security
Systems and methods that use probabilistic grammatical inference and statistical data analysis techniques to characterize the behavior of systems in terms of a...
US-9,910,979 Intercepting inter-process communications
Intercepting inter-process communications by determining a first computer memory location of an inter-process communications function of an instance of a...
US-9,910,977 Data sharing between multiple applications running on a mobile device
A method and a computer system for data sharing between multiple applications running on a mobile device are provided. The method comprising: receiving from a...
US-9,910,976 Processing mesh communications
A communication device comprising: a first processing function for performing protocol processing of received datagrams; a second processing function for...
US-9,910,975 Method for authenticating user using icon combined with input pattern, and password input device
A password input device comprises a storage unit for storing character strings according to each icon; an input window generation unit for generating and...
US-9,910,974 Method for controlling user access to an electronic device
A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and...
US-9,910,973 Fingerprint gestures
User authentication for a user device can leverage one or more fingerprint sensor regions capable of detecting and/or recognizing a user's fingerprints. The...
US-9,910,972 Remote trust attestation and geo-location of servers and clients in cloud computing environments
Methods and systems may provide for selecting a hypervisor protocol from a plurality of hypervisor protocols based on a communication associated with a remote...
US-9,910,971 System and method of interlocking to protect software-mediated program and device behaviours
Methods and devices for thwarting code and control flow based attacks on software. The source code of a subject piece of software is automatically divided into...
US-9,910,970 Enabling a software application to be executed on a hardware device
The invention provides a method, a hardware circuit and a hardware device for enabling a software application to be executed on a hardware device in dependence...
US-9,910,969 System, method, and device for delivering communications and storing and delivering data
A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is...
US-9,910,968 Automatic notifications for inadvertent file events
A content management system can detect file events that are suspected to be in error, and notify users having access to files affected by the detected file...
US-9,910,967 File origin determination
A file validation method and system is provided. The method includes retrieving from an authoritative source system, an artifact file. Identification...
US-9,910,966 System and method of increasing sample throughput
Technologies for increasing sample throughput by predicting the end point response time of a sensor for the analysis of an analyte in a sample are disclosed. In...
US-9,910,965 Systems, methods and computer program product for monitoring interactions with a medication storage device
Methods, apparatuses and computer program products are provided for monitoring the stocking and dispensing of medications from an automated medication storage...
US-9,910,964 Methods and systems using mathematical analysis and machine learning to diagnose disease
Exemplified method and system facilitates monitoring and/or evaluation of disease or physiological state using mathematical analysis and machine learning...
US-9,910,963 Market measures and outcomes for app prescribing
The disclosure generally describes computer-implemented methods, software, and systems for receiving and aggregating anonymized data reports about when...
US-9,910,962 Genetic and environmental risk engine and methods thereof
Risk engines and related methods may benefit patients and their physicians. For example, patients may benefit from being able to determine their personal...
US-9,910,961 Second opinion network
Systems and methods are provided to facilitate consultations between a referral source (e.g., labs, pathologists and patients) and a consultant (e.g.,...
US-9,910,960 Methods and systems for providing the proximity of a process requirement metric to a system process requirement
Methods and systems are presented for indicating the proximity of a process requirement metric to a corresponding system process requirement in a physiological...
US-9,910,959 Entry, storage and retrieval of medical information from a pharmacy
A system and method includes: a pharmacy server receiving a customer ID code to allow a customer wireless access to his medical data file stored on the server;...
US-9,910,958 Method and device for displaying a first image and a second image of an object
The positions of the images and a display mode of at least two images of an object are selected based on a comparison of a provided distance value between the...
US-9,910,957 Visualization, sharing and analysis of large data sets
Systems and methods for visualization, sharing and analysis of large data sets are described. Systems and methods may include receiving an input data set,...
US-9,910,956 Sequencing using concatemers of copies of sense and antisense strands
Methods and systems for single molecule sequencing using concatemers of copies of sense and antisense strands. Concatemers are provided, for example, by...
US-9,910,955 Methods for genome assembly and haplotype phasing
The disclosure provides methods to assemble genomes of eukaryotic or prokaryotic organisms. The disclosure further provides methods for haplotype phasing and...
US-9,910,954 Programmable clock division methodology with in-context frequency checking
A method, system, and compute program product use a generalized macro or a generalized macro timing abstract for a timing analysis in a specific timing context....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.