Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,934,425 Collection of affect data from multiple mobile devices
A user interacts with various pieces of technology to perform numerous tasks and activities. Reactions can be observed and mental states inferred from these...
US-9,934,424 Automated relationship categorizer and visualizer
Aspects differentially drive the graphic display of links overlaid between people in a group photograph as a function of associated relationship type....
US-9,934,423 Computerized prominent character recognition in videos
Techniques for identifying prominent subjects in video content based on feature point extraction are described herein. Video files may be processed to detect...
US-9,934,422 Digitized handwriting sample ingestion systems and methods
Certain aspects of the present methods and systems may focus on computer implemented methods of obtaining digitized hand-writing data corresponding to a sample...
US-9,934,421 Optical spoof detection
The present invention generally relates to authenticating a user of an electronic device comprising a capacitive fingerprint sensor and an optical sensor...
US-9,934,420 Fingerprint information processing method and apparatus for speed improvement of fingerprint registration and...
A fingerprint information processing method and apparatus in which the method includes: obtaining a fingerprint image; calculating an average value of shading...
US-9,934,419 Package structure, electronic device and method for manufacturing package structure
A package structure, an electronic device and a method for manufacturing the package structure are presented. The package structure comprises: a substrate...
US-9,934,418 Display integrated optical fingerprint sensor with angle limiting reflector
An optical sensor for imaging an input object, such as a fingerprint, on a sensing region of a display is disclosed. The sensor includes a transparent substrate...
US-9,934,416 Industrial design for consumer device based scanning and mobility
A data entry and scanning apparatus that includes a commercially available mobile device wherein said commercially available mobile device with a touch screen...
US-9,934,415 Handheld reader having transparent circuit board for alignment of multiple electrical contacts
A portable reader for performing an operation on an integrated circuit (IC) such as a printed memory. The portable reader comprises a body and a transparent...
US-9,934,414 Method and system for wireless tag reading
A wireless tag reading system including a frame, two or more antennas installed to the frame, and a turntable rotatable with respect to the frame. The turntable...
US-9,934,413 Magnetic reader identification of objects
A magnetic reader for identifying an object includes a hardware processor, a memory storing multiple magnetic field profiles, and a magnetic field detector. The...
US-9,934,412 Implementing replay protected storage
In one embodiment, a data storage client may establish a virtual replay protected storage system with an agnostic data storage. The virtual replay protected...
US-9,934,411 Apparatus for physically unclonable function (PUF) for a memory array
Methods and apparatus for creating a physically unclonable function for SRAM are disclosed. An example method includes after applying a voltage to a memory...
US-9,934,410 Security data path verification
A formal verification approach verifies data access and data propagation paths in a circuit design by proving the unreachability of path cover properties of the...
US-9,934,409 Apparatus and method for data matching and anonymization
A method includes receiving a plurality of data sets. Each data set includes a customer identifier field specifying a unique customer identifier associated with...
US-9,934,408 Secure personal content server
A local content server system (LCS) for creating a secure environment for digital content is disclosed, which system comprises: a communications port in...
US-9,934,407 Apparatus for and method of preventing unsecured data access
Shown and depicted is preventing sensitive information from being exfiltrated from an organization using hypervisors. A Data Loss Prevention system is composed...
US-9,934,406 Protecting private information in input understanding system
Examples of the present disclosure include capturing an input at a local platform and transmitting the captured input to a service platform separate from the...
US-9,934,405 Inter-process access control
A kernel receives a request to execute a first process instance from an agent. The first process instance is an instance of a first program. The kernel obtains...
US-9,934,404 Inter-process access control
A kernel receives a request to execute a first process instance from an agent. The first process instance is an instance of a first program. The kernel obtains...
US-9,934,403 Storage and privacy service
In one embodiment, a storage and privacy system stores and manages information associated with users and ensures and enforces access-control rules specified for...
US-9,934,402 Method and system for protecting user choices
A system, method, and computer-accessible medium for protecting user choice settings are provided. The system and method provide an application programming...
US-9,934,401 Hierarchical permissions model within a document
Case management systems and techniques are disclosed. In various embodiments, a hierarchical document permission model is received, the model describing a...
US-9,934,400 System and methods for encrypting data
A system and associated methods for encrypting data are disclosed. In at least one embodiment, a key manager is located in memory on an at least one computing...
US-9,934,399 Dynamic security policy generation
A user interface is described, such as a graphical user interface (GUI), operable to receive a representation of a security policy expressed in a first policy...
US-9,934,398 Bluetooth key apparatus
A Bluetooth key apparatus is provided. The apparatus comprises a control unit; a Bluetooth locking device connected with the control unit; and a Bluetooth...
US-9,934,397 Controlling privacy in a face recognition application
Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A...
US-9,934,396 Messaging systems and methods
A messaging system for providing messaging service between or among user accounts includes a message database server. The message database server includes an...
US-9,934,395 Enabling secure big data analytics in the cloud
Methods are provided for enabling secure big data analytics in the cloud. A method includes reading a secure file, by a Secure Distributed File System in a...
US-9,934,394 Non-resharable resource links
Provided are methods and systems for generating user-specific resource URIs for resources shared between users on the Internet. The user for whom the link was...
US-9,934,393 Transparent namespace-aware mechanism for encrypted storage of data within web applications
Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for providing data security in web applications...
US-9,934,392 Continuous Monitoring of Access of Computing Resources
Systems and methods are provided for monitoring access of computing resources. Usage rules may be created and stored that define a usage constraint based on...
US-9,934,391 Establishing trust using side channels
Disclosed are various embodiments for a trust establishment application. Machine instances executed in the same computing environment generate side channel...
US-9,934,390 Data redaction system
An electronic data storage and retrieval system comprising one or more first computing devices and a second computing device. The one or more first computing...
US-9,934,389 Provisioning of a shippable storage device and ingesting data from the shippable storage device
When a client requests a data import job, a remote storage service provider provisions a shippable storage device that will be used to transfer client data from...
US-9,934,388 Method and system for database encryption
A method for encrypting a database, according to which a dedicated encryption module is placed inside a Database Management Software above a database cache....
US-9,934,386 Method and apparatus for managing the privacy and disclosure of location information
An approach for managing the privacy and disclosure of location information associated with a computer system. For one aspect, a request is received from a...
US-9,934,385 System and method for implementing application policies among development environments
In a system for facilitating distributed security and vulnerability testing of a software application, each development sandbox in a set of sandboxes receives a...
US-9,934,384 Risk assessment for software applications
Disclosed are various embodiments for assessing risk associated with a software application on a user computing device in an enterprise networked environment....
US-9,934,383 Enabling an external operating system to access encrypted data units of a data storage system
The present invention is notably directed to a method for allowing an operating system, or OS, to access an encrypted data storage system of a computer (10),...
US-9,934,382 Virtual machine image encryption
Embodiments of the present disclosure include systems and methods for encrypting a virtual machine image and accessing an encrypted virtual machine image....
US-9,934,381 System and method for detecting malicious activity based on at least one environmental property
Techniques for detecting exfiltration content are described herein. According to one embodiment, a malicious content suspect is executed and a packet inspection...
US-9,934,380 Execution profiling detection of malicious objects
In an example, there is provided a system and method for execution profiling detection of malicious software objects. An execution profiling (EXP) engine may be...
US-9,934,379 Methods, systems, and computer readable media for detecting a compromised computing host
Methods, systems, and computer readable media for detecting a compromised computing host are disclosed. According to one method, the method includes receiving...
US-9,934,378 Systems and methods for filtering log files
The disclosed computer-implemented method for filtering log files may include (1) identifying, on the endpoint computing device, log files that recorded events...
US-9,934,377 Input/output parameter selection
A device comprises a detector configured to detect an event, and a selector coupled to the detector and configured to generate a signal in response to a...
US-9,934,376 Malware detection appliance architecture
A threat-aware virtualization module may be deployed in a malware detection appliance architecture and execute on a malware detection system (MDS) appliance to...
US-9,934,375 Secured execution of a web application
Methods and nodes for securing execution of a web application by determining that a call dependency from a first to a second function needs to be protected,...
US-9,934,374 Method and apparatus for program flow in software operation
The present disclosure provides a description of a computer implemented method and system for protecting a software program from attack during runtime. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.