Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,940,465 Static security analysis using a hybrid representation of string values
A hybrid string constructor includes a database configured to store a set of known concretizations. A processor is configured to compare the one or more string...
US-9,940,464 Static security analysis using a hybrid representation of string values
Methods for creating a hybrid string representation include determining string components from input string information that may be represented concretely by...
US-9,940,463 System and method for secure authentication
A method for device authentication comprises receiving, by processing hardware of a first device, a message from a second device to authenticate the first...
US-9,940,462 Code validation
Methods and apparatus for validating a system include reading protected record data for a section of the system from a secure storage element, and verifying...
US-9,940,461 Enabling an external operating system to access encrypted data units of a data storage system
A method for allowing an operating system (OS), to access an encrypted data storage system of a computer, wherein: the data storage system comprises: a...
US-9,940,460 Cleaning malware from backup data
Embodiments described herein perform cleanup of backup images of a storage system by applying a record of I/O operations recorded while performing anti-malware...
US-9,940,459 Methods and devices for detection of malware
An apparatus includes a database configured to store a collection of files. The apparatus also includes a counter module configured to calculate a frequency of...
US-9,940,458 Flag based threat detection
Technologies are generally described for systems, devices and methods effective to generate an alert in a computing system. In some examples, a read request may...
US-9,940,457 Detecting a cryogenic attack on a memory device with embedded error correction
Embodiments of the present disclosure provide a method, computer program product, and system for monitoring a dynamic random-access memory (DRAM) device to...
US-9,940,456 Using trusted execution environments for security of code and data
An embodiment includes a processor coupled to memory to perform operations comprising: creating a first trusted execution environment (TXE), in protected...
US-9,940,455 Programming code execution management
In one aspect of the present description, operations are described for detecting whether programming code of a first computer program has been modified by a...
US-9,940,454 Determining source of side-loaded software using signature of authorship
A source of side-loaded software is determined. An action may be performed in response to the determination of the source. In one case, the handling of an...
US-9,940,453 Method and system for securing user access, data at rest and sensitive transactions using biometrics for mobile...
Biometric data are obtained from biometric sensors on a stand-alone computing device, which may contain an ASIC, connected to or incorporated within it. The...
US-9,940,452 Method and system for interoperable identity and interoperable credentials
The present teaching relates to generating an identifier for a person. In one example, an actual name of the person is received. The identity of the person that...
US-9,940,451 Relay apparatus, system, relay method, and non-transitory computer readable medium
A relay apparatus includes a memory that stores a user management table used to manage user information including state information indicating a state of a...
US-9,940,450 Method and apparatus for managing confidential information
The invention is a method and apparatus for managing the secure acquisition, storage and disclosure of confidential information, to facilitate identity rights...
US-9,940,449 Secure information storage and retrieval apparatus and method
A user using a client computer registers with a server computer over a computer network by submitting a biometric scan of a body part of the user. The user...
US-9,940,448 Unlock processing method and device
An unlock processing method for a terminal, includes: receiving an input unlocking instruction from a user; determining whether the user belongs to a preset...
US-9,940,447 Managing application access to certificates and keys
Plural modes of operation, each associated with a class attribute, may be established on a mobile device. The present application discloses a method of handling...
US-9,940,446 Anti-piracy protection for software
A certificate for a target device includes encrypted system attributes that are verified against attributes of the target device prior to software usage. A...
US-9,940,445 Securing microprocessors against information leakage and physical tampering
A processor system comprising: performing a compilation process on a computer program; encoding an instruction with a selected encoding; encoding the security...
US-9,940,444 Software wrapper and installer using timestamp validation and system identification validation
Systems, methods, and apparatuses for installing a software product using timestamp validation and system identification validation are disclosed. An example...
US-9,940,443 Supporting secondary use of content of electronic work
A technique for supporting secondary use of content of an electronic work. This technique includes receiving, from a user terminal, a use request requesting...
US-9,940,442 Supporting secondary use of content of electronic work
A technique for supporting secondary use of content of an electronic work. This technique includes receiving, from a user terminal, a use request requesting...
US-9,940,441 System and method for maximum insulin pump bolus override
An ambulatory infusion pump can include a maximum bolus override procedure. When a bolus amount greater than a maximum bolus amount is requested, the pump can...
US-9,940,440 Detecting and responding to software and hardware anomalies in a fluid delivery system
A total dose of a therapeutic agent to be delivered to a patient by an infusion device over a total period of time is automatically divided into a plurality of...
US-9,940,439 Method and device for identification and/or sorting of medicines
A medicine identification and sorting system is disclosed, which includes an image capturing system for creating a digital image of at least a portion of a...
US-9,940,438 Medical diagnosis support apparatus and medical diagnosis support method
A medical diagnosis support apparatus which provides information for supporting medical diagnosis includes an inference unit which obtains an inference result...
US-9,940,437 Computer-aided multiple standard-based functional evaluation and medical reporting system
A method of performing an objective functional evaluation of a person's physical capacity comprises of a computer program particularly designed to amass and...
US-9,940,436 Method and system for updating a medical device
The present disclosure includes methods, devices and systems for determining the availability of an upgraded version of executable code for a medical device and...
US-9,940,435 Visualization of a development and escalation of a patient monitor alarm
In the present invention, a monitoring device for providing information on data obtained from sensors operably connected to the device includes a central...
US-9,940,434 System for genome analysis and genetic disease diagnosis
The method for genome analysis translates the clinical findings in the patient into a comprehensive test order for genes that can be causative of the patient's...
US-9,940,433 Discovering population structure from patterns of identity-by-descent
Described are techniques for determining population structure from identity-by-descent (IBD) of individuals. The techniques may be used to predict that an...
US-9,940,432 Development of an unmanned aerial vehicle
Techniques for developing a design for a module of an unmanned device may be provided. For example, the unmanned device may comprise one or more already...
US-9,940,431 Accurate statistical timing for boundary gates of hierarchical timing models
A system to improve performance of a semiconductor chip design includes a hierarchical analysis module that determines a hierarchical arrangement of the...
US-9,940,430 Burn-in power performance optimization
Method of burn-in power optimization which includes: testing integrated circuit devices to record a performance speed for each of the integrated circuit...
US-9,940,429 Early overlay prediction and overlay-aware mask design
Various embodiments include computer-implemented methods, computer program products and systems for analyzing at least one feature in a layout representing an...
US-9,940,428 Hierarchical fill in a design layout
This application discloses a computing system implementing one or more tools or mechanism configured to capture a hierarchy of a circuit design layout generated...
US-9,940,427 Lens heating aware source mask optimization for advanced lithography
A computer-implemented method for improving a lithographic process for imaging a portion of a design layout onto a substrate using a lithographic projection...
US-9,940,426 Signal via positioning in a multi-layer circuit board
One aspect is a method that includes identifying a substantially uniform distribution of signal vias for a multi-layer circuit board based on a design file...
US-9,940,425 Method and apparatus for camouflaging a standard cell based integrated circuit with micro circuits and post...
A method and apparatus for camouflaging an application specific integrated circuit (ASIC), wherein the ASIC comprises a plurality of interconnected functional...
US-9,940,424 Systems and methods for minimum-implant-area aware detailed placement
The present disclosure is directed to systems and methods for a minimum-implant-area (MIA) aware detailed placement. In embodiments, the present disclosure...
US-9,940,423 Editing a NoC topology on top of a floorplan
A NoC topology is represented on top of a physical view of a chip's floorplan. The NoC topology is edited, such as by adding switches, removing switches, and...
US-9,940,422 Methods for reducing congestion region in layout area of IC
A method for reducing congestion regions of an integrated circuit is provided. A placement of the IC is obtained, wherein the placement includes a signal path...
US-9,940,421 Method for optimizing place-and-routing using a random normalized polish expression
Simultaneous automatic placement and routing speeds up implementation an integrated circuit layout and improves the resulting layout such that the layout is...
US-9,940,420 Monolithic structure with a rotation in a shearable medium
A monolithic structure designed to be built with relatively few manufacturing steps comprises three dimensional elements enclosed by planar faces, a rotation...
US-9,940,419 Post design integrated circuit manufacturing obfuscation
Integrated circuit design layout files are partitioned into one or more design layout files containing data for Front-End-Of-Line sub-circuits and one or more...
US-9,940,418 Simulation of hierarchical circuit element arrays
This disclosure describes a design tool that iteratively performs simulation sets on an integrated circuit design, each corresponding to a different...
US-9,940,417 Simulating reference voltage response in digital simulation environments
Embodiments herein describe a digital simulation environment that changes the delay of a digital signal to represent different analog reference voltages. For...
US-9,940,416 Two-scale method using a list of active sub-domains for a fully parallelized solution of wave equations
Described herein is an apparatus and method for allocating hardware-based processing units for a wave modeling computation. The method generates a computational...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.