Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,001,3580 Security device with programmable systolic-matrix cryptographic module and programmable input/output interface
A system includes programmable systolic cryptographic modules for security processing of packets from a data source. A first programmable input/output interface...
US-1,001,3579 Secure routing of trusted software transactions in unsecure fabric
Various configurations and methods for securing and validating trusted input output (IO) data communications within fabric interconnects of processing circuitry...
US-1,001,3578 Apparatus for processing with a secure system manager
Method and apparatus for secure processing. The method includes detecting communication among secure and non-secure data entities, prohibiting execution of...
US-1,001,3577 Data processing systems for identifying whether cookies contain personally identifying information
A system for identifying and determining whether a particular cookie may include personal data, in various embodiments, is configured to analyze collected...
US-1,001,3576 History information anonymization method and history information anonymization device for anonymizing history...
A history information anonymization method is provided that includes associating each of a plurality of pieces of history information collected from a plurality...
US-1,001,3575 Method to manage raw genomic data in a privacy preserving manner in a biobank
A method to manage raw genomic data (SAM/BAM files) in a privacy preserving manner in a biobank. By using order preserving encryption of the reads' positions,...
US-1,001,3574 Method and apparatus for secure storage and retrieval of encrypted files in public cloud-computing platforms
In one aspect, a computerized Encrypted Drive System (EDS) server useful for keyword extraction and indexing server of includes a computer store containing...
US-1,001,3573 Personal ledger blockchain
A system, method, and computer readable storage medium configured for storing encrypted data in a blockchain. To write additional data in a blockchain, a...
US-1,001,3572 Implementing extent granularity authorization command flow processing in CAPI adapters
A method, system and computer program product are provided for implementing block extent granularity authorization command flow processing for a Coherent...
US-1,001,3571 Information management system and information management method
In the present invention, a control section of a CRM server performs editing processing for TPO (the time, the place, and the occasion) requirements. Next, a...
US-1,001,3570 Data management for a mass storage device
Disclosed aspects relate to data management for a mass storage device. The mass storage device may be structured to include an encrypted file system to store a...
US-1,001,3569 Privacy-preserving data collection, publication, and analysis
A data collection procedure is described, which can be performed automatically for each subject of a study as the participant produces the data being collected....
US-1,001,3568 Identifying and blocking prohibited content items in a content management system
To identify whether a content item is prohibited, a content management system can generate a content item fingerprint for the content item and then compare the...
US-1,001,3567 Private and public sharing of electronic assets
The embodiments set forth techniques for implementing a cloud service that enables cloud data to be shared between different users in a secure manner. One...
US-1,001,3566 System and method for managing collaboration in a networked secure exchange environment
In embodiments of the present invention improved capabilities are described for securely viewing computer data content, such as documents, presentations,...
US-1,001,3565 System and method for secure transport of data from an operating system to a pre-operating system environment
An information handling system includes a trusted platform module (TPM) and a storage device, the TPM provides boot authentication for the information handling...
US-1,001,3564 Methods, systems, and devices for handling image capture devices and captured images
Computationally implemented methods and systems include acquiring an encrypted image that is a captured image that has been encrypted through use of a...
US-1,001,3563 Systems and methods for binding a removable cryptoprocessor to an information handling system
In accordance with these and other embodiments of the present disclosure, an information handling system may include a processor and a basic input/output system...
US-1,001,3562 Information processing device, and information processing method
An information processing device includes an interrupt information output request part configured to detect an input of interrupt information, which is...
US-1,001,3561 Dynamic pre-boot storage encryption key
During a pre-boot cycle of a device an algorithm is obtain from a first portion of the hard drive. The algorithm is executed to obtain a key. The key is used to...
US-1,001,3560 Securely exchanging information during application startup
Provided is a method for securely exchanging information during application startup. A processor may send a request for a passphrase to one or more remote...
US-1,001,3559 Communication with a virtual trusted runtime BIOS
A secure communication channel is established between a virtual trusted runtime basic input output system (BIOS) and a virtual machine that includes a virtual...
US-1,001,3558 Method and computer readable medium for secure software installation mechanism
A method for securely updating at least one software application on a target system includes providing a removable computer readable medium containing an...
US-1,001,3557 System and method for disarming malicious code
The disclosed embodiments include a method for disarming malicious code in a computer system having a processor. The method comprises accessing, by the computer...
US-1,001,3555 System and method for detecting harmful files executable on a virtual stack machine based on parameters of the...
Disclosed are method and system for detecting harmful files executed by a virtual stack machine. An example method includes: analyzing a file executable on the...
US-1,001,3554 Time varying address space layout randomization
Embodiments include computing devices, apparatus, and methods implemented by the apparatus for time varying address space layout randomization. The apparatus...
US-1,001,3553 Protecting software application
There is provided a method of protecting the execution of a software application, the method performed by a plurality of processes comprising a process for...
US-1,001,3552 Protecting content on a mobile device from mining
Systems and methods prevent or restrict the mining of content on a mobile device. For example, a method may include identifying a mining-restriction mark in low...
US-1,001,3551 Isolated memory space
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for determining where to store a version of an object in an...
US-1,001,3550 Systems and methods for adding microservices into existing system environments
Systems and methods are disclosed that relate to network security within a virtual network, and how to add microservices in a scalable virtual network. For...
US-1,001,3549 OCR-based single sign-on
A method and technique for OCR-based single sign-on in a computing environment includes automatically causing a display of a dialog screen of an application in...
US-1,001,3548 System and method for integrating two-factor authentication in a device
A system and method for providing secondary-factor authentication with a third party application that can include enrolling a device application instance of an...
US-1,001,3547 System and method for motion gesture access to an application and limited resources of an information handling...
An information handling system includes a processor that determines a first orientation from orientation sensors and a sensor hub for detecting a motion...
US-1,001,3546 Pattern-based mobile device unlocking
A computer-implemented method of authenticating a user with a computing device is disclosed. The method involves displaying a grid of selectable ...
US-1,001,3545 Systems and methods for creating a user credential and authentication using the created user credential
Systems, methods and devices for creating a user credential are provided. A device for creating a user credential for user authentication includes one or more...
US-1,001,3544 Efficient logon
Methods and systems for efficiently logging in or onto a computer system or other restricted system are described. An enterprise device may detect that a user...
US-1,001,3543 System and device binding metadata with hardware intrinsic properties
A system, device, and method for binding metadata, such as information derived from the output of a biometric sensor, to hardware intrinsic properties by...
US-1,001,3542 Biometric interface system and method
A system includes a wearable device having at least one sensor configured to determine a user's fingerprint data, at least one data storage device containing...
US-1,001,3541 System and method for real world biometric analytics through the use of a multimodal biometric analytic wallet
A system and method for real world biometric analytics through the use of a multimodal analytic wallet. The system includes a biometric wallet comprising a...
US-1,001,3540 Authentication based on body movement
In one aspect, a device includes a processor and memory accessible to the processor. The memory bears instructions executable by the processor to receive input...
US-1,001,3539 Rapid device identification among multiple users
Techniques of performing authentication involve comparing current user authentication factors with previous authentication factors selected from multiple users...
US-1,001,3538 Matching accounts identified in two different sources of account data
Among other things, first and second sets of authentication credentials are used to access respectively data about a first set of one or more accounts from a...
US-1,001,3537 Varying the amount of time that a mobile device must be inactive before the mobile device re-locks access to a...
A technique controls access to a computerized resource of a mobile device (e.g., a smart phone, a tablet, a laptop computer, etc.). The technique involves...
US-1,001,3536 License activation and management
A software license management system may include an activation server that provides permission to activate a software product. The activation server may receive...
US-1,001,3535 Software configuration of module dependent on history
A program controller is arranged to automatically authorize or configure or upgrade a program for a customer replaceable card of a system, the controller being...
US-1,001,3534 Pill dispensing system for monitoring compliant receipt of pills by a patient
A pill dispensing system for monitoring compliant receipt of pills by a patient, comprising a base unit having an area adapted to receive a pill container, the...
US-1,001,3533 Parallel processing coronary circulation simulation method and simulator apparatus using newton-raphson analysis
A geometric model of an organ represents its shape as a collection of elements formed from nodes and connections among them. A first vessel network model...
US-1,001,3532 Terminal, system, display method, and recording medium storing a display program
A communication terminal for communicating with a counterpart communication terminal includes a receiver that receives image data including an eye image of a...
US-1,001,3531 Context based augmented reality
Context based AR may include receiving a first wireless signal from a pair of context based AR glasses worn by a user. The context based AR glasses may include...
US-1,001,3530 Pet insurance system and method
This disclosure relates to a system and method implemented to facilitate real-time medical coverage for veterinary hospitals. More specifically, the disclosure...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.