Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,005,5592 Systems and methods to generate a type based self-assembling indirect control flow graph
Using various embodiments, methods and systems for computing a self-assembling indirect control flow graph based on one or more function types and function...
US-1,005,5591 Secure protocol attack mitigation
A handshake for establishing a secure connection between a client computer system and a service includes a CAPTCHA element. When the client computer system...
US-1,005,5590 Rule matching in the presence of languages with no types or as an adjunct to current analyses for security...
A method includes reading by a computing system a rule file including one or more rules having specified paths to methods, each method corresponding to one of a...
US-1,005,5589 Systems and methods for validating auxiliary power unit or components by secure pin one time password
Systems and methods are provided for validating a vehicle component. The system includes a vehicle electronic control unit (ECU) in electronic communication...
US-1,005,5588 Event-based apparatus and method for securing BIOS in a trusted computing system during execution
An apparatus is provided for protecting a basic input/output system (BIOS) in a computing system. The apparatus includes a BIOS read only memory (ROM), an event...
US-1,005,5587 Implementations to facilitate hardware trust and security
Disclosed are devices, systems, apparatus, methods, products, media and other implementations, including a method that includes triggering a beacon circuit...
US-1,005,5586 Systems and methods for determining the trustworthiness of files within organizations
The disclosed computer-implemented method for determining the trustworthiness of files within organizations may include (1) identifying a file on a computing...
US-1,005,5585 Hardware and software execution profiling
Technologies for assembling an execution profile of an event are disclosed. The technologies may include monitoring the event for a branch instruction,...
US-1,005,5584 Method and device for obtaining virus signatures
A method and a device for obtaining virus signatures in the field of computer security have been disclosed. The method includes: obtaining text strings...
US-1,005,5583 Method and apparatus for processing file
The embodiments of the present invention provide a method and apparatus for processing a file. By means of acquiring a target file to be scanned and then using...
US-1,005,5582 Automated detection and remediation of ransomware attacks involving a storage device of a computer network
An apparatus in one embodiment comprises a security appliance having a processor coupled to a memory. The security appliance is associated with at least one...
US-1,005,5581 Locating a wireless communication attack
A technique for locating a wireless communication attack includes monitoring of Bluetooth.RTM. communications activity by a Bluetooth.RTM. capable communication...
US-1,005,5580 Technologies for multi-factor security analysis and runtime control
Technologies for client-level web application runtime control and multi-factor security analysis by a computing device include receiving application code...
US-1,005,5579 System resources for sandboxing
A method, computer program product, and apparatus for implementing a distributed sandbox is disclosed. The method comprises discovering a machine with...
US-1,005,5578 Secure software containers
A computer system that comprises a processor, a non-transitory memory, and a system application stored in the non-transitory memory. When executed by the...
US-1,005,5577 Technologies for mutual application isolation with processor-enforced secure enclaves
Technologies for mutual application isolation include a computing device having a processor with secure enclave support. The computing device loads an...
US-1,005,5576 Detection of malicious software packages
Systems and methods for a security tool that verifies the security of a software package. An example method may involve identifying a plurality of components...
US-1,005,5575 Smart random password generation
A method for generating a password for accessing a password-protected service is disclosed. A password requirements database and default password generation...
US-1,005,5574 Implementing extent granularity authorization processing in CAPI adapters
A method, system and computer program product are provided for implementing block extent granularity authorization processing for a Coherent Accelerator...
US-1,005,5573 Implementing extent granularity authorization and deauthorization processing in CAPI adapters
A method, system and computer program product are provided for implementing block extent granularity authorization and deauthorization processing for a Coherent...
US-1,005,5572 Systems and methods for preventing windows kernel code or drivers from being executed
Systems and methods for preventing drivers from being loaded in Windows.RTM. OS kernel space. A security driver according to aspects of the invention is loaded...
US-1,005,5571 Limiting user operations
An information processing device having a lock function for restricting user operations and a mechanism executed by this information processing device are...
US-1,005,5570 Mesh relay
A communication device capable of communicating over a network on behalf of a consumer device, the network being configured such transport of packets through...
US-1,005,5569 Location specific image based authentication
Embodiments are described for logging in to a location-specific user account on a host system. An example method includes sending, by a user device, as part of...
US-1,005,5568 Encryption authorization dongle having volatile memory
Embodiments of the present invention disclose a method, computer program product, and device for accessing encrypted data. A communication link may be...
US-1,005,5567 Proximity unlock and lock operations for electronic devices
The described embodiments perform a proximity unlock operation. For the proximity unlock operation, a first electronic device in a locked operating state...
US-1,005,5566 Using biometric user-specific attributes
Techniques are provided for determining two or more user-specific parameters that can be measured or obtained using various methods, and using values of the two...
US-1,005,5565 Sleep data chain of custody
A wearable device includes one or more biometric sensors, each of the one or more biometric sensors gathering biological data from a wearer of the wearable...
US-1,005,5564 Biometric authentication, and near-eye wearable device
Biometric authentication can comprise: obtaining, in response to an access request, verification information for biometric authentication and at least one piece...
US-1,005,5563 Air writing and gesture system with interactive wearable device
A wearable device interactive system and techniques, methods and apparatuses thereof are described. A wearable device may sense a movement by a user wearing the...
US-1,005,5562 Techniques for identifying a change in users
Various embodiments are generally directed to an apparatus, method and other techniques for detecting an input comprising an object contacting a surface of an...
US-1,005,5561 Identity risk score generation and implementation
Embodiments are directed to providing an identity risk score as part of an authentication assertion, applying operating heuristics to determine an operating...
US-1,005,5560 Device, method, and system of detecting multiple users accessing the same account
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a possible attacker. The...
US-1,005,5559 Security device, methods, and systems for continuous authentication
Methods, systems, and computer programs are presented for securing a computing device. One security device includes a processor, memory and a connector. The...
US-1,005,5558 Telecommunication method for authenticating a user
The disclosure relates to a telecommunication method for authenticating a user with respect to a computer system, the computer system comprising an ...
US-1,005,5557 User device and operating method thereof
An apparatus and security method are provided. The apparatus includes at least one communication interface and a controller. The controller is configured to...
US-1,005,5556 Technologies for authenticating a user of a computing device based on authentication context state
Technologies for authenticating a user of a computing device based on an authentication context state includes generating context state outputs indicative of...
US-1,005,5555 Image processing apparatus that performs user authentication, authentication method therefor, and storage medium
An image processing apparatus using an authentication technique that enables user authentication suited to application characteristics and user authorities,...
US-1,005,5554 Software-enabled remote licensing and provisioning
Described herein are systems and methods for providing software provisioning of functionality in a wireless communications device. Software-enabling...
US-1,005,5553 PC secure video path
A system and method are disclosed for creating a secure video content path, or a protected media content bus, within an unsecure personal computer. A portable...
US-1,005,5552 Pharmaceutical management system
A pharmaceutical management system including a housing having a closeable top cover. Within the housing, there is provided, in combination, a computer processor...
US-1,005,5551 Systems and methods for quantitative analysis of histopathology images using multiclassifier ensemble schemes
Described herein are systems and methods for performing multi-stage detection and classification of cancer regions from digitized images of biopsy slides. Novel...
US-1,005,5550 Remote management of therapy programming
The disclosure is directed to techniques for remote management of information relating to therapy delivered to a patient by an implantable medical device (IMD)....
US-1,005,5549 Method and apparatus for wireless health monitoring and emergent condition prediction
The present invention relates generally to an adherent sensor patch for wireless and remote physiological monitoring and evaluation of health and disease state...
US-1,005,5548 Single use AED
An automatic external defibrillator (AED) is described which is designed for use in a single cardiac emergency. If the AED is in standby for a year without...
US-1,005,5547 Intermediate check points in medical care lines for automatically identifying care deficiencies
A quality of medical care can be estimated based on factors such as a mortality rate or complications rate. However, by this point, poor care may have already...
US-1,005,5546 Healthcare analysis stream management
Apparatus, systems and methods for pre-processing, analyzing, and storing genomic data through a scalable, distributed analysis system across a network is...
US-1,005,5545 System and method for master data management
Some implementations may provide a computer-assisted method for master data management, the method including: receiving configuration information defining a...
US-1,005,5544 Patient care pathway shape analysis
A method includes accessing data related to a series of patient events, and determining whether the data accessed is related to a specific condition. Care...
US-1,005,5543 Control method and storage medium for searching medical images similar to a target image
A control method for an information terminal including a computer, the control method including controlling the computer to 1) detect whether information...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.