Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,008,9473 Software nomenclature system for security vulnerability management
Systems and methods for securing a computer system are described herein. The systems and methods, which are computer-implemented, involve receiving, by a...
US-1,008,9472 Event data structure to store event data
An event data structure is stored in a non-volatile memory that is electrically isolated from a bus accessible by a processor. In response to an event relating...
US-1,008,9471 System and methods for secure firmware validation
An electronic device, such as a dynamic transaction card having an EMV chip, that acts as a TPM having a memory, an applet, and a cryptographic coprocessor...
US-1,008,9470 Event-based apparatus and method for securing BIOS in a trusted computing system during execution
An apparatus is provided for protecting a basic input/output system (BIOS) in a computing system. The apparatus includes a BIOS read only memory (ROM), an event...
US-1,008,9469 Systems and methods for whitelisting file clusters in connection with trusted software packages
The disclosed computer-implemented method for whitelisting file clusters in connection with trusted software packages may include (1) identifying a trusted file...
US-1,008,9468 Detecting keylogging
A device may detect or emulate a sequence of keystrokes to be used to detect a keystroke logger application. The device may determine a sequence of characters...
US-1,008,9467 Static anomaly-based detection of malware files
A protection application detects and remediates malicious files on a client. The protection application trains models using known samples of static clean files,...
US-1,008,9466 Real-time network updates for malicious content
A global response network collects, analyzes, and distributes "cross-vector" threat-related information between security systems to allow for an intelligent,...
US-1,008,9465 Systems and methods for tracking malicious behavior across multiple software entities
Described systems and methods allow protecting a computer system from malicious software. In some embodiments, a security application divides a set of monitored...
US-1,008,9464 De-obfuscating scripted language for network intrusion detection using a regular expression signature
A device receives data, identifies a context associated with the data, and identifies a script, within the data, associated with the context. The device parses...
US-1,008,9463 Managing security of source code
A method is used in managing security of source code. Source code characteristics are derived from a source code change. Based on the source code...
US-1,008,9462 System and method for providing network security to mobile devices
A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected...
US-1,008,9461 Page replacement code injection
Techniques for malicious content detection using code injection are described herein. In one embodiment a first code section of a target program is loaded into...
US-1,008,9460 Behavior-based malicious code detecting apparatus and method using multiple feature vectors
A behavior-based malicious code detecting apparatus and method using multiple feature vectors is disclosed. A malicious code learning method may include...
US-1,008,9459 Malware detection and prevention by monitoring and modifying a hardware pipeline
The various aspects provide a method for recognizing and preventing malicious behavior on a mobile computing device before it occurs by monitoring and modifying...
US-1,008,9458 Separate, disposable execution environment for accessing unverified content
Methods and systems are disclosed for opening unverified content in a separate, disposable virtualized environment using a temporary virtual machine (VM). In...
US-1,008,9457 Unlocking device to access uncertified networks
An application program is implemented by an electrical device for executing a wireless network certification process, which includes the following steps:...
US-1,008,9456 Sensor derived authentication for establishing peer-to-peer networks
Methods, systems and devices for generating an authentication key are provided. Two or more communications devices can generate an authentication key by...
US-1,008,9455 Electronic device and method for controlling locking of electronic device
An electronic device and method for controlling locking of an electronic device are disclosed. An electronic device includes a short-range communication unit...
US-1,008,9454 Enhanced accuracy of user presence status determination
Technologies are described herein for enhancing a user presence status determination. Visual data may be received from a depth camera configured to be arranged...
US-1,008,9453 Blue light adjustment for biometric identification
Systems and methods for blue light adjustment with a wearable display system are provided. Embodiments of the systems and methods for blue light adjustment can...
US-1,008,9452 Three-dimensional fingerprint scanner
A fingerprint scanner includes a fingerprint scanner plate, a rotating platform aligned below the fingerprint scanner plate, a light mounted on the rotating...
US-1,008,9451 Electrocardiogram (ECG)-based authentication apparatus and method thereof, and training apparatus and method...
Provided are electrocardiogram (ECG)-based authentication and training. An authentication method includes generating a feature vector of an ECG obtained from an...
US-1,008,9450 User authentication method, authentication apparatus, and terminal
A user authentication method and a terminal. The method includes determining first-type authentication information and second-type authentication information...
US-1,008,9449 System, method, and device for controlled access to a network
A device for controlling network access comprising a first transceiver configured in as open access point device, a second transceiver configured in client mode...
US-1,008,9448 System and method for program security protection
Systems and methods are provided for program security protection. An exemplary method for program security protection may comprise obtaining data packets...
US-1,008,9447 Instructions and logic to fork processes of secure enclaves and establish child enclaves in a secure enclave...
Instructions and logic fork processes and establish child enclaves in a secure enclave page cache (EPC). Instructions specify addresses for secure storage...
US-1,008,9446 Method and device for providing offset model based calibration for analyte sensor
Methods and devices to detect analyte in body fluid are provided. Embodiments include processing sampled data from analyte sensor, determining a single, fixed,...
US-1,008,9445 Connected sensor substrate for blister packs
A blister pack for dispensing medication comprises a substantially flat backing, blisters formed on the backing, breakable resistive traces, conductive traces,...
US-1,008,9444 Image acquisition for medical dose preparation system
Use of improved image acquisition for a medical dose preparation system. The medical dose preparation system may include a work station for capturing medical...
US-1,008,9443 Home medical device systems and methods for therapy prescription and tracking, servicing and inventory
A home medical device system includes a plurality of home therapy machines that perform a home therapy on a patient; a connectivity server; a system hub coupled...
US-1,008,9442 Executable guideline solution with multiple alternative views on recommended care steps
A system (10) for presenting guideline recommendations to care givers includes at least one display device (54, 56), each displaying a user interface. The...
US-1,008,9441 System-wide probabilistic alerting and activation
Systems, methods, and computer program products that enable system-wide probabilistic forecasting, alerting, optimizing and activating resources in the delivery...
US-1,008,9440 Personal health data hub
In various embodiments, a personal health data hub ("PHDH") may include a device that receives health data from personal health devices ("PHDs"), stores the...
US-1,008,9439 Medical device with cryptosystem and method of implementing the same
A medical device and a method of implementing a cryptosystem on the medical device include storing a data structure on a memory component of the medical device....
US-1,008,9438 Integrated system and method for the acquisition, processing and production of health care records and services
The highly secure method and system acquires, processes and produces health care (HC) data and service records from multiple local devices, notwithstanding...
US-1,008,9437 Methods for genome assembly and haplotype phasing
The disclosure provides methods to assemble genomes of eukaryotic or prokaryotic organisms. The disclosure further provides methods for haplotype phasing and...
US-1,008,9436 Method and apparatus for calling single-nucleotide variations and other variations
Base calls for a target sequence may be identified relative to a reference sequence by using values from sequencing reads at locations satisfying a...
US-1,008,9435 Device and method of correlating rodent vocalizations with rodent behavior
The field of this invention is classifying animal behaviors. In particular the fields of this invention include using animals in vivariums, such as rodents,...
US-1,008,9434 Method and system for forming site network
A method for creating a laboratory automation system is disclosed. The method includes obtaining a plurality of subgraphs that correspond to a plurality of...
US-1,008,9433 Method for triple-patterning friendly placement
The present disclosure is directed to a method for triple-patterning friendly placement. The method can include creating cell attributes identifying potential...
US-1,008,9432 Rule-check waiver
When a designer designates one or more errors identified in layout design data as false errors, waiver geometric elements corresponding to the designated false...
US-1,008,9431 Tool for modular circuitboard design
A system for dynamic circuit board design, preferably including a library of modular circuits and a merge tool. A method for merging modular circuitry into a...
US-1,008,9430 Integrated circuits and methods of design and manufacture thereof
Integrated circuits and methods of manufacture and design thereof are disclosed. For example, a method of manufacturing includes using a first mask to pattern a...
US-1,008,9429 Method and system for verifying printed circuit board designs, and creating or verifying related electronic...
A system for printed circuit board assembly includes a user interface provided on a display device for visual verification of printed circuit board design data,...
US-1,008,9428 Intelligent cell swapping based on ceiling determination, floor determination, and cell attribute weighting...
Embodiments of the inventive concept include a computer-implemented method for intelligently swapping circuit cells and an associated intelligent cell swapper...
US-1,008,9427 Method and apparatus for word-level netlist preprocessing and analysis using same
A computer implemented representation of a circuit design is reduced by representing the circuit design as a data structure defining a netlist. A first set of...
US-1,008,9426 Logic circuit generation device and method
A specific information processing function, which assumes circuit implementation, is described in a programming language, and from this description, an RTL...
US-1,008,9425 Resource mapping in a hardware emulation environment
A system and method is disclosed in an emulation environment that dynamically remaps user designs. In one embodiment, a request is received to load an...
US-1,008,9424 Systems and methods for two-dimensional domain decomposition during parallel reservoir simulation
Systems and methods for 2D domain decomposition during parallel reservoir simulation to balance the active cells in a reservoir model.
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.