Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,010,2390 Memory authentication with redundant encryption
Contents of a memory may be authenticated using redundant encryption. In some examples, data to be stored by a memory is encrypted with two unique encryption...
US-1,010,2389 Access permissions management system and method
An access permissions management system including a hierarchical access permissions repository including access permissions relating to data elements arranged...
US-1,010,2388 Collection folder for collecting file submissions in response to a public file request
A content management system for collecting files from one or more submitters in a collection folder. A collector, who generates the collection folder, can...
US-1,010,2387 Systems and methods for identifying illegitimate accounts based on clustering
Systems, methods, and non-transitory computer-readable media can acquire a plurality of accounts associated with a set of features. Each account in the...
US-1,010,2386 Decrypting content protected with initialization vector manipulation
Disclosed are various embodiments for generating encrypted media content items as well as decrypting encrypted media content items. A content type is embedded...
US-1,010,2385 Steganographic image on portable device
A method for concealing sensitive information on a portable device via a steganographic image is disclosed. The portable device can be in the form of a card...
US-1,010,2384 Digital content execution control mechanism
The present disclosure provides a method and system for generating digital content for a computing device which will function on the computing device only after...
US-1,010,2383 Permanently erasing mechanism for encryption information
A system for protecting data includes a virtual zeroisation device which receives data to be encrypted and key material for encrypting the data. The key...
US-1,010,2382 Intrinsic use control for system and use controlled component security
An Initialization Unit (IU) initiates an initial secure connection with an Intrinsic Use Control (IUC) Chip based on very large random numbers (VLRNs). The IUC...
US-1,010,2381 Testing device for removing customer personal information from an electronic device
A testing device, system, and method for removing customer personal information (CPI). The testing device includes a user interface for communicating...
US-1,010,2380 Method and apparatus to provide secure application execution
A technique to enable secure application and data integrity within a computer system. In one embodiment, one or more secure enclaves are established in which an...
US-1,010,2379 Real-time evaluation of impact- and state-of-compromise due to vulnerabilities described in enterprise threat...
Published enterprise threat detection (ETD) security notes are accessed in a computer data store. Applicability of the published ETD security notes are...
US-1,010,2378 Boot images for units under test
Example implementations relate to boot images for units under test. In an example implementation, responsive to a unit under test (UUT) being booted to a...
US-1,010,2377 Protection of secured boot secrets for operating system reboot
Protecting secured boot secrets while starting an operating system. Embodiments include identifying that a second operating system is to be started to replace a...
US-1,010,2376 Implementing locale management on PaaS: locale replacement risk analysis
A method and apparatus are provided for implementing system locale management including locale replacement risk analysis in a computer system. A Locale Update...
US-1,010,2375 Multi-modal memory hierarchical management for mitigating side-channel attacks in the cloud
Techniques for preventing side-channel attacks on a cache are provided. A method according to these techniques includes executing a software instruction...
US-1,010,2374 Method of remediating a program and system thereof by undoing operations
There is provided a system and a computerized method of remediating a given program running in an operating system, the method comprising: querying a stateful...
US-1,010,2373 Method and apparatus for capturing operation in a container-based virtualization system
The present application discloses a method and apparatus for capturing an operation, and security control in a container-based virtualization system. A specific...
US-1,010,2372 Behavior profiling for malware detection
Provided herein are systems and methods for behavior profiling of targets to determine malware presence. The method includes, in various embodiments, applying a...
US-1,010,2371 Computer device and method for isolating untrusted content on a clipboard
A computer device and respective method provides a primary clipboard accessible from a primary user account, while a sandbox is used to isolate and contain a...
US-1,010,2370 Techniques to enable scalable cryptographically protected memory using on-chip memory
Techniques to enable scalable cryptographically protected memory using on-chip memory are described. In one embodiment, an apparatus may comprise a processor...
US-1,010,2369 Checkout system executable code monitoring, and user account compromise determination system
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a checkout system executable code monitoring, and user...
US-1,010,2368 Information flow tracking using incremental profiling
Various embodiments may include methods, devices, and non-transitory processor-readable media for performing information flow tracking during execution of a...
US-1,010,2367 Systems and methods for detecting and addressing HTML-modifying malware
Among other things, embodiments of the present disclosure help provide entities with the ability to remotely detect behavior associated with malware and...
US-1,010,2366 Fraud resistant passcode entry system
A method for user passcode authentication. The method includes accessing a user information database with predefined user input option parameters and generating...
US-1,010,2365 User authentication using temporal knowledge of dynamic images
An approach is described for authenticating a user. An associated method includes displaying a dynamic image on a display screen, detecting a user interaction...
US-1,010,2364 Verification of both identification and presence over a network
A method and system for verifying both identification and presence of a related user is provided. The system includes an identification tag containing data...
US-1,010,2363 System and method for user enrollment in a secure biometric verification system
A computer-implemented method and system for verifying the identity of a user in an identity authentication and biometric verification system which includes...
US-1,010,2362 Method and system of silent biometric security privacy protection for smart devices
An efficient, secured and robust system and method for information security and privacy protection of smart devices, by silent biometric authentication...
US-1,010,2361 Method and apparatus for implementing touch key and fingerprint identification, and terminal device
An apparatus for implementing touch key and fingerprint identification includes a fingerprint identification sensor arranged below a cover glass of a terminal...
US-1,010,2360 User authentication based on time variant fingerprint sequences
An electronic device includes a fingerprint detector sensor, a processor, and a memory coupled to the processor. The memory stores computer readable program...
US-1,010,2359 Device access using voice authentication
A device can be configured to receive speech input from a user. The speech input can include a command for accessing a restricted feature of the device. The...
US-1,010,2358 Face-controlled liveness verification
Techniques for implementing face-controlled liveness verification are provided. In one embodiment, a computing device can present, to a user, a sequential...
US-1,010,2357 Biometric identification and identity data protection method
The invention relates to a method for identifying a person to be identified having a certified data medium linking a primary identifier and a primary biometric...
US-1,010,2356 Securing storage control path against unauthorized access
Techniques are described providing secure authentication of control commands executed on a data storage system. A pass code may be generated in accordance with...
US-1,010,2355 Optimized enforcement of fine grained access control on data
Techniques for efficient cursor sharing to enforce fine-grained access control are provided. In one technique, the authorization context of a database statement...
US-1,010,2354 Integrated application feature store
An application feature store may be integrated with an application. The feature store may be accessed by a user through a feature storefront hosted within the...
US-1,010,2353 Digital resource protection method and apparatus, and digital resource using method and apparatus
A digital resource protection apparatus, includes: a configuring module to configure N encryption index values for a digital resource to be encrypted, wherein N...
US-1,010,2352 Content usage monitor
A trusted content usage monitor for monitoring content usage is provided. A unique identifier generation unit generates a unique identifier indicative of...
US-1,010,2351 Decoupling rights in a digital content unit from download
Systems and methods for enabling a user to obtain rights in a legitimate copy of a digital content unit without downloading the copy from a digital content...
US-1,010,2350 System and method for protecting data stored in the control registers of an integrated circuit
The present invention provides a system and method for protecting data stored in the control registers of an integrated circuit, such as a television chip. The...
US-1,010,2349 Molecular orbital similarity deviation evaluation method, and system using same
The present invention relates to a molecular orbital similarity deviation evaluation method comprising: a) a step for selecting two subject molecular orbitals,...
US-1,010,2348 Image based medical reference systems and processes
An image-based diagnostic system may include graphical user interfaces that include image icons. Users may select image icon(s) and/or other icon(s) related to...
US-1,010,2347 Patient specific anatiomical sketches for medical reports
The invention relates to a system for producing a representation of an object in image data, based on a template coupled to a model of the object, the system...
US-1,010,2346 Playing method for screen baseball system
A playing method for a screen baseball system includes (a) registering a personal rank, (b) transmitting pitching information section, (c) displaying a pitching...
US-1,010,2345 Personal wellness management platform
A personal wellness system may facilitate personal wellness management via personal wellness devices. The personal wellness devices may be portable, handheld...
US-1,010,2344 System and methods for analyzing blood glucose data and quantifying the success or failure of insulin therapy
A system and technique are enclosed for determining the effectiveness of a blood glucose therapy treatment. Examples of this technique include analyzing...
US-1,010,2343 Method for extracting heart information based on micro movements of human body
A method of extracting heart information from a body micro-movement is provided. The method includes a face tracking step, a frame difference averaging step,...
US-1,010,2342 Method and apparatus for tracking of food intake and other behaviors and providing relevant feedback
A sensing device monitors and tracks food intake events and details. A processor, appropriately programmed, controls aspects of the sensing device to capture...
US-1,010,2341 Method for managing patient quality of life
A method and system for modeling behavior and pain-related state of an individual, the method comprising: receiving a log of use dataset associated with...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.