Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,016,9620 Method of interacting with an electronic device while the display screen is deactivated
A method of interacting with an electronic device while the display screen is deactivated and the electronic device is possibly locked is described. In one...
US-1,016,9619 Physical token based secured charge management of a user equipment
Embodiments for physical token based secured charge management of a user equipment (UE) by a processor. A power charging session is authorized by firmware of...
US-1,016,9618 Encryption method for execute-in-place memories
Encryption/decryption techniques for external memory are described herein. In an example embodiment, a device comprises an internal memory and an external...
US-1,016,9617 Multi-topology logic gates
An RMTL gate includes at least two logic blocks, where at least one of the logic blocks operates in multiple modes. The respective logic block mode(s) are...
US-1,016,9616 Cryptographic processing of data and instructions stored off-chip
A disclosed circuit arrangement includes an interconnect circuit, a processor, a first memory circuit, a proxy memory circuit, and a decryption circuit. The...
US-1,016,9615 Methods and apparatuses for encryption and decryption
An encryption method includes: obtaining a user feature of a user; performing, using a hardware logic circuit, a logical operation on the obtained user feature...
US-1,016,9614 Container update system
A computer implemented method comprising operating a software container, the software container including a blockchain subsystem and a blockchain ledger,...
US-1,016,9613 Systems and methods for waveform watermarking
Generally discussed herein are systems, devices, and methods for waveform watermarking. A device can include an overt symbol modulator to receive mapped overt...
US-1,016,9612 Method for executing a safety-critical function of a computing unit in a cyber-physical system
A method for executing a safety-critical function of a computing unit in a cyber-physical system, a request being received for the execution of the...
US-1,016,9611 Dynamic application hiding
In an approach to enhancing the security features of user interfaces of computing devices, a computing device repeatedly detects environmental cues in its...
US-1,016,9610 Data privacy employing a k-anonymity model with probabalistic match self-scoring
According to one embodiment of the present invention, a system for protecting data determines a desired duplication rate based on a level of desired anonymity...
US-1,016,9609 Data processing systems for fulfilling data subject access requests and related methods
Responding to a data subject access request includes receiving the request and validating an identity of the requestor. In response to validating the identity...
US-1,016,9608 Dynamic management of data with context-based processing
Techniques for using contextual information to manage data that is subject to one or more data-handling requirements are described herein. In many instances,...
US-1,016,9607 Individual centric personal data management process and method
An individual centric personal data management process consisting of utilizing at least one computing device for performing the function of facilitating...
US-1,016,9606 Verifiable data destruction in a database
A computing device may determine that a policy event to initiate data destruction for a first set of data has been triggered. The first set of data may be...
US-1,016,9605 Implementing block device extent granularity authorization model processing in CAPI adapters
A method, system and computer program product are provided for implementing block extent granularity authorization model processing in Coherent Accelerator...
US-1,016,9604 Method and system to prevent ultrasound data leaks in mobile devices
A system, method and program product for implementing an ultrasound security system for a mobile device. A system is described that that integrates with an...
US-1,016,9603 Real-time data leakage prevention and reporting
Aspects include detecting that an extract transform load (ETL) job in an ETL system has been submitted for execution. The ETL job can include an input data...
US-1,016,9602 Method for local key management setup and recovery
A method and system for local key management setup and recovery includes receiving a lock request to secure one or more drives, then querying, for one or more...
US-1,016,9601 System and method for reading and writing to big data storage formats
A system may receive a request for access to a first variable. The request may include a requested action and a variable identifier for the first variable. The...
US-1,016,9600 Encryption policies for various nodes of a file
A computing device may parse a file into a plurality of nodes. The computing device may associate, based on the parsing, at least a first encryption policy with...
US-1,016,9599 Data access control with flexible data disclosure
A method for presenting data, the method including presenting via a first computer output device an indicator indicating a data item whose value is prevented,...
US-1,016,9598 Systems and methods for sending and receiving encrypted submessages
Systems and methods are provided for sending and receiving encrypted submessages. Messages could be partitioned into a plurality of submessages based on the...
US-1,016,9597 System and method of applying adaptive privacy control layers to encoded media file types
Disclosed are systems to apply customized permission settings to protect particular regions of a document, and, in particular, documents that are of a `lossy`...
US-1,016,9596 Information processing apparatus, method, and storage medium
An information processing apparatus carries out license return at the same time as carrying out license activation and returns only a license that can bring...
US-1,016,9595 Detecting malicious data access in a distributed environment
Systems, methods, and computer program products to perform an operation comprising identifying a first access to a first subset of a first database table on a...
US-1,016,9594 Network security for data storage systems
In one embodiment of the present invention, a server is created, and a computer readable storage media is included in the server. An adapter is connected to the...
US-1,016,9593 Security systems GUI application framework
A method, system and computer-usable medium are disclosed for injecting functionality into a security intelligence platform, comprising: providing the security...
US-1,016,9592 Security systems GUI application framework
A method, system and computer-usable medium are disclosed for injecting functionality into a security intelligence platform, comprising: providing the security...
US-1,016,9591 Chained security systems
A tiered credentialing approach provides assurance to customers having virtual machines running in a remote environment that the virtual images for these...
US-1,016,9590 Apparatus and method for displaying computer health index
The disclosure discloses an apparatus for displaying a computer health index comprising: a memory having instructions stored thereon; a processor to execute the...
US-1,016,9589 Securely booting a computer from a user trusted device
A method for allowing a computer to boot from a user trusted device is provided. The computer includes a long-term data storage device storing operating system...
US-1,016,9588 Controlled starting of an electronic circuit
A method of checking the authenticity of the content of a non-volatile memory of an electronic device including a microcontroller and an embedded secure element...
US-1,016,9587 Hosted device provisioning protocol with servers and a networked initiator
A network can operate a WiFi access point with credentials. An unconfigured device can (i) support a Device Provisioning Protocol (DPP), (ii) record responder...
US-1,016,9586 Ransomware detection and damage mitigation
Systems and methods for file encrypting malware detection are provided. According to one embodiment, a monitoring module is installed within active processes...
US-1,016,9585 System and methods for advanced malware detection through placement of transition events
A non-transitory storage medium including instructions that are executable by one or more processors to perform operations including instrumenting a VM is...
US-1,016,9584 Systems and methods for identifying non-malicious files on computing devices within organizations
The disclosed computer-implemented method for identifying non-malicious files on computing devices within organizations may include (1) identifying a file on at...
US-1,016,9583 Malware dropper discovery method and system
A process for finding potentially harmful malware dropper on an infected computer system includes the steps of a) identifying an executable file that is about...
US-1,016,9582 System, method, and computer program product for identifying a file used to automatically launch content as...
A system, method, and computer program product are provided for identifying a file utilized to automatically launch content as unwanted. In one embodiment, a...
US-1,016,9581 Detecting malicious code in sections of computer files
A training data set for training a machine learning module is prepared by dividing normal files and malicious files into sections. Each section of a normal file...
US-1,016,9580 Identifying whether an application is malicious
Identifying whether a first application is malicious. The first application can be presented for installation on a processing system. The first application can...
US-1,016,9579 Malicious PDF detection
Detecting malicious PDF documents is disclosed. A PDF document is received. The PDF is classified using a classifier. The classifier is trained at least in part...
US-1,016,9578 Migration service method and module for software modules
A migration service and module for software modules are disclosed. The migration service detects a security flaw in a first environment in which the software...
US-1,016,9577 Systems and methods for detecting modification attacks on shared physical memory
The disclosed computer-implemented method for detecting modification attacks on shared physical memory may include (i) identifying a page frame of physical...
US-1,016,9576 Malware collusion detection
Embodiments of the invention provide for malware collusion detection in a mobile computing device. In one embodiment, a method for malicious inter-application...
US-1,016,9575 Systems and methods for preventing internal network attacks
A computer-implemented method for preventing internal network attacks may include 1) identifying a host system that is within a subnet of a network, 2)...
US-1,016,9574 Using trusted execution environments for security of code and data
An embodiment includes a processor coupled to memory to perform operations comprising: creating a first trusted execution environment (TXE), in protected...
US-1,016,9573 Maintaining secure data isolated from non-secure access when switching between domains
A data processing apparatus including circuitry for performing data processing, a plurality of registers; and a data store including regions having different...
US-1,016,9572 Starting an application on a mobile device
The invention relates to management of programs on a mobile device, and in particular, to a method for activating application programs on a mobile device, and a...
US-1,016,9571 System and method for secure, policy-based access control for mobile computing devices
Systems and methods for secure, policy-based, access control and management of mobile computing devices, including policy decision enforcement mechanisms,...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.