Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,028,9873 Generating hardware security logic
The present disclosure includes systems and techniques relating to information flow and hardware security for digital devices and microprocessor systems. In...
US-1,028,9872 Secure mechanism for finite provisioning of an integrated circuit
This application discloses an electronic system including active circuitry configured to be selectively enabled for authorized number of times. The electronic...
US-1,028,9871 Integrated circuit lifecycle security with redundant and overlapping crosschecks
An integrated circuit includes a security module with multiple stages arranged in a pipeline, with each stage executing a different operation for accessing...
US-1,028,9870 Data processing systems for fulfilling data subject access requests and related methods
Various Data Subject Access Request (DSAR) processing systems are adapted for presenting a first webform on a first website, the first webform being adapted to...
US-1,028,9869 Personal information anonymization method, recording medium, and information processing apparatus
A personal information anonymization method is disclosed. Each of a plurality of data including personal information is classified into any one of a plurality...
US-1,028,9868 Transmitting medical datasets
The present embodiments relate to a method for transmitting medical datasets. The method includes receiving a patient dataset from an internal data storage, the...
US-1,028,9867 Data processing systems for webform crawling to map processing activities and related methods
In particular embodiments, a Data Access Webform Crawling System is configured to: (1) identify a webform used to collect one or more pieces of personal data;...
US-1,028,9866 Data processing systems for fulfilling data subject access requests and related methods
A privacy management system that is adapted for, in the course of processing a particular data subject access request, automatically determining a type of the...
US-1,028,9865 Systems and methods for providing kinship-based accessibility to securely stored data
A computer-implemented method for providing kinship-based accessibility to securely stored data may include (1) identifying encrypted data that is encrypted...
US-1,028,9864 Security tool to prevent sensitive data leakage
Embodiments include method, systems and computer program products for a security tool to prevent data leakage. In some embodiments, it may be determine that a...
US-1,028,9863 Devices, methods, and systems for managing representations of entities through use of privacy beacons
Computationally implemented methods and systems include acquiring a block of encrypted data that corresponds to an image that has been encrypted through use of...
US-1,028,9862 Storage efficient and unconditionally secure private information retrieval
A method of storing and retrieving a set of original data (E1, . . . , En) in and from a plurality of remote servers (SP1, . . . , SPI+1), comprises a coding...
US-1,028,9861 Permission-based secure media content sharing
Embodiments of a system and method for sharing media content are generally described herein. A method may include receiving, from a first clearing device, a...
US-1,028,9860 Method and apparatus for access control of application program for secure storage area
The present invention relates to a method for, when using security software which allows documents to be utilized in PCs and terminals in companies or...
US-1,028,9859 System and method for secure multi-tenancy in datadomain operating system (DDOS), a purpose built backup...
A first request is received from a first user to access a first file system management objects (FSMOs) of a first tenant unit (TU), the first TU being one of a...
US-1,028,9858 Analyzing policies of in information management system
In an information management system, activity data is collected and analyzed for patterns. The information management system may be policy based. Activity data...
US-1,028,9857 Enforcement of same origin policy for sensitive data
Methods, systems, and apparatus relating to enforcement of same origin policy of sensitive data are described. In an embodiment, a security agent may help...
US-1,028,9856 Digital enveloping for digital right management and re-broadcasting
Multiple data sets are preprocessed by WF muxing before stored/transported. WF muxed data is aggregated data from multiple data sets. The original data is...
US-1,028,9855 Ad hoc target based photograph sharing
Methods, systems and computer program products for sharing of photographs based on targets depicted in the photographs are provided. Aspects include receiving...
US-1,028,9854 Apparatus, computer program, and method for generating an intermediate entitlement specification for...
An apparatus, computer program, and method are provided for generating an intermediate entitlement specification that specifies one or more access rights in...
US-1,028,9853 Secure driver platform
Techniques described herein enable the implementation of a secure driver framework. In one example, a method includes managing an unsecure operating system...
US-1,028,9852 Using biometric verification to grant access to redacted content
Some embodiments provide an electronic device with a novel content redaction engine. The content redaction engine of some embodiments determines whether to...
US-1,028,9851 Semiconductor device and access restriction method
The present invention prevents unauthorized functions from being installed to a predetermined storage unit in the background through a communication function...
US-1,028,9850 Accessing supervisor password via key press
For supervisor password access based on a key press of a hotkey, systems, apparatus, methods, and program products are disclosed. The apparatus may include a...
US-1,028,9849 Electronic system having integrity verification device
Provided are an electronic system, an integrity verification device, and a method of performing an integrity verification operation. The electronic system...
US-1,028,9848 Malicious software clustering method expressed based on TLSH feature
This invention public a kind of malicious software clustering method expressed based on TLSH feature, which belongs to the analysis and test area of malicious...
US-1,028,9846 Systems and methods for detecting and addressing remote access malware
Systems and methods to detect remote access malware activities, via: detecting, in a computing device, first input events in an operating system of the...
US-1,028,9845 Protecting backup files from malware
A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a...
US-1,028,9844 Protecting backup files from malware
A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a...
US-1,028,9843 Extraction and comparison of hybrid program binary features
Systems and methods for identifying similarities in program binaries, including extracting program binary features from one or more input program binaries to...
US-1,028,9842 Method and apparatus for protecting kernel control-flow integrity using static binary instrumentation
An apparatus and a method for protecting kernel control-flow integrity using static binary instrumentation are provided. The method includes configuring a...
US-1,028,9841 Graph-based attack chain discovery in enterprise security systems
Methods and systems for detecting anomalous events include detecting anomalous events in monitored system data. An event correlation graph is generated based on...
US-1,028,9840 Integrated circuit with tamper protection and method therefor
An integrated circuit includes a tamper sensor that has plurality of state circuits. Each of the plurality of state circuits has a respective output that...
US-1,028,9839 Systems and methods for preventing unauthorized access to computing devices implementing computer accessibility...
The disclosed computer-implemented method for preventing unauthorized access to computing devices implementing computer accessibility services may include (i)...
US-1,028,9838 Scoring for threat observables
Example embodiments disclosed herein relate to determining threat scores for threat observables. Information about multiple threat observables are received from...
US-1,028,9837 Log information generation apparatus and recording medium, and log information extraction apparatus and...
A log information generation apparatus includes: a process information generation unit which generates first identification information for temporally and...
US-1,028,9836 Webpage integrity monitoring
A method to monitor integrity of webpages. The method includes obtaining rendered code generated using source code of a webpage from a server that hosts the...
US-1,028,9835 Token seed protection for multi-factor authentication systems
New techniques are disclosed for protecting a token seed in a multifactor authentication system. A personal identification number is used to derive a fixed...
US-1,028,9834 Account authority management device and account authority management method for a component mounter related...
Names of registered groups are displayed in a group name list section, and setting contents of authority for each function of a component mounting related...
US-1,028,9833 Authenticating internet user identities in electronic transactions
A method and system for authenticating an Internet user identity by cross-referencing and comparing at least two independent sources of information. A first...
US-1,028,9832 System and method for securing embedded controller communications by verifying host system management mode...
An information handling system includes a processor operable to provide a branch trace message, and an embedded controller coupled to the processor via a...
US-1,028,9831 Display driver integrated circuit for certifying an application processor and a mobile apparatus having the same
A display driver integrated circuit includes a seed generation block configured to generate a seed, an encryption block configured to encrypt the seed and...
US-1,028,9830 Interception-proof authentication and encryption system and method
An interception-proof authentication and encryption system and method is provided that utilizes passcodes with individual pins that are made up of symbols from...
US-1,028,9829 Multi-function information handling system bay supporting wireless security access
A system, method, and computer-readable medium are disclosed for supporting wireless security access via a multi-function information handling system bay. In...
US-1,028,9828 Image forming apparatus, image forming system, method for controlling image forming system, and storage medium
In an image forming system including a storage machine, an authentication server machine, and an output machine, when the output machine performs printing of...
US-1,028,9827 Information display device
The present invention provides an information display device which may simply display a defined information to improve the convenience. The information display...
US-1,028,9826 Using hidden secrets and token devices to control access to secure systems
A system for using an encrypted version of a password or access code which is stored in the open on a computer or other device, which utilizes a hardware token...
US-1,028,9825 Login access control for secure/private data
A login access control system is provided. The login access control system includes a camera configured to capture an input image of a subject purported to be a...
US-1,028,9824 Security system for facility access control
A facility access control system and corresponding method are provided. The facility access control system includes a camera configured to capture an input...
US-1,028,9823 Camera system for traffic enforcement
A traffic enforcement system and corresponding method are provided. The traffic enforcement system includes a camera configured to capture an input image of one...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.