- No Obligation
- No Legalese
- Free & Easy
- Confidential
- Quality Assured
- In-Depth Evaluation
Patent filing
$6000 for simple patents;
$4800 with 20% discount for corporations, small businesses, researchers and universities.
+ US Patent and Trademark Office fees.
20% discount for corporations, small businesses, researchers and universities.
Later, if needed, $2000 for responding to rejections.
Assisted Patent application
$2500 – Assisted patent drafting
Draft legally important claims and review description;
Filing and drafting of description are excluded.
Complex Patent filing
- Complex Invention
- Complex Description
- More than 20 claims
- Multiple dependent claim
$10000 for complex patent filing;
$8000 with 20% discount for corporations, small businesses, researchers and universities.
+ US Patent and Trademark Office fees.
20% discount for corporations, small businesses, researchers and universities.
Pro Bono services may be available for university researchers to promote the Progress of Science.
Simple Patent | Assisted Patent | Complex Patent |
---|---|---|
$6,000 | $2,500 | $10,000 |
$4,800 for Corporations, Small Businesses, Researchers and Universities (20% discount) | $8,000 for Corporations, Small Businesses, Researchers and Universities (20% discount) | |
Assisted Search | ||
Our Sample Patents
Password triggered trusted encryption key deletion
A method of evaluating secrets in a computer system’s trusted execution environment, wherein after evaluation of secrets, a securely stored encryption key is either retrieved or deleted upon entering corresponding secret (password, graphical password, biometric information, data sequence, security token, etc.) or secrets. Deletion of the encryption key can happen in a verifiable manner or in a non-verifiable manner. If a storage is encrypted with the encryption key, deletion of the encryption key makes the encrypted storage irreversibly undecryptable, while retrieval of the key permits decryption of the storage. Two encryption keys can be used to encrypt two separate storages, and then securely stored and processed in the trusted execution environment. Each of the two encryption keys can be retrieved using one or more associated secrets (passwords, etc.), and one or more other secrets would delete the encryption key associated with a preselected storage.
Protection system and method against unauthorized data alteration
A system for protecting user-editable files against unauthorized data alteration or against compromised operating systems or compromised applications. It comprises of untrusted operating environments and a trusted operating environment. One or more untrusted operating environments makes available user-editable files for creation and editing, and are stored in a non-protected partition of storage drive. The trusted operating environment provides an authentication key to access protected partition of storage drive, and stores copies of user-editable files in a protected partition of storage drive. Each new stored copy of a user-editable file in the protected partition corresponds to a new or an updated version of the user-editable file. A set of files and folders can be initially selected in an uncompromised untrusted operating environment. A trusted updater module running inside the trusted operating environment can perform copying to protected partition. Scheduled tasks can also copy user-editable files. Untrusted operating environment can also be suspended prior to triggering the trusted environment.
FREE In-Depth Initial Consultation by Email, Phone, Meet, Zoom, Teams, WebEx or in-person
We communicate using your preferred method. Click to reach us right now.
- Is it patentable, an abstract idea, a formula, or a product of nature?
- Is it public or obvious? Is it publicly available, or prior ideas be easily combined, substituted, or tried in obvious way?
- Should I file provisional or non-provisional application?
- Should I file utility or design application? What is the filing process?
- How about rejections, objections, reexamination, or appeal?
Easy 15 second Form to Get Free Consultation with Patent Attorney
- No Obligation
- No Legalese
- Free & Easy
- Confidential
- Quality Assured
- In-Depth Evaluation
We get back quickly. Average response time 1 hour, max 12 hours.
Protected by Google reCAPTCHA – Privacy and Terms.
Why us? We try our best for you:
- Less time explaining invention – we get it quickly.
- Diligently prosecute patents – explore invention in-depth, considering all the examples, boundaries & limitations.
- Don’t compromise – don’t limit patent scope.
- Prevent vulnerability to obviousness attacks on patent.
- Ensure large patent scope that maintains higher value in future.
- Protect inventions in multiple ways – protection from all perspectives to safeguard invention.
- Exclusively patent focused – so we understand it better.
- Client first service – customized, innovative and creative solutions.
- Quality Assured Patent for Electrical, Computer, Software, Mechanical, and Medical inventions using many years of ECE, CS, and Engineering experience and rigorous Total Quality Management.
Client Testimonials about Our Services
The patent attorney has helped us with two patents. What impressed us the most is his expertise in both technicality and law. Our previous perception of working with patent lawyers was that they may do a good job in filing and negotiating, but when it comes to drafting and especially the iterations of revisions, it takes a lot of time and effort to explain to them and reach an agreement. In this case, he has the technical background comparable to that of the inventors, so we only needed the extent of details sufficient to communicate with a co-inventor/colleague. In particular, in the process of drafting, he was clear about the key point of each claim and how the system works, and able to make the modifications to satisfy the filing requirements. When later we had to revise the claims a few times, he always managed to make the best trade-off possible that addressed the patent examiner’s challenges, while not hurting the scope and value of the invention. With the complexity already time-consuming for us (as required by filing a patent), he could even maintain a turnaround of a day or just several hours.
Moreover, his helpfulness was also reflected in the sense that he made us convinced and understood the rationale of each decision point, instead of just making the changes on his own, so that we as the inventors can be synced and participate to achieve a better outcome. In the long term, what we’ve learned from him, the legal aspects and best practices, will facilitate our future research and production of inventions, as we were not well aware of these before.
Overall, during the whole process of both patents, we never felt that we were trying to “use” a patent lawyer, but just interacting with another co-inventor, in terms of: ownership, hard work, knowledge and ease of communication.
L. Zhao (Carleton University, Canada) and M. Mannan (Concordia University, Canada)