Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0147842 INHIBITING UNAUTHORISED CONTACTLESS READING OF CONTACTLESS READABLE OBJECT
A jamming device for inhibiting unauthorised contactless reading of a contactless readable object is disclosed. In one embodiment, the jamming device includes:...
2017/0147841 METHODS AND SYSTEMS FOR ADJUSTING MOBILE-DEVICE OPERATING PARAMETERS BASED ON HOUSING-SUPPORT TYPE
Disclosed herein are methods and systems for adjusting mobile-device operating parameters based on housing-support type. In an embodiment, a mobile device...
2017/0147840 Thermal Printer with a Quick Release Cover
A high speed tabletop and industrial printer is disclosed with integrated high speed RFID encoding and verification at the same time. The industrial printer...
2017/0147839 Information Handling System Port Fluidic Component Manager
An information handling system processing component is selectively disabled by inflation of a bladder with a microfluidic reservoir in response to a...
2017/0147838 SYSTEMS AND METHODS FOR CACHE MEMORY AUTHENTICATION
Apparatus for authentication of system memory content, the apparatus operative in conjunction with system memory storing content (code or non-code) utilized by...
2017/0147837 SCALE-BASED DATA ACCESS CONTROL METHODS AND APPARATUSES
Certain aspects of the disclosure are directed to an apparatus including a scale and external circuitry. The scale includes a platform, and data-procurement...
2017/0147836 SYSTEM OF SHARED SECURE DATA STORAGE AND MANAGEMENT
This disclosure relates to a storage provider for storing first encrypted data associated with first meta tags from a first publisher and second encrypted data...
2017/0147835 EFFICIENT TWO PARTY OBLIVIOUS TRANSFER USING A LEVELED FULLY HOMOMORPHIC ENCRYPTION
A querying node generates public keys, secret keys, and switch key matrices. A public key associated with a first level and the switch key matrices are sent to...
2017/0147834 IDENTIFYING QUERY PATTERNS AND ASSOCIATED AGGREGATE STATISTICS AMONG SEARCH QUERIES
In various implementations, a plurality of non-private n-grams that satisfy a privacy criterion may be identified within a search log of private search queries...
2017/0147833 AREA-LIMITED SOFTWARE UTILITY
Computers and networks are configured to operate according to alternative protocols for using software applications, depending on geographic location. In one...
2017/0147832 ENTERPRISE LEVEL DATA ELEMENT REVIEW SYSTEMS AND METHODOLOGIES
An enterprise level data element review system including a data access event collection subsystem operative to collect data access event notifications relating...
2017/0147831 SENSITIVE DATA OBFUSCATION IN OUTPUT FILES
Embodiments include method, systems and computer program products for protecting sensitive data. Aspects include accessing computer readable program...
2017/0147830 Adaptive Rights Management System
Methods, systems, computer-readable media, and apparatuses for providing policy-based copyright enforcement of media content items streamed to client devices...
2017/0147829 Reversible Redaction and Tokenization Computing System
A computing system for redacting and/or tokenizing non-public information of electronic documents stored in a database may include a data redaction computing...
2017/0147828 Reversible Redaction and Tokenization Computing System
A computing system for redacting and/or tokenizing non-public information of electronic documents stored in a database may include a data redaction computing...
2017/0147827 INTEGRITY CHECKING FOR COMPUTING DEVICES
A computing device may perform integrity checks on a closed operating system defining a preconfigured user portion and a preconfigured system portion using an...
2017/0147826 Password Theft Protection for Controlling Access to Computer Software
Accessing a password-secured computer software application by acquiring an input password, generating at a first computer an output password from the input...
2017/0147825 Controlling Mobile Device Access to Secure Data
Various aspects of the disclosure relate to providing secure containers or data vaults for data of one or more managed applications. In some embodiments, each...
2017/0147824 CONTROLLED DELIVERY AND ASSESSING OF SECURITY VULNERABILITIES
A method for providing security vulnerability information is provided. The method may include checking for the security vulnerability information product...
2017/0147823 CONTROLLED DELIVERY AND ASSESSING OF SECURITY VULNERABILITIES
A method for providing security vulnerability information is provided. The method may include checking for the security vulnerability information product...
2017/0147822 Provisioning Location-Based Security Policy
In one embodiment, a system comprises: a processor including at least one core to execute instructions; a plurality of sensors, including a first sensor to...
2017/0147821 Detecting Malicious Instructions on a Virtual Machine Using Profiling
A system that includes a trusted measurement machine comprising a profiling tool, a semantics virtual machine profiling engine interface, a semantics virtual...
2017/0147820 Extracting and Detecting Malicious Instructions on a Virtual Machine
A system that includes a vault management console configured to determine a measurement request for virtual machine operating characteristics metadata. The...
2017/0147819 METHODS AND SYSTEMS FOR MAINTAINING A SANDBOX FOR USE IN MALWARE DETECTION
A shadow sandbox is maintained for malware detection. The shadow sandbox is a virtual machine replica of a target computing environment from a protected...
2017/0147818 METHOD AND DEVICE FOR OBTAINING VIRUS SIGNATURES
A method and a device for obtaining virus signatures in the field of computer security have been disclosed. The method includes: obtaining text strings...
2017/0147817 ANALYSIS DEVICE, ANALYSIS METHOD, AND STORAGE MEDIUM IN WHICH ANALYSIS PROGRAM IS RECORDED
Provided is an analysis apparatus including a first storage device configured to store data, and a processing circuitry that is configured to control the own...
2017/0147816 Extracting Malicious Instructions on a Virtual Machine
A system including a hypervisor and a guest virtual machine. The hypervisor is configured to communicate a measurement request that identifies virtual machine...
2017/0147815 METHOD FOR DETECTING A THREAT AND THREAT DETECTING APPARATUS
Aspects of the disclosure include a threat detecting apparatus. The threat detecting apparatus can include an interface circuit, an opcode detector, and a...
2017/0147814 EMBEDDED SYSTEMS MONITORING SYSTEMS AND METHODS
Methods and systems for detection and prevention of exploitation of embedded devices. A sensing component is configured to detect a plurality of emanated...
2017/0147813 Maintaining Secure Clustered Software with a Container-Based Architecture
The subject matter of this specification can be implemented in, among other things, a method that includes receiving, by a processing device in a...
2017/0147812 METHOD OF UPDATING FRAUD DETECTION RULES FOR DETECTING MALICIOUS FRAMES, FRAUD DETECTING ELECTRONIC CONTROL...
Provided is a fraud detection rule updating method enabling the updating of rules that serve as the basis for detecting malicious frames as necessary in an...
2017/0147811 MIGRATION SERVICE METHOD AND MODULE FOR SOFTWARE MODULES
A migration service and module for software modules are disclosed. The migration service detects a security flaw in a first environment in which the software...
2017/0147810 DETERMINING SOURCE OF SIDE-LOADED SOFTWARE USING SIGNATURE OF AUTHORSHIP
A source of side-loaded software is determined. An action may be performed in response to the determination of the source. In one case, the handling of an...
2017/0147808 TOKENS FOR MULTI-TENANT TRANSACTION DATABASE IDENTITY, ATTRIBUTE AND REPUTATION MANAGEMENT
One embodiment provides a method for token management in a multi-tenant transactional database, including: utilizing at least one processor to execute computer...
2017/0147807 IMAGE CAPTURE DEVICES FOR A SECURE INDUSTRIAL CONTROL SYSTEM
An image capture device for a secure industrial control system is disclosed. In an embodiment, the image capture device includes: an image sensor; a signal...
2017/0147806 PERSONAL FAMILIARITY AUTHENTICATION
A method for computer security. A gallery comprising a first identity of a first human person is maintained, the first identity associated with a plurality of...
2017/0147805 INFORMATION PROCESSING SYSTEM AND COMPUTER PROGRAM
[Object] To provide an information processing system capable of making it difficult to be easily recognized as being a key at a glance by others. [Solution]...
2017/0147804 KEY WITH INTEGRAL BIOMETRIC INPUT DEVICE
A key integrates with a biometric input device. According to an aspect of the present disclosure, a fingerprint scanner may be integral with a spacebar.
2017/0147803 LOCAL USER AUTHENTICATION WITH NEURO AND NEURO-MECHANICAL FINGERPRINTS
In accordance with one embodiment, a method for locally verifying the identification of a user with an electronic device is disclosed. The method includes...
2017/0147802 MESSAGE DISPLAY METHOD AND APPARATUS
The present disclosure discloses a message display method and apparatus. The method comprises: receiving unlock information and authenticating the unlock...
2017/0147801 PRE-BOOT AUTHENTICATION CREDENTIAL SHARING SYSTEM
A pre-boot authentication (PBA) credential sharing system includes a secure subsystem including an off-host processing system and a secure storage. A...
2017/0147800 FINGERPRINT SCANS WITH POWER BUTTONS
Example implementations relate to fingerprint scans with power buttons. For example, a computing device may include a power button and a processor. The power...
2017/0147799 DIRECT AUTHENTICATION SYSTEM AND METHOD VIA TRUSTED AUTHENTICATORS
Fraud and identity theft are enabled by two faulty assumptions about the way that the identity of a person is verified in our society. The first is that...
2017/0147798 Mobile Device And Method Of Operating Mobile Device
A mobile device and a method of operating a mobile device are disclosed. The mobile device includes a main processor executing a normal code of a mobile...
2017/0147797 ACCESS TO AN ELECTRONIC ASSET USING CONTENT AUGMENTATION
Methods, computer program products, and systems are presented and can include for instance: crowdsourcing data from a plurality of users via a computer...
2017/0147796 PERSONALIZED ONLINE CONTENT ACCESS EXPERIENCES USING INFERRED USER INTENT TO CONFIGURE ONLINE SESSION ATTRIBUTES
Systems for managing personalized access to shared online objects. A user accesses a server in a cloud-based environment, wherein the server is interfaced with...
2017/0147795 PERSONALIZED ONLINE CONTENT ACCESS EXPERIENCES USING ONLINE SESSION ATTRIBUTES
Systems for managing personalized access to shared online objects. A user accesses a server in a cloud-based environment, wherein the server is interfaced with...
2017/0147794 METHODS AND SYSTEMS FOR PREDICTIVE CLINICAL PLANNING AND DESIGN
One example method for predictive clinical planning and design includes instantiating a plurality of data objects, each data object of the plurality of data...
2017/0147793 SYSTEM FOR REMOTE MONITORING AND SUPERVISION OF DATA
A system for remote monitoring and supervision of data, particularly for activities associated with clinical trials, which comprises: a first station, which...
2017/0147792 ELECTRONIC DATA DOCUMENT FOR USE IN CLINICAL TRIAL VERIFICATION SYSTEM AND METHOD
The present invention provides an electronic data document (EDD) and related system and method for use in a computerized clinical trial verification system. In...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.