Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0270330 PROXIMITY-BASED LINKING FOR WEARABLE GROUP COMMUNICATION DEVICE
Systems, methods, software and apparatus enable linking of a wearable end user communication device (EUD) to an intermediate communication device (ICD)...
2017/0270329 IMAGING READER FOR, AND METHOD OF, READING A TARGET BY IMAGE CAPTURE THROUGH A SEALED WINDOW INTEGRATED WITH AN...
A window environmentally seals an imaging reader operative for reading a target by image capture. An integrated optical system having one or more optical...
2017/0270328 DIFFUSE BRIGHT FIELD ILLUMINATION SYSTEM FOR A BARCODE READER
One aspect of the present disclosure is related to a barcode reader that includes a bright field illumination system, a dark field illumination system, and an...
2017/0270327 READING OF RADIO FREQUENCY IDENTIFICATION TAG
The application discloses a radio frequency identification (RFID) tag reading system, an RFID reading-writing apparatus and an RFID tag reading method....
2017/0270326 BAND/TAG WITH INTEGRATED STATUS AND TRACKING
A tag/band and techniques of using a tag/band are provided. The tag/band providing a visual indication of a status relevant to an item to which the tag/band is...
2017/0270325 ADAPTIVE PROCESSING OF RADIO FREQUENCY IDENTIFICATION
Embodiments of the present disclosure relate to adaptive RFID communication. A tag device includes a storage configured to store content that is executable by...
2017/0270324 ASSOCIATING CONSUMER-PROVIDED ASSETS WITH PHYSICAL OBJECTS USING NFC TAGS
Systems, methods, and computer-readable storage media are provided for using Near Field Communication (NFC) smart "tags" associated with physical objects in...
2017/0270323 OPERATING SYSTEMS FOR AN RFID TAG
In embodiments of the present invention improved capabilities are described for a wireless computing device, comprising an antenna; an analog block for...
2017/0270322 TECHNIQUES FOR RECOVERING MISSING DEVICES
Techniques are provided for assisting owners to recover missing devices. The missing device automatically performs certain actions proactively in response to...
2017/0270321 COMMUNICATIONS BUS LINE ISOLATOR
A communications bus line isolator is provided. In some embodiments, a first side of the communications bus isolator can be coupled to a first device via first...
2017/0270320 WEB-BASED METHOD AND SYSTEM FOR APPLYING A LEGALLY ENFORCEABLE SIGNATURE ON AN ELECTRONIC DOCUMENT
A web-based method and system for applying a legally enforceable signature of a user on an electronic document. The user accesses a web environment from a...
2017/0270319 METHOD AND DEVICE FOR PROVIDING VERIFYING APPLICATION INTEGRITY
A device downloads and installs an APK file for the application, during which the code is modified. A checksum for the modified code is sent to a trusted...
2017/0270318 PRIVACY IMPACT ASSESSMENT SYSTEM AND ASSOCIATED METHODS
A privacy impact assessment system implements a method for data privacy compliance code generation. The system creates a legal architecture from legal guidance...
2017/0270317 SYSTEMS AND METHODS FOR PROVIDING DATA RESIDENCY PROTECTION USING REMOTE PROXIES
Computerized embodiments are disclosed for keeping personally identifying information within a protected domain environment when interacting with a ...
2017/0270316 PROTECTING SEARCH PRIVACY USING POLICY-BASED SEARCH TERMS
A processor-implemented method for policy-based search privacy is provided, including a search privacy module and one or more privacy policy configurations....
2017/0270315 TRACEABLE DATA AUDIT APPARATUS, METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM THEREOF
A traceable data audit apparatus, method, and non-transitory computer readable storage medium thereof are provided. The traceable data audit apparatus is...
2017/0270314 SYSTEM AND METHOD FOR DATA BACKUP USING UNMANNED AERIAL VEHICLE (UAV)
Disclosed are systems, methods and computer program products for performing data backup using an unmanned aerial vehicle (UAV). An example method includes in...
2017/0270313 MANAGING APPLICATIONS IN NON-COOPERATIVE ENVIRONMENTS
The present invention extends to methods, systems, and computer program products for managing applications in non-cooperative environments. Embodiments of the...
2017/0270312 VERIFYING A REQUISITION OBJECT RECORD
A method and system. It is ascertained that a database stores the company profile record including the target attribute and a validity attribute associated...
2017/0270311 SECURITY KEY ENTRY USING ANCILLARY INPUT DEVICE
A physical, non-human readable representation of a digital key may be in a physical key article. The key article may enable a person to generate a signal...
2017/0270309 USE OF GENERIC (BROWSER) ENCRYPTION API TO DO KEY EXCHANGE (FOR MEDIA FILES AND PLAYER)
Embodiments are directed towards decrypting encrypted content. A key for decrypting the encrypted content may be provided to a web application executing within...
2017/0270308 SECURITY DEVICE AND CONTROL METHOD
A secure area includes a processor that is included in a secure area and a first memory with storage capacity less than a predetermined amount. The processor...
2017/0270307 METHODS FOR RECOVERING SECRET DATA OF A CRYPTOGRAPHIC DEVICE AND FOR EVALUATING THE SECURITY OF SUCH A DEVICE
A method for recovering secret data of a cryptographic device comprises: a) determining stochastic models of leakages relating respective measurable quantities...
2017/0270306 REDUCING TIME TO FIRST ENCRYPTED FRAME IN A CONTENT STREAM
Techniques are described for reducing time to decrypt a next encrypted frame in a content stream by optimizing a license/key acquisition process. When...
2017/0270305 VEHICULAR DATA CONVERSION APPARATUS AND VEHICULAR DATA OUTPUT METHOD
A vehicular data conversion apparatus includes: an acquisition portion that acquires vehicle data from a vehicle; a first storage portion that stores a data...
2017/0270304 METHOD AND DEVICE FOR VULNERABILITY SCANNING
The disclosed embodiment provides a method and device for vulnerability scanning, the method comprising: a reverse scanning agent module acquires a client...
2017/0270303 Integrated Interactive Application Security Testing
A method for testing a software application program includes recording a sequence of functional tests that are applied to the program and automatically...
2017/0270302 SECURITY REMEDIATION
A method is provided to remediate defects in first computer program code that can be used to configure a computer to produce code for use by the same or a...
2017/0270301 Systems And Methods Using Virtual UEFI Path For Secure Firmware Handling In Multi-Tenant Or Server Information...
Systems and methods are provided that may be implemented to securely load Unified Extensible Firmware Interface (UEFI) images (e.g., UEFI Applications, UEFI...
2017/0270300 APPARATUS, SYSTEM, AND METHOD FOR PROTECTING AGAINST KEYLOGGING MALWARE
An apparatus, system, and method is disclosed for protecting against key logger malware. The protection includes protection form grabbing keylogger malware. In...
2017/0270299 APPARATUS AND METHOD FOR DETECTING MALWARE CODE BY GENERATING AND ANALYZING BEHAVIOR PATTERN
The present invention relates to an apparatus and a method for detecting a malware code by generating and analyzing behavior pattern. A malware code detecting...
2017/0270298 SYSTEM AND METHOD TO MITIGATE MALWARE
Particular embodiments described herein provide for an electronic device that can be configured to receive script data, determine a checksum tree for the...
2017/0270297 ANALYSIS DEVICE, ANALYSIS METHOD AND COMPUTER-READABLE RECORDING MEDIUM
Provided is an analysis device with which it is possible to find information relating to the intention and purpose of an attacker. The analysis device is...
2017/0270296 System and Method for Reverse Command Shell Detection
A system and method for detecting reverse command shell intrusions at a process-level on a user device is disclosed. In one embodiment, the system detects each...
2017/0270295 CYBER SECURITY FOR PHYSICAL SYSTEMS
A cyber security system and method that includes one or more devices configured to determine a cyber security threat or breach event based on analysis of...
2017/0270294 PREDICTING AND PREVENTING AN ATTACKER'S NEXT ACTIONS IN A BREACHED NETWORK
A method for cyber security, including detecting, by a management server, a breach by an attacker of a resource within a network of resources, wherein access...
2017/0270293 SYSTEMS AND METHODS FOR GENERATING TRIPWIRE FILES
A computer-implemented method for generating tripwire files may include (1) generating an initial tripwire file according to an initial tripwire generation...
2017/0270292 RELEVANCY IMPROVEMENT THROUGH TARGETING OF INFORMATION BASED ON DATA GATHERED FROM A NETWORKED DEVICE...
A method, apparatus, and system related to relevancy improvement through targeting of information based on data gathered from a networked device associated...
2017/0270291 INFORMATION PROCESSING SYSTEM
An information processing system made up of a plurality of controllers in a vehicle has a tamperproof configuration by including, in a specific controller...
2017/0270290 INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER PROGRAM PRODUCT
An information processing system includes an apparatus that carries out a function; an application program configured to provide a service using the function...
2017/0270289 USER-AUTHENTICATION GESTURES
This document relates to user-authentication gestures. One example can capture multiple biometric features when a user-authentication gesture is performed as a...
2017/0270288 SYSTEM AND DEVICE BINDING METADATA WITH HARDWARE INTRINSIC PROPERTIES
A system, device, and method for binding metadata, such as information derived from the output of a biometric sensor, to hardware intrinsic properties by...
2017/0270287 METHODS AND APPARATUS FOR USING CREDENTIALS TO ACCESS COMPUTING RESOURCES
Mechanisms for controlling access to credentials are disclosed. A computing device receives, at a first time, a request associated with a user to initiate a...
2017/0270286 DIRECT AUTHENTICATION SYSTEM AND METHOD VIA TRUSTED AUTHENTICATORS
Systems and methods are provided for enabling online entities to determine whether a user is truly the person who he says using a "two-factor" authentication...
2017/0270285 SECURITY SYSTEM FOR VERIFICATION OF USER CREDENTIALS
A system is disclosed that enables network-based systems to confirm the identity of users and/or the authenticity of their credentials during their...
2017/0270284 CONVERTING LICENSES FROM ONE PRODUCT TO ANOTHER PRODUCT
A method for converting licenses from one product to another product is described. The method includes: accessing client product license information for a...
2017/0270283 ACCESS CONTROL FOR SELECTED DOCUMENT CONTENTS USING DOCUMENT LAYERS AND ACCESS KEY SEQUENCE
In a digital rights management system, layers are defined for each document and user permissions are specified for each layer, to control user access at the...
2017/0270282 HIGH-RESOLUTION MASS SPECTROMETER AND METHODS FOR DETERMINING THE ISOTOPIC ANATOMY OF ORGANIC AND VOLATILE...
A mass spectrometer including an entrance slit, an energy filter, a momentum filter and a detector array, the entrance slit, energy filter and momentum filter...
2017/0270281 INTERACTION ENERGY CALCULATION METHOD, CALCULATION DEVICE, AND PROGRAM
A method, which includes: extracting one or more calculation-target water molecules that influence at least interaction energy between the target molecule and...
2017/0270280 PROCESS FOR DETERMINING AND TRACKING THE APTITUDE OF MEDICAL RESIDENTS
A process of evaluating the residential clinical performance of a medical resident based upon feedback from evaluators includes generating a number of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.