Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0277923 BARCODE READER AND ACCESSORY FOR THE BARCODE READER
A barcode reader and an accessory are disclosed. A barcode reader may include an interface for communication with a host computer via a wireless or wired link...
2017/0277922 MOBILE WIRELESS ANTENNA SYSTEM FOR RFID APPLICATION
The present invention provides a mobile wireless antenna system, including: a RFID reader module and a mobile vehicle. The RFID reader module is connected to a...
2017/0277921 SYSTEMS AND METHODS OF REAL-TIME ASSIGNMENT OF ITEMS TO PREREGISTERED INDIVIDUALS
Systems and methods of assigning an RFID chip and/or a participant number to an event participant who has preregistered for the event. The assignment of the...
2017/0277920 IDENTIFICATION OF INDUSTRIAL EQUIPMENT USING MICRO-LOCATION SERVICES
Techniques to facilitate identification of industrial equipment using micro-location services in an industrial automation environment are disclosed herein. In...
2017/0277919 Authenticity Verification System and Methods of Use
A system and associated methods for dynamically authenticating an at least one object are disclosed. In at least one embodiment, upon a user desiring to verify...
2017/0277918 CONTROL DEVICE AND PRINTING APPARATUS
A control device includes a prohibition unit that prohibits use of an electronic apparatus in a case where a sum of a cumulative amount of use of the...
2017/0277917 Method for operating soft keyboard, terminal and computer readable storage medium
A method for operating a soft keyboard, applied to an operating system of a terminal, includes that: a soft keyboard starting instruction is obtained and...
2017/0277916 SECURE CONTROL OF SELF-ENCRYPTING STORAGE DEVICES
Generally, this disclosure provides systems, devices, methods and computer readable media for secure control of access control enablement and activation on...
2017/0277915 DATA PROTECTION ENHANCEMENT USING FREE SPACE
A data storage system uses the free space that is not yet filled with data after the deployment of the data store. The free space is used to store additional...
2017/0277914 COMPUTER SYSTEM AND CONTROL METHOD THEREFOR
When mounting hardware which is coupled to another portion by a plurality of paths with different applications, despite the hardware being a single device, and...
2017/0277913 SECURE CRYPTO MODULE INCLUDING OPTICAL SECURITY PATHWAY
An optical electromagnetic radiation (EM) emitter and receiver are located upon a printed circuit board (PCB) layer and are connected to an optical security...
2017/0277912 METHOD AND SYSTEM FOR CRYPTOGRAPHICALLY ENABLING AND DISABLING LOCKOUTS FOR CRITICAL OPERATIONS IN A SMART GRID...
A method for locking out a remote terminal unit includes: receiving a lockout request, wherein the lockout request includes at least a public key associated...
2017/0277911 METHOD AND APPARATUS FOR SECURE SIGNING AND UTILIZATION OF DISTRIBUTED COMPUTATIONS
An approach is provided for providing secure signing and utilization of distributed computations. A distributed computation authentication platform causes, at...
2017/0277910 APPLICATION PERMISSION SETTINGS
Systems, device and techniques are disclosed for automatically determining a permission setting that indicates whether a permission is granted or denied to the...
2017/0277909 CRYPTOGRAPHICALLY PROVABLE ZERO-KNOWLEDGE CONTENT DISTRIBUTION NETWORK
A system, a computer readable storage medium, and methods for delivering content from a zero-knowledge edge server node in a content delivery network to an end...
2017/0277908 PROVIDING DATA PRIVACY IN COMPUTER NETWORKS USING PERSONALLY IDENTIFIABLE INFORMATION BY INFERENCE CONTROL
Data privacy is provided in a computer network using a security inference control processor of a network device in the computer network which receives a query...
2017/0277907 Abstracted Graphs from Social Relationship Graph
A system may generate abstracted graphs from a social relationship graph in response to a query. A query may identify a person for which permission has been...
2017/0277906 PRIVACY ENHANCED CENTRAL DATA STORAGE
The invention performs anonymous read/write accesses of a set of user devices to a server. Write accesses of the user devices of the set comprise generating an...
2017/0277905 LIVE EDITING AND PUBLISHING OF DOCUMENTS WITHIN A CONTENT MANAGEMENT SYSTEM USING A HYBRID DRAFT AUTHORIZATION...
A system for live editing and publishing of documents within a content management system using a hybrid draft authorization workflow within an authoring...
2017/0277904 SYSTEM, METHOD, AND RECORDING MEDIUM FOR PREVENTING BACK PROPOGATION OF DATA PROTECTION
A third party intermediary and a data protection method, system, and non-transitory computer readable medium, include a content request receiving circuit...
2017/0277903 Data Protection Using Virtual Resource Views
Embodiments include computing devices, systems, and methods for protecting data using virtual views of resource contents. A virtualization interface monitor...
2017/0277902 ELECTRONIC DEVICE AND METHOD FOR OPERATING THE SAME
A method for operating an electronic device according to an embodiment of the present invention includes: entering a content sharing mode capable of sharing...
2017/0277901 SYSTEM AND METHOD FOR AUTONOMOUS OR REMOTE CONTROLLED DESTRUCTION OF STORED INFORMATION OR COMPONENTS
A system and method are provided for the destruction of electronically stored information and/or components that incorporated sensitive technology or that...
2017/0277900 Method and Device for Access Control
The disclosure discloses a method and device for access control. The method includes: when a group of tasks are executed, controlling an access of a subject to...
2017/0277899 METHOD FOR EXECUTING ACCESS CONTROL OVER ELECTRONIC DEVICE AND ELECTRONIC DEVICE CAPABLE OF EXECUTING ACCESS...
A method for executing access control over an electronic device includes: detecting a position information of the electronic device with a positioning module;...
2017/0277898 KEY MANAGEMENT FOR SECURE MEMORY ADDRESS SPACES
A processor employs a security module to manage authentication and encryption keys for the processor. The security module can authenticate itself to other...
2017/0277897 SYSTEM ON CHIP TO PERFORM A SECURE BOOT, AN IMAGE FORMING APPARATUS USING THE SAME, AND METHOD THEREOF
A system on chip is provided. The system on chip includes a first memory to store a plurality of encryption keys, a second memory, a third memory to store an...
2017/0277896 ACCESSING SUPERVISOR PASSWORD VIA KEY PRESS
For supervisor password access based on a key press of a hotkey, systems, apparatus, methods, and program products are disclosed. The apparatus may include a...
2017/0277895 Staged Control Release In Boot Process
Integrity validation of a network device may be performed. A network device comprising a secure hardware module, may receive a root key. The secure hardware...
2017/0277894 Method and Apparatus for Isolating an Electronic Device from External Data Signals
Disclosed is a security device for selectively isolating an electronic device from external data signals, including an input for receiving an external cable,...
2017/0277893 DATA TRACKING IN USER SPACE
A way to track data from an untrusted source as it moves through memory in original or modified form. A probe is placed on a data reception call of a program....
2017/0277892 PREVENTION OF CROSS SITE SCRIPTING ATTACKS USING AUTOMATIC GENERATION OF CONTENT SECURITY POLICY HEADERS AND...
The present disclosure provides a method and system for transforming web application output that is vulnerable to XSS attacks to CSP-compliant web application...
2017/0277891 SYSTEM AND METHOD FOR VETTING MOBILE PHONE SOFTWARE APPLICATIONS
A system and method for implementing a software emulation environment is provided. In one example, a mobile application can interface with an emulation...
2017/0277890 Method for Testing computer program product
This document discloses a solution for detecting, by a computer apparatus, computer program library in a binary computer program code. A method according to an...
2017/0277889 Systems, Methods, and Media for Outputting a Dataset Based Upon Anomaly Detection
Systems, methods, and media for outputting a dataset based upon anomaly detection are provided. In some embodiments, methods for outputting a dataset based...
2017/0277888 SECURITY DEVICE FOR AN ELECTRONIC APPARATUS
A security device for an electronic apparatus having a port includes a housing and a connector extending from the housing. The connector is configured to...
2017/0277887 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER READABLE MEDIUM
A candidate event derivation unit (101) derives, as a candidate event, an event predicted to occur in an information system (200) including a plurality of...
2017/0277886 SYSTEM AND METHOD OF AUTHORIZING EXECUTION OF SOFTWARE CODE BASED ON AT LEAST ONE INSTALLED PROFILE
Embodiments include systems and methods for authorizing software code to be executed or access capabilities in secure operating environments. Profiles may be...
2017/0277885 PASSWORD HINT POLICIES ON A USER PROVIDED DEVICE
Disclosed are various examples for remotely managing passwords using local security policies. A client device can be enrolled with a management service. The...
2017/0277884 SECURITY CERTIFICATE MANAGEMENT METHOD FOR A VEHICULAR NETWORK NODE AND VEHICULAR NETWORK NODE APPLYING THE SAME
A security certificate management method for a vehicular network node is applied in a vehicular network. A message is received. Whether a certificate in the...
2017/0277883 DEBUG ARCHITECTURE
Roughly described, a method of restricting access of a debug controller to debug architecture on an integrated circuit chip, the debug architecture comprising...
2017/0277882 CONTROLLING A DEVICE
In accordance with an example aspect of the present invention, there is provided an apparatus comprising at least one receiver configured to receive, via a...
2017/0277881 METHOD AND SYSTEM FOR IMPROVING SECURITY OF A MOBILE TERMINAL
A method and system for improving security of a mobile terminal can be used to determine whether the obtained slide-to-unlock operation matches with...
2017/0277879 IC CARD, IC MODULE, AND IC CARD SYSTEM
Provided are an IC card, an IC module and an IC card system that can improve the security. An IC card of embodiments has a generation unit and an...
2017/0277878 AUTHENTICATION SYSTEM, USER TERMINAL, CONTROL DEVICE, SERVICE PROVIDING DEVICE, PROGRAM, AND AUTHENTICATION METHOD
An authentication system of an embodiment includes a control device, a user terminal, and a service providing device. The control device includes a storage...
2017/0277877 PHYSICAL TOKEN-LESS SECURITY SCREENING USING BIOMETRICS
In physical token-less security screening using biometrics, a person provides biometric data to a security computing device as part of a security screening....
2017/0277876 ELECTRONIC DEVICE WITH METHOD FOR CONTROLLING ACCESS TO SAME
An electronic device is able to alter one or more settings of its imager based on the motion of a user that the device is attempting to authenticate. The...
2017/0277875 SYSTEMS AND METHODS FOR CONTROLLING OUTPUT OF CONTENT BASED ON HUMAN RECOGNITION DATA DETECTION
Systems and methods for controlling output of content based on human recognition data captured by one or more sensors of an electronic device are provided. The...
2017/0277874 OPERATING METHOD FOR HANDHELD DEVICE
An operating method for handheld device is provided. The method includes following steps: detecting whether a user is holding a handheld device; control the...
2017/0277873 CHARACTERIZING USER BEHAVIOR VIA INTELLIGENT IDENTITY ANALYTICS
Methods, devices, and systems are provided to rapidly detect and prevent cyber-attacks that are enabled by either misuse of identity credentials or weaknesses...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.