Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0316242 IMAGE RECOGNITION APPARATUS, COMMODITY INFORMATION PROCESSING APPARATUS AND IMAGE RECOGNITION METHOD
An image recognition apparatus includes an acquisition unit and a controller. The acquisition unit acquires an image which captures by photography a pattern...
2017/0316241 RECOGNITION APPARATUS, RECOGNITION METHOD, STORAGE MEDIUM, MANAGEMENT SYSTEM, AND CONVEYANCE SYSTEM
A recognition apparatus includes one or more processors, a memory to store a plurality of instructions which, when executed by the processors, cause the...
2017/0316240 CONTROLLING THE OUTPUT OF CONTEXTUAL INFORMATION USING A COMPUTING DEVICE
A method for controlling the output of contextual information to assist a user to perform a sequence of activities using a computing device, the computing...
2017/0316239 METHOD FOR UPDATING INDICIA READERS
An indicia reader system includes: an indicia reader for reading symbol indicia and producing a symbol signal representative of the symbol indicia, the indicia...
2017/0316238 MODULE OR ARRANGEMENT FOR, AND METHOD OF, READING A TARGET BY IMAGE CAPTURE WITH AN IMAGING READER HAVING...
An imaging sensor of an imaging reader senses return light from a target to be read by image capture along an imaging axis over a field of view that extends...
2017/0316237 METHOD AND APPARATUS FOR TRACKING ONE OR MORE PLANTS AND/OR PLANT BASED PRODUCTS AND/OR TRACKING THE SALE OF...
This invention is for tracking at least one plant. A method of this invention comprises: putting at least one seed or at least one stem in a corresponding at...
2017/0316236 Interrogator and Interrogation System Employing the Same
A control and processing system for use with an interrogator and an interrogation system employing the same. In one embodiment, the control and processing...
2017/0316235 READER IN RFID SYSTEM, OPERATING METHOD OF THE READER, TAG DEVICE, AND OPERATING METHOD OF THE TAG DEVICE
Disclosed herein is an operating method of a reader in a radio frequency identification (RFID) system. In the method, a reader operates in a tag information...
2017/0316234 SENSORY TOTEM BADGE CAPABLE OF TRANSMITTING INDIVIDUALIZED INFORMATION
A sensory totem badge capable of transmitting individualized information and includes: a totem badge body attached or sewed onto an object surface; an e-tag,...
2017/0316233 ANALOG HETEROGENEOUS CONNECTIVITY TAGS AND METHODS AND SYSTEMS TO CONFIGURE THE TAGS
Analog heterogeneous tags and methods and systems to configure the tags are described. The present invention relates to the field of electronic devices and...
2017/0316232 INTERROGATION DEVICE, SYSTEM INCLUDING INTERROGATION DEVICE, AND PROGRAM
An interrogation device includes an interrogation unit that interrogates an RF tag in a contactless manner, and a controller that controls the interrogation...
2017/0316231 INTERROGATION DEVICE, SYSTEM INCLUDING INTERROGATION DEVICE, AND PROGRAM
A controller in an interrogation device performs, for each RF tag passing through an interrogation zone that is defined near an interrogation unit, an...
2017/0316230 EXTENDED USE OF LOGARITHM AND EXPONENT INSTRUCTIONS
Embodiments of the present disclosure are based on a recognition that some processors are configured with instructions to compute logarithms and exponents...
2017/0316229 SECURITY ADJUSTMENTS IN MOBILE DEVICES
Systems, device and techniques are disclosed for implementing a security configuration change based on one or more base events and a current security...
2017/0316228 TAMPER-PROOF ELECTRONIC PACKAGES WITH TWO-PHASE DIELECTRIC FLUID
Tamper-proof electronic packages and fabrication methods are provided including an enclosure enclosing, at least in part, at least one electronic component...
2017/0316227 Generating Hardware Security Logic
The present disclosure includes systems and techniques relating to information flow and hardware security for digital devices and microprocessor systems. In...
2017/0316226 KEYLESS METHOD TO SECURE PHYSICAL ACCESS TO INFORMATION HANDLING SYSTEMS IN A DATACENTER
Systems and methods are disclosed for securing an information handling system. A method for securing an information handling system may include securing the...
2017/0316225 PUBLICATION AND REMOVAL OF ATTRIBUTES IN A MULTI-USER COMPUTING SYSTEM
Embodiments of the present disclosure are directed toward publication and/or removal of attributes in a multi-user computing environment. In some embodiments,...
2017/0316224 HOSTED APPLICATION GATEWAY ARCHITECTURE WITH MULTI-LEVEL SECURITY POLICY AND RULE PROMULGATIONS
A hosted application gateway server node may be communicatively coupled to backend systems, client devices, and database shards associated with database...
2017/0316223 Security Layer and Methods for Protecting Tenant Data in a Cloud-Mediated Computing Network
A system for protecting data managed in a cloud-computing network from malicious data operations includes an Internet-connected server and software executing...
2017/0316222 Method and System for Temporarily Implementing Storage Access Policies on Behalf of External Client Agents
Systems, devices, methods, and computer program products are provided for temporarily implementing storage access policies within a storage system on behalf of...
2017/0316220 METHOD FOR ALLOWING DATA CLASSIFICATION IN INFLEXIBLE SOFTWARE DEVELOPMENT ENVIRONMENTS
System and method for enabling data modification, classification and enforcement of IRM capabilities in standard isolated software applications is disclosed,...
2017/0316219 SHARE TOKEN ISSUANCE FOR DECLARATIVE DOCUMENT AUTHORING
Issuance of job tokens performed by an authorization computing entity so that authoring authorizations can be shared with other authors. Each of the job tokens...
2017/0316218 METHOD OF PREVENTING PRY FOR RANDOM ACCESS MEMORY
The present invention provides a method of preventing pry for random access memory. A functional interface is designed between a computer program and a random...
2017/0316217 MULTI-FACTOR AUTHENTICATION BASED CONTENT MANAGEMENT
According to an example, multi-factor authentication based content management may include receiving a document viewing device certificate of a document viewing...
2017/0316216 SECURE MESSAGE-SENDING METHOD USING PERSONALIZED TEMPLATE AND APPARATUS USING THE SAME
Disclosed herein are a secure message-sending method using a personalized template and an apparatus using the method. A personalized template for a message...
2017/0316215 POLICY-BASED AUDITING OF STATIC PERMISSIONS FOR PHYSICAL ACCESS CONTROL
A system for auditing physical access to at least one resource includes a static permission database containing a plurality of static permission records...
2017/0316214 NON-MALLEABLE OBFUSCATOR FOR SPARSE FUNCTIONS
Described is a system for obfuscating a computer program. Sensitive data of an unprotected computer program is received as input. A random oracle is used to...
2017/0316213 IDENTIFYING CHARACTERISTICS OF PROBLEMATIC DEVELOPERS OF SOFTWARE
Disclosed are various embodiments for identifying characteristics of developers of problematic software. Report data generated by a security analysis tool is...
2017/0316212 CUSTOMIZING A SECURITY REPORT USING STATIC ANALYSIS
A control graph representing a model of data flow of a computer program can be generated during a static analysis. Respective edge weights can be assigned to...
2017/0316211 APPLICATION TRANSLOCATION
In one embodiment, a software application that is downloaded from an untrusted source is marked, based on the untrusted classification of the source, to be...
2017/0316210 IMPLEMENTING A SECURITY SOLUTION USING A LAYERING SYSTEM
A security solution can be implemented using a layering system. By using a layering system, any changes that are made to a computing system can be isolated...
2017/0316209 METHOD AND DEVICE FOR PREVENTING APPLICATION IN AN OPERATING SYSTEM FROM BEING UNINSTALLED
Provided are a method and device for preventing the application in an operating system from being uninstalled. The method includes monitoring the operation...
2017/0316208 FILE INTEGRITY PRESERVATION
In one embodiment of file integrity preservation in accordance with the present description, a file is subdivided into a plurality of subfiles, and a write...
2017/0316207 REAL-TIME NETWORK UPDATES FOR MALICIOUS CONTENT
A global response network collects, analyzes, and distributes "cross-vector" threat-related information between security systems to allow for an intelligent,...
2017/0316206 METHOD, APPARATUS, SYSTEM, DEVICE AND COMPUTER STORAGE MEDIUM FOR TREATING VIRUS
The present invention provides a method, apparatus, system, device and a computer storage medium for treating virus. A client reports a scan log to a cloud...
2017/0316205 SYSTEMS AND METHODS TO DETECT AND NEUTRALIZE MALWARE INFECTED ELECTRONIC COMMUNICATIONS
Systems and methods to detect and neutralize malware infected electronic communications are described. The system receives, at a server, a request for...
2017/0316204 AGENT PRESENCE FOR SELF-HEALING
In one or more examples, there is disclosed a system and method of detecting agent presence for self-healing. An out-of-band monitoring process, such as...
2017/0316203 TECHNIQUES FOR SHARING NETWORK SECURITY EVENT INFORMATION
This disclosure provides techniques for pooling and searching network security events reported by multiple sources. As information representing a security...
2017/0316202 RASP FOR SCRIPTING LANGUAGES
A method for runtime analysis of a software program (24) written in a scripting language. The method includes, before running the software program, adding...
2017/0316201 TECHNIQUES FOR ENFORCING CONTROL FLOW INTEGRITY USING BINARY TRANSLATION
Various embodiments are generally directed to an apparatus, method and other techniques to determine a valid target address for a branch instruction from...
2017/0316200 INTERACTIVE CAPTCHA
In response to a user access request, a media object containing a plurality of media components is constructed and transmitted to the user. At least one of the...
2017/0316199 SYSTEM FOR CONTROLLING ACCESS TO AN ACCOUNT
An account management server, a communication device and a service device are provided for managing access to an account. The account management server, for...
2017/0316198 METHOD FOR AUTHENTICATING A USER DEVICE DURING THE PROCESS OF LOGGING INTO A SERVER
The invention relates to a computer system (10) and to a method for authenticating a user device (Bm) associated with a user during the process of logging into...
2017/0316197 USER INTERFACE CONTROL METHOD AND ELECTRONIC DEVICE
A user interface control method executed in a security-locked electronic device with a touch screen detects an i-th sliding operation on the touch screen,...
2017/0316196 CONTROLLING USER ACCESS TO ELECTRONIC RESOURCES WITHOUT PASSWORD
Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image...
2017/0316195 DEVICE AND METHOD FOR OPTICAL CAPTURE AT DIFFERENT WAVELENGTHS EMITTED SEQUENTIALLY
A device and method, the purpose of which is to secure digital fingerprint reading by sequential optical captures with optimization of the exposures to light....
2017/0316194 Apparatus and Methods for Improving Terminal Security
The present invention provides an apparatus and a method for improving terminal security to improve security of a terminal. The method in the present invention...
2017/0316193 IMAGE SENSING SYSTEM
A system may include a sensing device and an application device. The sensing device includes an imaging device, an image processing unit that detects a whole...
2017/0316192 Biometric Interface System and Method
A system includes a wearable device having at least one sensor configured to determine a user's fingerprint data, at least one data storage device containing...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.