Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0344784 Method for Controlling Unlocking and Terminal
A method for controlling unlocking is provided. The method includes the following operations. A touch operation of a finger of user on a fingerprint...
2017/0344783 METHOD FOR LAUNCHING APPLICATION AND TERMINAL
A method and a terminal are provided for launching an application. The method includes acquiring a sliding trace of a sliding operation performed on a...
2017/0344782 FINGERPRINT SENSOR WITH FORCE SENSOR
The present invention generally relates to a method for authenticating a user of an electronic device comprising a fingerprint sensor and a force sensor, the...
2017/0344781 Method for Controlling Unlocking and Terminal
A method for controlling unlocking is provided. When a touch operation of a finger of a user on a fingerprint recognition sensor of a terminal is detected, a...
2017/0344780 FINGERPRINT SENSOR WITH CONTROLLABLE RESOLUTION
There is provided a capacitive fingerprint sensing device for sensing a fingerprint pattern of a finger, the capacitive fingerprint sensor comprising: a...
2017/0344778 BIOLOGICAL INFORMATION RECOGNITION APPARATUS AND SCANNING METHOD OF THE BIOLOGICAL INFORMATION RECOGNITION...
The present invention relates to a method a biological information recognition apparatus and a method for activating, by the biological information recognition...
2017/0344777 SYSTEMS AND METHODS FOR DIRECTIONAL SENSING OF OBJECTS ON AN ELECTRONIC DEVICE
Systems and methods determine a swipe direction of an object on an electronic device to enable the performance of actions in response to the determined swipe...
2017/0344776 PER-CHANNEL COLOR BARCODES FOR DISPLAYS
A method of decoding a coherent RGB color barcode captured by a RGB camera includes: displaying a coherent RGB color barcode on the RGB display; capturing an...
2017/0344775 BARCODE READER CONFIGURED FOR IMAGE PRE-PROCESSING
A barcode reader may include an image sensor array, an optic system, an image buffer, and a plurality of pre-processing circuits implemented in hardware. The...
2017/0344774 METHOD OF USING CAMERA SENSOR INTERFACE TO TRANSFER MULTIPLE CHANNELS OF SCAN DATA USING AN IMAGE FORMAT
A computer system for decoding a signal of decodable indicia is disclosed. The computer system includes a laser scanner configured that outputs a signal of...
2017/0344773 MOTION-CONTROLLED ARRANGEMENT FOR, AND METHOD OF, LOCATING TARGETS WITH IMPROVED PERFORMNCE IN A VENUE
Multiple sensing network units are deployed overhead in a venue. Each unit supports a motion detecting system for detecting a level of motion in a zone of the...
2017/0344772 RFID READING APPARATUS FOR SHELF OCCUPANCY DETECTION
An RFID reading apparatus (20) for shelf occupancy detection comprises an elongated antenna (18) with an outer conductor (26) and an inner conductor (28)...
2017/0344771 SYSTEMS AND METHODS FOR SCANNING A USER ENVIRONMENT AND EVALUATING DATA OF INTEREST
According to various embodiments, a mobile device continuously and/or automatically scans a user environment for tags containing non-human-readable data. The...
2017/0344770 RFID TAG
An RFID tag of one embodiment includes an RFID tag main body, in which an RFID chip and an antenna are disposed on a base material, and a retro-reflective...
2017/0344769 OBJECT IDENTIFICATION THROUGH ELECTROMAGNETIC TAG SIGNATURE
In an approach for identifying an object using an electromagnetic tag, an electromagnetic signal is received by a sensor, wherein the electromagnetic signal...
2017/0344768 PORTABLE TERMINAL, DATA COMMUNICATION SYSTEM, DATA COMMUNICATION METHOD AND PROGRAM
A portable terminal includes a wireless communication unit configured to perform data communication with a wireless tag in a non-contact manner, a position...
2017/0344767 SECURING INTERNET OF THINGS (IOT) RF (RADIO FREQUENCY) LOCATION TAGS USING SOURCE ADDRESSES TO LOCATE STATIONS...
RF tags using source addresses to locate stations on a Wi-Fi network are secured. An RF location server receives a pseudo source address of an RF (radio...
2017/0344766 ANTENNA LOOP CONFIGURATION FOR MORE EFFECIENTLY SURROUNDING THE HIGH INTENSITY AREA OF THE MAGNETIC FIELD...
A communication device including a device-side antenna 30 for wireless communication with an IC card 10 including a card-side antenna 11 wound in a rectangular...
2017/0344765 NFC Tags with Proximity Detection
Systems, apparatuses and methods provide for detecting the proximate placement of an external NFC reader to a specific location on a display surface. The...
2017/0344764 SMART CARD CONNECTOR
A smart card connector including a housing defining a smart card receiving slot communicating with a smart card ingress slit formed in the housing, a plurality...
2017/0344763 APPARATUS AND METHOD FOR APPLYING BAR CODES TO PELLET-SHAPED ARTICLES
A conveyer mechanism (110) may include one or more composition inspection units provided along the intended product transport path. The product's composition,...
2017/0344762 METHOD AND DEVICE FOR PROVIDING NOTIFICATION INDICATING LOSS OF TERMINAL
A method and a device are disclosed for providing a notification indicating a loss of a terminal, the method including obtaining a matching relation between...
2017/0344761 AUTHENTICATION SYSTEM AND METHOD
A system for authenticating a circuit includes: a processor; and a memory, and the memory has stored thereon instructions that, when executed by the processor,...
2017/0344760 DETECTION SYSTEM AND METHOD
A system for detecting changes to circuitry includes: a processor; and a memory, and the memory has stored thereon instructions that, when executed by the...
2017/0344759 ELECTRONIC CIRCUIT PERFORMING ENCRYPTION/DECRYPTION OPERATION TO PREVENT SIDE-CHANNEL ANALYSIS ATTACK, AND...
An electronic circuit includes an operator including logic gates configured to perform either one or both of encryption and decryption operations. The...
2017/0344758 SIGNATURE GENERATION DEVICE, SIGNATURE VERIFICATION DEVICE, SIGNATURE GENERATION METHOD, AND SIGNATURE...
A signature generation device includes a data acquirer acquiring a plurality of mutually related pieces of data including first data and a signature generator...
2017/0344757 CPU OBFUSCATION FOR CLOUD APPLICATIONS
A cloud deployment system is used for obfuscating CPU operation codes in a set of machines operating in a distributed computing environment. A reprogrammable...
2017/0344756 Tokenization Column Replacement
A tokenization system includes a vector table and one or more token tables. The tokenization system accesses sensitive data and a vector from a vector table...
2017/0344755 SECURE HEALTH DATA STORAGE AND TRANSACTION SYSTEM
Embodiments of the invention are directed to a system, method, or computer program product for a transaction apparatus for secure data storage and...
2017/0344754 System and Method for Data Management and Task Routing Based on Data Tagging
Systems and methods are shown for managing call center data in accordance with one or more sets of compliance rules involving receiving data pertaining to an...
2017/0344753 INTER-PROCESS ACCESS CONTROL
A kernel receives a request to execute a first process instance from an agent. The first process instance is an instance of a first program. The kernel obtains...
2017/0344752 INTER-PROCESS ACCESS CONTROL
A kernel receives a request to execute a first process instance from an agent. The first process instance is an instance of a first program. The kernel obtains...
2017/0344751 METHOD FOR CONFIGURATION OF A FIELD DEVICE FOR USE IN CUSTODY TRANSFER AND SUCH FIELD DEVICE
A method for configuring a field device for use in custody transfer and such a field device, wherein the field device has a computing unit and a storage,...
2017/0344750 MANAGING MOBILE APPLICATION SECURITY
One embodiment provides a method, the method including: utilizing at least one processor to execute computer code that performs the steps of: identifying one...
2017/0344749 METHODS AND APPARATUS TO PROVIDE GROUP-BASED ROW-LEVEL SECURITY FOR BIG DATA PLATFORMS
Methods, apparatus, systems and articles of manufacture are disclosed to facilitate electronic data security. An example apparatus includes a data storage...
2017/0344748 Intelligent Secure Social Media Based Event Management System
An intelligent system and method for gathering social network data for an event, moderate the data, and display it to people along with analytics. The system...
2017/0344747 SYSTEMS AND METHODS TO OPTIMIZE EXECUTION OF A SOFTWARE PROGRAM USING A TYPE BASED SELF ASSEMBLING CONTROL FLOW...
Using various embodiments, methods and systems to optimize the execution of a software program are disclosed. In one embodiment, a system is configured to...
2017/0344746 UTILIZING LIKELY INVARIANTS FOR RUNTIME PROTECTION OF WEB SERVICES
An exemplary method for use with an application includes: testing the application with a set of security payloads to produce a set of execution traces, wherein...
2017/0344745 SYSTEM FOR UTILIZING ONE OR MORE DATA SOURCES TO GENERATE A CUSTOMIZED SET OF OPERATIONS
Systems and computer-readable media are disclosed for utilizing one or more data sources to generate a set of operations. First data may be received from a...
2017/0344744 DETECTING KEYLOGGING
A device may detect or emulate a sequence of keystrokes to be used to detect a keystroke logger application. The device may determine a sequence of characters...
2017/0344743 METHOD AND APPARATUS FOR PROACTIVELY IDENTIFYING AND MITIGATING MALWARE ATTACKS VIA HOSTED WEB ASSETS
A new approach is proposed that contemplates systems and methods to provide identification and mitigation of malware attack via Web assets hosted on a Web...
2017/0344742 MALWARE DETECTION USING CLUSTERING WITH MALWARE SOURCE INFORMATION
Techniques for malware detection using clustering with malware source information are disclosed. In some embodiments, malware detection using clustering with...
2017/0344741 METHOD AND DEVICE FOR ENCRYPTING APPLICATION
The present disclosure relates to a method and a device for encrypting an application, belonging to a field of computer technology. The method includes:...
2017/0344740 CONFIGURING A SANDBOX ENVIRONMENT FOR MALWARE TESTING
A device may receive a file to be analyzed in a sandbox environment, and may determine configuration information for configuring the sandbox environment. The...
2017/0344739 VIRTUAL RELAY DEVICE FOR PROVIDING A SECURE CONNECTION TO A REMOTE DEVICE
Virtual machines in a network may be isolated by encrypting transmissions between the virtual machines with keys possessed only by an intended recipient....
2017/0344738 ELECTRONIC DEVICE AND UNLOCKING METHOD THEREOF
In method for unlocking an electronic device, a connection between an electronic device and a separate locking device is established. Identity information of...
2017/0344737 UNLOCKING CONTROL SYSTEM, METHOD AND WEARABLE DEVICE USING THE SAME
An unlocking control method is applied in a wearable device and a lockable electronic device. The wearable device communicates with the electronic device and...
2017/0344736 MONITORING SYSTEM FOR PHYSIOLOGICAL PARAMETER SENSING DEVICE
A system for detecting a physiological parameter of a subject includes a sensing device attached to a patient and an interrogation device for monitoring an...
2017/0344735 ELECTRONIC DEVICE AND UNLOCKING METHOD THEREFOR
An unlocking method used in an electronic device includes acquires data as to motion of the electronic device detected by a gyroscope at predetermined...
2017/0344734 Method for Controlling Unlocking and Terminal
A method for controlling unlocking is provided. At least one first fingerprint image is received when a touch operation of a finger of a user on a fingerprint...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.