Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0372110 DISPLAY DEVICE
A display panel including a display function layer displaying an image in a display area, a cover member including a first face and a second face disposed on...
2017/0372109 CAPACITIVE FINGERPRINT RECOGNITION MODULE
This application provides a capacitive fingerprint recognition module, including a substrate, a fingerprint recognition chip, a mold compound, a chip adhesive...
2017/0372108 Digital image processing using face detection and skin tone information
A technique for processing a digital image uses face detection to achieve one or more desired image processing parameters. A group of pixels is identified that...
2017/0372107 DECODING BARCODES
Systems and methods are provided for decoding barcodes. A scan signal is acquired along a scan through a barcode. A first character unit grid for a unit width...
2017/0372106 SYSTEM, APPARATUS AND METHOD FOR SEQUENCING OBJECTS HAVING RFID TAGS ON A MOVING CONVEYOR
In some embodiments, apparatuses and methods are provided herein useful to track objects on a moving conveyor system. In some embodiments, an RFID based...
2017/0372105 Cargo Handling System
Systems and methods for managing information flow when handling cargo. A mobile reader may be configured to connect to wirelessly readable memory devices...
2017/0372104 UTILIZATION OF MOTION AND SPATIAL IDENTIFICATION IN RFID SYSTEMS
In one aspect where a load or a subset of one or more tags is in motion relative to an RFID reader system, the RFID system obtains tag readings and derives tag...
2017/0372103 Pattern Recognition Based Motion Detection for Asset Tracking System
An asset tracking system that optimizes the value per ping by tying the ping to a pattern of movements of the asset. The asset tracking device will send a ping...
2017/0372102 RFID RECEIVER AND METHOD OF EXTRACTING DATA BITS ENCODED IN A RADIO SIGNAL
An RFID receiver (1) comprises an antenna (11) configured to receive a radio signal (20) from an RFID transmitter (2) and to generate an electrical signal...
2017/0372100 System and Method of Notifying an Owner of a Blocking Vehicle
This disclosure relates generally to the field of wireless communication technology and more particularly to a system and a method of notifying an owner of a...
2017/0372099 CARRIER FOR THE EXAMINATION OF WORKPIECES BY COMPUTED TOMOGRAPHY
A workpiece having an identification code is arranged on a workpiece carrier having coded therein, by a pattern made from a plurality of mutually separate...
2017/0372098 LABORATORY INSTRUMENT
The invention relates to a laboratory device, in particular to a peristaltic pump, having an accessory part, in particular a pump head, that is removably...
2017/0372097 COMPUTER-IMPLEMENTED METHOD FOR IMPROVING A SOCIAL NETWORK SITE COMPUTER NETWORK, AND TERMINAL, SYSTEM AND...
A method, at a terminal in a digital communications network, comprising: establishing direct or indirect communication access and linkage between the...
2017/0372096 SYSTEMS AND METHODS FOR MODIFYING AND REDACTING HEALTH DATA ACROSS GEOGRAPHIC REGIONS
Systems and methods are disclosed for preserving patient privacy while transmitting health data from one geographic region to another geographic region for...
2017/0372095 PRIVACY DETECTION OF A MOBILE APPLICATION PROGRAM
Privacy violation detection of a mobile application program is disclosed. Regular histories of the mobile application are mined. A call-graph representation of...
2017/0372094 METHOD AND APPARATUS FOR SECURE STORAGE AND RETRIEVAL OF ENCRYPTED FILES IN PUBLIC CLOUD-COMPUTING PLATFORMS
In one aspect, a computerized Encrypted Drive System (EDS) server useful for keyword extraction and indexing server of includes a computer store containing...
2017/0372093 FORMING A PROTECTED DATA FIELD ENTRY
The system may comprise receiving a data element, and receiving an encryption key and an associated encryption key identifier from an encryption keystore...
2017/0372092 INFORMATION PROCESSING SYSTEM, TERMINAL, AND DETERMINATION APPARATUS
An information processing system including an information processing apparatus, a terminal, and a determination apparatus, wherein the information processing...
2017/0372091 Systems and Methods for Sharing Verified Identity Documents
A method for sharing identity information is disclosed. The method is performed at one or more devices. The one or more devices obtain identity information of...
2017/0372090 Reversible Redaction and Tokenization Computing System
A computing system for redacting and/or tokenizing non-public information of electronic documents obtained from monitored communications includes a data...
2017/0372089 METHOD AND SYSTEM FOR DYNAMIC VIRTUAL PORTIONING OF CONTENT
A system and method for virtual portioning of content on a mobile device, comprising assigning each content of the plurality of content stored on the mobile...
2017/0372088 LIGHTWEIGHT TRUSTED EXECUTION FOR INTERNET-OF-THINGS DEVICES
Lightweight trusted execution technologies for internet-of-things devices are described. In response to a memory request at a page unit from an application...
2017/0372087 METHOD AND SYSTEM FOR DATA MANAGEMENT
Provided is a data management method and system. A data management method executed by an electronic device configured as a computer may include setting a first...
2017/0372086 LEAKAGE PREVENTION APPARATUS, LEAKAGE PREVENTION METHOD AND PROGRAM
An assumed use permission range storage stores a predetermined assumed use permission range. An unavailable state storage stores an information asset in an...
2017/0372085 PROTECTING DATA IN A STORAGE DEVICE
A first data encryption key is stored on a storage device. The first data encryption key, a first key encryption key obtained from first information received...
2017/0372084 PRINTING SYSTEM, ENCRYPTION KEY CHANGE METHOD, PRINTER, AND PROGRAM
A printing system includes: a program of a printer drive; and printers, wherein the printing system encrypts part of a print job and transmits the print job to...
2017/0372083 SECURE TRANSACTION METHOD FROM A NON-SECURE TERMINAL
The invention relates to a transaction method, the method including the steps of: providing a tenninal including a main processor, a graphic processor...
2017/0372082 Methods and a System for Inoculating Inter-Device Communication
A sending processing environment establishes a connection with a receiving processing environment for purposes of providing data during a communication session...
2017/0372081 EXECUTING PRIVILEGED CODE IN A PROCESS
A system and method for executing privileged code in a process are described. The method includes establishing, by an authorized library, a privileged...
2017/0372080 DYNAMICALLY PROVISIONING VIRTUAL MACHINES
Embodiments of the present invention disclose methods and systems which receive a user credential corresponding to a user, a task to be performed by the user,...
2017/0372079 SELECTIVE DATA ENCRYPTION
As disclosed herein a computer-implemented method includes receiving a request to perform selective data encryption on captured content corresponding to a...
2017/0372078 SYSTEMS AND METHODS FOR JURISDICTION INDEPENDENT DATA STORAGE IN A MULTI-VENDOR CLOUD ENVIRONMENT
A cloud based system for providing data security, the system having a processor which creates a source data file; wherein the source data file is split into at...
2017/0372077 SELECTIVE DATA ENCRYPTION
As disclosed herein a computer-implemented method includes receiving a request to perform selective data encryption on captured content corresponding to a...
2017/0372076 TECHNOLOGIES FOR PROVISIONING AND MANAGING SECURE LAUNCH ENCLAVE WITH PLATFORM FIRMWARE
Technologies for configuring a launch enclave include a computing device having a processor with secure enclave support. A trusted execution environment (TEE)...
2017/0372075 EFFICIENT REBOOT OF AN OPERATING SYSTEM
A computer system is rebooted upon crash without running platform firmware and without retrieving all of the modules included in a boot image from an external...
2017/0372074 SECURE BOOTING OF COMPUTER SYSTEM
A computer system is securely booted by executing a boot firmware to locate a boot loader and verify the boot loader using a first key that is associated with...
2017/0372073 SECURE BOOTING OF COMPUTER SYSTEM
A computer system is securely booted by executing a boot firmware to locate a boot loader and verify the boot loader using a first key that is associated with...
2017/0372072 DETECTING VULNERABLE APPLICATIONS
A method and system of determining a vulnerability of software. Libraries are downloaded and stored in a database. For each library, a set of features are...
2017/0372071 METHODS AND APPARATUS FOR DETECTING WHETHER A STRING OF CHARACTERS REPRESENTS MALICIOUS ACTIVITY USING MACHINE...
In some embodiments, a processor can receive an input string associated with a potentially malicious artifact and convert each character in the input string...
2017/0372070 CLOUD STORAGE SCANNER
A system, method and computer program for a scanning service is presented. A scanning service compatible with a cloud storage system is configured to receive...
2017/0372069 INFORMATION PROCESSING METHOD AND SERVER, AND COMPUTER STORAGE MEDIUM
The present disclosure discloses an information processing method, including the steps of acquiring at least one executable file of a specified type;...
2017/0372068 METHOD TO IDENTIFY KNOWN COMPILERS FUNCTIONS, LIBRARIES AND OBJECTS INSIDE FILES AND DATA ITEMS CONTAINING AN...
Apparatus for identifying the functionality and structure of an executable, for examining and classifying the executable, consisting of a computerized hardware...
2017/0372067 METHOD FOR DETECTING THE TAMPERING OF APPLICATION CODE AND ELECTRONIC DEVICE SUPPORTING THE SAME
An electronic device is provided. The electronic device includes a memory configured to store an application and first unique information of the application,...
2017/0372066 DETECTING HARMFUL APPLICATIONS PRIOR TO INSTALLATION ON A USER DEVICE
Examples of techniques for detecting harmful applications prior to installation on a user device are disclosed. In one example implementation according to...
2017/0372065 SCANNING KERNEL DATA STRUCTURE CHARACTERISTICS
A method and apparatus for detecting kernel data structure tampering are disclosed. In the method and apparatus, a memory region of a computer system is...
2017/0372064 METHOD AND SYSTEM FOR PREVENTING AND DETECTING SECURITY THREATS
A system and method is provided for implementing platform security on a consumer electronic device having an open development platform. The device is of the...
2017/0372063 VIRTUALIZATION BASED INTRA-BLOCK WORKLOAD ISOLATION
Generally, this disclosure provides systems, devices, methods and computer readable media for virtualization-based intra-block workload isolation. The system...
2017/0372062 SYSTEMS AND METHODS FOR DETERMINING TRUST LEVELS FOR COMPUTING COMPONENTS
Systems and methods for determining trust levels for components of a computing application including a development framework, a trust matrix, a trust level...
2017/0372061 PROVISIONING OF IDENTITY INFORMATION
In one embodiment, a file comprising a disk image and a key blob is prepared. The file is attached to a virtual machine configuration. A virtual machine based...
2017/0372060 SYSTEM, METHOD AND APPARATUS FOR EXTRACTING USAGE-BASED FINE GRAINED PERMISSIONS
A fine grained permission method and system that parameterizes permissions based on an objective criterion. The method includes accessing libraries of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.