Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0025192 ELECTRONIC IDENTIFICATION DOCUMENT
An electronic identification document is provided. The electronic identification document may include a carrier, an identification element, a microwave...
2018/0025191 RFID APPARATUS AND METHOD FOR COMMUNICATING WITH AT LEAST ONE RFID TRANSPONDER
An RFID apparatus for communicating with at least one RFID transponder is provided that has an RFID transceiver for radiating and receiving RFID signals and a...
2018/0025190 MULTI SIGNAL DIFFUSION INTEGRATED SYSTEM AND METHOD
An Internet of Things (IoT) enabled multi signal diffusion integrated system smartly tracks assets in different environments, using a combination of Radio...
2018/0025189 SIGNAL PROCESSING DEVICE
The purpose of the present invention is to provide a signal processing device that performs processing suitable for a signal processing device that transmits...
2018/0025188 METHODS, COMPUTER PROGRAM PRODUCTS, AND SYSTEMS FOR PROVIDING AUTOMATED VIDEO TRACKING VIA RADIO FREQUENCY...
Methods, computer program products and systems for providing video tracking. The method includes receiving a first signal from a radio frequency identification...
2018/0025187 READING DEVICE, SERVER DEVICE, AND PROGRAM
A reading apparatus includes a control unit and an interface through which the control unit transmits an output request to an electronic tag and receives tag...
2018/0025186 LABELING AND AUTHENTICATING USING A MICROTAG
An identifier made using a silicon film fragment. The silicon film has a varying optical index of refraction. The varying optical index of refraction reflects...
2018/0025185 ON-THE-FLY MARKING SYSTEMS FOR CONSUMER PACKAGED GOODS
An on-the-fly package label printing system for a variety of packages containing a variety of products printed on each package of a web of successive packages...
2018/0025184 PROGRAM EXECUTION DEVICE
A program execution device capable of protecting a program against unauthorized analysis and alteration is provided. The program execution device includes an...
2018/0025183 Management of Authenticated Variables
An embodiment includes an apparatus comprising: an out-of-band cryptoprocessor coupled to secure non-volatile storage; and at least one storage medium having...
2018/0025182 Phosphor-Loaded Waveguide
An improved waveguide is disclosed. The waveguide utilizes a luminescent material disposed within or around its perimeter to introduce additional light into...
2018/0025181 SYSTEM AND METHOD FOR VERIFYING DATA INTEGRITY USING A BLOCKCHAIN NETWORK
A system and method provided for verifying data integrity for large volumes of critical data using blockchain technology. An exemplary method includes storing...
2018/0025180 EXTERNAL RESOURCE CONTROL OF MOBILE DEVICES
The present disclosure provides a security enhanced channel control system useable on a wireless device comprising a policy module including at least one...
2018/0025179 METHOD/SYSTEM FOR THE ONLINE IDENTIFICATION AND BLOCKING OF PRIVACY VULNERABILITIES IN DATA STREAMS
A method and system for automatically identifying and protecting privacy vulnerabilities in data streams includes indexing data values for each attribute of...
2018/0025178 SYSTEMS AND METHODS FOR TRIGGER-BASED MODIFICATION OF PRIVACY SETTINGS ASSOCIATED WITH POSTS
Systems, methods, and non-transitory computer-readable media can identify a post to be published via a social networking system. A privacy schedule for...
2018/0025177 METHOD FOR PROTECTING PIN CODE ON ANDROID PLATFORM
The disclosure provides a method for protecting PIN code on Android platform, including: introducing, by Java layer, start event to C layer after invoked by...
2018/0025176 MEMBER INFORMATION MANAGEMENT SYSTEM AND MEMBER INFORMATION MANAGEMENT PROGRAM
A member information management system stores data of second stage groups H and I and second stage groups J and K and data of members belonging to these second...
2018/0025175 INFORMATION OUTPUT DEVICE, CAMERA, INFORMATION OUTPUT SYSTEM, INFORMATION OUTPUT METHOD, AND PROGRAM
As information output device includes: a first output unit that outputs acquired information acquired by a sensor; and a second output unit that converts...
2018/0025174 ACCESS CONTROLLED QUERIES AGAINST USER DATA IN A DATASTORE
In an example, a processing device of a datastore system may be configured to identify one or more grants of permission corresponding to one or more first...
2018/0025173 ENTITY SECURITY IMPLIED BY AN ASSET IN A REPOSITORY SYSTEM
Techniques are described for managing access to a repository system storing information (e.g., metadata) about objects (e.g., an application, a process, or a...
2018/0025172 DATA STORAGE APPARATUS, DATA PROCESSING METHOD, AND COMPUTER READABLE MEDIUM
An encrypted data receiving unit (201) receives encrypted data which has been encrypted, in which a decryption condition to define a user attribute of a...
2018/0025171 METHOD AND APPARATUS FOR CONTROLLING APPLICATION TO ACCESS MEMORY
A method for controlling an application to access a memory includes: receiving a first access request provided by the application and having a first access...
2018/0025170 FILE TRANSFER USING AN IN-BROWSER STAGING DATABASE
Methods and systems for data transfer include storing received data chunks in a staging database that is implemented within a browser sandbox. The stored data...
2018/0025169 TECHNIQUE FOR CONTROLLING THE READING OF A DIGITAL OBJECT
A technique for controlling the reading of a digital object by a user device. The digital object is stored locally in the memory of the user device. The...
2018/0025168 VIRTUAL SERVICE PROVIDER ZONES
A service proxy services as an application programming interface proxy to a service, which may involve data storage. When a request to store data is received...
2018/0025167 METHOD FOR STORING A DATA FILE OF A CLIENT ON A STORAGE ENTITY
A method for storing a data file of a client on a storage entity includes generating, by a proxy entity, a master encryption key; encrypting, by the client,...
2018/0025166 VALIDATING COMPUTER RESOURCE USAGE
A computer implemented method for validating use of a computing resource by a requester software component including: validating a characteristic of the...
2018/0025165 METHOD OF CONTROLLING MOBILE HARD DRIVE VIA MOBILE DEVICE
Method for controlling mobile hard disk through mobile device is disclosed, in which, control software installed on a computer is used to detect whether APP...
2018/0025164 DISSOLVABLE PROTECTION OF CANDIDATE SENSITIVE DATA ITEMS
Reducing risk of data loss by automatically background scanning a data set to detect a plurality of candidate sensitive data items. For at least some of those...
2018/0025163 DYNAMIC RISK MANAGEMENT
A dynamic risk management system for operating systems that provides monitoring, detection, assessment, and follow-up action to reduce the risk whenever it...
2018/0025162 APPLICATION PROGRAM ANALYSIS APPARATUS AND METHOD
Disclosed is an application program analysis apparatus comprising a first analyzer performing a dynamic analysis on an application program and extracting a...
2018/0025161 STATIC DETECTION OF CONTEXT-SENSITIVE CROSS-SITE SCRIPTING VULNERABILITIES
A method for statically analyzing a web application program may include obtaining a control flow graph for the web application program. Each control flow graph...
2018/0025160 GENERATING CONTAINERS FOR APPLICATIONS UTILIZING REDUCED SETS OF LIBRARIES BASED ON RISK ANALYSIS
A method includes analyzing a given application to determine one or more packages utilized by the given application, the one or more packages comprising a...
2018/0025158 SYSTEM AND METHOD FOR DETECTING MALWARE IN A STREAM OF BYTES
A system and method may include a first unit configured to receive a stream of bytes, cause a second unit to execute the stream of bytes from a selected first...
2018/0025157 AUTOMATED BEHAVIORAL AND STATIC ANALYSIS USING AN INSTRUMENTED SANDBOX AND MACHINE LEARNING CLASSIFICATION FOR...
The present system includes a computer-networked system that allows mobile subscribers, and others, to submit mobile applications to be analyzed for anomalous...
2018/0025156 Anti-Spoofing Defense System for a Can Bus
A processor is configured to identify a first impersonating message, transmitted over a Controller Area Network (CAN) bus by an attacking node connected to the...
2018/0025155 TOGGLE KEY BLOCKING METHOD FOR DATA SECURITY AND APPARATUS USING THE SAME
A toggle key blocking method for data security and an apparatus using the same. The toggle key blocking method for data security includes monitoring use of a...
2018/0025154 Method of Correlating Static and Dynamic Application Security Testing Results for a Web and Mobile Application
The invention provides a method of correlating and merging static application security testing (SAST) and dynamic application security testing (DAST) for web...
2018/0025153 METHOD AND DEVICE FOR DETECTING MALICIOUS CODE IN AN INTELLIGENT TERMINAL
The present invention discloses a method and device for detecting malicious code in an intelligent terminal. The method comprises: acquiring a virtual machine...
2018/0025152 SECURING MULTI-TENANCY IN A DATACENTER USING NANOSERVICES
A datacenter is configured to execute a method to improve multi-tenant security by isolating container applications or nano-service applications by...
2018/0025151 Wireless Memory Device Authentication
A system for wireless memory device authentication is provided, wherein a communications device receives a certified public key from a wireless memory device....
2018/0025150 AUTHENTICATED ACCESS TO MANAGEABILITY HARDWARE COMPONENTS
Examples include an authenticated access to manageability hardware components in a computing device. Some examples enumerate manageability hardware components...
2018/0025149 METHODS AND SYSTEMS FOR AUTHENTICATING A HEADSET FOR A TRANSPORTATION VEHICLE
Methods and systems for a transportation vehicle are provided. For example, one method includes storing a key on a device of a transportation vehicle and a...
2018/0025148 INCORPORATING RISK-BASED DECISION IN STANDARD AUTHENTICATION AND AUTHORIZATION SYSTEMS
Embodiments of the disclosure provide a method for enhancing standard authentication systems to include risk-based decisions. Risk-based decisions can be...
2018/0025147 SYSTEMS AND METHODS FOR SENSOR-BASED LAYER VARIATION ON MOBILE DEVICES
The present disclosure generally relates to visually varying an image using parallax image layers, and more specifically, relates to visually varying...
2018/0025146 METHOD FOR SECURE SYNCHRONIZATION AND PAIRING BETWEEN DEVICES AND APPARATUS USING THE METHOD
An electronic device includes a biomedical sensor configured to generate a first signal by detecting a biomedical signal, a motion sensor configured to...
2018/0025145 COMPUTER-IMPLEMENTED METHOD FOR CONTROLLING ACCESS
The invention relates to a computer-implemented method for controlling access of a terminal (118) to an attribute (112) stored in an ID token (100), wherein...
2018/0025144 INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING DEVICE, CONTROL METHOD, AND STORAGE MEDIUM
To provide an information processing system, an information processing device, a control method, and a storage medium capable of maintaining or improving...
2018/0025143 INDIVIDUALIZED CONTROL SYSTEM UTILIZING BIOMETRIC CHARACTERISTIC
A control system including a detection device and a control host is provided. The detection device is configured to detect a biometric characteristic to...
2018/0025142 COMPUTING DEVICE CHORDING AUTHENTICATION AND CONTROL
Chording techniques are described that may be utilized in a variety of ways to provide inputs to a computing device. The computing device, for instance, may...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.