Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0196978 Wireless RFID-Based Hand Sensory Apparatus with Contextual Antenna Selection
In aspects of a wireless RFID-based hand sensory apparatus with contextual antenna selection, a wearable article is worn by a user who moves items that each...
2018/0196977 SENSOR WITH TAIL OR TRANSMISSION LINE FOR VEHICLE LEAK TESTING
A method begins by detecting a variance of one or more RF characteristics of a wireless sensor from a desired value of the one or more RF characteristics, due...
2018/0196976 SMALL DIFFERENTIAL ELECTRIC FIELD ACTIVATED UHF RFID DEVICE
A small differential-electric-field-activated UHF RFID device. Such a device may be small and easy to manufacture, improving the viability of incorporating...
2018/0196975 RFID TRACKING FASTENER
In some embodiments, a tracking fastener may include a plastic tracking fastener. The plastic tracking fastener may include a plastic tracking staple or a...
2018/0196974 Ambient Backscatter Communication With Devices Having a Circuit Carrier With Embedded Communication Equipment
An ambient backscatter (transmit) communication device includes (a) an antenna arrangement for scattering electromagnetic radiation towards a receive...
2018/0196973 Security Certification Method for Hiding Ultra-High Frequency Electronic Tag Identifier
A security certification method for hiding an ultra-high frequency electronic tag identifier. By encrypting the electronic tag identifier (TID) using a random...
2018/0196972 ASSET TRACKING USING ACTIVE WIRELESS TAGS THAT REPORT VIA A LOCAL NETWORK OF CONNECTED BEACONS
A tag is configured to provide information that enables a processor or other computing device to locate the tag and any asset associated with the tag in an...
2018/0196971 CARD READER
A card reader for use with a card having a magnetic stripe may include a card insertion port into which the card is inserted; a card passage along which the...
2018/0196970 VISUAL CHOICE SELECTION CONCEALMENT COMPUTING DEVICE AND METHOD OF OPERATION
The present application intends to solve the problem of concealing a choice selection from third-party vision using optical effects. Disclosed are methods...
2018/0196969 CONTEMPORANEOUS GESTURE AND KEYBOARD FOR DIFFERENT LEVELS OF ENTRY AUTHENTICATION
A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to...
2018/0196968 KEYBOARD ENTRY AS AN ABBREVIATION TO A CONTEMPORANEOUS GESTURE AUTHENTICATION
A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to...
2018/0196967 CONTEXTUAL CONTEMPORANEOUS GESTURE AND KEYBOARD ENTRY AUTHENTICATION
A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to...
2018/0196965 System and method for authenticating and IP licensing of hardware modules
The invention relates to a license-verification circuit for selectively activating one or more protected circuits (206) of a device (102) the ...
2018/0196964 Secure Intelligent Networked Architecture with Dynamic Feedback
Provided herein are exemplary systems and methods including the generation of a superior strategy for deployment to real time actual conditions with dynamic...
2018/0196963 Method for Saving, Sending and Recollection of Confidential User Data
A system/method for displaying, in a first language, a request for a length of user data to be saved; receiving the length of user data; displaying a number of...
2018/0196962 SYSTEM AND METHOD FOR ANALYZING COOPERATIVE SYNTHETIC IDENTITIES
According to another embodiment of the disclosure, a method includes determining a first original identifier. The original identifier uniquely identifies a...
2018/0196961 SYSTEM AND METHOD FOR MANAGING COOPERATIVE SYNTHETIC IDENTITIES FOR PRIVACY PROTECTION THROUGH IDENTITY...
According to one embodiment of the disclosure, a method includes receiving, from a first requestor, a request to create a cooperative synthetic identity case...
2018/0196960 DISPATCHING IDENTITY INFORMATION FROM SECURE HARDWARE APPLIANCE
A technique for promoting network security employs a user-centric approach in which a hardware appliance serves as a local security hub for storing and...
2018/0196959 LOG OUTPUT APPARATUS AND LOG OUTPUT METHOD
A log output apparatus includes, a memory and a processor coupled to the memory and the processor configured to, specify an occurrence time when an incident...
2018/0196958 Automatic Audit Logging of Events in Software Applications Performing Regulatory Workloads
Automatically generating audit logs is provided. Audit log statement insertion points are identified in software components of an application based on a static...
2018/0196957 STORAGE AND PRIVACY SERVICE
In one embodiment, a method includes receiving a request for an object; retrieving one or more rules to evaluate whether to allow or deny access to the object,...
2018/0196956 SECURITY ARCHITECTURE AND METHOD
A security architecture and method for a system on a chip or a microcontroller. The method in one embodiment includes a first central processing unit (CPU)...
2018/0196955 DATA SHARING IN A MULTI-TENANT DATABASE SYSTEM
A method for sharing data in a multi-tenant database includes generating a share object in a first account comprising a share role. The method includes...
2018/0196954 SYSTEMS AND METHODS FOR AUTOMATIC AND CUSTOMIZABLE DATA MINIMIZATION OF ELECTRONIC DATA STORES
A dynamic data minimization server implements minimization protocols to entity-specific information based on access rights (e.g., privacy rights) of a...
2018/0196953 METHODS AND SYSTEMS FOR PREVENTING TRANSMISSION OF SENSITIVE DATA FROM A REMOTE COMPUTER DEVICE
A technique for preventing selected sets of data words from unauthorized transmission out of the secure perimeter of a computer system is disclosed. A set of...
2018/0196952 METHOD FOR SECURELY TRANSMITTING A SECRET DATA TO A USER OF A TERMINAL
This disclosure relates to a method for securely transmitting a secret data to a user, including: receiving by a user terminal, from a secure processor, a...
2018/0196951 Field-Programmable Gate Array Virtualization
Techniques for field-programmable gate array (FPGA) virtualization are described herein. In one or more implementations, an FPGA virtualization manager of a...
2018/0196950 SYSTEM AND METHOD OF GENERATING AND VALIDATING ENCAPSULATED CRYPTOGRAPHIC TOKENS BASED ON MULTIPLE DIGITAL...
Functional data for use in one or more digital transactions are secured by using an encapsulated security token (EST). In certain embodiments, the EST is...
2018/0196949 METHOD FOR OPERATING SEMICONDUCTOR DEVICE
Provided is a method of operating a semiconductor device. A method of operating a semiconductor device includes storing secure data in a secure area of a...
2018/0196948 DISTRIBUTED AND DECENTRALIZED CLOUND STORAGE SYSTEM AND METHOD THEREOF
A distributed and decentralized cloud storage method, which comprises: dynamically establishing a set of private notes (`PN") after a service requiring note...
2018/0196947 DATA REDUCTION WITH END-TO-END SECURITY
A storage controller coupled to a storage array comprising one or more storage devices receives a request to write encrypted data to a volume resident on a...
2018/0196946 PREVENTING CODE MODIFICATION AFTER BOOT
The subject disclosure is directed towards protecting code in memory from being modified after boot, such as code used in a dedicated microprocessor or...
2018/0196945 DECENTRALIZED ROOT-OF-TRUST FRAMEWORK FOR HETEROGENEOUS NETWORKS
Systems and methods are disclosed for providing a trusted computing environment that provides data security in commodity computing systems. Such systems and...
2018/0196944 APPLICATIONS OF A BINARY SEARCH ENGINE BASED ON AN INVERTED INDEX OF BYTE SEQUENCES
Techniques for searching an inverted index associating byte sequences of a fixed length and files that contain those byte sequences are described herein. Byte...
2018/0196943 Binary Search of Byte Sequences Using Inverted Indices
Techniques for searching an inverted index associating byte sequences of a fixed length and files that contain those byte sequences are described herein. Byte...
2018/0196942 Endpoint Detection and Response Utilizing Machine Learning
A plurality of events associated with each of a plurality of computing nodes that form part of a network topology are monitored. The network topology includes...
2018/0196941 SECURITY SYSTEM AND METHODS FOR IDENTIFICATION OF IN-VEHICLE ATTACK ORGINATOR
The present invention provides a security system, and methods useful for vehicle CAN bus communication mapping and attack originator identification,...
2018/0196940 ISOLATION AND PRESENTATION OF UNTRUSTED DATA
Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application....
2018/0196939 Component Protection Frameworks Using Defensive Patterns
Systems and methods are provided herein for establishing a protection framework for a component. Identified assets of a component requiring protection from a...
2018/0196938 PROGRAMMING CODE EXECUTION MANAGEMENT
In one aspect of the present description, operations are described for detecting whether programming code of a first computer program has been modified by a...
2018/0196937 ELECTRONIC DEVICE AND METHOD OF CONTROLLING SAME
Provided are an electronic device and a method of controlling same. The method of controlling the electronic device: displays a UI including a security index...
2018/0196936 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR CONTROLLING AND ALTERING BIOLOGICAL, BIOMETRIC, AND...
An authentication control method, system, and computer program product, includes performing an initial calibration to login to a registered device by detecting...
2018/0196935 RECEIVING APPARATUS, TRANSMITTING APPARATUS, AND DATA PROCESSING METHOD
There is provided an arrangement for executing an application on the condition that the application has been confirmed as authorized. A transmitting apparatus...
2018/0196934 PROXIMITY-BASED ACCIDENTAL LOCK SCREEN COMMAND PREVENTION FOR MOBILE COMMUNICATION TERMINAL
A mobile communication terminal (400) has a controller (410), a touch display (430) and a proximity sensor (420). The touch display has an inactive mode (610;...
2018/0196933 SYSTEM AND METHOD FOR UNLOCKING DEVICES ASSOCIATED WITH A CARRYING BAG
A system and method for unlocking devices associated with a carrying bag are provided. In example embodiments, biometric information of a user from a biometric...
2018/0196932 METHOD AND APPARATUS FOR AUTHENTICATING USER USING ELECTROCARDIOGRAM SIGNAL
A method and apparatus to authenticate a registered user are described. The method and apparatus include a processor configured to identify a first...
2018/0196931 ELECTRONIC DEVICE AND METHOD FOR CONTROLLING DISPLAY UNIT INCLUDING A BIOMETRIC SENSOR
The present disclosure relates to an electronic device and a method for controlling a display that includes a biometric sensor. The electronic device may...
2018/0196930 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR STATEFUL INSTRUCTION-BASED DYNAMIC MAN-MACHINE INTERACTIONS FOR...
A humanness validation method, system, and computer program product, include generating a sequence of actions including gaze actions and emotional state...
2018/0196929 DATA INPUT METHOD, AND ELECTRONIC DEVICE AND SYSTEM FOR IMPLEMENTING THE DATA INPUT METHOD
A data input method is implemented by an electronic device that includes a storage component, a display device and a processor. The storage component stores an...
2018/0196928 NETWORK VISUALIZATION FOR ACCESS CONTROLS
Network visualization of access controls is utilized to manage computing resources in a computing environment. Host computing systems, virtual nodes executing...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.