Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0211078 HYBRID OPTICAL AND CAPACITIVE SENSOR
A hybrid capacitive and optical fingerprint sensor system includes: capacitive sensor electrodes; an optical image sensor having a plurality of image sensor...
2018/0211077 SECURITY DEVICE AND SECURITY SYSTEM INCLUDING THE SAME
A security device includes a door handle unit disposed on a door body, a cover layer including a touch sensor and covering the door handle unit, a door locking...
2018/0211076 APPARATUS AND METHOD FOR PROVIDING A GRAPHIC REPRESENTATION OR GRAPHIC REPRESENTATION SEQUENCE FOR DETECTION BY...
For providing an apparatus and method for providing a graphic representation (1, 2) or a graphic representation sequence for detection by a detector (3) which...
2018/0211075 Adjustable Bent Housing Actuation Using Radio Frequency Identification
An assembly usable with a bottom hole assembly in a wellbore can include a fixed housing member coupleable to a bent housing member at a housing coupling...
2018/0211074 Shopping Cart With an RFID Interface and Associated Systems and Methods
Described in detail herein are systems and methods for interacting with an interactive display using a shopping cart. A RFID reader can read RFID tags...
2018/0211073 COMBINED PASSIVE TAGS AND ACTIVE SHORT RANGE WIRELESS COMMUNICATIONS
An access control system that utilizes a combination of passive tags and active RFIDs. The system may combine passive and active circuitry in one package or...
2018/0211072 Shopping Cart With an RFID Interface and Associated Systems and Methods
Described in detail herein are systems and methods for interacting with an interactive display using a shopping cart. A user navigate a shopping cart to a...
2018/0211071 CARD WITH ELECTRICALLY CONDUCTIVE POINTS THAT ARE READABLE
A card that includes an electrically non-conductive substrate and a plurality of conductive points disposed on a bottom surface of the non-conductive...
2018/0211070 EMBEDDING DATA ON OBJECTS USING SURFACE MODULATION
Methods and apparatus are disclosed for embedding static information (such as serial numbers, etc.) on objects by modifying their exterior shape slightly,...
2018/0211069 SECURITY CASE
The present invention is a self contained, portable security case or container. The case is secure in its locked condition by locks which are preferably...
2018/0211068 SYNCHRONIZED HARDWARE-BASED SECURITY FOR A COMMUNICATION SYSTEM
An improved apparatus, method and computer-readable storage medium are provided for implementing a secured communication system via synchronized hardware-based...
2018/0211067 CROSS-PLATFORM ENCLAVE IDENTITY
An abstract enclave identity is presented. An abstract identity may be a secure identity that may be the same for multiple related, but not identical, enclave...
2018/0211066 ACCESSING A PASSENGER TRANSPORTATION DEVICE CONTROL MEANS
The invention refers to a method for accessing an passenger transportation device control means comprising several separated printed circuit boards (PCB),...
2018/0211065 ASYMMETRICALLY MASKED MULTIPLICATION
Methods and systems for masking certain cryptographic operations in a manner designed to defeat side-channel attacks are disclosed herein. Squaring operations...
2018/0211064 MEMORY INTEGRITY MONITORING
In one example in accordance with the present disclosure, a system comprises a first memory module and a first memory integrity monitoring processor, embedded...
2018/0211063 TRANSMISSION METHOD, APPARATUS AND SYSTEM
A thing information transmission method, apparatus and system in the Internet of Things are for reducing risk of sensitive information leakage when thing...
2018/0211062 SELECTIVELY OBSCURING REPRESENTATIVE ATTRIBUTES OF FILES
Systems, methods, and software are disclosed herein for obfuscating representative attributes of files. In an implementation, an application identifies a set...
2018/0211061 Data Filtering for Data Request Workflow System
A data request workflow system comprises a vehicle operational data. A file processing system receives the vehicle operational data. At least one set of...
2018/0211060 Information Based Life View
A method for enabling a user to customize, prioritize, and view information filtered to align with the user's life state that includes interaction with an...
2018/0211059 TRUST BASED ACCESS TO RECORDS VIA ENCRYPTED PROTOCOL COMMUNICATIONS WITH AUTHENTICATION SYSTEM
Systems and techniques are disclosed for trust based access to records via encrypted protocol communications with an authentication system. One of the methods...
2018/0211058 TRUST BASED ACCESS TO RECORDS VIA ENCRYPTED PROTOCOL COMMUNICATIONS WITH AUTHENTICATION SYSTEM
Systems and techniques are disclosed for trust based access to records via encrypted protocol communications with an authentication system. An example system...
2018/0211057 TRANSMISSION METHOD, APPARATUS AND SYSTEM
A thing information transmission method, apparatus and system in the Internet of Things are for reducing risk of sensitive information leakage when thing...
2018/0211056 SYSTEMS AND METHODS FOR SCOPE-BASED ACCESS
An authorization system provides fine grain entitlements to a resource server by retrieving a dynamic constraint graph as a function of an authorization...
2018/0211055 ADAPTIVE PERMISSION TOKEN
Techniques are disclosed relating to generating permission tokens. A first computer system may store permission information for a user that indicates a...
2018/0211054 DEPENDENT ENCLAVE BINARIES
Techniques for instantiating an enclave from dependent enclave images are presented. The techniques include identifying a first set of dependent enclave...
2018/0211053 ACCESS INFORMATION SETTING SYSTEM, ACCESS INFORMATION SETTING METHOD AND DATA TRANSMISSION DEVICE
An access information setting system includes: a data reception device; a data transmission device that transmits data to the data reception device via a...
2018/0211052 PROTECTING METHOD FOR ACCESSING MATERIAL DATA OF PRINTER
A protecting method for accessing material data adopted by a printer having a processing unit, a MCU for storing material data, and a transmission interface is...
2018/0211051 MANAGING MULTI-TENANT SYSTEMS USING OBJECT-ORIENTED MODELS
Methods, systems, and computer-readable storage media for providing a system that interacts with a plurality of tenant systems, the plurality of tenants...
2018/0211050 METHOD AND A COMPUTING DEVICE FOR PROVIDING PRIVACY CONTROL IN A SURVEILLANCE VIDEO
Method and a computing device for providing privacy control in a surveillance video is disclosed. The computing device receives a surveillance video from a...
2018/0211049 ENCRYPTION AND DECRYPTION OF DATA OWNED BY A GUEST OPERATING SYSTEM
An apparatus includes one or more processor core, trusted key store, memory controller, and a memory module. The memory controller includes an ...
2018/0211048 OBJECT AND COMMUNICATION PROGRAM
An object includes: a first communication interface unit configured to communicate with a first apparatus; a second communication interface unit configured to...
2018/0211047 AUTOMATED INTELLIGENCE GRAPH CONSTRUCTION AND COUNTERMEASURE DEPLOYMENT
Techniques for providing information security threat assessment and amelioration are disclosed. The techniques may include obtaining fundamental data,...
2018/0211046 ANALYSIS AND CONTROL OF CODE FLOW AND DATA FLOW
Technologies are provided in embodiments to analyze and control execution flow. At least some embodiments include decompiling object code of a software program...
2018/0211045 APPLICATION SECURITY ASSESSMENT
Application security assessment is described. A system identifies a first security configuration and a second security configuration associated with an...
2018/0211044 METHOD AND APPARATUS FOR UPGRADING EMBEDDED MEMORY AND TERMINAL ASSOCIATED THEREWITH
Embodiments of the present disclosure provide a method and apparatus for upgrading an embedded memory and a terminal associated therewith. The method includes:...
2018/0211043 Blockchain Based Security for End Points
Systems and methods are provided for distributing security information. The systems and methods include a network having a plurality of nodes for storing a...
2018/0211042 ESCALATED REMEDIATION
Example implementations relate to escalated remediation. In an example implementation, a recovery script for addressing a security threat to the computing...
2018/0211041 Detection of Malware Using Feature Hashing
Data to is analyzed using feature hashing to detect malware. A plurality of features in a feature set is hashed. The feature set is generated from a sample....
2018/0211040 BEHAVIOR-BASED RANSOMWARE DETECTION
An anti-malware application detects, stops, and quarantines ransomware. The anti-malware application monitors threads executing on a computing device and...
2018/0211039 RANSOMWARE RESILIENT DATABASES
A system for protecting a database against a ransomware attack includes a database backup handler configured to selectively output database backup data...
2018/0211038 RANSOMWARE ATTACK REMEDIATION
A method for processing files as a preemptive measure against a ransomware activity. The method comprises scanning a plurality of file operation requests sent...
2018/0211037 IDENTIFYING COMPUTER BEHAVIOR USING VISUAL DATA ORGANIZATION AND GRAPHS
Configuration discrepancies, such as server drift among different servers or malicious code installed on one or more servers, can be identified using system...
2018/0211036 TECHNIQUES FOR IMPROVING SEAMLESS USER EXPERIENCE ON AIR-GAPPED ENDPOINTS
A method for performing user experience (UX) functions on an air-gapped endpoint is provided. The method includes monitoring a plurality of security zones,...
2018/0211035 ABSTRACT ENCLAVE IDENTITY
An abstract enclave identity is presented. An abstract identity may be a secure identity that may be the same for multiple related, but not identical, enclave...
2018/0211034 ENCLAVE CLIENT ABSTRACTION MODEL
Abstraction programming models of enclave security platforms are described, including receiving a request from an enclave client according to a client...
2018/0211033 DETECTING THREATS IN BIG DATA PLATFORMS BASED ON CALL TRACE AND MEMORY ACCESS PATTERNS
A runtime attack can be detected on a big data system while processes are executed on various computing devices. A behavior profile can be maintained for tasks...
2018/0211032 LOG INFORMATION GENERATION APPARATUS AND RECORDING MEDIUM, AND LOG INFORMATION EXTRACTION APPARATUS AND...
A log information generation apparatus includes: a process information generation unit which generates first identification information for temporally and...
2018/0211031 VIRTUAL MACHINE MALWARE SCANNING
Methods, systems, and computer program products for selecting a virtual machine to perform a task corresponding to a client request and performing the task at...
2018/0211030 TERMINAL APPARATUS AND CONTROL METHOD FOR TERMINAL APPARATUS
A terminal apparatus and a control method are disclosed. The terminal apparatus comprises: an input part for receiving a fingerprint; a control part for...
2018/0211029 ELECTRONIC DEVICE AND METHOD FOR MANAGING DATA IN ELECTRONIC DEVICE
An electronic device is provided. The electronic device includes a memory and at least one processor configured to execute a first application among at least...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.