Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0218191 OUTSIDE OF ACTIVE AREA FINGER-PRINT SENSOR
Embodiments herein describe an input device that includes a display area for outputting images which includes a capacitive sensing region. For example, the...
2018/0218190 SYSTEM AND METHOD FOR READING PATTERNS USING MULTIPLE IMAGE FRAMES
This invention provides a system and method for decoding symbology that contains a respective data set using multiple image frames of the symbol, wherein at...
2018/0218189 INDUSTRIAL DESIGN FOR CONSUMER DEVICE BASED SCANNING AND MOBILITY
A data entry and scanning apparatus that includes a commercially available mobile device wherein said commercially available mobile device with a touch screen...
2018/0218188 BARCODE-READING SYSTEM THAT OBTAINS RANGING DATA VIA TARGETING ILLUMINATION
A barcode-reading system may include a barcode-reading enhancement accessory that is securable to a mobile device. The accessory may include an optic system...
2018/0218187 SYSTEMS AND METHODS FOR LINKING UNIQUE IDENTIFIERS EMBEDDED IN MACHINE VERIFIABLE MARKS
A method is provided. The method includes generating a label containing at least a first and a second unique identifier, associating, linked, or otherwise...
2018/0218186 LINK ASSOCIATION
Examples disclosed herein relate to capturing a first machine-readable link via art image capture device, retrieving a first content element associated with...
2018/0218185 Distributed Autonomous Robot Systems and Methods with RFID Tracking
Described in detail herein is an autonomous fulfillment system using RFID devices. One or more RFID readers can be disposed throughout a facility can detect...
2018/0218184 SYSTEM AND APPARATUS FOR ASSESSING SANITIZATION COMPLIANCE
A system and apparatus for assessing whether a personnel has complied with sanitation protocols. The system may incorporate wearable tags on each personnel...
2018/0218183 BAND WITH RFID CHIP HOLDER NAD IDENTIFYING COMPONENTS
An apparatus is adapted to be coupled to a component of a system associated with a wellhead. The apparatus includes a band adapted to be coupled to the...
2018/0218182 TAG BOARD, RFID TAG, AND RFID SYSTEM
A tag board includes an insulation substrate with a lower surface bonded to the outside and an upper surface including a recess, an upper surface conductor on...
2018/0218181 COMMUNICATION PROTOCOL SPEEDUP AND STEP-DOWN
A payment terminal such as a payment reader may receive and form electrical connections with an electronic transaction card such as an EMV chip card. The...
2018/0218180 ATTACHING STRUCTURE OF CARD PROCESSING UNIT AND CARD ISSUING DEVICE
An attaching structure of a card processing unit may include the card processing unit and an attaching frame. The attaching frame includes a frame side...
2018/0218179 METHOD AND APPARATUS FOR STORAGE OF DATA FOR MANUFACTURED ITEMS
Exemplary embodiments are directed to a method and apparatus for storing data for a batch of manufactured items. The method comprises defining in a processor,...
2018/0218178 PRIVACY USER INTERACTIVE APPARATUS, ELECTRONIC APPARATUS HAVING THE SAME, AND USER INTERACTIVE METHOD FOR...
The present application discloses a privacy user interactive apparatus including a display panel configured to display a stereoscopic image of a user input...
2018/0218177 PHYSICAL UNCLONEABLE FUNCTION CIRCUIT
According to one embodiment, a physical uncloneable function circuit for providing a protected output bit is described including at least one physical...
2018/0218176 SYSTEM AND METHOD OF CREATING AN ASSET BASED AUTOMATED SECURE AGREEMENT
Disclosed is a system, a method and computer-readable medium for implementing a smart contract on a blockchain. The method includes creating, via a processor,...
2018/0218175 SELECTIVELY REDACTING DIGITAL FOOTPRINT INFORMATION IN ORDER TO IMPROVE COMPUTER DATA SECURITY
A computer-implemented method improves a computer system's security through use of a simulated digital footprint. One or more processors retrieve a historical...
2018/0218174 APPARATUS AND METHOD FOR DATA MATCHING AND ANONYMIZATION
A method includes receiving a plurality of data sets. Each data set includes a customer identifier field specifying a unique customer identifier associated...
2018/0218173 PRIVACY PRESERVING CROSS-ORGANIZATIONAL DATA SHARING WITH ANONYMIZATION FILTERS
A system can be designed that shares transaction data across different organizations while preserving data privacy and anonymizing the source organization....
2018/0218172 METHOD AND SYSTEM FOR MANIPULATING AND COMMUNICATING GENETIC CONSTRUCTS INDEPENDENT OF THEIR GENETIC SEQUENCE
Methods and systems are disclosed for genetic manipulation and for securing communication of genetic sequences. In one example, a sequence security system...
2018/0218171 PERFORMING PRIVACY-PRESERVING MULTI-PARTY ANALYTICS ON HORIZONTALLY PARTITIONED LOCAL DATA
Examples disclosed herein relate to: computing, by a computing device at a party among a plurality of parties, a sum of local data owned by the party. The...
2018/0218170 Structured Text and Pattern Matching for Data Loss Prevention in Object-Specific Image Domain
Structured text and pattern matching may be performed for data loss prevention in object-specific image domain. According to some embodiments, a method may...
2018/0218169 SECURITY AND DATA ISOLATION FOR TENANTS IN A BUSINESS DATA SYSTEM
A multi-tenant hosting system receives business data and tenant-identifying data, from a tenant. The data from multiple different tenants is stored on a single...
2018/0218168 ESTABLISHING A LINK BETWEEN IDENTIFIERS WITHOUT DISCLOSING SPECIFIC IDENTIFYING INFORMATION
A method for linking user identifiers. The method includes receiving, by a linking server and from a company server, a first data structure comprising entries....
2018/0218167 SYSTEMS AND METHODS OF MONITORING AND CONTROLLING ENTERPRISE INFORMATION STORED ON A CLOUD COMPUTING SERVICE (CCS)
A computer-implemented method is described to monitor and control enterprise information stored on a cloud computing service (CCS). The method includes using a...
2018/0218166 DATA MASKING
Data masking is provided by, for at least one predetermined data item in data to be sent, applying a one-way function to that data item to produce a first...
2018/0218165 Method for Locking Sensitive Data in the Cloud Based on Refactoring Technology
A method for cloud locking sensitive data based on refactoring technology is disclosed. Binary byte codes of a mobile application are modified and refactored,...
2018/0218164 DATA MASKING
Data masking is provided by, for at least one predetermined data item in data to be sent, applying a one-way function to that data item to produce a first...
2018/0218163 PREVENTING IMAGE CAPTURE DATA LEAKS
When a first device computer is placed in privacy aware mode, specific events are monitored for, and a program can instantaneously blur or mask data being...
2018/0218162 METHOD AND SYSTEM FOR REACTIVE MINING OF COMPUTER SCREENS
Systems and methods provide for text mining, and in particular text mining of screens, of endpoint and other target computers and devices, of an enterprise or...
2018/0218161 Operator System for a Process Control System
An operator system for a process control system, wherein the operator system includes an operator server and at least one operator client connected to the...
2018/0218160 APPLICATION OF SECURITY PARAMETERS FOR CONTENT
A user interface for applying restriction parameters to content items and users in a grouped manner is provided. A selection of one or more restriction groups...
2018/0218159 ENCRYPTION TRANSITION IN A DATABASE
A computing device includes a processor and a machine-readable storage medium storing instructions. The instructions are executable by the processor to:...
2018/0218158 EVALUATION APPARATUS, EVALUATION SYSTEM, AND EVALUATION METHOD
An evaluation apparatus that is connected to a bus used by a plurality of electronic control units that constitute an electronic control system for ...
2018/0218157 END USER SOCIAL NETWORK PROTECTION PORTAL
A computer implemented method including generating, by one or more processors, an activation request, receiving, from a user device, an activation...
2018/0218156 Encryption and Decryption Method and Apparatus in Virtualization System, and System
An encryption and decryption method in a virtualization system, where the virtualization system includes a virtual machine monitor (VMM) and an encryption and...
2018/0218155 PROVIDING A FASTLANE FOR DISARMING MALICIOUS CONTENT IN RECEIVED INPUT CONTENT
The disclosed embodiments include a method for disarming malicious content in a computer system. The method includes accessing input content intended for a...
2018/0218154 ANALYSIS DEVICE, ANALYSIS METHOD, AND ANALYSIS PROGRAM
A static code analysis unit specifies an implementation portion of a Java code in a cooperation mechanism that sends and receives data between an Android...
2018/0218153 COMPARING STRUCTURAL INFORMATION OF A SNAPSHOT OF SYSTEM MEMORY
Examples relate to snapshots of system memory. In an example implementation, structural information of a process in a snapshot of system memory is compared...
2018/0218152 AUDIT LOG ENHANCEMENT
A system for monitoring actual access to data elements in an enterprise computer network and providing associated data, the system including an at least near...
2018/0218151 AUTHENTICATING APPLICATION LEGITIMACY
Facilities are provided herein to address application phishing by determining whether an application is a legitimate application it purports to be. Optical...
2018/0218150 APPARATUS AND METHODS FOR TRANSITIONING BETWEEN A SECURE AREA AND A LESS-SECURE AREA
A data processing apparatus having a first secure area and a second secure area coupled by a monitor is provided. The monitor applies security credentials to...
2018/0218149 CONTAINER APPLICATION SECURITY AND PROTECTION
A plurality of pages of code executing via a container host operating system are monitored. The plurality of pages of code include pages of code from a...
2018/0218148 SYSTEM CALL POLICIES FOR CONTAINERS
Examples relate to system call policies for containers. In an example, a method includes receiving, by a container platform, a container for running an...
2018/0218147 METHOD FOR THE SECURITY OF AN ELECTRONIC OPERATION
A method for assisting in improving the security of an electronic operation carried out via a secure element. The method comprises the following steps. A first...
2018/0218146 METHOD OF AUTHENTICATING INTEGRATED CIRCUITS USING OPTICAL CHARACTERISTICS OF PHYSICALLY UNCLONABLE FUNCTIONS
A method and apparatus for reading unique identifiers of an integrated circuit. The unique identifiers may be physically unclonable functions (PUFs), formed by...
2018/0218145 SYSTEMS AND METHODS FOR ACCESS CONTROL TO WEB APPLICATIONS AND IDENTIFICATION OF WEB BROWSERS
A method and system includes: receiving an access request for a protected web application server by the requesting browser application; returning a web page...
2018/0218144 LOCKABLE WIDGETS ON A MOBILE DEVICE
A software widget running on a user device may be designed to operate in a locked or an unlocked mode. In unlocked mode, the user has full interactivity with...
2018/0218143 ELECTRONIC APPARATUS, AND NON-TRANSITORY COMPUTER READABLE RECORDING MEDIUM STORING LOCK MANAGING PROGRAM
In an electronic apparatus, a display device displays an unlock screen that includes a mark pattern of one or plural marks. A touch panel (a) detects as one...
2018/0218142 SYSTEMS AND METHODS FOR AUTHENTICATING USERS
Systems, methods, and non-transitory computer-readable media can determine user input that was provided to authenticate a user, the user input including a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.