Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0225490 SYSTEM FOR AUTOMATED CHECKOUT USING METAL DETECTION
A system and method are provided for automated checkout using metal detection to determine a location of a universal product code (UPC) or another physical...
2018/0225489 WIRELESS RING TYPE BARCODE READER
A wireless ring type barcode reader is sheathed on a user's finger and provided for a barcode scan operation. The barcode reader is turned on by using a...
2018/0225488 METHOD FOR CHECKING AN IDENTITY OF A PERSON
The present invention relates to a method for checking an identity of an individual, which method comprises the following steps: a) presenting an optically...
2018/0225487 OPTICAL JUMPER
One example of an optical jumper includes an optical cable, a first connector, a second connector, and a tag. The first connector is optically coupled to a...
2018/0225486 INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND PROGRAM
There is provided an information processing device including: a processing unit configured to select a first processing mode in which static information is...
2018/0225485 Active RFID Tag Arrangements for Actuation of Downhole Equipment in Well Fluids
A first RFID tag arrangement for actuating a downhole tool includes a non-metallic housing enclosing a passive RFID tag, power source, pulsed oscillator...
2018/0225484 COMPACT CARD READER FOR A MOBILE COMMUNICATION TERMINAL
A card reader includes a printed circuit board, a magnetic head and a smart card connector. The magnetic head and the smart card connector share a common...
2018/0225483 INTEGRATED CIRCUIT CARD READER WITH IMPROVED HEAT DISSIPATION
Various embodiments provide a card reader that provides heat dissipation for high data transfer ICCs. The card reader includes a body having a press bar that...
2018/0225482 NFC READER WITH AUTO TUNER
A near field communication (NFC) reader is disclosed. The NFC reader includes a NFC controller, an antenna, a filter coupled to the NFC controller, a tuner...
2018/0225481 EVENT-BASED DISPLAY INFORMATION PROTECTION SYSTEM
A display information protection system includes a management system that stores a plurality of display information protection policies and that may provide...
2018/0225480 METHOD AND SYSTEM FOR ELECTRONIC DELIVERY OF SENSITIVE INFORMATION
A method and related system obtains consent from a user for electronic delivery of sensitive information. The user operating a first computer accesses a web...
2018/0225479 PERSONAL DATA PROVIDING SYSTEM, PERSONAL DATA PROVIDING METHOD, AND INFORMATION PROCESSING APPARATUS
A personal data providing system including a plurality of first information processing apparatuses, wherein each of the first information processing...
2018/0225478 DEVICE DISPLAY SECURITY WITH USER-SPECIFIED FILTERING OF DISPLAY CONTENTS
Disclosed embodiments provide a temporary privacy mode for an electronic device. The user selects one or more regions of allowable content and/or unallowable...
2018/0225477 DEVICE DISPLAY SECURITY WITH USER-SPECIFIED FILTERING OF DISPLAY CONTENTS
Disclosed embodiments provide a temporary privacy mode for an electronic device. The user selects one or more regions of allowable content and/or unallowable...
2018/0225476 AUTOMATED IMAGE EDITING SYSTEM
A method comprising: detecting a first input selecting a first object in a first video; detecting a second input selecting a second object in the first video;...
2018/0225475 ENCRYPTED DATABASE MANAGEMENT DEVICE, ENCRYPTED DATABASE MANAGEMENT METHOD, ENCRYPTED DATABASE MANAGEMENT...
An encrypted database management system includes an encrypted database management device and a storage device including an encrypted database storing encrypted...
2018/0225474 MESSAGING SYSTEMS AND METHODS
A messaging system for providing messaging service between or among user accounts includes a message database server. The message database server includes an...
2018/0225473 SYSTEM AND METHOD FOR ACCESS CONTROL USING ACLS
Disclosed are systems and method for controlling access to objects of an operating system using Access Control Lists (ACLs). An exemplary method comprises:...
2018/0225472 COMPUTING SYSTEM WITH INFORMATION STORAGE MECHANISM AND METHOD OF OPERATION THEREOF
A computing system includes: a control unit configured to: receive user information through a vault user account; process the user information for storage in...
2018/0225471 TAGGING DOCUMENTS WITH SECURITY POLICIES
Embodiments of the present invention provide systems, methods, and computer storage media directed to facilitate identification of security policies for...
2018/0225470 SOURCE AUTHENTICATION OF A SOFTWARE PRODUCT
Embodiments of the present invention provide systems and methods for authenticating the source code of a software end product. The method includes generating a...
2018/0225469 EXPENDABLE ACCESS CONTROL
A computer implemented method of a resource provider for access control for a restricted resource in a network connected computer system, wherein a blockchain...
2018/0225468 SYSTEM AND METHOD FOR SELECTING A DATA ENTRY MECHANISM DURING APPLICATION CREATION
Disclosed are systems and methods for selecting a data entry mechanism during application creation. An example method comprises: determining a plurality of...
2018/0225467 METHOD AND SYSTEM FOR DATA PROTECTION
The disclosure relates to a method and a system for data protection. The system provides a key server and a software sequence executed in a user device. The...
2018/0225466 ACCESS CONTROL
A computer implemented method of access control for a restricted resource of a resource provider in a network connected computer system, wherein a blockchain...
2018/0225465 ACCESS CONTROL SYSTEM AND ACCESS CONTROL METHOD
To provide a system for simplifying setting of access control for a file system and a firewall, it is provided an access control system, which is formed by a...
2018/0225464 PROVISIONING OF A SHIPPABLE STORAGE DEVICE AND INGESTING DATA FROM THE SHIPPABLE STORAGE DEVICE
When a client requests a data import job, a remote storage service provider provisions a shippable storage device that will be used to transfer client data...
2018/0225463 SECURE COMPUTING SYSTEM
A computer system with multiple security levels, the system comprising a high-power processing device (130), a low-power processing device (110), and an...
2018/0225462 METHOD AND APPARATUS FOR PROTECTING DIGITAL CONTENT USING DEVICE AUTHENTICATION
A user device may strengthen the protection level of a digital content by dividing the security and normal modes and performing an operation. In order to...
2018/0225461 SYSTEM AND METHOD FOR CREATING AND EXECUTING BREACH SCENARIOS UTILIZING VIRTUALIZED ELEMENTS
A system for analyzing a computing system for potential breach points, the system comprising a memory device having executable instructions stored therein, and...
2018/0225460 VULNERABILITY DETECTION DEVICE, VULNERABILITY DETECTION METHOD, AND VULNERABILITY DETECTION PROGRAM
A vulnerability detection device includes a vulnerability portion extracting unit that extracts a first program code corresponding to an uncorrected...
2018/0225459 SYSTEM AND METHODS FOR SECURE FIRMWARE VALIDATION
An electronic device, such as a dynamic transaction card having an EMV chip, that acts as a TPM having a memory, an applet, and a cryptographic coprocessor...
2018/0225458 CONTROLLING CONFIGURATION DATA STORAGE
A machine-implemented method is provided for securing a storage-equipped device against introduction of malicious configuration data into configuration data...
2018/0225457 ENHANCING SECURITY OF A MOBILE DEVICE BASED ON LOCATION OR PROXIMITY TO ANOTHER DEVICE
A mobile device detects its location and other devices in proximity to the mobile device. When the device is in an untrusted location, or is in physical...
2018/0225456 ENHANCING SECURITY OF A MOBILE DEVICE BASED ON LOCATION OR PROXIMITY TO ANOTHER DEVICE
A mobile device detects its location and other devices in proximity to the mobile device. When the device is in an untrusted location, or is in physical...
2018/0225455 SCANNING OF WIRELESS NETWORK TRAFFIC IN VIRTUALIZED DOMAINS
A computing device includes at least one processor and a machine-readable storage medium storing instructions. The instructions may be executable by the...
2018/0225454 SYSTEM AND METHOD FOR PROVIDING NETWORK SECURITY TO MOBILE DEVICES
A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected...
2018/0225453 METHOD FOR DETECTING A THREAT AND THREAT DETECTING APPARATUS
Aspects of the disclosure include a threat detecting apparatus. The threat detecting apparatus can include an interface circuit, an opcode detector, and a...
2018/0225452 INPUT/OUTPUT PARAMETER SELECTION
A device comprises a detector configured to detect an event, and a selector coupled to the detector and configured to generate a signal in response to a...
2018/0225451 COMMUNICATION SYSTEM AND METHOD FOR NODES ASSOCIATED WITH A VEHICLE
Devices and nodes associated with a vehicle may communicate using a higher-level, common messaging protocol over an ad-hoc network to publish and subscribe to...
2018/0225450 COUNTER-FRAUD OPERATION MANAGEMENT
Disclosed aspects relate to counter-fraud operation management. A counter-fraud operation may be executed using an initial set of parameter values for a set of...
2018/0225449 COUNTER-FRAUD OPERATION MANAGEMENT
Disclosed aspects relate to counter-fraud operation management. A counter-fraud operation may be executed using an initial set of parameter values for a set of...
2018/0225448 TRANSACTION PROCESSING FOR CONSORTIUM BLOCKCHAIN NETWORK
The disclosed technology is generally directed to blockchain and other security technology. In one example of the technology, a pre-determined type of...
2018/0225447 SYSTEM AND METHOD OF ANALYSIS OF FILES FOR MALICIOUSNESS IN A VIRTUAL MACHINE
Disclosed are systems and methods of analysis of files for maliciousness in a virtual machine. An exemplary method comprises: opening and executing a file by a...
2018/0225446 PROCESSOR TRACE-BASED ENFORCEMENT OF CONTROL FLOW INTEGRITY OF A COMPUTER SYSTEM
A computer processing node is described that is configured to perform a control flow integrity (CFI) method on a protected process operating on the processing...
2018/0225445 DISPLAY APPARATUS AND METHOD FOR CONTROLLING DISPLAY APPARATUS THEREOF
A display apparatus which determines a screen to be displayed when a power-on command is input, and method thereof, is provided. The display apparatus includes...
2018/0225444 SYSTEMS AND METHODS FOR PROVISIONING A CAMERA WITH A DYNAMIC QR CODE AND A BLE CONNECTION
Some methods can include a user device establishing a Bluetooth connection with a camera, the user device receiving a camera PIN from the camera via the...
2018/0225443 AUTOMATED PASSWORD AUTHENTICATION
A system connected to an existing computer includes a unit for monitoring the screen and provides input, a storage unit that stores data that pairs screen...
2018/0225442 SYSTEMS AND METHODS FOR AUTHENTICATING A USER BASED ON A COMPUTING DEVICE
A system and/or method may be provided to silently authenticate a user. An example method of silently authenticating a user includes receiving a set of device...
2018/0225441 SYSTEMS AND METHODS FOR A CREDENTIAL INCLUDING MULTIPLE ACCESS PRIVILEGES
A credential for use in an access control system may include a first sector including first data of a first database type, and a second sector including second...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.