Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0322323 FINGERPRINT MODULE AND MOBILE TERMINAL
A fingerprint module includes a fingerprint identification chip, a flexible circuit board, and a pressure detection unit. The pressure detection unit includes...
2018/0322322 OPTICAL FINGERPRINT VERIFICATION METHOD AND MOBILE TERMINAL
Embodiments of the present disclosure provide an optical fingerprint verification method and a mobile terminal. The method may include: controlling the optical...
2018/0322321 IMAGE IDENTIFICATION METHOD, TERMINAL AND NON-VOLATILE STORAGE MEDIUM
A method and an apparatus for image identification are provided. For example, the processing circuitry of the apparatus obtains first feature values of a first...
2018/0322320 METHOD AND APPARATUS FOR TRACKING ONE OR MORE PLANTS AND/OR PLANT BASED PRODUCTS AND/OR TRACKING THE SALE OF...
This invention is for tracking at least one plant. A method of this invention comprises: putting at least one seed or at least one stem in a corresponding at...
2018/0322319 MULTIRESONATOR RADIO FREQUENCY IDENTIFICATION (RFID) TAG OVERLAY AS TAG RECODING
An improved system and method is provided for using the superposition of a number of extremely low cost multiresonator tags that can be configured to allow...
2018/0322318 RADIO FREQUENCY TRANSMISSION METHOD AND DEVICE THEREOF
A radio frequency transmission method and a device thereof are provided. The method includes: transmitting a radio frequency command by a radio frequency...
2018/0322317 MEDIA PROCESSING DEVICE, PRINTING DEVICE, AND CONTROL METHOD OF A MEDIA PROCESSING DEVICE
When writing information to the IC tag of a medium, the control unit 54 of a printer 1 determines if a specific area in the storage space of the IC tag is in...
2018/0322315 Tamper Responsive Sensor
A tamper responsive sensor comprising: a carrier printed circuit board ("carrier PCB"), holding a mesh of one or more electrically conductive tracks, a...
2018/0322314 FIXED-LOCATION IOT DEVICE FOR PROTECTING SECURE STORAGE ACCESS INFORMATION AND METHOD FOR PROTECTING SECURE...
Disclosed herein are a fixed-location Internet-of-Things (IoT) device for protecting secure storage access information and a method for protecting secure...
2018/0322313 SECURE COMMUNICATION CHANNEL FOR SYSTEM MANAGEMENT MODE
Embodiments are directed to securing system management mode (SMM) in a computer system. A CPU is configurable to execute first code in a normal mode, and...
2018/0322312 VERIFICATION OF SERVICE ACCESS IN A COMMUNICATIONS SYSTEM
There is provided mechanisms for verifying a log entry in a communications system. A method is performed by a host server. The method comprises obtaining a log...
2018/0322311 INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING DEVICE, SERVER DEVICE, METHOD OF CONTROLLING INFORMATION...
An information processing system provides a web service to an information processing device having personal information from a server device providing the web...
2018/0322310 METHOD/SYSTEM FOR THE ONLINE IDENTIFICATION AND BLOCKING OF PRIVACY VULNERABILITIES IN DATA STREAMS
A method, system and computer program product for providing privacy protection to data streams in a distributed computing environment. The method includes...
2018/0322309 PERTURBATION-BASED TECHNIQUES FOR ANONYMIZING DATASETS
In various embodiments, a dataset generation application generates a new dataset based on an original dataset. The dataset generation engine perturbs a first...
2018/0322308 COMPUTER SYSTEM OF COMPUTER SERVERS AND DEDICATED COMPUTER CLIENTS SPECIALLY PROGRAMMED TO GENERATE SYNTHETIC...
In some embodiments, the present invention provides for an exemplary computer system which includes at least: a graphical user interface client; a dedicated...
2018/0322307 Cross Container User Model
A second operating system accessing resources from an external service. A method includes sending an anonymized request, for an anonymized user corresponding...
2018/0322306 Techniques and Architectures for Selective Obfuscation of Personally Identifiable Information (PII) in...
Within one or more instances of a computing environment where an instance is a self-contained architecture to provide at least one database with corresponding...
2018/0322305 SYSTEM AND METHOD FOR DATA THEFT PREVENTION
Data theft may be prevented by modifying a data storage device having standard data records to include "mine" data records. The mine data records may include...
2018/0322304 DATA ALLOCATION BASED ON SECURE INFORMATION RETRIEVAL
Data allocation based on secure information retrieval is disclosed. One example is a system including an information processor communicatively linked to a...
2018/0322303 SYSTEMS AND METHODS FOR DIGITAL CONTENT DELIVERY
Methods, apparatus, systems and machine readable medium for the delivery of digital content are disclosed herein. An example method includes receiving a first...
2018/0322302 Multi-Party Secure Information Integration System
A method of the present disclosure includes a host system authenticating a user of the user device to access secure host information associated with the user...
2018/0322301 COMMIT AND ROLLBACK OF DATA STREAMS PROVIDED BY PARTIALLY TRUSTED ENTITIES
A collection of key-value pairs may be maintained by a key-value database management system. Updates to the collection may be provided by a partially trusted...
2018/0322300 SECURE MACHINE-CURATED SCENES
The present disclosure contemplates a variety of improved methods and systems for initializing a curated scene. The described solution includes a method...
2018/0322299 SYSTEMS AND METHODS FOR HARDWARE-BASED SECURITY FOR INTER-CONTAINER COMMUNICATION
In accordance with embodiments of the present disclosure, an information handling system may include a processor subsystem having access to a memory subsystem...
2018/0322298 Shared Secret Vault for Applications with Single Sign On
Some aspects of the disclosure generally relate to providing single sign on features in mobile applications in a secure environment using a shared vault. An...
2018/0322297 COPY PROTECTION FOR SECURED FILES
Embodiments of the present disclosure relate to copy protection. A request to copy a file from a requestor with one or more privileges sufficient to access the...
2018/0322296 COPY PROTECTION FOR SECURED FILES
Embodiments of the present disclosure relate to copy protection. A request to copy a file from a requestor with one or more privileges sufficient to access the...
2018/0322295 ENCODING INFORMATION USING WORD EMBEDDING
A computer-implemented method includes receiving, by a processor system, a collection of information. The collection of information includes private...
2018/0322294 COPY PROTECTION FOR SECURED FILES
Embodiments of the present disclosure relate to copy protection. A request to copy a file from a requestor with one or more privileges sufficient to access the...
2018/0322293 Providing Intrusion Detection, Monitoring And Protection In A System
In an embodiment, a system includes a processor with at least one core to execute an application to provide intrusion detection and protection, a radar sensor...
2018/0322292 CYBERSECURITY MATURITY FORECASTING TOOL/DASHBOARD
Systems and methods of the present invention provide for executing a first database query selecting a project objective data record storing a forecast maturity...
2018/0322291 OPERATIONAL VERIFICATION
Example implementations relate to operational verification. In an example, operational verification includes a processor, a shared non-volatile memory storing...
2018/0322290 IMPLEMENTING LOCALE MANAGEMENT ON PAAS: LOCALE REPLACEMENT RISK ANALYSIS
A method and apparatus are provided for implementing system locale management including locale replacement risk analysis in a computer system. A Locale Update...
2018/0322289 CORRELATING A TASK WITH A COMMAND TO PERFORM A CHANGE TICKET IN AN IT SYSTEM
An approach is provided for controlling a task to perform a change ticket. The task is correlated with user(s) authorized to initiate execution of command(s)...
2018/0322288 METHOD FOR MANUFACTURING AND EXECUTING SINGLE-USE SYSTEMS
A method for manufacturing and executing single-use systems. Invention provides provably secure system design, instantiated in heterogeneous hardware that...
2018/0322287 MACHINE LEARNING MODEL FOR MALWARE DYNAMIC ANALYSIS
In some implementations there may be provided a system. The system may include a processor and a memory. The memory may include program code which causes...
2018/0322286 PARAMETRIC BEHAVIORAL PATTERN DEFINITION
A security agent implemented on a monitored computing device is described herein. The security agent has access to parametric behavioral pattern definitions...
2018/0322285 SYSTEM AND METHOD FOR DETECTING MALICIOUS SOFTWARE IN NVME OVER FABRICS DEVICES
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD,...
2018/0322284 METHODS FOR PREVENTING COMPUTER ATTACKS IN TWO-PHASE FILTERING AND APPARATUSES USING THE SAME
The invention introduces a method for preventing computer attacks in two-phase filtering, performed by a processing unit of an apparatus, which contains at...
2018/0322283 EVENT ANOMALY ANALYSIS AND PREDICTION
According to an example, event anomaly analysis and prediction may include accessing a master directed graph that specifies known events and transitions...
2018/0322282 METHOD AND ELECTRONIC DEVICE FOR MONITORING AN AVIONICS SOFTWARE APPLICATION, RELATED COMPUTER PROGRAM AND...
Disclosed is method for monitoring an avionics software application, able to be executed on a platform including resources and hosting an operating system, the...
2018/0322281 OFFLOADING PROCESSING OF WRITES TO DETERMINE MALICIOUS DATA FROM A FIRST STORAGE SYSTEM TO A SECOND STORAGE SYSTEM
Provided are a computer program product, system, and method for offloading processing of writes to determine malicious data from a first storage system to a...
2018/0322280 DETERMINING WHETHER TO DESTAGE WRITE DATA IN CACHE TO STORAGE BASED ON WHETHER THE WRITE DATA HAS MALICIOUS DATA
Provided are a computer program product, system, and method for determining whether to destage write data in cache to storage based on whether the write data...
2018/0322279 PROVIDING DIFFERENTIALLY PRIVATE DATA WITH CAUSALITY PRESERVATION
A method is disclosed for providing sanitized log data to a threat detection system. The sanitized log data is derived from a log table with continuous...
2018/0322278 SECURE INTEGRATED-CIRCUIT STATE MANAGEMENT
An apparatus includes a Non-Volatile Memory (NVM) and a controller. The controller is configured to store in the NVM a state array, which includes multiple...
2018/0322277 SYSTEM MANAGEMENT MODE PRIVILEGE ARCHITECTURE
In one example, a system for a system management mode (SMM) privilege architecture includes a computing device comprising: a first portion of SMM instructions...
2018/0322276 LEAST RECENTLY USED (LRU)-BASED EVENT SUPPRESSION
A security agent can implement a least recently used (LRU)-based approach to suppressing events observed on a computing device. The security agent may observe...
2018/0322275 METHODS AND APPARATUS TO MANAGE PASSWORD SECURITY
Methods, apparatus, systems and articles of manufacture are disclosed to manage password security. An example apparatus includes means for invoking a...
2018/0322274 Plant-Specific, Automated Certificate Management
A method for authenticating devices and/or applications, specifically web applications, in a control system for an industrial plant, wherein the control system...
2018/0322273 METHOD AND APPARATUS FOR LIMITED STARTING AUTHORIZATION
A method and apparatus for limited starting authorization are provided. The method includes: determining whether an authorized wireless device is connected to...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.