Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,811,707 Fingerprint reader on a portion of a device for changing the configuration of the device
In one aspect, a device includes a first panel at least bearing a keyboard, a second panel at least bearing a display, and a fingerprint reader on at least a...
US-9,811,706 System for anonymous communication from a user to the publisher of a scannable label
"Publishers" generate individual QR codes which may be either displayed on a smartphone or printed on a physical label, and "consumers" scan and decode those...
US-9,811,705 Illumination system with active element for generating different illumination patterns for a data reader
A data reader for reading and decoding a code from an item. The data reader includes an imager operable to form an image of the code from an item located in a...
US-9,811,704 Support and capsule for preparing a beverage by centrifugation, system and method for preparing a beverage by...
A code support for association with or part of a capsule used in delivering a beverage in a beverage producing device by centrifugation of the capsule is...
US-9,811,703 Attachment including a targeting optic system that directs illumination from a white light source towards a...
An attachment for a smart phone includes a targeting optic system which, when the attachment is secured to the backside of the smart phone, receives...
US-9,811,702 Optical accessory for attachment to mobile device
An attachment assembly for use with a mobile device with a camera or a case for the mobile device can include one or more of an attachment base and an...
US-9,811,701 Barcode-reading system
This patent specification describes a barcode-reading enhancement accessory for a mobile device having a barcode-reading capability. The accessory may include...
US-9,811,700 Fractal plasmonic surface reader antennas
Plasmonic-surface antenna systems are described in which resonators, or cells, are closely arranged but do not touch. At least a portion of a radiating surface...
US-9,811,699 Master tracking device
A master tracking device, including a first transceiver for a local area network (LAN) configured to acquire a tag information from a plurality of radio...
US-9,811,698 System and method for tracking and utilizing data tag carriers
Systems and methods are disclosed for tracking and utilizing data tag carriers involving a plurality of terminals, and associated data tags and data tag...
US-9,811,697 Object tracking using enhanced video surveillance through a distributed network
Tracking a tagged object may include receiving, using a first processor, a first video of an object tagged with a radio frequency identification (RFID) tag and...
US-9,811,696 Method for operating a field device of process automation technology
Method for operating a field device of process automation technology, wherein the field device includes a main circuit, which serves in a first operating mode...
US-9,811,695 Chip card arrangement, chip card, apparatus for contactless interaction with a chip card arrangement or a chip...
In various embodiments, a chip card arrangement for carrying out contactless interaction with an external apparatus is provided. The chip card arrangement may...
US-9,811,694 Magnetic card reader and transaction terminal device having the same
Magnetic readers that read magnetic data which is recorded on a magnetic card and a flexible cable that transfers each of the signals from the magnetic readers...
US-9,811,693 Wiring board and method for recognizing code information thereof
A wiring board of the present invention includes an insulating board including a core insulating plate and an insulating layer laminated on at least one surface...
US-9,811,692 Security and protection device and methodology
A mobile device includes a security device. The security device determines whether the mobile device is inside or outside security zones defined around a device...
US-9,811,691 Program execution device
A program execution device capable of protecting a program against unauthorized analysis and alteration is provided. The program execution device includes an...
US-9,811,690 Protecting hidden content in integrated circuits
Various integrated circuits protect hidden content e.g., embedded instruments, keys, data, etc.) using scan cell circuit(s). For example, a first scan cell...
US-9,811,689 Chip ID generation using physical unclonable function
A method for generating a data set on an integrated circuit including programmable resistance memory cells includes applying a forming pulse to all members of a...
US-9,811,688 Authentication with battery and host programmed with shared identity key
Systems and methods for providing a battery module 110 with secure identity information and authentication of the identity of the battery 110 by a host 120. In...
US-9,811,687 Common location of user managed authorization
A method and apparatus for managing authorizations to access personal data of a user is disclosed. A computer retrieves a set of authorizations for a plurality...
US-9,811,686 Support systems interactions with virtual network functions in a trusted security zone
An apparatus, comprising a network communication interface to communicatively couple the apparatus to a network, a processor coupled to the network...
US-9,811,684 Token-based storage service
A token-based storage service may comprise a repository of key-value data. In response to a request to store a data item, the storage service may generate a...
US-9,811,683 Context-based security screening for accessing data
A computer system securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic...
US-9,811,682 Security policy for device data
Techniques for providing security policy for device data are described. In implementations, data on a device is stored in an encrypted form. To protect the...
US-9,811,681 Method and system for providing access to a device for a user
The present invention relates to a method and system for providing access to a device for a user. The method comprises the steps of receiving an access attempt...
US-9,811,680 Secure storage and sharing of data by hybrid encryption using predefined schema
The claimed subject matter includes techniques for storing, retrieving and sharing files. An example system includes a key generator module to generate a secret...
US-9,811,679 Electronic system with access management mechanism and method of operation thereof
An electronic system includes: a control unit configured to operate on a user interface; and the user interface, coupled to the control unit, configure to:...
US-9,811,678 Method and system for transferring data and instructions through a host file system
A method for encrypting data may generate an encryption instruction and combine it with a payload of data to form a packet. The packet is associated with a...
US-9,811,677 Secure data replication in a storage grid
A method for securing data in a storage grid is provided. The method includes generating a storage key from key shares of at least two storage clusters of a...
US-9,811,676 Systems and methods for securely providing information external to documents
A computer-implemented method for securely providing information external to documents may include identifying a document that may include at least one link to...
US-9,811,675 Generation and use of a modified protected file
Generating a modified protected file is disclosed, including: renaming a primary content object of a protected file; and creating a modified protected file...
US-9,811,674 Data leakage prevention system, method, and computer program product for preventing a predefined type of...
A data leakage prevention system, method, and computer program product are provided for preventing a predefined type of operation on predetermined data. In use,...
US-9,811,673 Content object encapsulating content items for accessing content and access authorization information
Provided are a method, system, and computer program product for a content object encapsulating content items for accessing content and access authorization...
US-9,811,672 Systems and methods for provisioning and using multiple trusted security zones on an electronic device
A method of provisioning a subordinate trusted security zone in a processor having a trusted security zone. The method comprises receiving by a master trusted...
US-9,811,671 Authentication method and system
The present invention provides a method and apparatus for the production and labeling of objects in a manner suitable for the prevention and detection of...
US-9,811,670 Information processing device, information processing method, and program
An information processing device including: a data processing unit that generates an encryption key of content; and a communication unit that transmits an...
US-9,811,669 Method and apparatus for privacy audit support via provenance-aware systems
Example embodiments of the present invention relate to a method, an apparatus, and a computer program product for privacy audit support via provenance-aware...
US-9,811,668 Multi-context exploit test management
An input handler receives an exploit test request specifying at least one exploit to be tested against at least one application in at least one execution...
US-9,811,667 System and method for grouping computer vulnerabilities
A system and method in one embodiment includes modules for creating a vulnerability set including one or more vulnerabilities, adding the vulnerability set to a...
US-9,811,666 System and method providing dependency networks throughout applications for attack resistance
A method and system is provided to automatically propagate dependencies from one part of a software application to another previously unrelated part....
US-9,811,665 Static and dynamic security analysis of apps for mobile devices
Techniques for performing static and dynamic analysis on a mobile device application are disclosed. Static analysis is performed on a mobile device application...
US-9,811,664 Methods and systems for detecting unwanted web contents
Unwanted web contents are detected in an endpoint computer. The endpoint computer receives a web page from a website. The reputation of the website is...
US-9,811,663 Generic unpacking of applications for malware detection
A technique for detecting malware in an executable allows unpacking of a packed executable before determining whether the executable is malware. In systems with...
US-9,811,662 Performing anti-virus checks for a distributed filesystem
The disclosed embodiments disclose techniques that facilitate the process of performing anti-virus checks for a distributed filesystem. Two or more cloud...
US-9,811,661 System and method for protecting computers from unauthorized remote administration
Disclosed are system and method for protecting computers from unauthorized remote administration. One exemplary method comprises: intercepting events occurred...
US-9,811,660 Securing a shared serial bus
A method for securing a serial bus shared by a control module and one or more subordinate electronic devices, the serial bus having a protocol specifying that...
US-9,811,659 Systems and methods for time-shifted detection of security threats
The disclosed computer-implemented method for time-shifted detection of security threats may include (1) collecting history data that describes activity of the...
US-9,811,658 Selectively capturing video in a virtual environment based on application behavior
One example method includes executing a software application within the virtual machine environment; during execution of the software application, detecting one...
US-9,811,657 Security information for software parts
A system and method of identifying a security policy for a software part. Security information for the software part is signed with a security information...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.