Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,842,239 Presentation scanner with user interface to provide feedback about object and code indicia position relative to...
A method of scanning an object may include determining that an object is proximately positioned relative to a scanning volume of a presentation scanner in...
US-9,842,238 System controlled by data bearing records
A system controlled responsive at least in part to data read from data bearing records is operative to cause vehicle repair parts to be determined and...
US-9,842,237 Device and method for identifying an object at least partially covered by a transparent material
A device and method for identifying an object at least partially covered by a transparent material. The abstract of the disclosure is submitted herewith as...
US-9,842,236 Scanner including a switchable mirror and method for using same
A scanner for scanning an item positioned in a scan volume can include: an electronically switchable mirror configured to switch between a reflective state and...
US-9,842,235 Portable terminal, information display system, information display method, and multi-tag
A problem is to provide a portable terminal, an information display system, an information display method, and a multi-tag in which two sheets of...
US-9,842,234 RFID tag authentication system
An RFID tag using a physically unclonable function (PUF) generates a response value corresponding to a challenge value, receives an RFID reader ID from an RFID...
US-9,842,233 Switchable radio-frequency identification tag device
A switchable radio-frequency identification tag device. The device includes a first RFID module positioned on a first plane, at least one un-tuned antenna...
US-9,842,232 Wireless tag communication device and wireless tag communication program
A wireless tag communication device for communicating with a wireless tag through a directional antenna includes a wireless tag communication section configured...
US-9,842,231 System method and apparatus for anti counterfeiting serialization
An anti-counterfeiting serialization method. The method can include receiving an input serial number, locating a seed character at a predetermined position in...
US-9,842,230 System and method for automatically detecting and then self-repairing corrupt, modified or non-existent files...
A system and method of guaranteeing the presence of secure and tamper-proof remote files over a distributed communication medium, such as the Internet, is...
US-9,842,229 Automated application analysis for finding leaked personal information
A method for detecting instances of exfiltration by an application. The method includes performing a first set of runs on a first computation device, and...
US-9,842,228 Local personal daemon
Systems and methods of a personal daemon, executing as a background process on a mobile computing device, for providing personal assistant to an associated user...
US-9,842,227 Secure high speed data storage, access, recovery, and transmission
A method for storing a first data object includes: decomposing the first data object into a first fragment associated with a first original record locator and a...
US-9,842,226 Locative social networking using a mobile device
Technologies are generally described for providing a locative social networking service utilizing wireless access point. In some examples, a method performed...
US-9,842,225 Method and apparatus for controlling a browser
A method and apparatus for controlling a browser are provided. The method includes: acquiring a characteristic identifier of a user; comparing the ...
US-9,842,224 Portable electronic device proximity sensors and mode switching functionality
An electronic device includes a housing. One or more processors are operable with a plurality of proximity sensor components that can be disposed behind a...
US-9,842,222 Securely rebuilding an encoded data slice
A method begins by a requesting entity issuing a rebuild request regarding an encoded data slice to at least some of a set of distributed storage (DS) units. In...
US-9,842,221 Role analyzer and optimizer in database systems
Particular embodiments provide a system that analyzes and optimizes roles and authorizations for users of a customer. The system determines which executables...
US-9,842,220 Systems and methods of secure self-service access to content
In one embodiment, a method is performed by a computer system. The method includes receiving a request from a user to access particular content. The method...
US-9,842,219 Systems and methods for curating file clusters for security analyses
The disclosed computer-implemented method for curating file clusters for security analyzes may include (1) identifying a suspicious file that exists on at least...
US-9,842,218 Systems and methods of secure self-service access to content
In one embodiment, a method includes receiving a request from a user to access particular content. The method also includes determining at least one topic of...
US-9,842,217 Method and system for securing data
A method for securing user data includes the steps of: a) setting the user data as input data; b) randomly fragmenting the input data into a plurality of Atoms...
US-9,842,216 System and methods for tamper proof interaction recording and timestamping
A system and method for securely recording voice communications, comprising an authentication server, further comprising at least a software components...
US-9,842,215 Computer-implemented system and method for anonymizing encrypted data
A computer-implemented system and method for anonymizing encrypted data is provided. At least one attribute is identified within a dataset for anonymization and...
US-9,842,214 System and method to secure on-board bus transactions
A technique for securing on-board bus transactions in a computing device is discussed. A shared key is generated and then programmed into the read-only...
US-9,842,213 Mechanisms for locking computing devices
Various systems and methods for locking computing devices are described herein. In an example, a portable device comprises an electro-mechanical lock; and a...
US-9,842,212 System and method for a renewable secure boot
Embodiments of systems and methods disclosed herein include renewable secure boot systems for renewing and booting a target device. Systems and methods include...
US-9,842,211 Systems and methods for biometric authentication
Systems and methods for determining a threat level are disclosed. A method includes: receiving, from a biometric sensor, data corresponding an attempt to verify...
US-9,842,210 Universal extensible firmware interface module identification and analysis
The present disclosure provides a network architecture and verification platform for analyzing the various modules of a Unified Extensible Firmware Interface...
US-9,842,209 Hardened event counters for anomaly detection
A collection of techniques allow for the detection of covert malware that attempts to hide its existence on a system by leveraging both trusted hardware event...
US-9,842,208 Method, apparatus and system for detecting malicious process behavior
A method, apparatus and system for detecting a malicious process behavior. A detection apparatus monitors a process to obtain behavior information about a...
US-9,842,207 Mobile device with multiple security domains
Included within a shared housing are at least one user interface element; a first isolated computational entity; a second isolated computational entity; and a...
US-9,842,206 Using call stack snapshots to detect anomalous computer behavior
Detecting computer anomalies by determining probabilities of encountering call stack configurations at various depths, the call stacks being associated with...
US-9,842,205 Time-varying passwords for user authentication
Time-varying passwords for user authentication are disclosed. Example methods disclosed herein for password generation include obtaining a base password...
US-9,842,204 Systems and methods for assessing security risk
Systems and methods for providing identification tests. In some embodiments, a system and a method are provided for generating and serving to a user an animated...
US-9,842,203 Secure system for allowing the execution of authorized computer program code
Systems and methods for selective authorization of code modules are provided. According to one embodiment, a kernel mode driver monitors events occurring within...
US-9,842,202 Device proximity
A method of determining the proximity of a first device to a second device, the method comprising, at the second device: receiving a first packet having a first...
US-9,842,201 Privacy preserving electronic document signature service
An electronic document signature system preserves the security of an electronic document while tracking a signature process corresponding to the electronic...
US-9,842,200 Content monitoring and host compliance evaluation
A content hosting service provides an interface for enabling content owners to upload controlled video and specify conditions for monitoring and hosting it on...
US-9,842,199 Information processing system, method of controlling the system, information processing apparatus, web server,...
In an information processing apparatus, upon the calling of a web application being instructed, the information processing apparatus sets a URL corresponding to...
US-9,842,198 Screening method and systems utilizing mass spectral fragmentation patterns
The present application is directed to methods and systems for identifying small molecule compounds in mixtures using a library comprising calculated structures...
US-9,842,197 Athlete informational device
A digital image with athletic information organized on it to be output to a computer, smartphone and/or physical, including adhesive-backed textiles that remain...
US-9,842,196 Variable dose dispensing system
A variable dose dispensing system may include a processor and memory. The processor may receive a request for a variable dose order of a medication, such as...
US-9,842,195 Medication management and reporting technology
Medication management and reporting technology, in which output from at least one sensor configured to sense physical activity in a building in which medication...
US-9,842,194 Simplified method for robust estimation of parameter values
A method for estimating parameter values includes acquiring image data with an imaging apparatus, deriving a parameter model function from the image data,...
US-9,842,193 Swallowing simulation apparatus and method
A swallowing simulation apparatus comprises a computer that stores swallowing simulation software that when executed results in an oral cavity model and a...
US-9,842,192 Tele-presence robot system with multi-cast features
A graphical user interface for a remote controlled robot system that includes a robot view field that displays information provided by a robot and an observer...
US-9,842,191 Imaging system operational property monitoring
This invention relates to an imaging system and more particularly to imaging system operational property monitoring and describes an approach that makes key...
US-9,842,190 Displaying a set of interrelated objects
A system for displaying a set of interrelated objects comprises an initializer (1) for identifying a plurality of interrelated objects, a first information...
US-9,842,189 System and method to monitor inventory of storage container
A system and method for monitoring the inventory of a medical storage container that has a required inventory of medical articles. An enclosure is used to...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.