Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,000,7823 Simple code reader
Embodiments of the present disclosure provide code readers for reading codes provided as patterns imprinted on objects. Light interacts with a pattern by e.g....
US-1,000,7822 Graphical barcode readers that are configured for glare reduction
A method for glare reduction may be implemented by a graphical code reader. The graphical code reader includes an optic system, a plurality of light sources,...
US-1,000,7821 Interrogator system, apparatus and method
The present invention relates to the identification of RFID devices that are arranged closely together and placed on shelving for logistical and storage...
US-1,000,7820 Systems and methods for scanning a user environment and evaluating data of interest
According to various embodiments, a mobile device continuously and/or automatically scans a user environment for tags containing non-human-readable data. The...
US-1,000,7819 Hybrid tag for radio frequency identification system
RFID (radio frequency identification) systems are provided in which tag and interrogator devices implement a hybrid framework for signaling including an optical...
US-1,000,7818 Multi-position RFID switch
An RFID switch manually operable for transmitting status data includes a plurality of RFID tags that a user can selectively expose to or shield from activation...
US-1,000,7817 RFID system
An RFID system includes an antenna of a reader/writer and an antenna of an RFID tag. Transmission and reception of a high-frequency signal of a UHF band is...
US-1,000,7816 On-demand activation of radio frequency identification (RFID) tag
In aspects of on-demand RFID tag activation, an RFID tag is configured so as to enable a person to activate the RFID tag if or when the person wishes. An RFID...
US-1,000,7815 Production method, RFID transponder, authentication method, reader device and computer program product
The exemplary embodiments of the invention realize an efficient prevention of massive infiltration of cloned RFID transponders into existing and new RFID...
US-1,000,7814 Card reader and control method for card reader
A card reader may include a card insertion part comprising a card insertion port is formed; a plurality of metal sensors structured to detect whether a foreign...
US-1,000,7813 Card reader with passive ID circuit
A method of transmitting information to a mobile device includes providing a card reader is provided with a read head, a slot for swiping a magnetic stripe of a...
US-1,000,7812 Dynamic quick response code branding
In an approach to managing a quick response code branding device and management of a quick response code branding device, one or more computer processors...
US-1,000,7811 Anti-tamper system
The present invention relates to a system for protecting sensitive data including at least one enclosing layer, a cryptography module, at least one...
US-1,000,7810 Alternate screen reveal for instant privacy
A system and method for assuring the privacy of a computer application includes generating a user interface with a privacy feature coupled with a computer...
US-1,000,7809 Fine-grained self-shredding data in a secure communication ecosystem
One embodiment provides a document management system comprising a storage system to store one or more encrypted documents, at least a first portion of a first...
US-1,000,7808 Protecting application programs from malicious software or malware
A computer system, includes a crypto mechanism that decrypts and integrity-checks Secure Object information as the Secure Object information moves into the...
US-1,000,7807 Simultaneous state-based cryptographic splitting in a secure storage appliance
Methods and systems for managing I/O requests in a secure storage appliance are disclosed. One method includes receiving a plurality of I/O requests at the...
US-1,000,7806 Secure boot sequence for selectively disabling configurable communication paths of a multiprocessor fabric
Disabling communication in a multiprocessor fabric. The multiprocessor fabric may include a plurality of processors and a plurality of communication elements...
US-1,000,7805 Forming a protected data field entry
The system may comprise receiving a data element, and receiving an encryption key and an associated encryption key identifier from an encryption keystore...
US-1,000,7804 Secure cloud storage distribution and aggregation
Methods and systems for vendor independent and secure cloud storage distribution and aggregation are provided. According to one embodiment, an application...
US-1,000,7803 Searching over encrypted keywords in a database
The present invention relates to a computer-implemented method, system and computer readable medium for searching over encrypted keywords in a database. The...
US-1,000,7802 Device, method, and graphical user interface for accessing an application in a locked device
A device with a touch sensitive display and a plurality of applications, including a camera application, while the device is in a locked, passcode-protected...
US-1,000,7801 Automatic audit logging of events in software applications performing regulatory workloads
Automatically generating audit logs is provided. Audit log statement insertion points are identified in components of an application based on a static code...
US-1,000,7800 Remote rule execution
In a policy decision point (500) coupled to at least one remote attribute source (107a-c), a method of transforming an attribute-based access control (ABAC)...
US-1,000,7799 Workflow and user credentials
A hardware processor may execute instructions to execute at least one request from a plurality of profiles with corresponding credentials used to access inputs...
US-1,000,7798 Method for managing privacy of digital images
A captured digital image is stored in memory together with metadata derived from a location signal only if the location metadata is determined not to be within...
US-1,000,7797 Transparent client-side cryptography for network applications
In one embodiment, a system and associated processes for transparent client-side cryptography are provided. In this system, some or all of a user's private data...
US-1,000,7796 Digital communications
A device to apply a digital fingerprint to a digital signal comprises a means of intercepting or acquiring a signal, a storage element and a processor for...
US-1,000,7795 Detection and recovery of documents that have been compromised by malware
Documents that have been compromised by malware are detected and recovered. A hash of a portion of a file of a document is generated. An identifier of the file...
US-1,000,7794 Methods and systems for ensuring printer looses ability to print security patterns if disconnected from...
The present invention relates to a method and system used to ensure that a printer which is capable of printing security patterns loses its ability to print...
US-1,000,7793 Secure object having protected region, integrity tree, and unprotected region
A method and structure for a secure object, as tangibly embodied in a computer-readable storage medium. The secure object includes a cryptographically protected...
US-1,000,7792 Modeling a network security environment as a game
Disclosed are various embodiments that model a network security environment as a game. A data model corresponding to a network security environment is received....
US-1,000,7791 Systems and methods for increasing security sensitivity based on social influence
Systems, methods, and non-transitory computer-readable media can provide a set of security features capable of being enabled by a user associated with an online...
US-1,000,7790 Secure application development and execution
Examples of secure application development and execution are disclosed herein. An example method may include parsing code of an application configured for...
US-1,000,7789 Apparatus and method for detecting malware code by generating and analyzing behavior pattern
The present invention relates to an apparatus and a method for detecting a malware code by generating and analyzing behavior pattern. A malware code detecting...
US-1,000,7788 Method of modeling behavior pattern of instruction set in N-gram manner, computing device operating with the...
A computing device configured to execute an instruction set is provided. The computing device includes a system call hooker for hooking system calls that occur...
US-1,000,7787 Runtime return-oriented programming detection
Input is received during runtime of a program. The input is a return instruction address of a called function and a return target address of the program. A...
US-1,000,7786 Systems and methods for detecting malware
A computer-implemented method for detecting malware may include (1) identifying a behavioral trace of a program, the behavioral trace including a sequence of...
US-1,000,7785 Method and apparatus for implementing virtual machine introspection
The present disclosure relates to the field of information technologies and discloses a method and an apparatus for implementing virtual machine introspection....
US-1,000,7784 Technologies for control flow exploit mitigation using processor trace
Technologies for control flow exploit mitigation include a computing device having a processor with real-time instruction tracing support. During execution of a...
US-1,000,7783 Method for protecting an automation component against program manipulations by signature reconciliation
In a method for determining a threat situation for an automation component of the controller or field level, wherein the automation component has at least one...
US-1,000,7782 Method and system for facilitating replacement of system calls
One embodiment of the present invention provides system for facilitating replacement of a system function in an application with a customized function. During...
US-1,000,7781 Method and system for password setting and authentication
A method for password setting and authentication is provided. The method includes receiving a password setting request and acquiring a reference character...
US-1,000,7780 Authentication management
Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing...
US-1,000,7779 Methods and systems for gradual expiration of credentials
Methods and systems are provided to enable gradual expiration of credentials. Instead of depriving a user of all his access rights upon expiration of his...
US-1,000,7778 Controlled connecting method between luminaire and auxiliary device
According to some embodiments, a system and method provide a lighting fixture including at least one socket, wherein each socket is operative to receive an...
US-1,000,7777 Single input unlock for computing devices
A device is described that, while operating in a lock-sensitive display. Responsive to detecting, and while receiving the first portion, the device displays a...
US-1,000,7776 Systems and methods for distinguishing among human users and software robots
A technique for distinguishing between a human user and a software robot. The technique includes: receiving a first communication from a device different from...
US-1,000,7775 Managing access to an electronic system
A method, system or computer usable program product for managing access to an electronic system through a touchscreen device including presenting a display of a...
US-1,000,7774 Biometric data detection device
A biometric data detection device includes a biometric authentication sensor electrically connected to a data processing terminal through a connecting member, a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.