Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,001,3595 Correlating fingerprints to pointing input device actions
An example electronic device (10) is provided. The electronic device (10) includes a screen (32), at least one electronic component (34) to detect at least one...
US-1,001,3594 Fingerprint identification device, touch panel and display device
The present disclosure provides a fingerprint identification device, a touch panel and a display device. The fingerprint identification device includes a...
US-1,001,3593 Multiphase fingerprint sensor layout and construction
A capacitive fingerprint sensor includes a set of capacitive sensor electrodes in a sensing area. The set of capacitive sensor electrodes includes a set of...
US-1,001,3592 Method and system for supervised disembarking of passengers from a bus
System and method for collecting object identification data from a plurality of objects that interact with a vehicle during operation of the vehicle, where the...
US-1,001,3591 Code symbol reading system having adaptive autofocus
A system for reading code symbols includes an imaging subsystem that includes a focusing module and an image processor. The image processor selects an initial,...
US-1,001,3590 Mobile RFID reader
Disclosed herein is a mobile Radio Frequency Identification (RFID) reader: including a plate panel for recognition of RFID tag information configured to include...
US-1,001,3589 Systems and methods for enabling user interactions with wireless tags
There is provided a system including a wireless tag reader, a first wireless antenna, a wireless tag including an integrated circuit (IC), a conductive element...
US-1,001,3588 Encoded information reading terminal with multi-directional antenna
An encoded information reading terminal can comprise a microprocessor, a memory communicatively coupled to the microprocessor, a radio frequency identifier...
US-1,001,3587 Powering RFID tags using multiple RFID readers
Synthesized-beam RFID readers may be used to locate RFID tags. In one embodiment, a tag's response rates on different beams can be used, along with the target...
US-1,001,3586 Information bearing medium and information processing system
An information processing system includes an information bearing medium and an information reading unit. The information bearing medium has a two-dimensional...
US-1,001,3585 Dynamic quick response code branding
In an approach to managing a quick response code branding device and management of a quick response code branding device, one or more computer processors...
US-1,001,3584 Apparatus, system, and method for detecting theft of network devices
The disclosed apparatus may include a secure storage device that securely stores an initial geographic location of a network device that facilitates network...
US-1,001,3583 Electronic device
An electronic device of an aspect of the present disclosure includes an underwater detection unit and at least one processor. The underwater detection unit is...
US-1,001,3582 Secure data entry device
A secure data entry device including a housing having at least one housing element, at least one additional element located within the housing, at least one...
US-1,001,3581 Detection of fault injection attacks
An apparatus for detecting fault injection includes functional circuitry and fault detection circuitry. The functional circuitry is configured to receive one or...
US-1,001,3580 Security device with programmable systolic-matrix cryptographic module and programmable input/output interface
A system includes programmable systolic cryptographic modules for security processing of packets from a data source. A first programmable input/output interface...
US-1,001,3579 Secure routing of trusted software transactions in unsecure fabric
Various configurations and methods for securing and validating trusted input output (IO) data communications within fabric interconnects of processing circuitry...
US-1,001,3578 Apparatus for processing with a secure system manager
Method and apparatus for secure processing. The method includes detecting communication among secure and non-secure data entities, prohibiting execution of...
US-1,001,3577 Data processing systems for identifying whether cookies contain personally identifying information
A system for identifying and determining whether a particular cookie may include personal data, in various embodiments, is configured to analyze collected...
US-1,001,3576 History information anonymization method and history information anonymization device for anonymizing history...
A history information anonymization method is provided that includes associating each of a plurality of pieces of history information collected from a plurality...
US-1,001,3575 Method to manage raw genomic data in a privacy preserving manner in a biobank
A method to manage raw genomic data (SAM/BAM files) in a privacy preserving manner in a biobank. By using order preserving encryption of the reads' positions,...
US-1,001,3574 Method and apparatus for secure storage and retrieval of encrypted files in public cloud-computing platforms
In one aspect, a computerized Encrypted Drive System (EDS) server useful for keyword extraction and indexing server of includes a computer store containing...
US-1,001,3573 Personal ledger blockchain
A system, method, and computer readable storage medium configured for storing encrypted data in a blockchain. To write additional data in a blockchain, a...
US-1,001,3572 Implementing extent granularity authorization command flow processing in CAPI adapters
A method, system and computer program product are provided for implementing block extent granularity authorization command flow processing for a Coherent...
US-1,001,3571 Information management system and information management method
In the present invention, a control section of a CRM server performs editing processing for TPO (the time, the place, and the occasion) requirements. Next, a...
US-1,001,3570 Data management for a mass storage device
Disclosed aspects relate to data management for a mass storage device. The mass storage device may be structured to include an encrypted file system to store a...
US-1,001,3569 Privacy-preserving data collection, publication, and analysis
A data collection procedure is described, which can be performed automatically for each subject of a study as the participant produces the data being collected....
US-1,001,3568 Identifying and blocking prohibited content items in a content management system
To identify whether a content item is prohibited, a content management system can generate a content item fingerprint for the content item and then compare the...
US-1,001,3567 Private and public sharing of electronic assets
The embodiments set forth techniques for implementing a cloud service that enables cloud data to be shared between different users in a secure manner. One...
US-1,001,3566 System and method for managing collaboration in a networked secure exchange environment
In embodiments of the present invention improved capabilities are described for securely viewing computer data content, such as documents, presentations,...
US-1,001,3565 System and method for secure transport of data from an operating system to a pre-operating system environment
An information handling system includes a trusted platform module (TPM) and a storage device, the TPM provides boot authentication for the information handling...
US-1,001,3564 Methods, systems, and devices for handling image capture devices and captured images
Computationally implemented methods and systems include acquiring an encrypted image that is a captured image that has been encrypted through use of a...
US-1,001,3563 Systems and methods for binding a removable cryptoprocessor to an information handling system
In accordance with these and other embodiments of the present disclosure, an information handling system may include a processor and a basic input/output system...
US-1,001,3562 Information processing device, and information processing method
An information processing device includes an interrupt information output request part configured to detect an input of interrupt information, which is...
US-1,001,3561 Dynamic pre-boot storage encryption key
During a pre-boot cycle of a device an algorithm is obtain from a first portion of the hard drive. The algorithm is executed to obtain a key. The key is used to...
US-1,001,3560 Securely exchanging information during application startup
Provided is a method for securely exchanging information during application startup. A processor may send a request for a passphrase to one or more remote...
US-1,001,3559 Communication with a virtual trusted runtime BIOS
A secure communication channel is established between a virtual trusted runtime basic input output system (BIOS) and a virtual machine that includes a virtual...
US-1,001,3558 Method and computer readable medium for secure software installation mechanism
A method for securely updating at least one software application on a target system includes providing a removable computer readable medium containing an...
US-1,001,3557 System and method for disarming malicious code
The disclosed embodiments include a method for disarming malicious code in a computer system having a processor. The method comprises accessing, by the computer...
US-1,001,3555 System and method for detecting harmful files executable on a virtual stack machine based on parameters of the...
Disclosed are method and system for detecting harmful files executed by a virtual stack machine. An example method includes: analyzing a file executable on the...
US-1,001,3554 Time varying address space layout randomization
Embodiments include computing devices, apparatus, and methods implemented by the apparatus for time varying address space layout randomization. The apparatus...
US-1,001,3553 Protecting software application
There is provided a method of protecting the execution of a software application, the method performed by a plurality of processes comprising a process for...
US-1,001,3552 Protecting content on a mobile device from mining
Systems and methods prevent or restrict the mining of content on a mobile device. For example, a method may include identifying a mining-restriction mark in low...
US-1,001,3551 Isolated memory space
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for determining where to store a version of an object in an...
US-1,001,3550 Systems and methods for adding microservices into existing system environments
Systems and methods are disclosed that relate to network security within a virtual network, and how to add microservices in a scalable virtual network. For...
US-1,001,3549 OCR-based single sign-on
A method and technique for OCR-based single sign-on in a computing environment includes automatically causing a display of a dialog screen of an application in...
US-1,001,3548 System and method for integrating two-factor authentication in a device
A system and method for providing secondary-factor authentication with a third party application that can include enrolling a device application instance of an...
US-1,001,3547 System and method for motion gesture access to an application and limited resources of an information handling...
An information handling system includes a processor that determines a first orientation from orientation sensors and a sensor hub for detecting a motion...
US-1,001,3546 Pattern-based mobile device unlocking
A computer-implemented method of authenticating a user with a computing device is disclosed. The method involves displaying a grid of selectable ...
US-1,001,3545 Systems and methods for creating a user credential and authentication using the created user credential
Systems, methods and devices for creating a user credential are provided. A device for creating a user credential for user authentication includes one or more...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.