Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,004,9243 Event RFID timing system and method having integrated participant event location tracking
A system and method for determining and tracking a location of a participant traveling along a route wherein the participant being tracked with an RFID tag...
US-1,004,9242 Information processing method and non-transitory recording medium
An information processing method causes a processor in a terminal to: display, on the display of the terminal, a first screen representing a pre-preparation...
US-1,004,9241 System for identifying a location of a mobile tag reader
A radio frequency identification (RFID) reader identifies in which room among several rooms the RFID reader is more likely to be located. The RFID reader...
US-1,004,9240 Asset tracking system for rack-based enclosures
A method of establishing a location beacon includes establishing a bi-directional wireless radiofrequency connection between a directed light beacon device and...
US-1,004,9239 Article management system
An article management system according to the present invention includes: a reader antenna (102) including an open-type transmission line terminated in an...
US-1,004,9238 Encoded information reading terminal with item locate functionality
An encoded information reading terminal can comprise a microprocessor, a memory communicatively coupled to the microprocessor, a communication interface, and an...
US-1,004,9237 Radio-frequency identification transponder and method for sending a radio-frequency identification message
Embodiments provide a method for sending a message from an RFID transponder to a reader during a transmission frame using active load modulation, the method...
US-1,004,9236 Identification of items within delivery containers
A food item container that contains a food item may include one or more sensors that collect sensor data indicating a characteristic (e.g., temperature,...
US-1,004,9235 Creating mechanical stamps to produce machine-readable optical labels
A tool for creating mechanical stamps that produce machine-readable optical labels. The tool selects an initial element of a list of two-dimensional labels. The...
US-1,004,9234 Secure access management of devices
Systems and methods may provide implementing one or more device locking procedures to block access to a device. In one example, the method may include receiving...
US-1,004,9233 Information processing apparatus, security management method and information processing system that switches...
When security software is activated, it is determined whether the mode is a safe mode or a normal mode. And the security software switches a monitor in...
US-1,004,9232 Rewrite detection system, rewrite detection device and information processing device
A rewrite detection system, a rewrite detection device and an information processing device can detect unauthorized rewrite to a program or data stored in a...
US-1,004,9231 Method and system for obfuscating the properties of a web browser
A method for obfuscating the properties of a web browser includes identifying an active web browser and generating random assortments of properties compatible...
US-1,004,9230 System and methods for exchanging identity information among independent enterprises which may include person...
A system and method for exchanging identity information and for correlating protected data across independent data systems connected through a network is...
US-1,004,9229 Systems and methods for the management of huddle board participants
Systems and methods for managing a list of huddle board participants are disclosed. The huddle collaboration system includes a huddle management system having...
US-1,004,9228 File encryption support for FAT file systems
Native file encryption support is integrated into an existing file system that does not provide such support, such as the FAT family of file systems, while...
US-1,004,9227 Data field masking and logging system and method
A computer-implemented method for controlling the expression of a block of data from a sensitive data storage device, the method including the steps of...
US-1,004,9226 Facilitating access to restricted functionality
Techniques are described for facilitating access of computing system users to restricted functionality, such as internal functionality of a business or other...
US-1,004,9225 Data access control systems and methods
Various hardware and software configurations are described herein which provide improved security and control over protected data. In some embodiments, a...
US-1,004,9224 Shared secret vault for applications with single sign on
Some aspects of the disclosure generally relate to providing single sign on features in mobile applications in a secure environment using a shared vault. An...
US-1,004,9223 Analyzing address book upload requests
Techniques for processing address book upload requests are provided. A user of a social network service uploads a list of email addresses. The social network...
US-1,004,9222 Establishing application trust levels using taint propagation
An application of a mobile device may be granted access to sensitive or private information. The mobile device may be configured to monitor the application's...
US-1,004,9221 Management of application access
Concepts and technologies are disclosed herein for management of application access. A security management application can be configured to set access controls...
US-1,004,9220 Automatic transformation of security event detection rules
A computer-implemented method for transformation of security information and event management (SIEM) rules and deploying the SIEM rules in a network of event...
US-1,004,9219 Process risk classification
In one implementation, a computer-implemented method includes receiving, at a process risk classifier running on a computer system, a request to determine a...
US-1,004,9218 Rollback resistant security
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for rollback resistant security are disclosed. In one aspect,...
US-1,004,9217 Event-based apparatus and method for securing bios in a trusted computing system during execution
An apparatus is provided for protecting a basic input/output system (BIOS) in a computing system. The apparatus includes a BIOS read only memory (ROM), an event...
US-1,004,9216 Media protection policy enforcement for multiple-operating-system environments
Technologies for media protection policy enforcement include a computing device having multiple operating systems and a data storage device partitioned into a...
US-1,004,9215 Apparatus and method for preventing access by malware to locally backed up data
A method for providing malware protection in connection with processing circuitry including hardware resources and software resources managed by a primary...
US-1,004,9214 Systems and methods for detecting malicious processes on computing devices
The disclosed computer-implemented method for detecting malicious processes on computing devices may include (i) identifying a portion of data on a computing...
US-1,004,9213 Fog-based distributed malware defense
In one embodiment, a device in a network joins a fog-based malware defense cluster comprising one or more peer devices. The device and each peer device in the...
US-1,004,9212 Protection against return oriented programming attacks
In one embodiment, a processor includes at least one execution unit. The processor also includes a Return Oriented Programming (ROP) logic coupled to the at...
US-1,004,9211 Hardware-accelerated prevention of code reuse attacks
Described systems and methods allow protecting a host computer system from malicious software, such as return-oriented programming (ROP) and jump-oriented...
US-1,004,9210 System and method for detection of omnientrant code segments to identify potential malicious code
Methods, systems and media are shown for detecting omnientrant code segments to identify potential malicious code involving, for each offset of a code segment,...
US-1,004,9209 Device, method, and system of differentiating between virtual machine and non-virtualized device
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a cyber-attacker. An end-user...
US-1,004,9208 Intrusion assessment system
An intrusion assessment apparatus includes a memory and a processor. The memory stores first and second records and first, second, and third keywords. The...
US-1,004,9207 Methods of operating storage systems including encrypting a key salt
A method of operating a storage system includes using the device driver to combine a password, the key salt, and the number of iterations to generate a primary...
US-1,004,9206 Accessory authentication for electronic devices
Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches...
US-1,004,9205 Asserting identities of application users in a database system based on delegated trust
Techniques are provided for integrating application-level user security context with a database. A session manager, in a middle tier that includes an...
US-1,004,9204 Computer readable storage media for multi-factor authentication and methods and systems utilizing same
Systems and methods for providing multi-factor authentication are discloses herein. A method for multi-factor authentication may include a step for receiving an...
US-1,004,9203 Method and apparatus for authentication of a user to a server using relative movement
Method and apparatus for authentication of a user to a server that involves the user performing a requested act and that further involves relative movement...
US-1,004,9202 Strong authentication using authentication objects
Representations of authentication objects are provided for selection via an interface. An authentication object may be generated to include information proving...
US-1,004,9201 Physical token-less security screening using biometrics
In physical token-less security screening using biometrics, a person provides biometric data to a security computing device as part of a security screening. The...
US-1,004,9200 Electronic seal, authentication system, and computer-readable recording medium
An electronic seal includes a detector configured to detect contact of a contact surface; a generator configured to generate a pattern on the contact surface in...
US-1,004,9199 Securing a device using graphical analysis
Embodiments are directed to a computer system for securing an electronic device. The system includes at least one processor configured to receive at least one...
US-1,004,9198 Securing a device using graphical analysis
Embodiments are directed to a computer system for securing an electronic device. The system includes at least one processor configured to receive at least one...
US-1,004,9197 System and methods for personal identification number authentication and verification
Systems and methods to authenticate and verify user access replace the digits of a personal identification number (PIN) of a particular user with prompted...
US-1,004,9196 Enhanced task scheduling for data access control using queue protocols
A system and method for scheduling tasks associated with controlling access to databases. The system and method relate to scheduling tasks for data requesting...
US-1,004,9195 Determining user authentication requirements based on the current location of the user being within a...
Systems, apparatus, methods, and computer program products are provided for determining a user's authentication requirements/credentials for a specific network...
US-1,004,9194 Control access to function of information device
A control system for controlling access to a protected function of an information device is disclosed. The control system includes a communication device...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.