Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,006,1955 Proximity-based linking for wearable group communication device
Systems, methods, software and apparatus enable linking of a wearable end user communication device (EUD) to an intermediate communication device (ICD)...
US-1,006,1954 On-screen code stabilization
Methods and systems for stabilizing an on-screen code on a display of a mobile device are described. A code is displayed on a mobile device as an on-screen...
US-1,006,1953 Devices and systems for barcoding individual wells and vessels
The invention generally relates to devices and systems for individually barcoding sample vessels. In certain embodiments, the devices comprise an attachment...
US-1,006,1952 Arrangement for, and method of, detecting passage of objects associated with radio frequency (RF)...
A radio frequency (RF) identification (RFID) reader is mounted in a venue in proximity to a portal that is openable and closable by a door. The portal reader...
US-1,006,1951 Methods and systems for localizing articles comprising passive radio frequency identification (RFID) tags
A method of localizing articles comprising passive Radio Frequency Identification Device (RFID) tags is disclosed. The method includes receiving tag information...
US-1,006,1950 Inventory-cycle-based RFID tag location
Techniques are provided to estimate the location of an RFID tag using tag read information, such as a tag read count or a tag read rate, and an opportunity...
US-1,006,1949 System and method for providing secure identification solutions
The present invention provides a method and system for verifying and tracking identification information. In an embodiment of the invention, a system for...
US-1,006,1948 Systems and methods for emulating RFID transponders of a plurality of medical devices
A radio frequency identification (RFID) network is presented including a plurality of medical devices each including an RFID transponder and a single RFID...
US-1,006,1947 Wireless user authentication system
A wireless user authentication system uses an AIDC device and a wireless reader to verify the identity of an individual. The AIDC device is a key fob that...
US-1,006,1946 Method and apparatus for industrial identification mark verification
The invention provides methods and apparatus for analysis of images of direct part mark identification codes to measure and assess a print quality. Methods to...
US-1,006,1945 Method and apparatus for location-based recovery of stolen mobile devices
A method, apparatus, and system for locating mobile devices. The system includes a location-aware mobile device. The location-aware mobile device includes a...
US-1,006,1944 Electronic whiteboard system, electronic whiteboard access right giving method and its program
An electronic whiteboard system includes a server device 10 including a storage device 11 that stores electronic whiteboard data of an electronic whiteboard and...
US-1,006,1943 Keyboard monitoring to protect confidential data
In an example embodiment described herein, keyboard monitoring logic is operable to obtain data typed into a keyboard. The data typed into the keyboard is...
US-1,006,1942 Secure storage of an electronic subscriber identity module on a wireless communication device
A method for secure storage of an embedded Subscriber Identity Module (eSIM) on a wireless communication device including an embedded Universal Integrated...
US-1,006,1941 Systems and methods for multiport to multiport cryptography
Systems and methods are discussed herein for reusing hardware for encryption and authentication, where the hardware has a fixed input bandwidth, and where the...
US-1,006,1940 Secure protection processor and method including comparing an instruction security attribute of an instruction...
A secure protection method executed by a processor is provided. The secure protection method includes the following steps: Perform a security checking before or...
US-1,006,1939 Computing confidential data insight histograms and combining with smoothed posterior distribution based histograms
In an example embodiment, a number of buckets is determined for an empirical histogram of confidential data values submitted to a computer system. The empirical...
US-1,006,1938 Moving a portion of a streaming application to a public cloud based on sensitive data
A streams manager determines which portions of a streaming application process sensitive data, and when performance of the streaming application needs to be...
US-1,006,1937 Protecting confidential information
An approach using a computer, receives from a first computer, text generated by a user and identifies in the text generated by the user, confidential...
US-1,006,1936 Systems and methods of identity protection and management
In an embodiment, a computing system, such as a monitoring computer, receives a request from a user to monitor an account of the user with an online service...
US-1,006,1935 Information processing apparatus, information processing method, and storage medium
An information processing apparatus includes a memory that stores document data; a creating unit that creates access control information indicative of access...
US-1,006,1934 Access to a wearable computing system using randomized input origins
Embodiments disclosed herein provide systems, methods, and computer-readable media for accessing a wearable computing system using randomized input origins for...
US-1,006,1933 System and method for controlling the power states of a mobile computing device
An exemplary mobile computing device, including a memory device for storing a control policy defining a functional configuration of the mobile computing device;...
US-1,006,1932 Securing portable data elements between containers in insecure shared memory space
Systems and methods for encrypting an unencrypted data set within a file are provided. The disclosed systems and methods can be configured to create a...
US-1,006,1931 Image processing apparatus, control method therefor, and computer-readable storage medium storing program for...
An image processing apparatus capable of reducing the frequency of a user's inputting work for authentication information to improve the convenience. When the...
US-1,006,1930 Strong confirmation mechanism for manipulation of sensitive configuration data
An intention to perform a data management function in a computing environment is confirmed by issuing a confirmation prompt requiring a user to input at least...
US-1,006,1929 Secure content sharing
Convenient sharing of information among authorized network users may be facilitated by allowing a user to send information originating from multiple...
US-1,006,1928 Security-enhanced computer systems and methods
In general, the invention provides a computer architecture designed for enhanced data security. In embodiments, the architecture comprises two sub-systems, each...
US-1,006,1927 Storage medium having stored therein boot program, information processing apparatus, information processing...
Identification information of a program read from outside, such as firmware, is acquired, and usability of a piece of key data in a range corresponding to the...
US-1,006,1926 Method and system for unlocking and deleting file and folder
A method and system for unlocking and deleting a file or a folder. The method for unlocking the file or the folder comprises: receiving an unlock request of a...
US-1,006,1925 Detecting attacks by matching of access frequencies and sequences in different software layers
A number of events are counted in different layers of a computing environment during execution of a software application. The number of counted events can be...
US-1,006,1924 Detecting malicious code based on deviations in executable image import resolutions and load patterns
Trusted executable images are run in a controlled environment, such as a dynamic malware analysis platform. For each trusted executable image, a corresponding...
US-1,006,1923 Safe and secure internet or network connected computing machine providing means for processing, manipulating,...
A computing machine that minimizes problems from external files, such as software virus and malware is disclosed. The computing machine has local operations...
US-1,006,1922 System and method for malware detection
Systems and methods for malware detection techniques, which detect malware by identifying the C&C communication between the malware and the remote host. In...
US-1,006,1921 Methods and systems for detecting computer security threats
A behavior of a computer security threat is described in a root-cause chain, which is represented by a detection rule. The detection rule includes the objects...
US-1,006,1920 Secure platform implementing dynamic countermeasures
The present invention relates to a secure platform implementing dynamic countermeasures in relation with the execution of a code, said secure platform having at...
US-1,006,1919 Computing platform security methods and apparatus
Computing platform security methods and apparatus are disclosed. An example apparatus includes a security application to configure a security task, the security...
US-1,006,1918 System, apparatus and method for filtering memory access logging in a processor
In one embodiment, a processor comprises: a first storage including a plurality of entries to store an address of a portion of a memory in which information has...
US-1,006,1917 Network operations center and appliance host in a single machine
System and method of a single machine or cluster of machines acting as a single machine that simplifies and consolidates the hosting of appliances using...
US-1,006,1916 Systems and methods for measuring peer influence on a child
The disclosed computer-implemented method for measuring peer influence on a child may include (i) monitoring computing activity on at least one endpoint device...
US-1,006,1915 Posture assessment in a secure execution environment
Systems and methods for providing computer system monitoring as a service of a computing resource service provider, monitoring capacity computer system of a...
US-1,006,1914 Account recovery protocol
The present disclosure relates to receiving a request for recovery of an account associated with a user, sending a CAPTCHA challenge to a user device associated...
US-1,006,1913 Slider authenticator
For a device with a slider component, movement of the slider component may be used as part of an authentication process, for example, when unlocking the device,...
US-1,006,1912 Multi-factor authentication system and method
A system and method of multi-factor authentication are described. In some embodiments, a first device provides an initial authentication data to a second...
US-1,006,1911 Local user authentication with neuro and neuro-mechanical fingerprints
In accordance with one embodiment, a method for locally verifying the identification of a user with an electronic device is disclosed. The method includes...
US-1,006,1910 Secure biometric data capture, processing and management for selectively prohibiting access to a data storage...
A system includes one or more biometric sensors, a sensor hub and a trusted application execution environment. The sensor hub has exclusive access to the...
US-1,006,1909 Device authentication based on behavior classification using convolution neural network
A method of authenticating a user on a mobile device includes gathering samples of behavioral data of the user from multiple sensors of the mobile device, each...
US-1,006,1908 Program editing device, program management device, and computer readable medium
A management server (200) has a storage section to store a program set (110) and a user management table. The management server receives user information from a...
US-1,006,1907 File origin determination
A file validation method and system is provided. The method includes retrieving from an authoritative source system, an artifact file. Identification...
US-1,006,1906 Object rendering systems and methods
Systems and methods are described that protect intellectual property rights in connection with 3-dimensional printing processes. In certain embodiments, an...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.