Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,007,3997 Filtering inventory objects using images in an RFID system
A method for filtering scanned objects displayed on a reader is provided. The reader may scan one or more transponders, and obtain, from a database, an image...
US-1,007,3996 Device with RFID window that couples to the mouth of a shopping cart or another container and method of...
Device with RFID radio frequency identification window that couples to the mouth of a shopping cart, or another container, that includes a frame with a window...
US-1,007,3995 Protection of personal data contained on an RFID-enabled device
A system for protecting personal data contained on an RFID-enabled device, suitable for use with an RFID system including an RFID reader configured to extract...
US-1,007,3994 Successive memory writes in an RFID interrogator
A high speed tabletop and industrial printer is disclosed with integrated high speed RFID encoding and verification at the same time. The industrial printer...
US-1,007,3993 System for interrogating RFID transponders
Disclosed is a system for electromagnetic interrogation of RFID transponders including at least one RFID transponder, at least one so-called repeater RFID...
US-1,007,3992 Method and apparatus pertaining to facilitating the reading of RFID tags
These teachings generally comprise interrogating RFID tags and receiving corresponding responses from various ones of these RFID tags while also receiving, from...
US-1,007,3991 Systems and methods for correction of on-strip coding
Systems and methods of making a diagnostic test strip, the method including marking a machine-readable pattern onto the diagnostic test strip which contains...
US-1,007,3990 System and method for monitoring network devices incorporating authentication capable power supply modules
A power supply module implemented within a first device and including a voltage regulator and an authentication module. The voltage regulator receives power...
US-1,007,3989 Systems and methods for preventing data remanence in memory systems
Methods, circuits, and systems for preventing data remanence in memory systems are provided. Original data is stored in a first memory, which may be a static...
US-1,007,3988 Chipset and host controller with capability of disk encryption
A chipset and a host controller, including a storage host controller for a storage device and an encryption and decryption engine that is implemented by...
US-1,007,3987 Methods and systems for privileged execution support for file system commands on a storage device
The present invention relates to a storage device that is able to execute higher level commands, such as network-level, file-system commands, with privileged...
US-1,007,3986 Regulating access to and protecting portions of applications of virtual machines
Embodiments of apparatus, computer-implemented methods, systems, and computer-readable media are described herein for a virtual machine manager, wherein the...
US-1,007,3985 Apparatus and method for trusted execution environment file protection
An apparatus and method for securing sensitive data on a mobile device are provided. The method includes receiving an encryption or decryption request for the...
US-1,007,3984 Rights based system
A rights-based system is described in which vouchers are employed for creating, managing, distributing, and redeeming rights in digital contexts. A voucher is a...
US-1,007,3983 Systems and methods for identifying suspicious singleton files using correlational predictors
The disclosed computer-implemented method for identifying suspicious singleton files using correlational predictors may include (1) identifying a set of...
US-1,007,3982 Semiconductor device
A scramble unit subjects data to be written into twin cells in a first storage unit to scramble processing with the use of scramble data. A write unit writes...
US-1,007,3981 Controlling secure processing of confidential data in untrusted devices
A number of transmissions of secure data communicated between a secure trusted device and an unsecure untrusted device in a DBMS is controlled. The data is...
US-1,007,3980 System for assuring security of sensitive data on a host
Techniques determine and mitigate leakage of sensitive data into log data. The message is parsed to identify a first value and a first data classification tag...
US-1,007,3979 Method, system, and program for an improved enterprise spatial system
Disclosed is a method, system, and program for providing access to spatial data. A request for data is received. Enterprise and third party data are integrated....
US-1,007,3978 Efficient modification and creation of authorization settings for user accounts
For efficient authorization settings in a computing environment, user access permissions are created or modified by mapping, granting, and/or limiting access to...
US-1,007,3977 Technologies for integrity, anti-replay, and authenticity assurance for I/O data
Technologies for authenticity assurance for I/O data include a computing device with a cryptographic engine and one or more I/O controllers. A metadata producer...
US-1,007,3976 Application executing method and device, and recording medium thereof
A system and method for setting windows to either a traceable mode or a non-traceable mode, and selectively executing an application in a window to restrict...
US-1,007,3975 Application integrity verification in multi-tier architectures
A method and system of determining a vulnerability of software are provided. In a setup phase, an authorized application is received from an authorized source....
US-1,007,3974 Generating containers for applications utilizing reduced sets of libraries based on risk analysis
A method includes analyzing a given application to determine one or more packages utilized by the given application, the one or more packages comprising a...
US-1,007,3973 Process testing apparatus, computer-readable medium, and process testing method
A test memory extracting unit 110 extracts a test memory image 191 from a memory area of a target system. A template memory extracting unit 120 extracts a...
US-1,007,3972 Computing platform security methods and apparatus
Computing platform security methods and apparatus are disclosed. An example apparatus includes a security application to configure a security task, the security...
US-1,007,3971 Traffic processing for network performance and security
Aspects of the subject disclosure are directed towards protecting machines, such as virtual machines in a cloud datacenter, from receiving unwanted traffic, and...
US-1,007,3970 System and method for reverse command shell detection
A system and method for detecting reverse command shell intrusions at a process-level on a user device is disclosed. In one embodiment, the system detects each...
US-1,007,3969 File system metadata extension utilizable with object store
An apparatus comprises an object store, back-end storage supporting the object store, and a file system associated with the back-end storage. Objects of the...
US-1,007,3968 Systems and methods for classifying files
The disclosed computer-implemented method for classifying files may include (i) identifying a point in time before which there is a non-zero probability that at...
US-1,007,3967 Controlling distribution and use of a developer application in a network environment
A method is disclosed for controlling distribution and use of a developer application in a network environment. A portal is provided for a developer to submit...
US-1,007,3966 Operating system-independent integrity verification
An integrity verification subsystem can verify the integrity of software and firmware modules on a computing device at load time and/or at run time,...
US-1,007,3965 Methods and systems for validating an autonomous system that includes a dynamic-code module and a static-code...
Disclosed herein are methods and systems for validating an autonomous system that comprises a static-code module and a dynamic-code module, the method including...
US-1,007,3964 Secure authentication protocol systems and methods
An input device of a secure authentication protocol system may receive at least one user authentication factor in a pre-boot session. The input device may...
US-1,007,3963 Claiming data from a virtual whiteboard
A method of storing data from a whiteboard application executed on a computing system including an interactive display device is provided. The method comprises...
US-1,007,3962 System and method employing reduced time device processing
Methods and systems for facilitating a transaction are provided. A transaction involving an integrated circuit user device in contact with an access device is...
US-1,007,3961 Authentication system, user terminal, control device, service providing device, program, and authentication method
An authentication system of an embodiment includes a control device, a user terminal, and a service providing device. The control device includes a storage...
US-1,007,3960 Hybrid device having a personal digital key and receiver-decoder circuit and methods of use
A hybrid device includes a personal digital key (PDK) and a receiver-decoder circuit (RDC). The PDK and RDC of the hybrid device are coupled for communication...
US-1,007,3959 Secure authentication of users of devices using tactile and voice sequencing with feedback
A method for securely authenticating users of a device which uses pairings of a verbal passphrase and user interactions. The user interactions may be finger...
US-1,007,3958 Security system for verification of user credentials
A system enables network-based systems to confirm the identity of users and/or the authenticity of their credentials during their registration process by...
US-1,007,3957 Method and terminal device for protecting application program
The present disclosure relates to a method for protecting an application program in a terminal device, and a terminal device thereof. The method includes:...
US-1,007,3956 Integration services systems, methods and computer program products for ECM-independent ETL tools
To resolve a conflict between CMIS secondary types and certain ECM features such as content server categories, and allow the underlying ECM system to be fully...
US-1,007,3955 Method, system and apparatus for guiding and tracking medication usage
Methods and systems are provided for tracking and guiding a patient's clinically directed medication usage. Medicaments are placed in secure passive packaging...
US-1,007,3954 Dispenser system and methods for medication compliance
Systems and methods are provided for dispensing medication in a predetermined amount. An exemplary system and method may include operations and/or instructions...
US-1,007,3953 Wearable personal digital device for facilitating mobile device payments and personal use
Provided are a wearable personal digital device and related methods. The wearable personal digital device may comprise a processor, a display, biometric...
US-1,007,3952 Method and system for microbiome-derived diagnostics and therapeutics for autoimmune system conditions
A method for at least one of characterizing, diagnosing, and treating an autoimmune disorder in at least a subject, the method comprising: receiving an...
US-1,007,3951 Demographically filterable interface for conveying information about a medication
A medication analysis system maintains a database of medication profiles for users of medications, each medication profile being associated with a person and...
US-1,007,3950 Telepresence robot with a camera boom
A remote controlled robot with a head that supports a monitor and is coupled to a mobile platform. The mobile robot also includes an auxiliary camera coupled to...
US-1,007,3949 Ophthalmic drug delivery
The present invention includes and provides a method of delivering a medicament to an eye of a subject in need thereof a solution, the method comprising: (a)...
US-1,007,3948 Medical data management system and process
Systems and processes for managing data relating to one or more medical or biological conditions of a plurality of subjects (such as patients) over a wide area...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.