Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2011/0302683 SUTERA PLANT NAMED 'DANOVA982'
A new and distinct Sutera cordata plant named `DANOVA982` particularly characterized by 5-petalled flowers, measuring 2.2 cm in diameter and light violet in...
2011/0302682 SUTERA PLANT NAMED 'DANOVA886'
A new and distinct Sutera cordata plant named `DANOVA886` particularly characterized by 5-petalled flowers, measuring 2.3 cm in diameter and violet-blue in...
2011/0302681 Dianella tasmanica plant named 'Lemon Lime'
`Lemon Lime` is a distinctive variety of Dianella caerulea which is characterized by the combination of its short to medium plant height, dense upright growth...
2011/0302680 Blackberry plant named APF-45
Description and specifications of a new and distinct blackberry cultivar named `APF-45` which originated from seed produced by a hand pollinated cross of Ark....
2011/0302679 Mandarin tree named '950'
A new mandarin hybrid tree particularly distinguished by having dense foliation; bearing fruit that are attractive in appearance with excellent eating quality;...
2011/0302678 Cranberry variety named 'CNJ95-20-20'
A new cranberry variety distinguished by very early season ripening, with exceptional early and high fruit anthocyanin (TAcy), as compared to the currently...
2011/0302677 DETECTION AND CHARACTERIZATION OF LASER-INDUCED HEAT AFFECTED ZONES ON POLYMER BASED DEVICES
Detection and characterization of laser-induced heat affected zones on polymer based devices, such as polymeric stents, are described where Nano Thermal...
2011/0302676 Method and Device for Examining a Sample with a Probe Microscope
The invention relates to a method for examining a sample by using probe microscopy, in particular scanning probe microscopy in which a sample is examined by way...
2011/0302675 CONTROL OF VIRAL AND BACTERIAL INFECTION BY ANTIMICROBIAL PEPTIDES RETROCYLIN AND/OR PROTEGRIN EXPRESSED IN...
Disclosed herein are antimicrobial compositions containing one or more antimicrobial peptides having been expressed in chloroplasts. Exemplified herein are the...
2011/0302674 Methods and Compositions for the Improvement of Plant Tolerance to Environmental Stresses
The invention provides methods, polynucleotides and polypeptides useful for producing or selecting plants with increased tolerance to at least one environmental...
2011/0302673 Transgenic Plants with Increased Yield
Polynucleotides are disclosed which are capable of enhancing yield of a plant transformed to contain such polynucleotides. Also provided are methods of using...
2011/0302672 LOWERING SATURATED FATTY ACID CONTENT OF PLANT SEEDS
Compositions and methods include genetically encoding and expressing a novel delta-9 desaturase in plant cells. In some embodiments, methods of expressing...
2011/0302671 EMBRYO SAC-SPECIFIC GENES
The present invention relates to isolated nucleotide sequences useful for the production of plants with a modified embryo sac, embryo and or endosperm...
2011/0302670 POLYNUCLEOTIDES AND METHODS FOR THE IMPROVEMENT OF PLANTS
The invention provides methods for producing a plant with altered seed yield, the methods comprising transformation of a plant with a genetic construct...
2011/0302669 MAIZE VARIETY AND METHOD OF PRODUCTION
The disclosure relates to a maize plant, seed, variety, and hybrid. More specifically, the disclosure relates to a maize plant containing a Cal-1 allele, whose...
2011/0302668 Broccoli Type Having Curds with Detached Florets
The present invention includes broccoli plants with curds having detached florets and methods for obtaining such broccoli plants. The present invention also...
2011/0302667 TRANSGENIC BRASSICA EVENT MON 88302 AND METHODS OF USE THEREOF
The invention provides plants comprising transgenic event MON 88302 that exhibit tolerance to glyphosate herbicide. The invention also provides seeds, plant...
2011/0302666 PRODUCTION AND USE OF RAT SPERMATOGONIAL STEM CELL LINES
A spermatogonial stem cell line that is derived from testes rats characterized by a desirable genetic background can serve as a source for cells to transplant...
2011/0302665 NON-HUMAN MAMMALS WITH T OR B CELLS HAVING PREDEFINED SPECIFICITY
The present invention provides non-human mammals, e.g., mice, generated from a T cell or B cell with a predefined specificity or isolated from an organism...
2011/0302664 DEVICE AND METHOD FOR PROTECTING AN ELECTRONIC SYSTEM AGAINST UNAUTHORIZED ACCESS
The invention relates to an electronic system comprising a printed circuit (30) contained in a package. The system comprises a protection device (32) comprising...
2011/0302663 Method and System for Securing a Home Domain From External Threats Received by a Gateway
A method and system are provided in which a broadband gateway may handle at least one physical layer connection to at least one corresponding network access...
2011/0302662 CONTENT PROTECTION SYSTEM
Provided is a content protection system, in which: a user terminal judges, when a content is to be reproduced or executed, whether or not the user terminal has...
2011/0302661 System & Method for Distributing Digital Assets Across a Network
Digital media assets are distributed through the use of identification data. A rights-holder server is adapted to introduce a digital asset which is associated...
2011/0302660 METHOD AND APPARATUS FOR SECURING DIGITAL DEVICES WITH LOCKING CLOCK MECHANISM
A mechanism to secure a synchronous digital device such as a Mobile Device is provided. Using the clocking mechanisms of the synchronous digital designs, the...
2011/0302659 DATA SECURITY IN A MULTI-NODAL ENVIRONMENT
A data security manager in a multi-nodal environment enforces processing constraints stored as security relationships that control how different pieces of a...
2011/0302658 METHOD, APPARATUS, AND SYSTEM FOR ENABLING A SECURE LOCATION-AWARE PLATFORM
A method, apparatus, and system enable a secure location-aware platform. Specifically, embodiments of the present invention may utilize a secure processing...
2011/0302657 SECURITY COUNTERMEASURE FUNCTION EVALUATION PROGRAM
In a security countermeasure function evaluation apparatus, an estimator operates an input unit, whereby an evaluation point calculation unit makes an...
2011/0302656 DETECTING MALICIOUS BEHAVIOUR ON A COMPUTER NETWORK
A malicious behaviour detector (100) for detecting malicious behaviour on a network, comprises a processor unit (120) and associated system memory (130)...
2011/0302655 Anti-virus application and method
A method of performing an anti-virus scan on an electronic file. An anti-virus application running at a computer device determines that an electronic file...
2011/0302654 METHOD AND APPARATUS FOR ANALYZING AND DETECTING MALICIOUS SOFTWARE
A method for providing analysis and detection of malicious software may include directing a comparison of patterns within sample code to a predetermined set of...
2011/0302653 System and Method for Network Security Including Detection of Attacks Through Partner Websites
A computer readable storage medium has instructions for execution on a computer. The instructions monitor transactions between a server and a set of clients. An...
2011/0302652 SYSTEM AND METHOD FOR DETECTING REAL-TIME SECURITY THREATS IN A NETWORK DATACENTER
The system and method described herein may include a configuration management database that describes every known service endpoint in a network datacenter to...
2011/0302651 VERIFICATION OF A SEGMENTED PROGRAM ON A PARALLEL PROCESSING COMPUTING SYSTEM
Embodiments of the invention provide a method, apparatus, and program product to verify a program that includes a plurality of sections with a computing system...
2011/0302650 INITIATION OF STORAGE DEVICE SCANS
Example embodiments relate to initiation of storage device scans based on a record of existing scans of the storage device. In particular, example embodiments...
2011/0302649 SYSTEM FOR AND METHOD OF PROVIDING SECURE SIGN-IN ON A TOUCH SCREEN DEVICE
A system for and method of providing secure sign-in on a touch screen device that comprises an electronic device in accordance with exemplary embodiments may...
2011/0302648 ANTI-MALWARE SYSTEM AND OPERATING METHOD THEREOF
Provided are an anti-malware system, and an operating method thereof. The anti-malware system matches an filtering operation on first target data to be filtered...
2011/0302647 AUTOMATING NETWORK RECONFIGURATION DURING MIGRATIONS
Automating network reconfiguration such as firewall reconfiguration in migrations may include determining network reconfiguration needs in one or more network...
2011/0302646 SYSTEM AND METHODS FOR ONLINE AUTHENTICATION
A method of authenticating a network client to a relying party computer via a computer server comprises the computer server receiving a transaction code from a...
2011/0302645 Multi-Channel Multi-Factor Authentication
Systems and methods for authenticating electronic transactions are provided. The authentication methods employ a combination of security features and...
2011/0302644 Multi-Channel Multi-Factor Authentication
Systems and methods for authenticating electronic transactions are provided. The authentication methods employ a combination of security features and...
2011/0302643 MECHANISM FOR AUTHENTICATION AND AUTHORIZATION FOR NETWORK AND SERVICE ACCESS
There is proposed a network access authentication and authorization mechanism in which an authentication session in an authentication, authorization and...
2011/0302642 IMAGE FORMING APPARATUS, CONTROL METHOD THEREOF, AND STORAGE MEDIUM
In an image forming apparatus of the present invention, authentication information necessary for a user to log in to the image forming apparatus and address...
2011/0302641 METHOD AND SYSTEM PROTECTING AGAINST IDENTITY THEFT OR REPLICATION ABUSE
A system detecting and protecting against identity theft by abusing a computer users ID and password or protecting a user against identity replication through...
2011/0302640 CYBER GENE IDENTIFICATION TECHNOLOGY BASED ON ENTITY FEATURES IN CYBER SPACE
A new identification (ID) technology comprising unified and standardized object identification within Cyber Space is disclosed based upon intrinsic properties...
2011/0302639 SERVER APPARATUS, AND CONTROL METHOD AND COMPUTER-READABLE STORAGE MEDIUM THEREFOR
A server apparatus capable of preventing unauthorized use of services by a third party through an electronic appliance that stores information used for user...
2011/0302638 Staged Control Release In Boot Process
Integrity validation of a network device may be performed. A network device comprising a secure hardware module, may receive a root key. The secure hardware...
2011/0302637 SOFTWARE DISTRIBUTION METHOD, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING SYSTEM
A distribution server receives authentication information acquired from an IC card reader of a client PC and authenticated by an authentication server. The...
2011/0302636 Method of Providing a Digital Asset for Distribution
Digital assets are distributed within an electronic network. An index of digital assets available for distribution over the electronic network is provided,...
2011/0302635 ENHANCING SECURITY IN A WIRELESS NETWORK
A method of enhancing security in a wireless mesh communication network operating in a process control environment and including a plurality of wireless network...
2011/0302634 PROVIDING SECURE COMMUNICATION AND/OR SHARING OF PERSONAL DATA VIA A BROADBAND GATEWAY
A broadband gateway may manage confidential data associated with users in a home network managed and/or serviced by the broadband gateway. The broadband gateway...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.