Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0104017 BARCODE-READING SYSTEM
This patent specification describes operations of a mobile device with barcode-reading capabilities and an application and license server. A mobile device may...
2016/0104016 BARCODE-READING SYSTEM
This patent specification describes operations of a mobile device with barcode-reading capabilities and an application and license server. A mobile device may...
2016/0104015 READER AND RFID READER
A reader is provided, including a power amplifier (PA), a low-noise amplifier (LNA), a circulator, an auto-tuning matching network, and a control circuit. The...
2016/0104014 Method of recognizing whether a transponder of an RFID system is present in a boundary region, RFID system and...
The present invention relates to a method of recognizing whether a transponder of an RFID system, comprising a reading device and the transponder, is present...
2016/0104013 Methods and Systems for Estimating Distance of a Radio Frequency Identification Tag
A localization method and system, including determining at least two phases associated with at least two response signals transmitted by a radio frequency...
2016/0104012 Location Sensitive Solid State Drive
A data storage system including a SSD includes a capability to detect whether its location is acceptable for function, and a capability to self-disable in the...
2016/0104011 MICROPROCESSOR WITH ON-THE-FLY SWITCHING OF DECRYPTION KEYS
A microprocessor is provided in which an encrypted program can replace the decryption keys that are used to decrypt sections of the encrypted program. The...
2016/0104010 MICROPROCESSOR WITH SECURE EXECUTION MODE AND STORE KEY INSTRUCTIONS
A microprocessor conditionally grants a request to switch from a normal execution mode in which encrypted instructions cannot be executed, into a secure...
2016/0104009 DECRYPTION OF ENCRYPTED INSTRUCTIONS USING KEYS SELECTED ON BASIS OF INSTRUCTION FETCH ADDRESS
A microprocessor and method are provided for securely decrypting and executing encrypted instructions within a microprocessor. A plurality of master keys are...
2016/0104008 Systems and Methods for Context-Based Permissioning of Personally Identifiable Information
A method is provided, including establishing a plurality of context profiles for a user, at least one context profile is associated with: (i) subject areas...
2016/0104007 DEVICE AND METHOD FOR DATA PRIVACY MANAGEMENT
A method for data privacy management is disclosed. The method includes: predefining, at an electronic device, an action for visualizing hidden data, wherein...
2016/0104006 METHOD FOR CONTROLLING SECURITY SYSTEM AND ELECTRONIC DEVICE THEREOF
A portable electronic device, a wearable device and methods for operating the same are provided. The portable electronic device includes a display, a...
2016/0104005 FACILITATING TENANT-BASED CUSTOMIZATION OF ACCESS AND SECURITY CONTROLS IN AN ON-DEMAND SERVICES ENVIRONMENT
In accordance with embodiments, there are provided mechanisms and methods for facilitating tenant-based customization of access and security controls in an...
2016/0104004 ACCESS CONTROL FOR OBJECTS HAVING ATTRIBUTES DEFINED AGAINST HIERARCHICALLY ORGANIZED DOMAINS CONTAINING FIXED...
An aspect of the present disclosure facilitates controlling access to objects having attributes defined against hierarchically organized domains, with each...
2016/0104003 INTEGRATION USER FOR ANALYTICAL ACCESS TO READ ONLY DATA STORES GENERATED FROM TRANSACTIONAL SYSTEMS
The technology disclosed preserves the tenant specificity and user specificity of the tenant data by associating user IDs to complementary special IDs referred...
2016/0104002 ROW LEVEL SECURITY INTEGRATION OF ANALYTICAL DATA STORE WITH CLOUD ARCHITECTURE
A predicate-based row level security system is used when workers build or split an analytical data store. According to one implementation, predicate-based...
2016/0104001 Input to Locked Computing Device
The subject matter of this specification can be embodied in, among other things, a method that includes receiving at a computing device that is in a locked...
2016/0104000 METHODS AND SYSTEMS FOR SECURE ACQUISITION AND TRANSMISSION OF IMAGE
Methods and systems allow secure acquisition and transmission of images by a mobile communication device. The method includes acquiring an image by the mobile...
2016/0103999 METHOD AND SYSTEM FOR ELECTRONIC DELIVERY OF SENSITIVE INFORMATION
A method and related system obtains consent from a user for electronic delivery of sensitive information. The user operating a first computer accesses a web...
2016/0103998 METHODS AND SYSTEMS OF SECURELY STORING DOCUMENTS ON A MOBILE DEVICE
A method of encrypting information using a computational tag may include, by a mobile electronic device, detecting a computational tag within a near field...
2016/0103997 METHOD, DEVICE, TERMINAL, AND SERVER FOR VERIFYING SECURITY OF SERVICE OPERATION
A method for verifying a security of a service operation is provided. The method includes receiving, by a service terminal, a creditability analysis...
2016/0103996 Methods and Systems for Behavioral Analysis of Mobile Device Behaviors Based on User Persona Information
A computing device processor may be configured with processor-executable instructions to implement methods of using behavioral analysis and machine learning...
2016/0103995 OUT OF BAND MANAGEMENT OF BASIC INPUT/OUTPUT SYSTEM SECURE BOOT VARIABLES
A method is provided in one example embodiment and includes storing secure boot variables in a baseboard management controller; and sending the secure boot...
2016/0103994 STORAGE MEDIUM HAVING STORED THEREIN BOOT PROGRAM, INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING...
Identification information of a program read from outside, such as firmware, is acquired, and usability of a piece of key data in a range corresponding to the...
2016/0103993 Contextual Alert of an Invasion of a Computer System
Methods, systems, and computer-readable media for providing contextual feedback to a user of a computer system upon detection of an invasion of the computer...
2016/0103992 SYSTEMS AND METHODS FOR CLASSIFYING SECURITY EVENTS AS TARGETED ATTACKS
The disclosed computer-implemented method for classifying security events as targeted attacks may include (1) detecting a security event in connection with at...
2016/0103991 SELF-AUTHENTICATION DEVICE AND METHOD
A self-authentication device and method. The self-authentication device being for the user or owner of an electronic security device, wherein the ...
2016/0103990 Unattended Secure Device Authorization
Unattended secure device authorization techniques are provided. An operating system (OS) module, which is responsible for device validation when that device is...
2016/0103989 DEVICE AUTHENTICATION
Multi-touch groupings of characters are detected for device authentication and access. In an embodiment, one or more non-character based factors are used in...
2016/0103988 SECURE AUTOMATIC AUTHORIZED ACCESS TO ANY APPLICATION THROUGH A THIRD PARTY
A method and process for users to have secure access to multiple mobile, embedded or web based applications, is provided whereby each requires different...
2016/0103987 ELECTRONIC DEVICE AND AN UNLOCKING PASSWORD SETTING METHOD
In an unlocking password setting method executed by a first electronic device, the first electronic device is connected to a second electronic device....
2016/0103986 Method for Generating At Least One Derived Identity
The invention provides a method of generating at least one derived identity of an individual 1, the method comprising the following steps: generating a first...
2016/0103985 REVERSE BATTERY PROTECTION DEVICE AND OPERATING METHOD THEREOF
A wearable device includes: a touch screen; an acceleration sensor configured to generate an acceleration signal; an optical sensor using a light source and...
2016/0103984 DECRYPTION DEVICE, METHOD FOR DECRYPTING AND METHOD AND SYSTEM FOR SECURE DATA TRANSMISSION
A decryption device for decrypting a document encrypted using biometric information of an intended receiver of the document is provided. The decryption device...
2016/0103983 CAPTCHA CHALLENGE INCORPORATING OBFUSCATED CHARACTERS
A method for determining if a user of a computer system is a human. A processor receives an indication that a computer security program is needed and acquires...
2016/0103982 CREDENTIAL VALIDATION USING MULTIPLE COMPUTING DEVICES
A tool for credential validation using multiple computing devices. The tool selects at least one challenge question. The tool selects one or more user owned...
2016/0103981 UTILIZING MULTIPLE COMPUTING DEVICES TO VERIFY IDENTITY
A tool for identify verification using computing device collaboration. The tool generates a hash based, at least in part, on device specific information for...
2016/0103980 VEHICLE MIDDLEWARE
The present disclosure describes a vehicle implementing one or more processing modules. These modules are configured to connect and interface with the various...
2016/0103979 METHODS AND APPARATUS FOR IN SILICO PREDICTION OF CHEMICAL REACTIONS
Provided are a method and apparatus for designing and processing a rule pipeline for in silico prediction of chemical reactions. The method includes designing...
2016/0103978 Apparatus, System, and Method for Managing Prescriptions
A system for managing prescriptions. The system includes a server to operate a prescription manager, a prescription manager, and a client. The server includes...
2016/0103977 METHOD AND SYSTEM FOR OBTAINING AND USING PHARMACOKINETIC DATA IN DRUG ADMINISTRATION
There is provided a method for dosing a drug to a patient, including (a) administering the drug to the patient according to a titration dosing schedule, where...
2016/0103976 COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR ASSOCIATING PRESCRIPTION DATA AND DE-DUPLICATION
A prescription association system and method for grouping together prescription-related transactions and creating groups or "clusters" of prescriptions having...
2016/0103975 PRE-VERIFICATION OF PRESCRIPTIONS
A plurality of available effective selections is determined in accordance with a prescription. A differential value for one of the selections is determined...
2016/0103974 PERSONALIZED ANTIBIOTIC DOSING PLATFORM
A personalized antibiotic dosing platform may comprise method and systems configured for: receiving infection data, wherein the infection data comprises a...
2016/0103973 COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR IDENTIFYING SIMILAR PATIENTS
A method, system, and database is provided that permits users treating patients with genomic alteration to more easily and effectively exchange information...
2016/0103972 METHOD AND SYSTEM FOR SENSITIVITY ANALYSIS IN MODELING BLOOD FLOW CHARACTERISTICS
Embodiments include systems and methods for determining cardiovascular information for a patient. A method includes receiving patient-specific data regarding a...
2016/0103971 MULTI-SCALE COMPLEX SYSTEMS TRANSDISCIPLINARY ANALYSIS OF RESPONSE TO THERAPY
Described herein are methods and systems to measure dynamics of disease progression, including cancer growth and response, at multiple scales by multiple...
2016/0103970 INFORMATION SHARING METHOD AND DEVICE
Methods, devices and systems for sharing information related to exercise/health activities are disclosed. A user terminal can acquire a device identifier...
2016/0103969 CHRONIC DISEASE MANAGEMENT AND WORKFLOW ENGINE
The present invention relates to a method for monitoring a chronic disease using a chronic disease management device, the chronic disease management device...
2016/0103968 Processing Blood Donation Data for Presentation on Operator Interface
A system and method processes blood donation data for presentation on an operator interface. A handheld computing device has a touch screen display and a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.