Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0110584 METHODS AND SYSTEMS FOR CLASSIFYING BIOLOGICAL SAMPLES, INCLUDING OPTIMIZATION OF ANALYSES AND USE OF CORRELATION
Methods, systems, and devices for classifying a biological sample that include receiving an image of a biological sample and applying one or more algorithms...
2016/0110583 FINGERPRINT IDENTIFICATION METHOD
The present invention provides fingerprint-based verification system and fingerprint identification method. The fingerprint-based verification system verifies...
2016/0110582 MEASURING ATMOSPHERIC ATTRIBUTES USING MULTISPECTRAL IMAGES
A mechanism for determining atmospheric conditions from an image is described. A mechanism for determining atmospheric conditions includes determining an...
2016/0110581 FINGERPRINT DETECTING APPARATUS CANCELING OFFSET AND CONTROL METHOD THEREOF
According to an embodiment of the present invention, an apparatus for detecting a fingerprint is provided, which includes a plurality of sensor pads receiving...
2016/0110580 CODE READING DEVICE AND CODE READING PROGRAM
A code reading device is equipped with a region extracting unit 2, which divides a photographed image of a bar code into a plurality of horizontal areas, and...
2016/0110579 HAND-MOUNTED DEVICE WITH FINGER MOTION TRIGGERING
A wearable device is worn on the back of a user's hand such that the act of pointing the user's index finger is sufficient to align the device and trigger a...
2016/0110578 DECODABLE INDICIA READING TERMINAL WITH OPTICAL FILTER
A decodable indicia reading terminal can comprise a housing including a housing window, a multiple pixel image sensor disposed within the housing, an imaging...
2016/0110577 APPARATUS OPERATIVE FOR CAPTURE OF IMAGE DATA
There is set forth an apparatus for capturing image data. In one embodiment, an apparatus is operative for capture of a first frame of image data and a second...
2016/0110576 SEQUENCED ILLUMINATION IN MARK READING DEVICES
A reader operable to read a mark on a substrate, the reader comprising a power source, operable to deliver a variable drive current or voltage, a light source...
2016/0110575 Dimensioning and Barcode Reading System
A system and method for calibrating a barcode scanning tunnel comprises providing a scanning tunnel having a moveable surface, a camera, and a dimensioning...
2016/0110574 IMAGE READER HAVING IMAGE SENSOR ARRAY
An image reader can include an image sensor array. An image reader in one embodiment can include an optical system capable of directing light reflected from a...
2016/0110573 METHOD OF WRITING AND REPRODUCING MULTIMEDIA SERVICE BY USING TAG AND APPARATUS THEREFOR
Provided are method and apparatus for writing and reproducing a multimedia service using a tag in order to provide an intuitive interface for a user using a...
2016/0110572 LOW-ENERGY RADIO FREQUENCY TAG FOR PERFORMING A VEHICLE FUNCTION
A low-energy transceiver tag is described, as well as methods of using the low-energy transceiver tag to enable secure communication with a vehicle. The...
2016/0110571 RFID TAG AUTHENTICATION SYSTEM
An RFID tag using a physically unclonable function (PUF) generates a response value corresponding to a challenge value, receives an RFID reader ID from an RFID...
2016/0110570 RFID READER/WRITER DEVICE
A radio frequency electronic tag reader/writer device including a housing, an antenna, a processing unit connected to the antenna and intended to exchange data...
2016/0110569 RFID TAG READING DEVICE, RFID TAG READING PROGRAM, AND RFID TAG READING METHOD
An RFID reading device according to the present invention includes: response requesting unit (20) configured to output a response request signal to a wireless...
2016/0110568 LABELING AND AUTHENTICATING USING A MICROTAG
A system for decoding energy peaks of an identifier includes an interface and a processor. The interface is configured to receive a reference peak position...
2016/0110567 TAMPER RESISTANT MODULE FOR INDUSTRIAL CONTROL SYSTEM
An industrial control system module and methods are described for self-destruction or the destruction and/or erasure of sensitive data within the industrial...
2016/0110566 APPARATUS, SYSTEMS AND METHODS FOR SECURELY STORING MEDIA CONTENT EVENTS ON A FLASH MEMORY DEVICE
Systems and methods are operable to securely store media content events on a flash memory device. An exemplary embodiment receives user-provided authorization...
2016/0110565 STORAGE SYSTEM SECURITY
Disclosed aspects include managing access to a particular storage unit in a storage facility. The particular storage unit is coupled, in the storage facility,...
2016/0110564 HOLOGRAPHIC ENCRYPTION OF MULTI-DIMENSIONAL IMAGES
Cryptographic techniques for encrypting images, and decrypting and reconstructing images, are provided to facilitate preventing unauthorized access to images....
2016/0110563 SYSTEM FOR ENCODING CUSTOMER DATA
A system for encoding customer data includes a memory, a decision engine, a rules engine and an interface engine. The memory stores customer data associated...
2016/0110562 SYSTEM FOR ENCODING CUSTOMER DATA
A system for transforming customer data includes a network interface and a processor. The network interface communicates a request for customer data associated...
2016/0110561 TERMINAL AND METHOD FOR HIDING AND PROTECTING DATA INFORMATION
The present invention provides a terminal which includes an an information collection unit configured to acquire subsidiary information added to a current...
2016/0110560 AUGMENTED REALITY BASED PRIVACY AND DECRYPTION
A method, non-transitory computer readable medium and apparatus for decrypting a document are disclosed. For example, the method captures a tag on an encrypted...
2016/0110559 IDENTIFYING AND BLOCKING PROHIBITED CONTENT ITEMS IN A CONTENT MANAGEMENT SYSTEM
To identify whether a content item is prohibited, a content management system can generate a content item fingerprint for the content item and then compare the...
2016/0110558 CLIENT IDENTIFYING DATA (CID) TARGET-STATE-COMPLIANT COMPUTER-EXECUTABLE APPLICATIONS
An approach for facilitating client identifying data (CID) target-state-compliant computer-executable applications is disclosed. In some implementations, a CID...
2016/0110557 BASE MODULE FOR ELECTRONIC DEVICE
A base module for an electronic device connects an application module in the electronic device to a network. The base module includes a memory unit which...
2016/0110556 System, apparatus and method for License Key permutation
A system and method of dynamically altering the encoding, structure or other attribute of a cryptographic key, typically a license activation key, to render...
2016/0110555 RESOURCE SHARING APPARATUS, METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM THEREOF
A resource sharing apparatus and a resource sharing method thereof are provided. The resource sharing apparatus runs a federated resource sharing program to...
2016/0110554 TECHNOLOGIES FOR SECURE INPUT AND DISPLAY OF VIRTUAL TOUCH USER INTERFACES
Technologies for secure input and display of a virtual touch user interface include a computing device having a security monitor that may protect memory...
2016/0110553 POLICY ACCESS CONTROL LISTS ATTACHED TO RESOURCES
Methods, storage systems and computer program products implement embodiments of the present invention that include defining, for an entity, a policy access...
2016/0110552 Method and Apparatus for Transmission of Visually Encoded Data
A method for secured data transmission of visually encoded data from a mobile end device to a processing unit includes supplying on a security element of the...
2016/0110551 Computer System Anomaly Detection Using Human Responses to Ambient Representations of Hidden Computing System...
A system and method involve measuring one or more hidden states internal to a computing system related only to a user's active task with the computing system,...
2016/0110550 INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING DEVICE, AND SETTING DETERMINATION METHOD
An information processing system determines security setting of an information processing device. The information processing system includes: an evaluating...
2016/0110549 ANALYZING TARGET SOFTWARE FOR SECURITY VULNERABILITIES
A method of analyzing target software for security vulnerabilities comprises, with a processor, scanning a codebase of a target software using a static...
2016/0110548 DETERMINING AN ATTACK SURFACE OF SOFTWARE
A method of determining an attack surface of software may include generating a platform for testing at least one deployment of software code, identifying...
2016/0110547 SYSTEMS AND METHODS FOR ANALYSIS OF CROSS-SITE SCRIPTING VULNERABILITIES
A system for detecting XSS vulnerabilities includes determining the context in which a probe supplied as an input to a webpage or an application exists in a...
2016/0110546 COMPUTING DEVICE BOOT SOFTWARE AUTHENTICATION
Various embodiments are generally directed to authenticating a chain of components of boot software of a computing device. An apparatus comprises a processor...
2016/0110545 CODE POINTER AUTHENTICATION FOR HARDWARE FLOW CONTROL
Techniques for enforcing flow control of a software program in a processor are provided. An example method according to these techniques includes analyzing...
2016/0110544 DISABLING AND INITIATING NODES BASED ON SECURITY ISSUE
Example embodiments disclosed herein relate to disabling and initiating nodes based on a security issue. Multiple nodes of a cluster are monitored. It is...
2016/0110543 APPARATUS AND METHOD FOR DETECTING MALICIOUS APPLICATION BASED ON VISUALIZATION SIMILARITY
The present invention provides a malicious application detecting apparatus based on a visualization similarity, including: a first storing unit which...
2016/0110542 Attack Protection For Valid Gadget Control Transfers
In one embodiment, a processor comprises: a first register to store a first bound value for a stack to be stored in a memory; a second register to store a...
2016/0110541 MULTIDIMENSIONAL SANDBOXING FOR FINANCIAL PLANNING
A computer-implemented method can include creating a sandbox responsive to a sandbox creation request from a user, wherein the sandbox represents an alternate...
2016/0110540 INTERFACE BETWEEN A DEVICE AND A SECURE PROCESSING ENVIRONMENT
Embodiments of an invention for an interface between a device and a secure processing environment are disclosed. In one embodiment, a system includes a...
2016/0110539 MONITORING ACCESS TO A LOCATION
Devices, methods, and systems for monitoring access to a location are described herein. One or more method embodiments include determining data associated with...
2016/0110538 MULTI- PROFILE MOBILE DEVICE INTERFACE FOR SAME USER
A multi-environment computer device configured for providing a work environment type and a personal environment type via a user interface for a device user,...
2016/0110537 RELEVANCY IMPROVEMENT THROUGH TARGETING OF INFORMATION BASED ON DATA GATHERED FROM A NETWORKED DEVICE...
A method, apparatus, and system related to relevancy improvement through targeting of information based on data gathered from a networked device associated...
2016/0110536 ACCESSORY AUTHENTICATION FOR ELECTRONIC DEVICES
Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches...
2016/0110535 Methods and Apparatus for Setting the Address of a Module Using a Voltage
A method of operating a module is disclosed. The method includes determining if a voltage between a power connection and a ground connection exceeds a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.