Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0117540 ELECTRONIC DEVICE AND CONTROL METHOD THEREOF
A method for controlling an electronic device is provided. The electronic device has a child mode and an adult mode. The method includes capturing a touch...
2016/0117539 IMAGE VISUALIZATION
A method includes at least a portion of an image displayed on a video screen or film, and generating a signal indicative thereof, wherein the at least a...
2016/0117538 SYSTEMS AND METHODS FOR DETECTING AND DECODING BARCODES WITH BAR DILATION
Systems and methods for detecting and decoding 4-state barcodes with extreme bar dilation are disclosed. The method is implemented in a computing device and...
2016/0117537 Apparatus for Machine Vision and Recognition and Associated Methods
An apparatus includes a system for processing of an object that has at least one surface. The object has a machine readable code on the at least one surface of...
2016/0117536 AIRCRAFT CARGO MONITORING SYSTEM AND METHOD FOR WIRELESSLY MONITORING AIRCRAFT CARGO
An aircraft cargo monitoring system includes a controller installed in an aircraft, the controller having a transceiver module configured to transceive...
2016/0117535 NON-CONTACT COMMUNICATION METHOD DETERMINATION CIRCUIT, NON-CONTACT COMMUNICATION CIRCUIT, AND IC CARD
A non-contact communication method determination circuit includes a determiner which determines whether or not a binary signal of a received radio signal is a...
2016/0117534 HIGH DENSITY READ CHAMBERS FOR SCANNING AND ENCODING RFID TAGGED ITEMS
High density read chambers are provided for scanning and/or encoding a plurality of RFID tagged items. Such chambers may include an enclosure with an interior...
2016/0117533 ELECTRONIC DEVICE AND BACK COVER THEREOF
An electronic device and a back cover thereof are provided. The electronic device comprises a body and the back cover. The back cover includes a near field...
2016/0117532 Using Unique Identifiers to Retrieve Configuration Data for Tag Devices
Methods and systems for using unique identifiers to retrieve configuration data for tag devices are described herein. An example method may involve obtaining a...
2016/0117531 METHOD FOR DETERMINING EXISTENCE OF WIDEBAND IMPEDANCE MATCHING CIRCUIT IN A WIRELESS IC DEVICE SYSTEM
An accessory device to be mounted on a main device is provided with a wireless IC device. The main device is provided with a reader/writer that is an...
2016/0117530 METHODS FOR SCANNING AND ENCODING A PLURALITY OF RFID TAGGED ITEMS
Methods are provided for scanning and/or encoding a plurality of RFID tagged items. Such methods may involve inserting a plurality of RFID tagged items into an...
2016/0117529 LOW-PROFILE CARD READER
A low-profile card reader, including: a carriage; a single support arm including a first end statically mounted to the carriage, a second end, free from the...
2016/0117528 SYSTEM HAVING AN IMPROVED USER INTERFACE FOR READING CODE SYMBOLS
A system for reading code symbols includes a camera, a user interface system, and a processor communicatively coupled to the camera and the user interface...
2016/0117527 COMPACT CMOS CURRENT-MODE ANALOG MULTIFUNCTION CIRCUIT
The compact CMOS current-mode analog multifunction circuit is based on an implementation using MOSFETs operating in a sub-threshold region and forming two...
2016/0117526 INFORMATION PROCESSING DEVICE, METHOD FOR VERIFYING ANONYMITY AND METHOD
The present invention provides an information processing device that enables a reduction in the processing cost of verifying anonymity during anonymization...
2016/0117525 Mobile Privacy Information Proxy
An approach is provided for managing data being transmitted from a mobile device. The mobile device receives a request from a user to initiate a transmission...
2016/0117524 ENHANCED VIEW COMPLIANCE TOOL
An apparatus comprises a network interface and a processor communicatively coupled to the network interface. The network interface communicates with a database...
2016/0117523 System and Method for Selectively Sharing Information
Disclosed is a system and method for selectively sharing information among users of a computer application. Specific utility in healthcare applications is...
2016/0117522 PROBABILISTIC SURFACING OF POTENTIALLY SENSITIVE IDENTIFIERS
Probabilistic surfacing of potentially sensitive identifiers is provided. In one embodiment of the present invention, a method of and computer program product...
2016/0117521 COMPUTER SYSTEM FOR STORING AND RETRIEVAL OF ENCRYPTED DATA ITEMS, CLIENT COMPUTER, COMPUTER PROGRAM PRODUCT...
The invention relates to a computer system comprising a client computer (10) and a database (30) stored on a server (22), the server (22) being coupled to the...
2016/0117520 METHOD AND SYSTEM FOR SHARING CONTENT FILES USING A COMPUTER SYSTEM AND DATA NETWORK
A method and system of distributing files among devices is described. The method and system permits users and authors to create customized channels for...
2016/0117519 MULTI-LEVEL SECURITY SYSTEM FOR ENABLING SECURE FILE SHARING ACROSS MULTIPLE SECURITY LEVELS AND METHOD THEREOF
A multi-level security system includes a storage medium partitionable into a plurality of partitions, a file system coupleable to the plurality of partitions,...
2016/0117518 File Encryption/Decryption Device And File Encryption/Decryption Method
Provided are a file encryption and decryption device and file encryption and decryption method. The encryption device comprises: one or more non-transitory...
2016/0117517 PROVIDING POLICY TIPS FOR DATA LOSS PREVENTION IN COLLABORATIVE ENVIRONMENTS
A policy tip or end user notification is provided for data loss prevention in collaborative environments. A document interactivity application detects an...
2016/0117516 METHOD AND APPARATUS FOR ENCRYPTING AREA OF ELECTRONIC DOCUMENT
A method and apparatus for encrypting an area of an electronic document are provided. The method includes displaying the electronic document, receiving an...
2016/0117515 Establishing and Maintaining an Authenticated Connection Between a Smart Pen and a Computing Device
A system and method establishes a connection between a smart pen and a computing device, and establishes a privilege level that regulates data requests for...
2016/0117514 DATA ACCESS CONTROL SYSTEMS AND METHODS
Various hardware and software configurations are described herein which provide improved security and control over protected data. In some embodiments, a...
2016/0117513 APPLICATION EXECUTING METHOD AND DEVICE, AND RECORDING MEDIUM THEREOF
A system and method for setting windows to either a traceable mode or a non-traceable mode, and selectively executing an application in a window to restrict...
2016/0117512 COMPUTING SYSTEM WITH INFORMATION PRIVACY MECHANISM AND METHOD OF OPERATION THEREOF
A computing system includes: a control unit configured to: obtain an information release setting for a raw user information, the raw user information including...
2016/0117511 DIGITAL CONTENT EXECUTION CONTROL MECHANISM
The present disclosure provides a method and system for generating digital content for a computing device which will function on the computing device only...
2016/0117510 Computer Security System and Method to Protect Against Keystroke Logging
Static security credentials are replaced by pseudonyms and session-specific passwords to increase security associated with user login attempts, and...
2016/0117509 METHOD AND SYSTEM FOR KEEPING DATA SECURE
The present disclosure provides a method and system for keeping data secure. The method includes: acquiring at least one audio signal and assigning the segment...
2016/0117508 SIO DEVICE WITH SPI BUS GATEWAY CONTROLLER FOR WRITE PROTECTION
A serial input/output (SIO) device with a serial peripheral interface (SPI) bus gateway controller. The gateway controller retrieves operation code (opcode)...
2016/0117507 Evaluating Customer Security Preferences
Methods and systems for evaluating customer security preferences are presented. In some embodiments, a computer system may receive, from a customer portal...
2016/0117506 Security Controlled Multi-Processor System
Embodiments of the present disclosure provide systems and methods for implementing a secure processing system having a first processor that is certified as a...
2016/0117505 LARGE-SCALE, TIME-SENSITIVE SECURE DISTRIBUTED CONTROL SYSTEMS AND METHODS
Large-scale, time-sensitive secure distributed control systems and methods are disclosed. According to an aspect, a method includes detecting an anomaly at a...
2016/0117504 IDENTITY THEFT COUNTERMEASURES
In some embodiments, techniques for computer security comprise preventing and/or mitigating identity theft such as phishing.
2016/0117503 Using Power Fingerprinting (PFP) to Monitor the Integrity and Enhance Security of Computer Based Systems
Procedures are described for enhancing target system execution integrity determined by power fingerprinting (PFP): by integrating PFP into the detection phase...
2016/0117502 Using Power Fingerprinting (PFP) to Monitor the Integrity and Enhance Security of Computer Based Systems
Procedures are described for enhancing target system execution integrity determined by power fingerprinting (PFP): by integrating PFP into the detection phase...
2016/0117501 SYSTEM AND METHOD FOR VALIDATING PROGRAM EXECUTION AT RUN-TIME
A pipelined processor comprising a cache memory system, fetching instructions for execution from a portion of said cache memory system, an instruction...
2016/0117500 DEVICE SECURITY USING USER INTERACTION ANOMALY DETECTION
A mobile device security system can include circuitry configured to receive first user-interaction information associated with the mobile device. The first...
2016/0117499 System and Method for Password Recovery
A method and system for password recovery in computer applications is disclosed. Passwords in the same computer application may be recovered according to...
2016/0117498 COMPUTING PLATFORM SECURITY METHODS AND APPARATUS
Computing platform security methods and apparatus are disclosed. An example apparatus includes a security application to configure a security task, the...
2016/0117497 COMPUTING PLATFORM SECURITY METHODS AND APPARATUS
Computing platform security methods and apparatus are disclosed. An example apparatus includes a security application to configure a security task, the...
2016/0117496 INTELLIGENT ACCESSORIES FOR MEDICAL DEVICES
An accessory for a host medical device that is capable of authenticating itself to the host medical device. The accessory includes an onboard facility for...
2016/0117495 ACCESS BLOCKING FOR DATA LOSS PREVENTION IN COLLABORATIVE ENVIRONMENTS
Data loss prevention (DLP) systems may be implemented in conjunction with collaborative services that may be integrated with or work in coordination with...
2016/0117494 KEYBOARD NEUTRAL AUTHENTICATION
A method of performing user authentication including the steps of receiving a password comprising a sequence of characters, accessing one or more alternative...
2016/0117493 WORKING METHOD OF SMART KEY DEVICE
A working method of a smart key device, in which it includes: power on the smart key device; the smart key device reads Bluetooth module parameters, and...
2016/0117492 METHOD OF AUTHENTICATING A USER HOLDING A BIOMETRIC CERTIFICATE
The present invention concerns a method of generating a biometric certificate of a user performed by a data processing device of a certifying authority,...
2016/0117491 ELECTRONIC DEVICE AND METHOD FOR VERIFYING USER IDENTIFICATION
A user verification method executed in an electronic device stores iris information of a user in a storage device of the electronic device. In response to a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.