Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0125209 SYSTEM AND DEVICE FOR SAVING AND SHARING FILES
A scannable tag is provided having an inlay with an NFC chip and an antenna, and a memory element. When a user scans the tag using a scanning device, such as a...
2016/0125208 RFID PROTOCOL
A method of adding TTO functionality to an RTF RFID air protocol, such as ISO/IEC 18000-63 and EPC C1G2 protocol, Chinese GB/T 29768-2013. The starting wait...
2016/0125207 CARD READER
A card reader may include a card passage, a magnetic head to abut with a magnetic stripe of the card, and an IC contact block having IC contact springs to...
2016/0125206 SECURITY APPARATUS TO HOUSE A DEVICE
According to an example, a security apparatus to house a device may include a chassis, a front stop having a front stop wall and a front stop opening, a rear...
2016/0125205 SESSION-LEVEL-RESTRICTION FOR UNIVERSAL SERIAL BUS STORAGE DEVICES
A system and method of implementing SLR for a USB device of an information handling system is disclosed herein. An OS may load a disk driver stack and a volume...
2016/0125204 ELECTRONIC DEVICE AND METHOD FOR UNLOCKING TOUCH SCREEN
An unlocking method for a touch screen of an electronic device includes activating a color sensor of the electronic device when the touch screen of a locked...
2016/0125203 METHOD AND APPARATUS OF VERIFYING TERMINAL AND MEDIUM
A method and an apparatus of verifying a terminal are provided in the field of computer technology. In the method, the terminal establishes a secure channel...
2016/0125202 Method for operating a control device
A method for operating a control device having a system-on-a-chip having a processor unit and a security processor unit, the processor unit and the security...
2016/0125201 HARDWARE-PROTECTIVE DATA PROCESSING SYSTEMS AND METHODS USING AN APPLICATION EXECUTING IN A SECURE DOMAIN
A data processing system supporting a secure domain and a non-secure domain comprises a hardware component, and a processor device having operating modes in...
2016/0125200 METHODS AND SYSTEMS FOR NETWORK-BASED ANALYSIS, INTERVENTION, AND ANONYMIZATION
Systems and method for alerting a user device based on a proposed anonymization of a contribution to a conversation thread via one or several location-based...
2016/0125199 VERIFYING A USER'S IDENTITY BASED ON ADAPTIVE IDENTITY ASSURANCE LEVELS
The disclosed embodiments provide a system that manages access to a computer-based resource. During operation, the system obtains a request for the...
2016/0125198 SEARCHABLE ENCRYPTION WITH SECURE AND EFFICIENT UPDATES
Methods, systems, and computer-readable storage media for selecting columns for using searchable encryption to query a database storing encrypted data....
2016/0125197 Database Security
A method includes automatically determining a component of a security label for each first record in a first table of a database having multiple tables,...
2016/0125196 SECURED DATA STORAGE ON A HARD DRIVE
Secured electronic data storage on a hard drive is described. A computer system that incorporates the hard drive includes a shrink, shred, and data...
2016/0125195 OVER NETWORK OPERATION RESTRICTION ENFORCEMENT
The enforcement of operation restriction on a file system entity over a network. The file system entity exists on a server (which could be a single machine, a...
2016/0125194 DYNAMIC SERVICE DISCOVERY
When an application is launched, a framework scanning module scans a plurality of frameworks linked against by the application to generate a list of available...
2016/0125193 Secure Display Element
Techniques for securely displaying sensitive information against attempts to capture such information via screenshots are introduced. Similar to the pieces of...
2016/0125192 Data Access Sharing
Data access sharing may be provided. Requests may be received to display an data item associated with a list of data items. Upon determining whether a property...
2016/0125191 SELF-REMOVAL OF ENTERPRISE APP DATA
Self-removal of enterprise application data (e.g., managed application data) is disclosed. It may be determined that a data removal condition has been...
2016/0125190 MANAGING SHARED INVENTORY IN A VIRTUAL UNIVERSE
A method and system for managing shared inventory in a virtual universe. A received owner request from an owner of an inventory item designates the inventory...
2016/0125189 ROW LEVEL SECURITY
A system and method of enabling row level security through security policies is disclosed herein. In this system and method, a computing device may be...
2016/0125188 CONFIDENTIAL EXTRACTION OF SYSTEM INTERNAL DATA
Secure extraction of state information of a computer system is provided. A method includes obtaining, by a security engine of a system, a public encryption key...
2016/0125187 System and Method for a Renewable Secure Boot
Embodiments of systems and methods disclosed herein include renewable secure boot systems for renewing and booting a target device. Systems and methods include...
2016/0125186 METHOD OF LOADING FILES INTO RANDOM ACCESS MEMORY IN AN ELECTRONIC DEVICE AND ASSOCIATED ELECTRONIC DEVICE
In an electronic device designed to function in a trusted execution environment (TEE), because of the execution of a trusted operating system by a processor of...
2016/0125185 Web Application Security Access Method, Server, and Client
A web application security access method, including periodically detecting, by an application store server, if the locally stored source code is inconsistent...
2016/0125184 SYSTEM AND METHOD FOR IDENTIFYING A MOBILE APPLICATION LIKELY TO ADVERSELY AFFECT NETWORK PERFORMANCE
A system and method identifies mobile applications that are likely to have an adverse effect on a mobile network if accessed by mobile communication devices....
2016/0125183 Determining Malware Status of File
Determining malware status of a file is disclosed. An apparatus obtains information about an unknown target file, obtains system context of the unknown target...
2016/0125182 EVALUATION OF A PASSWORD
A method and computer for assessing whether a password can be generated by using characteristics of a physical arrangement of keys of an input device. A...
2016/0125181 Secure Display Element
Techniques for securely displaying sensitive information against attempts to capture such information via screenshots are introduced. Similar to the pieces of...
2016/0125180 Near Field Communication Authentication Mechanism
A computing device is described. The computing device includes input/output (I/O) circuitry to receive sensory data and a trusted execution environment to...
2016/0125179 PROCEDE D'IDENTIFICATION BIOMETRIQUE
The invention relates to a method for identifying a person to be identified having a certified data medium linking a primary identifier and a primary biometric...
2016/0125178 Systems And Methods For Spoof Detection In Iris Based Biometric Systems
The invention provides methods, systems and computer program products for spoof detection in iris based biometric recognition. In an embodiment, the invention...
2016/0125177 INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, ACCESS CONTROL METHOD, AND PROGRAM
An information processing system including at least one information processing apparatus includes an access control unit configured to receive a request from a...
2016/0125176 BEHAVIORAL CHARACTERISTICS BASED USER VERIFICATION
A method, system, and computer program product for user verification based on behavioral characteristics are provided in the illustrative embodiments. A set of...
2016/0125175 INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND PROGRAM
An information processing device includes an identification part configured to, in response to a user's operation to start any given one of a plurality of...
2016/0125174 INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, ACCOUNT REGISTRATION METHOD, AND PROGRAM
An information processing system including at least one information processing apparatus that includes an administration unit configured to administer whether...
2016/0125173 INFORMATION PROCESSING SYSTEM, ELECTRONIC DEVICE AND SERVICE AUTHORIZATION METHOD
An information processing system includes an information processing device, and an electronic device to utilize a service provided from the information...
2016/0125172 AUTOMATIC GENERATION OF LICENSE TERMS FOR SERVICE APPLICATION MARKETPLACES
A processor stores information associated with one or more programming modules, including one or more license terms associated with the one or more programming...
2016/0125171 SYSTEMS AND METHODS FOR MANAGING CLINICAL TRIALS
Systems and methods for managing, analyzing, and evaluating clinical trials. Clinical trial data collection, management, review, and analysis may be performed...
2016/0125170 DYNAMIC ANALYSIS OF HEALTH AND MEDICAL DATA APPLIED TO CLINICAL TRIALS
Methods, devices, systems and computer program products determine suitability of an individual for participation in a drug trial. One method for assessment of...
2016/0125169 DUPLICATION DETECTION IN CLINICAL DOCUMENTATION
Methods, systems, and computer-readable media are provided to detect similarities in clinical documents that might be inaccurate or inappropriate. A first...
2016/0125168 CARE MANAGEMENT ASSIGNMENT AND ALIGNMENT
Methods, systems, and computer-readable media are provided for aligning a patient who is determined to be eligible for care management services with a care...
2016/0125167 METHOD AND DEVICE
A method implemented by a computer includes: obtaining information on a first medicine before being taken or information on a food or beverage before being...
2016/0125166 INTEROPERABLE MEDICAL CODE
A program product that includes an authentication system and a method for processing a medical order from a health practitioner is disclosed. The program...
2016/0125165 INFUSION BILLING
Methods, computer systems and computer readable media for receiving data and information from medical devices in a healthcare setting are provided. In...
2016/0125164 BOLUS DISPLAY AND DOCUMENTATION
Methods, computer systems and computer readable media for receiving data and information from medical devices in a healthcare setting are provided. In...
2016/0125163 APPARATUS FOR THE AUTOMATIC MANAGEMENT OF THE INTAKE OF DRUGS BY A PATIENT
The present invention relates to a new apparatus capable of scheduling and supervising the intake of drugs by the patient. Said apparatus comprises a device...
2016/0125162 METHOD FOR CONTROLLING INFORMATION TERMINAL, AND RECORDING MEDIUM
A display screen including a first display area displaying plural similar medical images received from a case search system and a second display area...
2016/0125161 SYSTEMS AND METHODS FOR SIMULATION OF HEMODIALYSIS ACCESS AND OPTIMIZATION
Systems and methods are disclosed for simulating or optimizing hemodialysis access. One method includes receiving a patient-specific anatomic model of a...
2016/0125160 CONTACTLESS AND MINIMAL-CONTACT MONITORING OF QUALITY OF LIFE PARAMETERS FOR ASSESSMENT AND INTERVENTION
An apparatus, system, and method for the measurement, aggregation and analysis of data collected using non-contact or minimally-contacting sensors provides...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.