Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0132701 MULTI-PURPOSE CREDIT CARD READER APPARATUS
A credit card reader shields a credit card, stores data from one or more credit cards simultaneously and then selectively broadcasts data associated with one...
2016/0132700 PORTABLE ELECTRONIC DEVICE
The problem of the present invention is to provide a tablet-type portable electronic device that can perform payment by way of a card, as well as having a...
2016/0132699 Split-Key Arrangement in a Multi-Device Storage Enclosure
Apparatus and method for data security in a multi-device data storage enclosure. In some embodiments, the storage enclosure has a housing with opposing first...
2016/0132698 SEMICONDUCTOR DEVICE MODULE, LICENSE SETTING METHOD AND MEDIUM HAVING LICENSE SETTING PROGRAM RECORDED THEREIN
A semiconductor device module according to embodiments includes a specific information storage unit configured to store individual identification information...
2016/0132697 Multi-Tier Storage Based on Data Anonymization
Examples disclosed herein relate to a multi-tier storage based on data anonymization. A processor may store data in a first data tier. The processor may...
2016/0132696 DATA PRIVACY MANAGEMENT
A system and a method for managing privacy of data are provided. The method includes causing generation of a trigger notification notifying an access to one or...
2016/0132695 ONE WAY AND TWO WAY DATA FLOW SYSTEMS AND METHODS
A system may include a database, a processor coupled to the database, and a user module executed by the processor. The user module may be configured to receive...
2016/0132694 Preventing Sharing of Sensitive Information Through Code Repositories
Methods, systems, and computer program products for preventing sharing of sensitive information through code repositories are provided herein. A method...
2016/0132693 DOCUMENT DISTRIBUTION AND INTERACTION
An electronic signature comprises an authenticated audio and/or visual recording of a spoken assent that conforms to a pre-established phrase. Alternatively,...
2016/0132692 SEARCHABLE ENCRYPTION FOR INFREQUENT QUERIES IN ADJUSTABLE ENCRYPTED DATABASES
Methods, systems, and computer-readable storage media for selecting columns for selecting encryption to perform an operator during execution of a database...
2016/0132691 SYSTEM AND METHOD FOR A LOG-IN PROCEDURE FOR NON-READERS
A system and method for logging a non-reader into a corresponding user account is disclosed. A system can include a processor, a user interface, a display, and...
2016/0132690 Access Revocation
Systems and apparatuses for revoking access to one or more applications for one or more individuals or users are provided. In some examples, revocation...
2016/0132689 COMMUNICATION CONTROL DEVICE, DATA SECURITY SYSTEM, COMMUNICATION CONTROL METHOD, AND COMPUTER PRODUCT
A communication control device configured to access an information processing apparatus in which data is stored. The device and method acquires an operational...
2016/0132688 Task Oriented Passwords
When the mobile device is awakened, a task oriented password system takes control of the device in order to present a screen in which the user must participate...
2016/0132687 SECURING DATA ON A COMPUTING SYSTEM
The present subject matter relates to securing data on a computing system. In an example, a request to execute an application instance of the application is...
2016/0132686 PERMISSION CONTROL
In some example implementations, there is provided a method including determining, from a received request, one or more attributes; sending, by a permission...
2016/0132685 COMMUNICATION BETWEEN KEY MANAGER AND STORAGE SUBSYSTEM KERNEL VIA MANAGEMENT CONSOLE
System, computer program product, and method embodiments for communication between a kernel operational on a storage subsystem and a key manager (KM) through a...
2016/0132684 SECURE DATABASE BACKUP AND RECOVERY
As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system...
2016/0132683 Confidential Content Display in Flexible Display Devices
Confidential content within a file is masked for display on a flexible display device. A legend relating the masking to the confidential content is displayed...
2016/0132682 TECHNIQUES FOR SECURE DATA MANAGEMENT IN A DISTRIBUTED ENVIRONMENT
Techniques for secure data management in a distributed environment are provided. A secure server includes a modified operating system that just allows a kernel...
2016/0132681 METHOD FOR PERFORMING A SECURE BOOT OF A COMPUTING SYSTEM AND COMPUTING SYSTEM
A method for performing a secure boot of a mobile device computing system that includes a tamper-resistant hardware that provides secure storage of at least a...
2016/0132680 RESOURCE USAGE OPTIMIZED AUDITING OF DATABASE SHARED MEMORY
A system, and computer program product for security auditing of database transactions are provided in the illustrative embodiments. For a specified period, an...
2016/0132679 SYSTEM AND METHOD FOR DETECTING SENSITIVE USER INPUT LEAKAGES IN SOFTWARE APPLICATIONS
A system and method for detecting sensitive user input leakages in software applications, such as applications created for smartphone platforms. The system and...
2016/0132678 MANAGING SOFTWARE DEPLOYMENT
The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of...
2016/0132677 Unauthorized Account Access Lockout Reduction
A method and system for determining unauthorized account access is provided. The method includes receiving a username of a user and a passcode for access to a...
2016/0132676 SECURE PASSWORD STORAGE AND RECALL SYSTEM
A method and system for securely storing passwords and recalling any of the stored passwords in the computer using a single, master password. The system...
2016/0132675 SECURE SYSTEM FOR ALLOWING THE EXECUTION OF AUTHORIZED COMPUTER PROGRAM CODE
Systems and methods for selective authorization of code modules are provided. According to one embodiment, a kernel mode driver monitors events occurring...
2016/0132674 APPARATUS AND METHOD FOR CONFIGURING PASSWORD AND FOR RELEASING LOCK
Methods of configuring a different authority for a plurality of users to use at least one application in an electronic device. User inputs are received to set...
2016/0132673 VARIABLE IMAGE PRESENTATION FOR AUTHENTICATING A USER
Facilities are provided herein for authenticating a user to use a processing device. A user predefines authenticators of one or more types and associates these...
2016/0132672 REMOTE ENTRY SYSTEM
A system is disclosed for providing secure access to a controlled item, the system comprising a database of biometric signatures, a transmitter subsystem...
2016/0132671 Online Pseudonym Verification and Identity Validation
Methods, systems, and computer program products for authenticating an online user. Authentication involves sending a code from a server to a user device...
2016/0132670 SYSTEMS AND METHODS FOR AUTHENTICATING USER IDENTITY BASED ON USER-DEFINED IMAGE DATA
The disclosed embodiments include computerized methods and systems that facilitate two-factor authentication of a user based on a user-defined image and...
2016/0132669 BIOMETRIC USER AUTHENTICATION SYSTEM AND A METHOD THEREFOR
The present disclosure relates to a method and a system for authenticating a user. In one embodiment, one or more input and target data samples extracted from...
2016/0132668 MANAGEMENT APPARATUS, MANAGEMENT METHOD, AND RECORDING MEDIUM OF MANAGEMENT PROGRAM
A management method for billing system, the management method includes setting, by a processor, billing address for usage fees of a virtual machine, deployed...
2016/0132667 WEB APPLICATION PROTECTION
A method and system for generating a protected version of the digital content is disclosed. The method includes obfuscating the digital content to yield a...
2016/0132666 System And Method For Relicensing Content
A method, computer program product and system for indicating the occurrence of a relicensing trigger event on a client electronic device includes generating a...
2016/0132665 MECHANISM FOR FACILITATING MANAGEMENT OF DATA IN AN ON-DEMAND SERVICES ENVIRONMENT
In accordance with embodiments, there are provided mechanisms and methods for facilitating management of data in an on-demand services environment. In one...
2016/0132664 SYSTEM FOR IDENTIFYING CONTENT OF DIGITAL DATA
A processor receives a first list comprising a plurality of events from a portion of digital data of an unknown work and one or more metrics between each pair...
2016/0132663 SYSTEM AND METHOD OF ENHANCED DISTRIBUTION OF PHARMACEUTICALS IN LONG-TERM CARE FACILITIES
A system and related methods of enhanced distribution of pharmaceuticals in long-term care facilities are provided. An embodiment of a system includes one or...
2016/0132662 CABINET WITH REMOTE INTEGRATION
A medication dispensing cart with remote integration includes a plurality of drawers operably attached to a mast, a drawer controller operably connected to the...
2016/0132661 PILL REMOVAL DETECTION FROM PILL PACKAGE
Technologies are generally provided for a pill dispensing device to track removal of a pill from a pill package. The device may include circuits ...
2016/0132660 ELECTRONIC MEDICATION ADHERENCE, IDENTIFICATION, AND DISPENSATION
An electronic medication system including a network server (112), a patient device (104), and a medication storage device (132) is disclosed. The network...
2016/0132659 DISPENSING SYSTEM FOR PHARMACIES
There is disclosed a dispensing system for pharmaceutical products, the dispensing system comprising: a plurality of individually lockable storage bins for...
2016/0132658 NOVEL MULTI-COMPARTMENT DOSAGE CARDS FOR SPLIT PACKAGE ADMINISTRATION
The present invention relates to novel technology suitable for reducing errors introduced into the process of medication administration. In particular, the...
2016/0132657 METHOD AND SYSTEM FOR FACILITATING PHYSIOLOGICAL COMPUTATIONS
A system for noninvasively determining at least one physiological characteristic of a patient may include at least one computer system configured to, using a...
2016/0132656 PROCEDURE FOR THE MODELLING OF THE DIRECTION OF INCIDENT ABDOMINAL PRESSURES TOWARDS THE FEMALE PELVIC CAVITY...
A method for modelling the direction of incident abdominal pressures through a strait and directed towards the female pelvic cavity and for modelling the...
2016/0132655 ENDOBIOGENIC-BASED PROCESSING OF BIOLOGICAL DATA
A method is provided that includes processing biological data using a biological simulation model, including calculating a set of measurements called indexes...
2016/0132654 METHOD AND DEVICE FOR MULTIMODAL NEUROLOGICAL EVALUATION
A method of building classifiers for neurological assessment is described. The method comprises the steps of extracting quantitative features from a plurality...
2016/0132653 METHOD AND SYSTEM FOR PROCESSING CLINICAL DATA
Embodiments provide a method, system and non-transitory computer medium for processing clinical data. In particular, the method comprises configuring at least...
2016/0132652 COMMUNICABLE DISEASE TRACKING
Systems and methods for controlling the spread of a communicable disease are provided. A combination of physiological data and location data is used to...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.