Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0188919 METHOD AND APPARATUS FOR ENERGY HARVEST FROM A PROXIMITY COUPLING DEVICE
The disclosure generally relates to a method and apparatus for energy harvest from a proximity coupling device (PCD) by a proximity integrated circuit card. In...
2016/0188918 RFID SYSTEM WITH LOCATION CAPABILITY
Provided are RFID systems, methods and RFID tags according to various aspects. An infrared (IR) beam, from an IR transmitter, is outputted in a first direction...
2016/0188917 Systems and Methods for Estimation of a Population of Passive RFID Sensors
Systems and methods for providing an estimate of a population of passive Radio Frequency Identification (RFID) sensors in a coverage area of an RFID reader...
2016/0188916 Systems And Methods For Creating Dynamic Programmable Magnetic Stripes
Conventional magnetic stripe cards are encoded with static magnetic patterns. To act like many different magnetic stripe cards, a programmable dynamic magnetic...
2016/0188915 METHODS OF TRANSMITTING INFORMATION TO MOBILE DEVICES USING COST EFFECTIVE CARD READERS
A method of transmitting information to a mobile device includes providing a card reader is provided with a read head, a slot for swiping a magnetic stripe of...
2016/0188914 SYSTEM AND METHOD FOR DETECTING BARCODE PRINTING ERRORS
Barcode verifiers automate the verification process by capturing an image of the printed barcode and analyzing the image according to an industry ...
2016/0188913 ELECTRONIC EQUIPMENT SECURITY DEVICE
An apparatus for securing a component to prevent unauthorized removal of the component, the apparatus comprising a security device for securing the component,...
2016/0188912 SECURE DATA ENTRY DEVICE
A secure data entry device including a housing having at least one housing element, at least one additional element located within the housing, at least one...
2016/0188911 PROCESS AUTHENTICATED MEMORY PAGE ENCRYPTION
A memory controller encrypts contents of a page frame based at least in part on a frame key associated with the page frame. The memory controller generates a...
2016/0188910 AUTOMATED MANUFACTURING SYSTEM WITH ADAPTER SECURITY MECHANISM AND METHOD OF MANUFACTURE THEREOF
A method of operation of an automated assembly system includes: detecting a socket adapter having an adapter identifier and an adapter cryptographic chip;...
2016/0188909 TRUSTED COMPUTING
A trusted computing device (TCD) includes an isolated environment, host interface, secure interface, and program instructions. The environment includes an...
2016/0188908 INFORMATION PROCESSING SYSTEM AND SEMICONDUCTOR DEVICE
According to an embodiment, an information processing system includes a time constant processor and a pattern generator. The time constant processor binarizes...
2016/0188907 METHOD FOR CREATING SIGNALS FOR TIME-STAMPING OF DOCUMENTS AND METHOD FOR TIME-STAMPING OF DOCUMENTS
Method for creating a signal for time-stamping of documents (A), comprising the following steps: a) selecting a digitally stored reference document (D1-D3),...
2016/0188906 PROCESSORS, METHODS, SYSTEMS, AND INSTRUCTIONS TO CHANGE ADDRESSES OF PAGES OF SECURE ENCLAVES
A processor of an aspect includes a decode unit to decode a user-level instruction. The user-level instruction is to indicate a page of a secure enclave and is...
2016/0188905 APPROXIMATE PRIVACY INDEXING FOR SEARCH QUERIES ON ONLINE SOCIAL NETWORKS
In one embodiment, a method includes retrieving, from one or more data stores, one or more objects requested by an application accessed by a first user of an...
2016/0188904 METHOD AND SYSTEM OF PRIVACY PROTECTION IN ANTAGONISTIC SOCIAL MILIEU/DARK PRIVACY SPOTS
An efficient and robust system 100 of privacy protection to provide security of a computing device by identifying and detecting unauthorized intrusion/peek...
2016/0188903 CONTROLLING ESSENTIAL LIFE DATA
A computer-implemented method for controlling essential life data including estate content to at least one user according to the respective user's predefined...
2016/0188902 COMPUTING SYSTEM FOR PRIVACY-AWARE SHARING MANAGEMENT AND METHOD OF OPERATION THEREOF
A computing system includes a control unit configured to determine a usage context including a capability of a device, a usage time and a device location...
2016/0188901 Database Virtualization
Aspects of the subject matter described herein relate database virtualization. In aspects, clusters of database servers may be located at various locations of...
2016/0188900 PROTECTION OF A NON-VOLATILE MEMORY BY CHANGE OF INSTRUCTIONS
A method for protecting a volatile memory against a virus, wherein: rights of writing, reading, or execution are assigned to certain areas of the memory; and a...
2016/0188899 SECURITY ENHANCEMENT BASED ON USE OF ICONS WITH PASS CODES
Embodiments are directed to receiving, by a computing device comprising a processor, a selection of an icon that corresponds to a request for access to at...
2016/0188898 METHODS AND SYSTEMS FOR ROLE BASED ACCESS CONTROL IN NETWORKED STORAGE ENVIRONMENT
Methods and systems for role based access control (RBAC)) by a management device are provided. The management device communicates with a plurality of...
2016/0188897 SECURE EVENT LOG MANAGEMENT
A trusted device includes a secure interface and a host interface, the secure interface being isolated from the host interface by an isolated environment. A...
2016/0188896 SECURE HOST INTERACTIONS
A trusted device includes a secure interface and a host interface, the secure interface being isolated from the host interface by an isolated environment. A...
2016/0188895 ELECTRONIC SYSTEM WITH ACCESS MANAGEMENT MECHANISM AND METHOD OF OPERATION THEREOF
An electronic system includes: a control unit configured to operate on a user interface; and the user interface, coupled to the control unit, configure to:...
2016/0188894 RETENTION MANAGEMENT IN A FACILITY WITH MULTIPLE TRUST ZONES AND ENCRYPTION BASED SECURE DELETION
A computing facility, including a storage management system belonging to a first trust zone having a first privilege level, a metadata management system...
2016/0188893 SYSTEM AND METHOD OF APPLYING ADAPTIVE PRIVACY CONTROLS TO LOSSY FILE TYPES
The proliferation of personal computing devices in recent years, especially mobile personal computing devices, combined with a growth in the number of...
2016/0188892 Authentication system of synchronizing instant timestamp and a method thereof
The present invention is related to an authentication system of synchronizing instant timestamp issued by a digital timestamp device and a method thereof. The...
2016/0188891 ENTITLEMENT SECURITY AND CONTROL
A system, apparatus, and method are provided for entitlement security and control. An example method includes granting an entitlement permission after an...
2016/0188890 SECURITY MODE DATA PROTECTION
In one embodiment, a device containing sensitive information may be placed in a data security mode. In such a data security mode, certain activities may...
2016/0188889 CREATING SECURE CHANNELS BETWEEN A PROTECTED EXECUTION ENVIRONMENT AND FIXED-FUNCTION ENDPOINTS
Embodiments of an invention for establishing secure channels between a protected execution environment and fixed-function endpoints are disclosed. In one...
2016/0188888 PRIVACY SCREEN-BASED SECURITY
A system for privacy screen-based security comprises an input interface and a processor. The input interface is configured to receive authentication...
2016/0188887 System And Method Of Determining User-Defined Permissions Through A Network
The proliferation of personal computing devices in recent years, especially mobile personal computing devices, combined with a growth in the number of...
2016/0188886 Systems and Methods To Obfuscate Market Data on a Trading Device
Systems and methods to obfuscate market data on a trading device are disclosed. An example method includes receiving market data related to a tradable object...
2016/0188885 SOFTWARE VULNERABILITY ANALYSIS METHOD AND DEVICE
The present disclosure includes: searching a code clone corresponding to a used source code from any analysis target source code; detecting a security sink and...
2016/0188884 Application Decomposition Using Data Obtained From External Tools For Use In Threat Modeling
An illustrative embodiment of automated application decomposition generates a set of information specific to an application by one or more external tools....
2016/0188883 ELECTRONIC SYSTEM WITH RISK PRESENTATION MECHANISM AND METHOD OF OPERATION THEREOF
An electronic system includes: a control unit configured to: calculating a risk score based on a permission requested by an application, generating a summary...
2016/0188882 SOFTWARE NOMENCLATURE SYSTEM FOR SECURITY VULNERABILITY MANAGEMENT
Systems and methods for securing a computer system are described herein. The systems and methods, which are computer-implemented, involve receiving, by a...
2016/0188881 SECURITY CO-PROCESSOR BOOT PERFORMANCE
Technologies for improving platform initialization on a computing device include beginning initialization of a platform of the computing device using a basic...
2016/0188880 OUTBREAK PATHOLOGY INFERENCE
In an example, a system and method for outbreak pathology inference are described. In certain computational ecosystems, malware programs and other malicious...
2016/0188879 DETECTION AND REMEDIATION OF MALWARE WITH FIRMWARE OF DEVICES
A computing device having a data store for storing firmware is configured such that, upon determining that a connection to a firmware device has been...
2016/0188878 DIGITAL PROTECTION THAT TRAVELS WITH DATA
The present disclosure relates to a system and method for performing antimalware scanning of data files that is data-centric rather than device-centric, In the...
2016/0188877 Automating Monitoring Of A Computing Resource In A Cloud-Based Data Center
Provided is a method of identifying a computing resource requiring monitoring for a security purpose in a cloud-based data center during creation of a service...
2016/0188876 ANOMALY DETECTION FOR VEHICULAR NETWORKS FOR INTRUSION AND MALFUNCTION DETECTION
A security monitoring system for a Controller Area Network (CAN) comprises an Electronic Control Unit (ECU) operatively connected to the CAN bus. The ECU is...
2016/0188875 TECHNOLOGIES FOR MANAGING SECURITY THREATS TO A COMPUTING SYSTEM UTILIZING USER INTERACTIONS
Technologies for managing security threats on a computing system include detecting a security threat to the computing system, determining a plurality of...
2016/0188874 SYSTEM AND METHOD FOR SECURE CODE ENTRY POINT CONTROL
Embodiments of systems and methods disclosed herein relate execution of related secure code blocks on a processor. Systems and methods include techniques by...
2016/0188873 BINARY TRANSLATION OF A TRUSTED BINARY WITH INPUT TAGGING
In an example, a computing device includes a trusted execution environment (TEE), including an enclave. The enclave may include both a binary translation...
2016/0188872 METHOD AND SYSTEM FOR RUNTIME INJECTION OF SECURE APPLICATIONS
A method and system of runtime injection for a secure application are described herein. During runtime of the secure application, a conventional request from...
2016/0188871 Managing Opt-In and Opt-Out for Private Data Access
Concepts and technologies disclosed herein are for managing opt-in and opt-out for private data access. According to one aspect disclosed herein, a mobile...
2016/0188870 ELECTRONIC APPARATUS AND SCREEN UNLOCK METHOD THEREOF
An electronic apparatus and a screen unlock method thereof are provided in the invention. The method includes the following steps. First, when a screen of an...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.