Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0232389 Aimer beam formation facilitating rapid barcode processing by a user with a standard smart phone
An assisted aimer for rapid, accurate, and low-cost imaging of barcodes, includes a hand-held device, such as a smart phone or tablet, having a digital camera...
2016/0232388 READER FOR AN ELECTRONIC UHF ACCESS CONTROL SYSTEM
Reader for an electronic UHF access control system, wherein the reader in operation cooperates with corresponding UHF tags and is provided with a housing, in...
2016/0232387 SYSTEMS AND METHODS OF OBJECT DETECTION AND MANAGEMENT
Systems and devices for determining the presence of and managing objects contained within a container. The container includes at least one compartment that can...
2016/0232386 RADIO FREQUENCY IDENTIFICATION TECHNIQUES IN AN ULTRA-LOW TEMPERATURE ENVIRONMENT
According to certain inventive techniques, a system includes a plurality of shelves in an interior chamber of a cold-storage apparatus, an RFID antenna...
2016/0232385 Magnetic Recording Medium Processing Device and Control Method of the Same
A device comprising a detection mechanism to detect a medium; a pre-head to slide on a magnetic strip formed on the medium to read magnetic data; a shutter...
2016/0232384 CARD READER
A card reader may include a card insertion port; a card conveying passage; and a card lock mechanism. The card lock mechanism may include a motor; a rotation...
2016/0232383 METHOD AND SYSTEM FOR PERFORMING SECURE I/O OPERATION IN A PLUGGABLE FLASH STORAGE DEVICE
The present disclosure relates to a method and a system for performing secure read/write operations in the pluggable flash storage device. In one embodiment, a...
2016/0232382 SM3 HASH ALGORITHM ACCELERATION PROCESSORS, METHODS, SYSTEMS, AND INSTRUCTIONS
A processor includes a decode unit to decode an SM3 two round state word update instruction. The instruction is to indicate one or more source packed data...
2016/0232381 HARDWARE SECURITY MODULE, METHOD OF UPDATING INTEGRITY CHECK VALUE STORED IN HARDWARE SECURITY MODULE, AND...
Provided is a method of updating an integrity check value (ICV) stored in a hardware security module (HSM). The method includes storing user authentication...
2016/0232380 AUTOMATIC INITIATION OF EXECUTION ANALYSIS
Approaches for transferring control to a bit set. Execution of a bit set upon a host operating system is monitored. A determination is made that the execution...
2016/0232379 MEMORY INTEGRITY CHECKING
According to an example, memory integrity checking may include receiving computer program code, and using a loader to load the computer program code in memory....
2016/0232378 MAPPING AND OBSCURING DIGITAL REPRESENTATIONS OF A NUMBER OF USER ACCOUNTS ON A SOCIAL NETWORK MAP
Mapping and obscuring digital representations of a number of user accounts on a social network map includes identifying a primary user account from a number of...
2016/0232377 SYSTEM, METHOD, AND PROGRAM FOR STORING AND CONTROLLING ACCESS TO DATA REPRESENTING PERSONAL BEHAVIOR
A system for storing and controlling access to data representing personal behavior, the system comprising an ID retrieval apparatus to receive identifying...
2016/0232376 PRIVACY FRACTAL MIRRORING OF TRANSACTION DATA
The tool to provide anonymous data in response to a request for information is configured to receiving a request for information relating to a population of...
2016/0232375 METHODS AND SYSTEMS FOR PROVIDING ONLINE DIGITAL IMAGE RIGHTS MANAGEMENT AND IDENTITY PROTECTION IN A DIGITAL...
Methods and systems for providing photographic rights management and identity protection. The invention is premised on the assumption that the individual that...
2016/0232374 PERMISSION CONTROL METHOD AND APPARATUS
This application provides a permission control method and apparatus. The method includes: acquiring an application type of an application program; and...
2016/0232373 METHOD AND APPARATUS FOR PROVIDING SECURITY INFORMATION OF USER DEVICE
A method and an apparatus for providing security information of a user device are disclosed. The method includes obtaining security information of a user...
2016/0232372 SYSTEM, METHOD AND DATABASE PROXY SERVER FOR SEPARATING OPERATIONS OF READ AND WRITE
A method of separating read operations from write operations includes obtaining and storing a client ID after establishing a slave database connection with a...
2016/0232371 METHODS AND APPARATUS FOR PROVIDING VIABLE LANDING SITES FOR A MOBILE DEPLOYMENT OF, INTER ALIA, AN INTERACTIVE...
A method for providing hierarchal client entitlement information in a graphical user interface ("GUI") is provided. The method includes deploying the...
2016/0232370 GRAPHICAL INTERACTION TECHNIQUES FOR CONFIGURING AN ACCESS CONTROL MECHANISM IN A COMPUTER SYSTEM
An attribute-based access control (ABAC) policy governs the behaviour of an access control mechanism in a computer system which selectively permits and denies...
2016/0232369 Managing Access To Images Using Roles
A reference image of one or more objects is displayed on the display of a mobile device in a manner that allows a user of the mobile device to simultaneously...
2016/0232368 INTELLIGENT GOVERNANCE CONTROLS BASED ON REAL-TIME CONTEXTS
Systems, methods, and computer program products to perform an operation comprising receiving, from a set of input devices, data of an environment surrounding a...
2016/0232367 STATEFUL DATA GEOFENCING
An apparatus includes a boundary module that determines if a mobile device is within a secure area. The mobile device includes a computing device capable of...
2016/0232366 SYSTEMS AND METHODS FOR VERIFICATION AND DEPLOYMENT OF APPLICATIONS TO PROGRAMMABLE DEVICES
A system for verifying applications for Real-Time Execution (RTE) devices is provided. The system includes a memory, at least one processor coupled to the...
2016/0232365 PERMISSION CONTROL METHOD AND ELECTRONIC DEVICE OPERATING THE SAME
Disclosed is an electronic device including a memory configured to store inheritance limitation information of sharing permission owned by an application in a...
2016/0232364 Gesture Based Access Control Method and System
Gesturing is used to enter a unique combination of hand positions and/or movements for accessing a secured device having a security entry system requiring that...
2016/0232363 CONTROLLING AN ANALYSIS SYSTEM OF BIOLOGICAL SAMPLES
A method for controlling an analysis system is presented. The method comprises receiving, by an encryption unit, authentication data of a user. In the case of...
2016/0232362 INCREASING SEARCH ABILITY OF PRIVATE, ENCRYPTED DATA
Techniques are provided to allow full search for encrypted data within a database. In some embodiments, searchable data may be separated into different...
2016/0232361 DEVICE AND METHOD FOR SAFELY OPERATING THE DEVICE
A device includes a controller configured to carry out a control operation using a cryptographically determined parameter, and a safety apparatus for making...
2016/0232360 METHOD FOR REALIZING SECURE COMMUNICATION
A method for realizing secure communication, comprises: Step 1, a card reader is powered on, determine a system working mode, perform an apple device...
2016/0232359 PATCH MONITORING AND ANALYSIS
This disclosure provides for patch monitoring and analysis, such as in an industrial process control and automation system. A method includes discovering at...
2016/0232358 Information Technology Vulnerability Assessment
Presented herein are vulnerability assessment techniques for highlighting an organization's information technology (IT) infrastructure security ...
2016/0232357 Secure Boot Sequence for Selectively Disabling Configurable Communication Paths of a Multiprocessor Fabric
Disabling communication in a multiprocessor fabric. The multiprocessor fabric may include a plurality of processors and a plurality of communication elements...
2016/0232356 Information Handling System Boot Pre-Validation
Pre-validation of bootloader certificates for firmware bootloaders of an operating system boot list during a setup mode of BIOS boot initiation provides the...
2016/0232355 INFORMATION PROCESSING METHOD AND ELECTRONIC DEVICE
An information processing method and an electronic device are provided. The method includes: detecting a first operation of a first application, where the...
2016/0232354 SYSTEM MEMORY INTEGRITY MONITORING
Disclosed herein is a system and method for monitoring structures of interest in a host system that is isolated and independent of the CPU and of the operating...
2016/0232353 Determining Model Protection Level On-Device based on Malware Detection in Similar Devices
Methods, systems and devices for identifying, classifying, modeling, and responding to mobile device behaviors may include using lightweight processes to...
2016/0232352 Methods and Systems for Detecting Fake User Interactions with a Mobile Device for Improved Malware Protection
A computing device processor may be configured with processor-executable instructions to implement methods of detecting and responding to fake user interaction...
2016/0232351 METHOD AND DEVICE FOR IDENTIFYING COMPUTER VIRUS VARIANTS
A method and apparatus for identifying computer virus variants are disclosed to improve the accuracy of virus identification and removal, and may relate to the...
2016/0232350 SYSTEM AND METHOD FOR INSPECTING DATA THROUGH FILE FORMAT CONVERSION
A system and method for inspecting data through file format conversion, which filter out various types of malicious code attached to data, entering into a...
2016/0232349 MOBILE MALWARE DETECTION AND USER NOTIFICATION
Methods and systems for detecting and responding to malware events associated with mobile/portable computing devices by means of a malware detection gateway...
2016/0232348 SYSTEM AND METHOD FOR FIRMWARE BASED ANTI-MALWARE SECURITY
A system for securing an electronic device includes a non-volatile memory, a processor coupled to the non-volatile memory, a resource of the electronic device,...
2016/0232347 MITIGATING MALWARE CODE INJECTIONS USING STACK UNWINDING
Malware in a computer is found by detecting a sequence of function calls in a memory space of a process executing on a computer, tracing the process stack to...
2016/0232346 MECHANISM FOR TRACKING TAINTED DATA
The disclosure relates in some aspects to protecting systems and data from maliciously caused destruction. Data integrity is maintained by monitoring data to...
2016/0232345 METHOD OF MODELING BEHAVIOR PATTERN OF INSTRUCTION SET IN N-GRAM MANNER, COMPUTING DEVICE OPERATING WITH THE...
A computing device configured to execute an instruction set is provided. The computing device includes a system call hooker for hooking system calls that occur...
2016/0232344 METHOD FOR RE-ADJUSTING APPLICATION PERMISSION AND USER TERMINAL FOR PERFORMING THE SAME METHOD
The present disclosure relates to a user terminal and a method for automatically readjusting application permission. The user terminal comprises an application...
2016/0232343 BASEBAND SECURE BOOT WITH REMOTE STORAGE
In order to simplify and reduce the cost of an electronic device, the size of a first non-volatile memory associated with an integrated circuit is...
2016/0232342 METHOD AND SYSTEM FOR AUTHENTICATING ACCESS
Embodiments of the present disclosure disclose a method for authenticating access. The method comprises receiving a touch input from a user, where the touch...
2016/0232341 Presence-Triggered Beacon Authentication
A system and method for authenticating a user of a device includes a user fob configured to transmit a code related to authentication, wherein the device is...
2016/0232340 ELECTROCARDIOGRAM (ECG)-BASED AUTHENTICATION APPARATUS AND METHOD THEREOF, AND TRAINING APPARATUS AND METHOD...
Provided are electrocardiogram (ECG)-based authentication and training. An authentication method includes generating a feature vector of an ECG obtained from...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.