Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0239699 CHIP SCALE SENSING CHIP PACKAGE AND A MANUFACTURING METHOD THEREOF
An embodiment of this invention provides a chip scale sensing chip package module, comprising a chip scale sensing chip package, having a sensing chip with a...
2016/0239698 INDICIA READING TERMINAL INCLUDING FRAME QUALITY EVALUATION PROCESSING
There is described an indicia reading terminal that can be operative to capture a succession of frames of image data and that can be operative so that a...
2016/0239697 MANAGER, MANAGEMENT SYSTEM, MANAGEMENT METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM
A manager includes a storage that stores a registration information associated with an identification information and an information processing method, the...
2016/0239696 EXTERNAL ACCESS TO MEMORY ON AN RFID TAG
In embodiments of the present invention improved capabilities are described for an RFID tag comprising a radio frequency (RF) network node and a communication...
2016/0239695 CHIP CARD READING ARRANGEMENT
A chip card reading arrangement is provided including a chip card reading device including a data processing circuit and a reader antenna coupled to the data...
2016/0239694 RFID-TO-BLUETOOTH SELECTIVE ADAPTER WITH MULTIPLE RFID INTEGRATED CHIPS
RFID-to-Bluetooth selective adapter with multiple RFID integrated chips mounted on RFID elevator controller, having customized RFID transponders, a bluetooth...
2016/0239693 SOFTWARE-DEFINED MULTI-MODE RFID READ DEVICES
Devices and methods for reading multiple types of RFID tags having different frequencies and or encoding schemes are disclosed. One or more search signals...
2016/0239692 TAG ANTI-COLLISION METHOD, READER APPARATUS AND SYSTEM FOR RFID SYSTEMS WITH MULTI-PACKET RECEPTION CAPABILITY
Provided is a method of preventing collision between a plurality of RFID tags by an RFID reader. An anti-collision method by a tag reader apparatus in an RFID...
2016/0239691 TONE-BASED WAKE UP CIRCUIT FOR CARD READER
A card reader for a point-of-sale system that is configured to accept both magnetic strip-type and integrated circuit (IC) chip-type payment cards. The card...
2016/0239690 INFORMATION MEDIUM READING APPARATUS AND METHOD FOR READING INFORMATION MEDIUM
An information medium reading device may include a magnetic head to read magnetic datum and output an analog magnetic signal; an image sensor to take a photo...
2016/0239689 Method for Deploying Large Numbers of Waste Containers in a Waste Collection System
A method of redeploying waste containers in a waste collection system with an active or passive signal means requires a user to aim an optical character...
2016/0239688 METHOD AND APPARATUS FOR DETERMINING SHAPES FOR DEVICES BASED ON PRIVACY POLICY
An approach is provided for determining at least one interaction mode of at least one application executing on at least one device, wherein the at least one...
2016/0239687 CONTEMPORANEOUS GESTURE AND KEYBOARD ENTRY AUTHENTICATION
A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to...
2016/0239686 STORING AND USING DATA WITH SECURE CIRCUITRY
An electronic device is provided. The electronic device includes a processor, a memory configured to connect to the processor, and secure circuitry configured...
2016/0239685 HYBRID SECURE NON-VOLATILE MAIN MEMORY
According to an example, a hybrid secure non-volatile main memory (HSNVMM) may include a non-volatile memory (NVM) to store a non-working set of memory data in...
2016/0239684 DEVICE AND METHOD FOR GENERATING IDENTIFICATION KEY BY USING SEMICONDUCTOR PROCESS
Provided are a device and a method for generating an identification key by using a process variation in a semiconductor process. A semiconductor is...
2016/0239683 System and method for securely storing files
A method for securely storing a file includes receiving, by a computing device, an instruction to store a file. The method includes dividing, by the computing...
2016/0239682 METHOD AND SYSTEM OF ENFORCING PRIVACY POLICIES FOR MOBILE SENSORY DEVICES
A method and device for classifying collected images. The method and device include instructions to compare a captured image to a known set of images to...
2016/0239681 CLOUD-BASED HARDWARE ARCHITECTURE
A federated in-memory database system (FIMDB) and a method for operating the same. The system comprises: A plurality of interconnected computing sites (LS),...
2016/0239680 VIRTUALIZATION INPUT COMPONENT
One or more systems and/or methods for storing personal information within a first device and/or for providing personal information from the first device to...
2016/0239679 UNIFIED USER IDENTIFICATION WITH AUTOMATIC MAPPING AND DATABASE ABSENCE HANDLING
An identification system that may be used in heterogeneous computing environments provides a fail-free path to providing identifiers from a single canonical...
2016/0239678 System and Methods For Encrypting Data
A system and associated methods for encrypting data are disclosed. In at least one embodiment, a key manager is located in memory on an at least one computing...
2016/0239677 DYNAMIC SECURITY POLICY GENERATION
A user interface is described, such as a graphical user interface (GUI), operable to receive a representation of a security policy expressed in a first policy...
2016/0239676 User Authentication Method and Terminal
A user authentication method and terminal, where the method includes acquiring an authentication interaction object and an interference interaction object...
2016/0239675 SYSTEM AND METHOD FOR PERMISSION BASED DIGITAL CONTENT SYNDICATION, MONETIZATION, AND LICENSING WITH ACCESS...
A system for controlling access to digital content enables global sharing of digital content under terms negotiated between a content owner and a content...
2016/0239674 NETWORK-BASED CLIENT SIDE ENCRYPTION
A device may provide an upload request to upload a file. The device may receive, based on the upload request, a unique identifier associated with the device....
2016/0239673 SYSTEM AND METHOD FOR SECURE DOCUMENT EMBEDDING
The example non-limiting technology herein uses a Microsoft Office module or other application that automatically encrypts an Office document (Excel,...
2016/0239672 Systems and Methods of Multidimensional Encrypted Data Transfer
Example embodiments of the systems and methods of multidimensional encrypted data transfer disclosed herein also introduce novel and unobvious methods to store...
2016/0239671 METHOD AND DEVICE FOR PROTECTING AN APPLICATION AND METHOD AND DEVICE FOR EXECUTING A PROTECTED APPLICATION...
An application comprising a code part is protected in a device including a processor that encrypts the code part to be protected to obtain a protected part...
2016/0239670 Multi-Party Encryption Cube Processing Apparatuses, Methods and Systems
Computer-implemented systems and methods are disclosed herein for use within secure multi-party computation. A system and method are used for storing an...
2016/0239669 User Terminal And Method For Protecting Core Codes Of Applications Using The Same
A user terminal includes a communication circuit, an encryption-decryption circuit, and an execution circuit. The communication circuit receives a core code...
2016/0239668 DOCUMENT REDACTION WITH DATA RETENTION
A method for redacting an electronic document (ED) having a file format, including: obtaining a request to redact a sensitive data item in the ED; identifying...
2016/0239667 CONTENT BASED HARDWARE SECURITY MODULE ASSIGNMENT TO VIRTUAL MACHINES
At least one hardware security module out of a plurality of hardware security modules is assigned to a guest system. The at least one hardware security module...
2016/0239666 NON-DETERMINISTIC ENCRYPTION
A non-deterministic encryption functionality receives and encrypts an open-text input stream. Codes for error-correction are generated for the encrypted...
2016/0239665 AUTOMATED AND CONTINUOUS RISK ASSESSMENT RELATED TO A CYBER LIABILITY INSURANCE TRANSACTION
Systems, methods, and computer program products for evaluating situational awareness of a cyberspace operational environment in a security control server in...
2016/0239664 PREVENTING RE-PATCHING BY MALWARE ON A COMPUTER
Preventing re-patching by malware on a computer by detecting a request to modify a write-protection attribute of a memory location within a memory of a...
2016/0239663 DETECTING A CRYOGENIC ATTACK ON A MEMORY DEVICE WITH EMBEDDED ERROR CORRECTION
Embodiments of the present disclosure provide a method, computer program product, and system for monitoring a dynamic random-access memory (DRAM) device to...
2016/0239662 CONTROL SYSTEM AND AUTHENTICATION DEVICE
Provided are a control system and an authentication device capable of detecting abnormality of a development device for distributing a control program and of...
2016/0239661 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM
An attack activity definition information database 111 stores, for a plurality of events, attack activity definition information describing an event, a...
2016/0239660 SEQUENCE IDENTIFICATION
A sequence identification apparatus comprising a processor, wherein the apparatus is adapted to generate a directed acyclic graph data structure of equivalence...
2016/0239659 ELECTRONIC DEVICE FOR EXECUTING APPLICATION AND METHOD OF CONTROLLING SAME
A electronic device and a control method of the electronic device are provided. A control method includes providing a first environment in which at least one...
2016/0239658 DIGITAL IDENTITY
The disclosure relates to a digital identity system for creating a computer stored digital identity. The system includes a network interface configured to send...
2016/0239657 DIGITAL IDENTITY SYSTEM
The disclosure relates to a digital identity system including an enrolment module executing on a processor configured to receive a data item from an enrolling...
2016/0239656 TEST FOR DISTINGUISHING BETWEEN A HUMAN AND A COMPUTER PROGRAM
A method for distinguishing between a human and a computer program is described. The method comprises the steps of providing a first output for indicating a...
2016/0239655 SECURE AUTHENTICATION MECHANISM USING QUICK RESPONSE CODES
A method of securing authentication of a user's identity is disclosed. The method comprises the steps of: an authentication program of an entity receiving...
2016/0239654 SYSTEMS AND METHODS FOR PROVIDING IMAGE-BASED SECURITY MEASURES
Systems, methods, and non-transitory computer-readable media can detect an operation that causes a challenge response process to be initiated. An image...
2016/0239653 DIGITAL IDENTITY
The disclosure relates to a method of authenticating a digital credential of a bearer by a validating device, the method including capturing the bearer...
2016/0239652 IDENTITY AUTHORIZATION AND AUTHENTICATION
A method of authorizing and/or authenticating a user includes: obtaining a first pressure profile of the user, the first pressure profile including at least a...
2016/0239651 METHOD OF CONTROLLING AN ELECTRONIC DEVICE TO OPERATE USING A MOBILE TERMINAL AND THE MOBILE TERMINAL
The invention provides a method of controlling an electronic device to operate using a mobile terminal and the mobile terminal. Wherein the method comprises...
2016/0239650 SYSTEM AND METHOD FOR USER IDENTITY VERIFICATION, AND CLIENT AND SERVER BY USE THEREOF
A method of user identity verification by a server, where the server pre-configures, by use of collected user information, verification information...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.