Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0247015 Connecting to an Onscreen Entity
A method for identifying unknown third parties appearing within video call data based on generated image characteristics data. A user's computing device and a...
2016/0247014 IMAGE PROCESSING APPARATUS AND IMAGE PROCESSING METHOD
An apparatus for identifying a candidate area in a first image corresponding to an object in a second image, includes a memory and a processor to divide the...
2016/0247013 HIDDEN BIOMETRIC SETUP
A method, a device, and a non-transitory storage medium having instructions to invoke a setup of a fingerprint identification service of the user device,...
2016/0247012 Method and a System for Matching Fingerprint Images Obtained From Different Fingerprint Image Capturing Devices
The present invention describes a method and the system for matching fingerprint images obtained from different fingerprint image capturing devices and...
2016/0247011 Visibility of Targets on and below the Ocean Surface
A pair of images is obtained having pixel intensities substantially proportional to wave height for a majority of pixels. The images are aligned,...
2016/0247010 Fingerprint Detection with Transparent Cover
An electronic device includes a transparent cover and a light source disposed at an edge of the transparent cover. The light source is configured to inject...
2016/0247009 SEMICONDUCTOR FINGERPRINT IDENTIFICATION SENSOR AND MANUFACTURING METHOD THEREOF
Disclosed are a semiconductor fingerprint identification sensor and a method for manufacturing the same. The semiconductor fingerprint identification sensor...
2016/0247008 METHODS FOR SECURING INVISIBLE 2D BARCODES AND PRINTED IMAGES
A secure document includes a fluorescent barcode and a fluorescent filler printed onto a substrate. The fluorescent barcode is printed using a first...
2016/0247007 DEVICE AND METHOD FOR IDENTIFYING AN OBJECT AT LEAST PARTIALLY COVERED BY A TRANSPARENT MATERIAL
A device and method for identifying an object at least partially covered by a transparent material. The abstract of the disclosure is submitted herewith as...
2016/0247006 INVENTORY ASSISTANCE DEVICE AND METHOD
A system comprises two or more item storage bins, each item storage bin comprising: a wireless communication tag emitting a wireless signal having data...
2016/0247005 TEST AUTOMATION FOR AUTOMATED FARE MANAGEMENT SYSTEMS
A test robot may receive a test scenario for testing a fare management system. The test robot may program a fare card to store card information based on the...
2016/0247004 MARKING PAPER PRODUCTS
Methods of marking paper products and marked paper products are provided. Some methods include irradiating the paper product to alter the functionalization of...
2016/0247003 MODULAR APPLICATION OF PERIPHERAL PANELS AS SECURITY PROTECTION SCREENS WITH INDIVIDUAL LOCKING MECHANISMS...
A rack-based information handling system (RIHS) includes a rack chassis having at least two opposing side panels which are structurally held in place by one or...
2016/0247002 Detection of Hardware Tampering
A trusted guard module stores one or more identifiers, each identifier uniquely identifying a respective electronic component of one or more electronic...
2016/0247001 SYSTEM AND METHOD FOR A SECURE DISPLAY MODULE
A system for a secure display module includes a display element array, a driver controller, a communication interface, a host controller and a cryptographic...
2016/0247000 PASSWORD ENTRY METHOD AND SYSTEM
Disclosed are a password entry method and system. In the present invention, an intelligent display terminal receives a password entry instruction of a user,...
2016/0246999 METHOD AND SYSTEM FOR IMAGE CAPTURING PREVENTION OF INFORMATION DISPLAYED ON A SCREEN AND COMPUTER PROGRAM THEREOF
The method comprising: presenting a textual information on a screen of at least one user computing device therefore providing a bitmapped textual image;...
2016/0246998 SECURE ACCESS MANAGEMENT OF DEVICES
Systems and methods may provide implementing one or more device locking procedures to block access to a device. In one example, the method may include...
2016/0246997 SOCIAL NETWORK REPORTS
Technology is disclosed for generating social networking reports. In various embodiments, the technology receives an identity of a user wherein the identity is...
2016/0246996 Systems and Methods for Bulk Redaction of Recorded Data
Systems and methods for redacting information from data records are provided. Data records are recorded by recording devices, including, but not limited to,...
2016/0246995 METHOD AND APPARATUS FOR AUTHORIZED ACCESS TO LOCAL FILES ON A COPY APPLIANCE
A new approach is proposed that contemplates systems and methods to support authorized access by a second client to files stored on a local content appliances...
2016/0246994 INFORMATION COLLECTION APPARATUS AND METHOD
An information collection apparatus, which collects information from an information apparatus on a network and stores the collected information in a database,...
2016/0246993 METHOD AND SYSTEM FOR ISOLATING SECURE COMMUNICATION EVENTS FROM A NON-SECURE APPLICATION
A system and method for isolating secure communication events from a non-secure application are described herein. The method can include the steps of...
2016/0246992 Fine-Grained User Control Over Usages Of Sensitive System Resources Having Private Data With Applications In...
A system and method whereby permission is accessed that is to be revoked for an application. The permission involves access to private data of a user via an...
2016/0246991 Systems and Methods for Automated Data Privacy Compliance
Systems and methods for automated data privacy compliance involve a data privacy operations server receiving information via a web server regarding an...
2016/0246990 Fine-Grained User Control Over Usages Of Sensitive System Resources Having Private Data With Applications In...
A system and method whereby permission is accessed that is to be revoked for an application. The permission involves access to private data of a user via an...
2016/0246989 COMPUTERIZED SYSTEM AND METHOD FOR SELECTIVELY RESTRICTING ACCESS TO HEALTH INFORMATION
Disclosed is a system and method restricting access to health information over a computer network comprising the steps of receiving settings for restricting...
2016/0246988 DEVICE AND METHOD FOR ENCODING DATA COLUMN
A device and a method for encoding a data column are disclosed. A schema inquiry unit inquires into a schema of an original table which is a data table for...
2016/0246987 SENSOR AWARE SECURITY POLICIES WITH EMBEDDED CONTROLLER HARDENED ENFORCEMENT
An information handling system (IHS) performs security policy enforcement using security policy data maintained in an embedded controller, which operates...
2016/0246986 CODE ANALYSIS FOR PROVIDING DATA PRIVACY IN ETL SYSTEMS
In an approach for providing data privacy in information integration systems, a method performed during compilation of an information integration job receives...
2016/0246985 LICENSING OF SOFTWARE PRODUCTS
In a method for issuing an access authorization for a software product provided on an application server, provision is made for a license server to establish,...
2016/0246984 CIRCUITRY AND METHOD FOR INSTRUCTION STREAM PROTECTION
A circuitry is provided. The circuitry comprises a signature memory having stored thereon a plurality of stored signatures. Moreover, the circuitry comprises a...
2016/0246983 REMOTE RULE EXECUTION
In a policy decision point (500) coupled to at least one remote attribute source (107a-c), a method of transforming an attribute-based access control (ABAC)...
2016/0246982 SYSTEMS AND METHODS FOR SECURE DATA EXCHANGE AND DATA TAMPERING PREVENTION
Systems and methods for secure data exchange and data tampering prevention. A secure data system receives electronic data files from data entities and stores...
2016/0246981 DATA SECRECY STATISTICAL PROCESSING SYSTEM, SERVER DEVICE FOR PRESENTING STATISTICAL PROCESSING RESULT, DATA...
A result of statistical processing for a set of original data items can be obtained while the risk of leakage of information to be hidden is reduced by...
2016/0246980 SYSTEM FOR SECURING THE CRITICAL DATA OF AN ON-BOARD AIRPLANE SYSTEM OF AN AIRCRAFT
A data security system for securing the critical data of an on-board airplane avionics system comprising access control means for controlling access to the...
2016/0246979 UNMASKING OF CONFIDENTIAL CONTENT
Facilities are provided herein for unmasking content presented on a display of a computing device. An unmask rule for unmasking the content on the display is...
2016/0246978 Electronic Device and Method for Providing DRM Content by Electronic Device
An electronic device according to an embodiment of the present disclosure may include a communication unit that transmits, to an external device, at least one...
2016/0246977 SYSTEM AND ARCHITECTURE FOR SECURE COMPUTER DEVICES
The present invention relates to a system and architecture for securing otherwise unsecured computer subsystems. According to one aspect, the invention...
2016/0246976 IDENTITY-BASED ENCRYPTION FOR SECURING ACCESS TO STORED MESSAGES
A method, system, and computer program product for securing access to stored messages using identity-base encryption are disclosed. The method includes...
2016/0246975 System and Method for Authentication
A multi-functional device is attached to a secure network and includes a control circuit. The control circuit receives indications as to whether a user is...
2016/0246974 INTER-VIRTUAL MACHINE COMMUNICATION
Techniques to interface with an isolated compute environment may be provided. An external interface may be provided by the isolated compute environment...
2016/0246973 SYSTEM AND METHOD FOR GENERATING APPLICATION CONTROL RULES
Disclosed is a system and method for configuring control rules for applications executable on a computer. An example method includes classifying computer...
2016/0246972 DISTRIBUTED ENCRYPTION AND ACCESS CONTROL SCHEME IN A CLOUD ENVIRONMENT
An approach is proposed that contemplates systems, methods, and computer-readable storage mediums to support receiving, from a computerized system, a first...
2016/0246971 CRYPTIC NOTES AND RELATED METHODS
A computer-implemented method is described. A first portion and a second portion of a message are received from a user via a user interface of a computer...
2016/0246970 STEGANOGRAPHIC IMAGE ON PORTABLE DEVICE
A method for concealing sensitive information on a portable device via a steganographic image is disclosed. The portable device can be in the form of a card...
2016/0246969 ADAPTIVE SYSTEM PROFILE
An approach to generating and regenerating a profile value from features of a system (e.g., a computer system), allows for certain changes of features of the...
2016/0246968 SYSTEM AND METHOD FOR PROTECTING DATA STORED ON A REMOVABLE DATA STORAGE DEVICE
A system for protecting data stored in a removable data storage device includes a personal electronic device, a removable solid state data storage device...
2016/0246967 Method of Operating Ephemeral Peripheral Device
An ephemeral system includes an ephemeral communications device and associated ephemeral memory system (onboard or peripheral) for securing user data....
2016/0246966 METHOD AND SYSTEM OF ASSESSING RISK ASSOCIATED WITH USERS BASED AT LEAST IN PART ON ONLINE PRESENCE OF THE USER
A risk assessment system assesses risk associated with users based at least in part on online presence of the user. The risk assessment system includes at...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.