Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0275321 DATA APPLICATION METHOD AND SYSTEM OF RFID TAGS
A data application method and system of radio-frequency identification (RFID) tags are provided. The method includes: when a first-type RFID tag is within a...
2016/0275320 RADIO TAG COMMUNICATION METHOD AND A RADIO TAG COMMUNICATION APPARATUS
A radio tag communication apparatus that communicates with radio tags including storing units capable of storing identification information and state...
2016/0275319 RFID Sensor Tag And System For Small Output Transducers, And Related Methods
A battery-free wireless sensor system enables high resolution and very accurate measurements of strain or other transducers with small signal outputs. The...
2016/0275318 REEL RECEIVING DEVICE BASED ON RFID
A reel receiving device based on RFID is disclosed. A reel receiving device according to one embodiment of the present invention includes a reel receiving...
2016/0275317 METHOD FOR PRODUCING A MEMORY-CARD-READING BODY, CORRESPONDING MEMORY-CARD-READING BODY AND MEMORY-CARD-READING...
A method is provided for producing a memory-card-reading body having a generally rectangular parallelepiped shape, including a slot for inserting a memory...
2016/0275316 CARD READER
Various embodiments related to a card reader are described. According to an embodiment, the card reader comprises: a card reader body part; a contact card...
2016/0275315 Computer Data Protection Lock
An information handling system includes a lock, a switch, and a south bridge. The lock is configured to receive a key and to alternate between a locked...
2016/0275314 OPERATING A DISPLAY OF A USER EQUIPMENT
Operating a display of a user equipment. The present invention relates to a method for operating a display (2) of a user equipment (1). The display (2) is...
2016/0275313 PROCESSOR RELATED NOISE ENCRYPTOR
An apparatus for encrypting processor related noise is disclosed. A method and a computer program product also perform the functions of the apparatus. The...
2016/0275312 Systems And Methods For Multiple Photo Feed Stories
Techniques to allow for ease of navigation within a photo browsing interface of a social networking system. In one embodiment, a designation of a first image...
2016/0275311 METHOD AND SYSTEM FOR OBFUSCATING THE PROPERTIES OF A WEB BROWSER
A method for obfuscating the properties of a web browser includes identifying an active web browser and generating random assortments of properties compatible...
2016/0275310 WELLNESS REGISTRY
The present disclosure relates to receiving and sharing wellness data. The wellness data can be received by a user device from any number of sensors external...
2016/0275309 METHODS AND SYSTEMS PROVIDING CENTRALIZED ENCRYPTION KEY MANAGEMENT FOR SHARING DATA ACROSS DIVERSE ENTITIES
A method and apparatus provide centralized encryption key management for sharing data across diverse entities. In particular, the present invention relates to...
2016/0275308 METHOD TO MANAGE RAW GENOMIC DATA IN A PRIVACY PRESERVING MANNER IN A BIOBANK
A method to manage raw genomic data (SAM/BAM files) in a privacy preserving manner in a biobank. By using order preserving encryption of the reads' positions,...
2016/0275307 AUTOMATIC RESOURCE OWNERSHIP ASSIGNMENT SYSTEM AND METHOD
A method for automatic folder ownership assignment, including ascertaining which first folders, among a first multiplicity of folders, have at least one of...
2016/0275306 SECURING VIRTUAL MACHINE DATA
One embodiment of the present invention is a method including: (a) representing virtual primary disk data and state data of a virtual machine in a unit of...
2016/0275305 Image-Based Unlock Functionality on a Computing Device
Utilizing an image on a computing device to serve as a template for locking/unlocking the computing device. The image includes a plurality of portions that are...
2016/0275304 METHOD AND APPARATUS FOR VERIFYING IMAGES BASED ON IMAGE VERIFICATION CODES
The present invention provides a method and apparatus for verifying images based on image verification codes, the method comprising selecting an identification...
2016/0275303 SYSTEMS AND METHODS OF MONITORING AND CONTROLLING ENTERPRISE INFORMATION STORED ON A CLOUD COMPUTING SERVICE (CCS)
A computer-implemented method is described to monitor and control enterprise information stored on a cloud computing service (CCS). The method includes using a...
2016/0275302 SECURING A DEVICE USING GRAPHICAL ANALYSIS
Embodiments are directed to a computer system for securing an electronic device. The system includes at least one processor configured to receive at least one...
2016/0275301 INFORMATION SHARING CONTROL
Disclosed is a system for controlling the information that is shared during electronic device communication. Devices communicate with a server and one another...
2016/0275300 CONTENTS SECURITY METHOD AND ELECTRONIC APPARATUS FOR PROVIDING CONTENTS SECURITY FUNCTION
Provided are a content security method and an electronic apparatus for providing a content security function. The content security method according to an...
2016/0275299 VERIFICATION AND ACCESS CONTROL FOR INDUSTRY-SPECIFIC SOLUTION PACKAGE
A solution package, that has configured computing system assets from a base computing system, is received and analyzed to verify that it meets a set of...
2016/0275298 METHOD FOR PROTECTING JAVA PROGRAM
A method for protecting java program is provided, which relates the field of software protection. The method includes: java virtual machine loading class file;...
2016/0275297 IMAGE FORMING APPARATUS CAPABLE OF ENSURING HIGH SECURITY LEVEL, METHOD OF CONTROLLING IMAGE FORMING APPARATUS,...
An image forming apparatus that is capable of ensuring a high security level. An image forming apparatus receives a print job from an information processing...
2016/0275296 METHOD AND SYSTEM FOR PROVIDING AN ENCRYPTION PROXY
An encryption proxy is instantiated in a first computing environment and includes encryption proxy authentication data for identifying itself to a secrets...
2016/0275295 OBJECT ENCRYPTION
A system, computer program product, and computer-executable method of managing data objects within a cloud storage provider, the system, computer program...
2016/0275294 DATA SYSTEM AND METHOD
A data system for providing data communication includes at least one user device and a configuration of nodal elements which is operable to communicate with...
2016/0275293 INFORMATION PROCESSING SYSTEM AND CONTROL METHOD OF THE INFORMATION PROCESSING SYSTEM
An abstraction unit converts confidential information to alternative information. An association information management unit manages association information...
2016/0275292 SYSTEM AND METHOD FOR IMPLEMENTING APPLICATION POLICIES AMONG DEVELOPMENT ENVIRONMENTS
In a system for facilitating distributed security and vulnerability testing of a software application, each development sandbox in a set of sandboxes receives...
2016/0275291 UNIFIED EXTENSIBLE FIRMWARE INTERFACE (UEFI) DATABASE FOR SECURE BOOTSTRAP OF A COMPUTER
Embodiments of the present invention provide a method, system and computer program product for UEFI firmware database management of keys and certificates...
2016/0275290 Dynamic Firmware Module Loader in a Trusted Execution Environment Container
A dynamic firmware module loader loads one of a plurality of a firmware contexts or modules as needed in a containerized environment for secure isolated...
2016/0275289 UNSUPERVISED ANOMALY-BASED MALWARE DETECTION USING HARDWARE FEATURES
Disclosed are devices, systems, apparatus, methods, products, media and other implementations, including a method that includes obtaining current hardware...
2016/0275288 DETECTION OF ANOMALOUS PROGRAM EXECUTION USING HARDWARE-BASED MICRO-ARCHITECTURAL DATA
Disclosed are devices, systems, apparatus, methods, products, media and other implementations, including a method that includes obtaining hardware-based...
2016/0275287 Container and Image Scanning for a Platform-as-a-Service System
A method of container and image scanning includes storing at a central scan store of a multi-tenant system, an image scan result for a container image, the...
2016/0275286 ISOLATED PROGRAM EXECUTION ENVIRONMENT
Embodiments relate to an isolated program execution environment. An aspect includes receiving, by the isolated program execution environment on a computer...
2016/0275285 PROXIMITY BASED AUTHENTICATION FOR STRIPED DATA
An approach for authentication is provided. The approach performs identifying, by one or more computer processors, an account attempting to access striped...
2016/0275284 BARCODE READER AND BARCODE READING SYSTEM HAVING AN AGE VERIFICATION CAPABILITY
A barcode reader and a barcode reading system having an age verification capability are disclosed. The barcode reader may capture a barcode pattern on an...
2016/0275283 ELECTRONIC DEVICE WITH PARALLAXING UNLOCK SCREEN AND METHOD
Unlocking an electronic device includes displaying a lock screen containing a simulated parallaxing three-dimensional scene on a touch screen of the electronic...
2016/0275282 DEVICE, AUTHENTICATION SYSTEM, AUTHENTICATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT
A first creator creates a first priority user information. When an installer installs a program that has a user authentication function, a second creator...
2016/0275281 SELECTIVELY PROVIDING PERSONAL INFORMATION AND ACCESS TO FUNCTIONALITY ON LOCK SCREEN BASED ON BIOMETRIC USER...
A computing device is described that selectively displays or suppresses personalized information on a lock screen based on the results of a biometric user...
2016/0275280 REMOTE AUTHENTICATION OF IDENTITY
A method of identifying a person by remotely processed data by an identifying party. A person pre-registers a biometric signature with a security service...
2016/0275279 ELECTRONIC SEAL, AUTHENTICATION SYSTEM, AND COMPUTER-READABLE RECORDING MEDIUM
An electronic seal includes a detector configured to detect contact of a contact surface; a generator configured to generate a pattern on the contact surface...
2016/0275278 SECURING A DEVICE USING GRAPHICAL ANALYSIS
Embodiments are directed to a computer system for securing an electronic device. The system includes at least one processor configured to receive at least one...
2016/0275277 DATA PROTECTION SYSTEM BASED ON USER INPUT PATTERNS ON DEVICE
Methods, systems, and computer program products are provided for protecting data stored on a device based on user input patterns. The device may have one or...
2016/0275276 VALIDITY CHECK OF A LICENSE OF A MAINTENANCE UNIT FOR ACCESSING A CONTROLLER OF A PASSENGER...
The invention allows checking the validity of a license of a maintenance unit for accessing a controller of a passenger transportation/access device of a...
2016/0275275 METHODS AND APPARATUSES FOR CONTROLLING STATE OF TERMINAL SCREEN
A method for controlling a screen of a terminal, includes: determining a real-time state of the screen as a first state; generating a first electromagnetic...
2016/0275274 APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT
An apparatus includes a determination unit, an authentication unit, and a using unit. The determination unit determines, from among application programs...
2016/0275273 ELECTRONIC DEVICE, METHOD AND STORAGE MEDIUM
According to one embodiment, an electronic device includes one or more connectors configured to connect external devices, and circuitry. The circuitry is...
2016/0275272 USER AUTHENTICATION SYSTEM, USER AUTHENTICATION METHOD, PROGRAM, AND INFORMATION STORAGE MEDIUM
A stranger who has come across user information of a user is prevented from being successfully authenticated as the user. A user authentication system...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.