Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0283757 INFORMATION PROCESSING APPARATUS, POWER SOURCE CONTROL METHOD OF INFORMATION PROCESSING APPARATUS AND PROGRAM
Provided is an information processing apparatus including an IC module that performs communication with an external apparatus, a detection unit that detects an...
2016/0283756 Methods and Apparatus for Localizing a Source of a Set of Radio Signals
Methods and apparatus are provided for localizing a source of a set of radio signals, such as radio signals received from an RFID tag at various locations. A...
2016/0283755 RADIO FREQUENCY IDENTIFICATION (RFID) READER, RFID TAG, AND METHOD THEREOF FOR PERFORMING WRITE CHECK OF TAG DATA
An RFID reader, RFID tag, and method thereof for performing a write check of tag data. According to an exemplary embodiment, the RFID reader may include: a...
2016/0283754 CARD READER AND CONTROL METHOD THEREFOR
A card reader may include a card insertion slot into which the card is inserted; a metal detecting mechanism structured to detect the external connection...
2016/0283753 ANTI-RECORDING CARD READING DEVICE
This anti-recording card reading device includes: a magnetic card reading head having a data reading terminal and a flexible circuit board, where the flexible...
2016/0283752 CMOS CURRENT-MODE SQUARING CIRCUIT
The CMOS current-mode squaring circuit includes a translinear loop. A rectifier is used to produce the absolute value of the input current. Carrier mobility...
2016/0283751 DATA PROCESSING SYSTEM WITH TEMPERATURE MONITORING FOR SECURITY
A processing system includes a processor and a temperature security module coupled to provide a temperature tamper signal to the processor. The temperature...
2016/0283750 PROVIDING ENHANCED REPLAY PROTECTION FOR A MEMORY
In an embodiment, a processor includes: at least one core to execute instructions; a cache memory coupled to the at least one core to store data; and a tracker...
2016/0283749 METHOD FOR ENCRYPTING DATABASE
According to an embodiment of the present invention, a computer program stored in a computer-readable medium for encrypting a data value included in a data...
2016/0283748 FLEXIBLE COUNTER SYSTEM FOR MEMORY PROTECTION
The present disclosure is directed to a flexible counter system for memory protection. In general, a counter system for supporting memory protection operations...
2016/0283747 TECHNOLOGIES FOR HARDENING DATA ENCRYPTION WITH SECURE ENCLAVES
Technologies for hardening encryption operations are disclosed. In some embodiments, the technologies harden encryption operations typically performed by...
2016/0283746 DETECTION OF STEGANOGRAPHY ON THE PERIMETER
A method to detect a plurality of steganography based information embedded in a multimedia file associated with an online computer environment is provided. The...
2016/0283745 SYSTEMS AND METHODS FOR ANONOSIZING DATA
Various systems, computer-readable media, and computer-implemented methods of providing improved data privacy, anonymity, and security by enabling subjects to...
2016/0283744 METAMOROPHIC STORAGE OF PASSCODES
Systems and methods for securing sensitive data are presented. The system includes a database that stores multiple data storage schemes, each of which denotes...
2016/0283743 MANAGING DIGITAL PHOTOGRAPH METADATA ANONYMIZATION
An approach for managing photograph metadata anonymization is provided. The approach receives, by one or more processors, a photograph file, wherein the...
2016/0283742 ELECTRONIC DATA SECURITY APPARATUS
An apparatus for providing security for an integrated circuit (IC) chip is disclosed. The apparatus may include the IC chip, attached to a surface of a printed...
2016/0283741 ACCESS CONTROL METHOD AND TERMINAL DEVICE
An access control method and a terminal device are disclosed. The method includes: receiving an unlock password after receiving an instruction for opening an...
2016/0283740 CONSUMER AND BRAND OWNER DATA MANAGEMENT TOOLS AND CONSUMER PRIVACY TOOLS
The disclosed tools include enhanced and flexible login and profile management tools as well as brand owner communication tools that provide more flexibility...
2016/0283739 SYSTEM AND METHOD FOR CREATING AND TRANSITIONING TO MULTIPLE FACETS OF A SOCIAL MEDIA OBJECT IN A SOCIAL NETWORK
Systems and methods for facilitating users to create multi-faceted social media objects (e.g., text, images, videos, etc.) with one public facing front side...
2016/0283738 PRIVACY AND MODELING PRESERVED DATA SHARING
A method for generating a classification model using original data that is sensitive or private to a data owner. The method includes: receiving, from one or...
2016/0283737 SYSTEM AND METHOD ENABLING MULTIPARTY AND MULTI LEVEL AUTHORIZATIONS FOR ACCESSING CONFIDENTIAL INFORMATION
Disclosed is a method and system for enabling multi-party and multi level authorizations for accessing confidential information. A first set of access...
2016/0283736 SECURING PROTECTED HEALTH INFORMATION BASED ON SOFTWARE DESIGNATION
Systems, methods, and computer program products to perform an operation comprising receiving, from a first process, a request to access content stored in a...
2016/0283735 PRIVACY AND MODELING PRESERVED DATA SHARING
A system, method and computer program product for generating a classification model using original data that is sensitive or private to a data owner. The...
2016/0283734 USER VERIFICATION USING TOUCH AND EYE TRACKING
A method includes receiving at a processor, an indication of a user touching a point on a data entry device, receiving at the processor, an indication of a...
2016/0283733 NON-BLOCKING REGISTRATION IN DISTRIBUTED TRANSACTIONS
A method for transaction registration is described herein. The method includes sending, for a transaction manager, a registration request for a transaction....
2016/0283732 SYSTEM AND METHOD FOR ENHANCED DISPLAY-SCREEN SECURITY AND PRIVACY
A security method that includes assigning a sensitivity value for a communication with a sensitivity determining module including at least one hardware...
2016/0283731 SYSTEMS, METHODS, AND APPARATUS TO PROVIDE PRIVATE INFORMATION RETRIEVAL
Systems, methods, and apparatus to provide private information retrieval. A disclosed example system includes a first trusted processing unit to store a first...
2016/0283730 INTEGRATED CIRCUIT DEVICE, INFORMATION PROCESSING APPARATUS, MEMORY MANAGEMENT METHOD FOR INFORMATION STORAGE...
A memory region on an IC card has a hierarchical structure. Each application allocated on the memory region is registered in a directory, and the memory region...
2016/0283729 MASKING OF DIFFERENT CONTENT TYPES
Systems and methods for masking content of different types are described. The system may implement the method comprising receiving a request to mask input...
2016/0283728 DATABASE SERVER AND CLIENT FOR QUERY PROCESSING ON ENCRYPTED DATA
Methods, systems, apparatuses, and computer program products are provided for secure handling of queries by a data server (DS) and a database application (DA)....
2016/0283727 POLICY ENFORCEMENT
Data security access and management may require a server dedicated to monitoring document access requests and enforcing rules and policies to limit access to...
2016/0283726 FLEXIBLE ROLE BASED AUTHORIZATION MODEL
Systems and methods described herein relate to role-based authorization systems which allow customization of role templates as well as the ability, using...
2016/0283725 Smart Card with Domain-Trust Evaluation and Domain Policy Management Functions
Methods and instrumentalities are disclosed that enable one or more domains on one or more devices to be owned or controlled by one or more different local or...
2016/0283724 SECURE USER INPUT MODE FOR ELECTRONIC DEVICES USING RANDOMIZED LOCATIONS OF SELECTION INDICIA
Operations by an electronic device include randomly selecting an initial location among ordered keys for display of a selection indicia, and displaying on a...
2016/0283723 DATA SECURITY WITH A SECURITY MODULE
A security module securely manages keys. The security module is usable to implement a cryptography service that includes a request processing component. The...
2016/0283722 Systems and Methods for Protecting Video Content
Systems and methods for content-protecting video codecs are described. At least one embodiment of the invention comprises a system for protecting video content...
2016/0283721 OUT-OF-BAND HOST OS BOOT SEQUENCE VERIFICATION
Embodiments of techniques and systems for out-of-band verification of host OS components are described. In embodiments, a out-of-band host OS boot sequence...
2016/0283720 Method for Validating an Untrusted Native Code Module
A system that validates a native code module. During operation, the system receives a native code module comprised of untrusted native program code. The system...
2016/0283719 METHOD FOR EVALUATION, COMPUTER-READABLE RECORDING MEDIUM HAVING STORED THEREIN PROGRAM FOR EVALUATION, AND...
According to an aspect of the embodiments, a method for evaluation of selection for an edited field, including: displaying information having one or more...
2016/0283718 INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING METHOD
An information processing device may include a master circuit; and a security circuit. The master circuit may include a status checking circuit configured to...
2016/0283717 MEMORY SCANNING METHODS AND APPARATUS
Memory scanning methods and apparatus are disclosed. An example apparatus includes a walker to traverse a paging structure of an address translation system; a...
2016/0283716 System and Method for Emulation-based Detection of Malicious Code with Unmet Operating System or Architecture...
System, method and media are shown for detecting potentially malicious code by iteratively emulating potentially malicious code, that involve, for each offset...
2016/0283715 UNAUTHORIZED ACTIVITY DETECTION AND CLASSIFICATION
Systems and methods are provided for identifying and detecting unauthorized user activity and for decreasing the rate of false-positives. The disclosed systems...
2016/0283714 TECHNOLOGIES FOR CONTROL FLOW EXPLOIT MITIGATION USING PROCESSOR TRACE
Technologies for control flow exploit mitigation include a computing device having a processor with real-time instruction tracing support. During execution of...
2016/0283713 SECURITY WITHIN A SOFTWARE-DEFINED INFRASTRUCTURE
There is a method and system that includes establishing a security container that describes a workload and a set of resources that corresponds to the workload...
2016/0283712 CONTROL-FLOW INTEGRITY WITH MANAGED CODE AND UNMANAGED CODE
A data processing system (DPS) supports control-flow integrity (CFI). The DPS comprises a processing element with a CFI enforcement mechanism that supports one...
2016/0283711 eMMC Monitoring Method and Apparatus
Embodiments of the present disclosure disclose an Embedded Multi Media Card (eMMC) monitoring method and apparatus. The monitoring method includes monitoring...
2016/0283710 PATTERN INPUT APPARATUS AND METHOD, AND RECORDING MEDIUM USING THE SAME
The present disclosure discloses a pattern input apparatus and a pattern input method for user authentication. According to the present disclosure, differently...
2016/0283709 PATTERN-BASED PASSWORD WITH DYNAMIC SHAPE OVERLAY
Methods for enabling pattern-based user authentication are described. During a registration phase for establishing user credentials, an end user of a computing...
2016/0283708 IMAGE-BASED USER AUTHENTICATION
An authenticity accuracy, corresponding to a personal identification number, is determined. A device presents a correct image (or group of images) and an...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.