Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0300098 DATA PROCESSING METHOD AND SYSTEM
A data processing method and system are disclosed for processing hyperspectral image data of a scene for locating targets within the scene. The method...
2016/0300097 METHODS AND SYSTEMS FOR CAPTURING BIOMETRIC DATA
A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an...
2016/0300096 FINGER PRINT SENSOR AND MANUFACTURING METHOD THEREOF
A fingerprint sensor device and a method of making a fingerprint sensor device. As non-limiting examples, various aspects of this disclosure provide various...
2016/0300095 ELECTRONIC DEVICE COMPRISING FINGERPRINT SENSOR
The present invention relates to an electronic device comprising a capacitive fingerprint sensor having a fingerprint sensing surface forming part of an...
2016/0300094 SKIN TEXTURE COLLECTION AND IDENTITY RECOGNITION METHOD AND SYSTEM
This application discloses a skin texture collection and identity recognition method. The method includes: collecting a skin texture image of a user;...
2016/0300093 SYSTEM FOR CAPTURING A CODED IMAGE
An aimer module for a mobile device and method of use is provided. The aimer module advantageously collimates diffuse light from a lamp on a mobile device for...
2016/0300092 OPTICAL ACCESSORY FOR ATTACHMENT TO MOBILE DEVICE
An attachment assembly for use with a mobile device with a camera or a case for the mobile device can include one or more of an attachment base and an...
2016/0300091 OPTICAL CODE READING SYSTEM WITH DYNAMIC IMAGE REGIONALIZATION
In a method and system for acquiring image data for detection of optical codes located on objects carried by a conveyor system, a conveyor system has an imager...
2016/0300090 AIMER ACCESSORY FOR CAPTURING A CODED IMAGE
An aimer accessory for a mobile device and method of use is provided. The accessory includes a body configured for being affixed to the mobile device. The body...
2016/0300089 SYSTEM AND METHOD FOR IDENTIFYING LOCATIONS OF MOBILE ELEMENTS IN A FACILITY WITH A NUMBER OF REGIONS
A system for identifying respective locations of mobile elements in a number of regions. The system includes a number of board RFID tags, each of which is...
2016/0300088 COMMUNICATION DEVICE AND SYSTEM
The present invention relates to a communication method, device, and system. The communication method include using low-frequency alternating magnetic field...
2016/0300087 COMMUNICATIONS SYSTEM FOR AIRCRAFT
Methods for communicating between a near field device and a near field reader, near field readers, and systems for near field device reading on an airplane are...
2016/0300086 RECEIVER UNIT FOR AN RF TAG
The present invention concerns a receiver unit comprising a first and a second input terminal to which are connected an antenna, a communication stage adapted...
2016/0300085 GROUPING TRANSPONDERS
Methods and systems of processing transponder signals received from transponders to identify the transponders are provided. A first signal including a first...
2016/0300084 CARD READER
A card reader may include a plurality of IC contact points to communicate data with a card; an IC contact block holding the plurality of the IC contact points;...
2016/0300083 INTEGRATED CIRCUIT, DIAGNOSTIC SYSTEM AND DIAGNOSTIC METHOD
An integrated circuit is one that performs radio communication with an external apparatus and includes a processing circuit, a diagnostic circuit configured to...
2016/0300082 ACCESSORY, ELECTRONIC APPARATUS AND SYSTEM FOR ACCESSORY CERTIFICATION
An accessory, an electronic apparatus and a system for accessory certification is disclosed. The accessory comprises an encryption chip, with the encryption...
2016/0300081 ACTIVATING AN ELECTRONIC PRIVACY SCREEN DURING DISPLAY OF SENSITVE INFORMATION
One embodiment provides a method including: receiving, on a display device, a request to display data; detecting, using a processor, a factor indicating a need...
2016/0300080 METHODS AND SYSTEMS FOR SECURING STORED INFORMATION
Methods and systems for securing information are provided. The method includes generating a hash key by an input/output (I/O) processing module interfacing...
2016/0300079 Method and Device for Processing Hidden File Folder, and Terminal
Provided are a method, device for processing a hidden file folder, and a terminal. The method comprises that: an application icon to which the hidden file...
2016/0300078 ELECTRONIC PREEMPTIVE EVIDENTIARY ESCROW PLATFORM
The system and method described herein provide mechanisms by which connected devices and/or internal subsets of devices can be used to implement an electronic...
2016/0300077 PERSONAL IDENTIFICATION NUMBER DISTRIBUTION DEVICE AND METHOD
The method of distributing a personal identification number to a user of a financial instrument associated with the personal code includes: a step of sending...
2016/0300076 PRIVACY AUTHORITY MANAGEMENT METHOD AND DEVICE
Disclosed is a privacy authority management method, including: when a service that needs to use a privacy authority in an operating system is triggered,...
2016/0300075 SYSTEMS AND METHOD FOR OBFUSCATING DATA USING DICTIONARY
At least some aspects of the present disclosure feature systems and methods for obfuscating data. The method includes the steps of: receiving an input data...
2016/0300074 DATA PROTECTION BASED ON USER INPUT DURING DEVICE BOOT-UP, USER LOGIN, AND DEVICE SHUT-DOWN STATES
A computing device is described herein that automatically enters a data protection mode in response to the detected presence or absence of certain user input...
2016/0300073 SYSTEM AND METHOD FOR ONLINE KEY ROTATION
The system may comprise receiving a data element, and receiving an encryption key and an associated encryption key identifier from an encryption keystore...
2016/0300072 DEVICE, METHOD, AND GRAPHICAL USER INTERFACE FOR ACCESSING AN APPLICATION IN A LOCKED DEVICE
A device with a touch sensitive display and a plurality of applications, including a camera application, while the device is in a locked, passcode-protected...
2016/0300071 METHOD FOR PROTECTING CLOUD STORAGE VIDEO DATA AND SYSTEM THEREOF
A method for protecting video data stored in a cloud and a system thereof. The method comprises the following steps: when video data needs to be protected,...
2016/0300070 SECURE CONTENT SHARING
Technologies for sharing secure content include a source computing device to determine a content use policy for content of the source computing device. The...
2016/0300069 DATA SANITIZATION
Data sanitization comprises tracking at least one block being freed from a file when an action is performed on the file to remove data. Further, it is...
2016/0300068 System and Method to View Encrypted Information on a Security Enabled Display Device
A secure display device includes a display and a decoder. The secure display device receives encoded content that includes information that encodes a secure...
2016/0300067 Protecting Personal Data
Personal information related to calls is protected from disclosure. Mobile location data may be useful for profiling users of mobile devices. However,...
2016/0300066 DIRECTED EXECUTION OF DYNAMIC PROGRAMS IN ISOLATED ENVIRONMENTS
A test object that includes at least one computer program that includes dynamic executable code is obtained. The at least one computer program is transformed...
2016/0300065 Program Vulnerability Identification
In one embodiment, a system for identifying and tracking application vulnerabilities includes an interface, a processor, and a memory. The interface is...
2016/0300064 SECURE PROCESSOR FOR SOC INITIALIZATION
An embedded system includes an interface to an external peripheral device storing secure boot code and a secure boot controller. The secure boot controller...
2016/0300063 SOFTWARE VULNERABILITIES DETECTION SYSTEM AND METHODS
This invention teaches a system and methods of detecting software vulnerabilities in a computer program by analyzing the compiled code and optionally the...
2016/0300062 VIRUS CO-PROCESSOR INSTRUCTIONS AND METHODS FOR USING SUCH
Circuits and methods for detecting, identifying and/or removing undesired content are provided. According to one embodiment, a system includes a co-processor...
2016/0300061 DYNAMICALLY OPTIMIZING PERFORMANCE OF A SECURITY APPLIANCE
A device may identify a set of features associated with the unknown object. The device may determine, based on inputting the set of features into a threat...
2016/0300060 SOFTWARE SECURITY VIA CONTROL FLOW INTEGRITY CHECKING
Various technologies related to control flow integrity checking are described herein and can be used to greatly improve software security. During static...
2016/0300059 RISK ASSESSMENT MODELING
One or more techniques and/or systems are provided for risk assessment. Historical authentication data and/or compromised user account data may be evaluated to...
2016/0300058 SYSTEM AND METHOD FOR AUTOMATED DATA BREACH COMPLIANCE
Computer-implemented methods and systems for data breach compliance are disclosed. Organization related information may be received. Breach information...
2016/0300057 PROGRAM PROTECTION DEVICE
Disclosed is a device for protection a program. The device includes a protection domain unit including an encrypted protection domain, a start point display unit...
2016/0300056 Processor, Processing Device, and Method for Creating Program
An object of the present invention is to provide a technique to reliably prevent execution of a malicious program due to a buffer overflow. In the present...
2016/0300055 LIMITING ENTERPRISE APPLICATIONS AND SETTINGS ON DEVICES
Registering a computer system for use in an enterprise. A method includes receiving, from a device management infrastructure of the enterprise, an executable...
2016/0300054 DEVICE, SYSTEM, AND METHOD OF THREE-DIMENSIONAL SPATIAL USER AUTHENTICATION
Devices, systems, and methods of user authentication. A system includes a spatial challenge unit to distinguish between a human user and a non-human user. The...
2016/0300053 COMPARING REAL-TIME MOVEMENTS TO PATTERN PROFILE BACKGROUND
Examples of comparing real-time movements to a pattern profile are disclosed. In one example implementation according to aspects of the present disclosure, a...
2016/0300052 PORTABLE ELECTRONIC DEVICE WITH SECURITY SYSTEM
A PED configured to record and monitor access attempts and a method of recording and monitoring attempts to access a PED are provided. The PED includes a...
2016/0300051 CONTENT PROTECTION SYSTEM USING BIOMETRIC AUTHENTICATION
The present disclosure is directed to a content protection system using biometric authentication. In general, a user may be authenticated using sensed...
2016/0300050 VERIFYING A USER WITH BIOMETRIC DATA
A system and method of verifying a biometric variable of a handheld wireless device user includes: receiving at a wireless device a biometric variable measured...
2016/0300049 MACHINE-LEARNING BEHAVIORAL ANALYSIS TO DETECT DEVICE THEFT AND UNAUTHORIZED DEVICE USAGE
The disclosure relates to machine-learning behavioral analysis to detect device theft and unauthorized device usage. In particular, during a training phase, an...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.