Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0328597 BIOMETRIC IMAGING DEVICE AND BIOMETRIC IMAGING METHOD
A biometric imaging device includes a processor that outputs an instruction of an operation position on an input device, in response to detection of a first...
2016/0328596 METHODS OF STORING A SET OF BIOMETRIC DATA TEMPLATES AND OF MATCHING BIOMETRICS, BIOMETRIC MATCHING APPARATUS...
There is provided a method of storing a set of biometric data templates, which emanates from a biometric object, among a plurality of biometric data templates,...
2016/0328595 Fingerprint Detection Apparatus, Mobile Device Using the Same and Manufacturing Method Thereof
A fingerprint detection apparatus, a mobile device using the same and a manufacturing method thereof are provided. The fingerprint detection apparatus...
2016/0328594 System and Method for Acquiring Multimodal Biometric Information
Methods, systems, and programming for user identification are presented. In one example, a system for acquiring biometric information is disclosed. The system...
2016/0328593 SENSING APPARATUS FOR DETECTING USER TOUCH
A sensing apparatus includes a substrate, N groups of sensing elements formed on the substrate, a sensing circuit and a switch control circuit. Each group of...
2016/0328592 CAPACITIVE FINGERPRINT SENSOR
On the basis of the physical principle that a capacitance value is inversely proportional to the distance between capacitive electrodes, the spatial structure...
2016/0328591 2D INDICIA POSE ESTIMATION AND CONSEQUENT GRID LOCALIZATION AND/OR SYNCHRONIZATION
Systems and methods of operation for a machine-readable symbol reader for estimating the relative position, orientation and/or distance of a scanned target...
2016/0328590 ON-SCREEN CODE STABILIZATION
Methods and systems for stabilizing an on-screen code on a display of a mobile device are described. A code is displayed on a mobile device as an on-screen...
2016/0328589 ID READING DEVICE
A device includes a recording medium housed in each of cells: an optically readable ID display part provided on a surface of the recording medium; an accessor...
2016/0328588 Systems and Methods for Reading Machine-Readable Labels on Sample Receptacles
Systems for reading machine-readable labels, for example, two-dimensional barcodes, include a housing, a reader configured to read the machine-readable labels...
2016/0328587 DRIVER'S LICENSE DETECTOR
A license detector system enables a person such as a police officer to monitor vehicles on the road to ensure drivers have valid licenses. Within each valid...
2016/0328586 Tamper Evident Point of Containment, Inventory and Accountability System and Method
The system in at least one embodiment provides a tamper evident specimen sample lock that in a further embodiment includes an embedded storage medium. They...
2016/0328585 RFID TAG EMBEDDED WITHIN A MOLDED CONNECTOR AND A TRACKING SYSTEM THEREFOR
An electrical asset for distributing power for use with a Radio Frequency Identification ("RFID") tracking system and middleware. The electrical asset includes...
2016/0328584 RADIO FREQUENCY IDENTIFICATION (RFID) TAG(S) and SENSOR(S)
A passive radio frequency identification (RFID) sensor is provided. This passive RFID sensor includes at least one antenna, at least one processing module, and...
2016/0328583 RFID READER AND METHOD FOR ADJUSTING A FRAME LENGTH OF AN RFID SYSTEM COMPRISING AN RFID READER
Embodiments provide an RFID reader. The RFID reader includes a collision detector, a decoder and a frame length adjuster. The collision detector is configured...
2016/0328582 DIAGNOSTIC TAG FOR AN INDUSTRIAL VEHICLE TAG READER
An industrial vehicle comprising a tag reader, a reader module, and a diagnostic tag, wherein the diagnostic tag is coupled to the industrial truck within a...
2016/0328581 Device for determining an amount of insulin to be injected for diabetes patients
The invention relates to a slide device (1) for ascertaining an amount of insulin to be injected, comprising portions of flat material arranged in layers,...
2016/0328580 SYSTEMS, APPARATUSES AND METHODS FOR COMPUTER SECURITY IN A COMPUTER NETWORK
A computer network includes a server and client electronic devices. Registration with a security server permits security operations to be performed on a client...
2016/0328579 USB DOCK SYSTEM AND METHOD FOR SECURELY CONNECTING A USB DEVICE TO A COMPUTING NETWORK
A Universal Serial Bus (USB) dock for connecting a USB data storage device to a computing network. The USB dock includes a chassis for coupling the USB dock to...
2016/0328578 SYSTEMS AND METHODS FOR GENERATING PHYSICALLY UNCLONABLE FUNCTIONS FROM NON-VOLATILE MEMORY CELLS
This disclosure describes techniques for generating physically unclonable functions (PUF) from non-volatile memory cells. The PUFs leverage resistance...
2016/0328577 INTEGRATION PLATFORM AND APPLICATION INTERFACES FOR REMOTE DATA MANAGEMENT AND SECURITY
Various embodiments implement a multiplatform system architected to provide secure messaging between a plurality of disparate systems (e.g., mobile devices,...
2016/0328576 INTEGRATION PLATFORM AND APPLICATION INTERFACES FOR REMOTE DATA MANAGEMENT AND SECURITY
Various embodiments implement a multiplatform system architected to provide secure messaging between a plurality of disparate systems (e.g., mobile devices,...
2016/0328575 Access Control Framework
The described implementations relate to an access control framework for a database system. One implementation can receive, from a user, a request for data that...
2016/0328574 Preventing Conflicts of Interests Between Two or More Groups
To prevent conflicts of interest, an information management system is used to make sure two or more groups are kept apart so that information does not...
2016/0328573 CENTRALIZED THROTTLING SERVICE
A method and system are provided that may centralize the management of applications that access the data of social networks via API calls. A central service...
2016/0328572 FRAUDULENT APPLICATION DETECTION SYSTEM AND METHOD OF USE
The present invention provides a system and a method for detecting or determining a possible fraudulent information provided by a subject using the subject's...
2016/0328571 METHOD FOR EXECUTING A SAFETY-CRITICAL FUNCTION OF A COMPUTING UNIT IN A CYBER-PHYSICAL SYSTEM
A method for executing a safety-critical function of a computing unit in a cyber-physical system, a request being received for the execution of the...
2016/0328570 DOCUMENT PROVIDING METHOD AND APPARATUS
Disclosed are a document providing method and apparatus. The method comprises: receiving an access request to a target document that is sent by a user;...
2016/0328569 TERMINAL DEVICE AND METHOD FOR PROTECTING INFORMATION THEREOF
A method for protecting information of a terminal device is provided. The method for protecting information of a terminal device includes: displaying a UI...
2016/0328568 VERIFICATION TECHNIQUES FOR ENHANCED SECURITY
In an example, a method includes obtaining an expected biological sample value at a computing device. The expected biological sample value indicates an...
2016/0328567 XOR-BASED SCRAMBLER/DESCRAMBLER FOR SSD COMMUNICATION PROTOCOLS
Example embodiments for descrambling and scrambling a memory channel comprise: executing a training mode for the memory device to discover XOR vectors used by...
2016/0328566 SYSTEMS AND METHODS FOR OPTIMIZED IMPLEMENTATION OF A DATA WAREHOUSE ON A CLOUD NETWORK
Systems and methods for optimized implementation of a data warehouse on a cloud network are disclosed. In one embodiment, a method comprises receiving, by a...
2016/0328565 Arbitrary Code Execution and Restricted Protected Storage Access to Trusted Code
A method comprises signing boot code with a public/private cryptographic key pair, and writing to storage the boot code, the public cryptographic key, and the...
2016/0328564 UNIFIED EXTENSIBLE FIRMWARE INTERFACE (UEFI) CREDENTIAL- BASED ACCESS OF HARDWARE RESOURCES
Systems and methods for Unified Extensible Firmware Interface (UEFI) credential-based access of hardware resources. In an illustrative, non-limiting...
2016/0328563 DETECTING MALICIOUS COMPUTER CODE IN AN EXECUTING PROGRAM MODULE
Determining if a computer program is malicious. The program is loaded for execution into the memory of the computer. A list of program instructions of interest...
2016/0328562 COMPUTING PLATFORM SECURITY METHODS AND APPARATUS
Computing platform security methods and apparatus are disclosed. An example apparatus includes a security application to configure a security task, the...
2016/0328561 HARDENED EVENT COUNTERS FOR ANOMALY DETECTION
A collection of techniques allow for the detection of covert malware that attempts to hide its existence on a system by leveraging both trusted hardware event...
2016/0328560 System and Method for Detection of Omnientrant Code Segments to Identify Potential Malicious Code
Methods, systems and media are shown for detecting omnientrant code segments to identify potential malicious code involving, for each offset of a code segment,...
2016/0328559 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PROTECTING SOFTWARE VIA CONTINUOUS ANTI-TAMPERING AND...
Method, system and computer program product for applying existing anti-tampering and obfuscation techniques to virtual machine technology and offers several...
2016/0328558 COMPUTING DEVICE FOR SECURED TRANSACTIONS AND VIRTUAL MONITORING EXTERNAL FROM THE OPERATING SYSTEM
A secure computer for secure transactions that includes an operating system, a processor, an identity security module, and a loss protection device. The...
2016/0328557 Method and System for Log Aggregation
Systems and methods for aggregating one or more log records are provided. An example method includes receiving an indication that a request has been completed....
2016/0328556 Network operations center and appliance host in a single machine.
System and method of a single machine or cluster of machines acting as a single machine that simplifies and consolidates the hosting of appliances using...
2016/0328555 System and Method for Securing Embedded Controller Communications by Verifying Host System Management Mode...
An information handling system includes a processor operable to provide a branch trace message, and an embedded controller coupled to the processor via a...
2016/0328554 INTEGRATED CIRCUIT ACCESS
A method provides access to an integrated circuit which may comprise a storage containing an unalterable first security key and a memory containing a second...
2016/0328553 VARIABLE IMAGE PRESENTATION FOR AUTHENTICATING A USER
Facilities are provided herein for authenticating a user to use a processing device. A user predefines authenticators of one or more types and associates these...
2016/0328552 Fraud Resistant Passcode Entry System
A method for user passcode authentication. The method includes accessing a user information database with predefined user input option parameters and...
2016/0328551 CLIENT PROFILE AND SERVICE POLICY BASED CAPTCHA TECHNIQUES
Captcha techniques for detecting if a client device is operating under control of a human user based upon a client profile and service policy when matching a...
2016/0328550 CONTROLLING AUTHORIZATION WITHIN COMPUTER SYSTEMS
Techniques for controlling the provision of data to a requester use a local device communicating with a personal computing device. The personal computing...
2016/0328549 AUTHENTICATION METHOD AND APPARATUS THEREOF
A method and an authentication apparatus are provided by the embodiments of the present disclosure. In the embodiments of the present disclosure, data to be...
2016/0328548 System and Method for Identifying Speakers
An electronic challenge system is used to control access to resources by using a spoken test to identify an origin of a voice. The test is based on a series of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.