Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0053026 SIMPLE CODE READER
Embodiments of the present disclosure provide code readers for reading codes provided as patterns imprinted on objects. Light interacts with a pattern by e.g....
2018/0053025 EVENT BASED INTERROGATION ZONE TRACKING SYSTEM FOR PRODUCT SAMPLES
The invention provides a temporary installation of a system of RFID-based terminals and user-worn RFID devices within an event interrogation zone. At an event,...
2018/0053024 READING APPARATUS
According to one embodiment, a reading apparatus for reading a wireless tag includes a housing having a chamber and an opening providing an entrance to the...
2018/0053023 EXTERNAL OPERATION CONTROL DEVICE, ARTICLE POSITION ACQUIRING SYSTEM, AND ARTICLE POSITION AQUIRING METHOD
A control device for wireless tags which are respectively attached to a plurality of articles supported respectively on a plurality of support portions and...
2018/0053022 READING DEVICE AND CONTROL PROGRAM FOR READING DEVICE
A reading device includes an antenna having a signal radiating surface and configured to output a linearly polarized wave from the radiating surface, a movable...
2018/0053021 AUGMENTED REALITY MEMORIAL
Some embodiments are directed to information systems, assemblies and funerary markers employing augmented reality for the commemoration of deceased...
2018/0053020 INFORMATION CODE IMAGE DISPLAY SYSTEM, INFORMATION CODE IMAGE DISPLAY TERMINAL, INFORMATION CODE IMAGE DISPLAY...
An information code image display system includes an area specifying part, an image generation part, and a display controller. The area specifying part...
2018/0053019 TECHNIQUES OF IMPROVING KVM SECURITY UNDER KVM SHARING
In an aspect of the disclosure, a method, a computer-readable medium, and an apparatus are provided. The apparatus may be a service processor. The service...
2018/0053018 METHODS AND SYSTEMS FOR FACILITATING SECURED ACCESS TO STORAGE DEVICES
The present disclosure discloses methods and systems for facilitating secured access to storage devices. The method includes receiving a request for access to...
2018/0053017 PROGRAMMABLE LOGIC DEVICE, INFORMATION PROCESSING APPARATUS, AND PROCESSING METHOD
A programmable logic device includes: an encryption unit configured to encrypt data based on a process of an arithmetic processing unit and first checking data...
2018/0053016 VISUALLY CONFIGURABLE PRIVACY ENFORCEMENT
A method is disclosed including presenting via a graphical user interface of an application at least one element that is activatable to specify a source of...
2018/0053015 TECHNIQUE FOR DATA LOSS PREVENTION THROUGH CLIPBOARD OPERATIONS
Techniques describe preventing sensitive data from being misappropriated during a clipboard operation. A copy operation for data being copied to a clipboard is...
2018/0053014 METHOD AND DEVICE FOR ENCRYPTING OR DECRYPTING CONTENT
A wearable device includes a user information obtainer configured to obtain user information, a controller configured to selectively generate, in response to a...
2018/0053013 METHOD AND SYSTEM FOR PROTECTING PERSONAL INFORMATION BASED ON MOBILE TERMINAL AND THE MOBILE TERMINAL
The present disclosure provides a method for protecting personal information based on a mobile terminal including establishing and storing a new content...
2018/0053012 SYSTEM AND METHOD FOR ENABLING A MULTI-LOCATION DATA STORAGE AND RETRIEVAL SYSTEM
A system and method for storing data in multiple locations on the basis of rules maintained by the system. The invention can enable data management,...
2018/0053011 SECURE ACCESS DEVICE
The technology relates to securely providing patient data to caretakers. Verification information from one or more patients may be received by one or more...
2018/0053010 SYSTEM AND METHOD OF ENCRYPTING FOLDER IN DEVICE
Provided are a system and method of encrypting a folder in a device. The device for controlling access to the folder includes a communication part configured...
2018/0053009 METHOD FOR SECURE DATA MANAGEMENT IN A COMPUTER NETWORK
A method for secure data management in a computer network includes automatically calculating a key from a predetermined number of key fragments of a...
2018/0053008 FORMAT PRESERVING ENCRYPTION
Encrypting data without losing their format is important in computing systems, because many parties using confidential data rely on systems that require...
2018/0053007 NETWORK COMMUNICATION STACK FOR DATABASE CONTROL AND RESOURCE PLANNING
A network communication stack running on relational processing circuitry performs control and maintenance actions on records from a database server managed by...
2018/0053006 PRIMARY DEVICE, AN ACCESSORY DEVICE, AND METHODS FOR PROCESSING OPERATIONS ON THE PRIMARY DEVICE AND THE...
In accordance with an aspect of the present disclosure, a method for encrypting/hiding or decrypting/unhiding a target object on a device is provided. The...
2018/0053005 METHOD AND SYSTEM FOR SECURE DEVICE BASED BIOMETRIC AUTHENTICATION SCHEME
A method for device based biometric authentication includes: storing, in a computing device, an encrypted biometric template; storing, in a first memory of the...
2018/0053004 SYSTEMS AND METHODS FOR DUAL-PORTED CRYPTOPROCESSOR FOR HOST SYSTEM AND MANAGEMENT CONTROLLER SHARED...
In accordance with these and other embodiments of the disclosure, an information handling system may include a host system comprising a host system processor,...
2018/0053003 SELECTIVELY OBFUSCATING A PORTION OF A STREAM OF VISUAL MEDIA THAT IS STREAMED TO AT LEAST ONE SINK DURING A...
In an embodiment, a Source is engaged in a screen-sharing session with at least one Sink whereby the Source is streaming a version of media being displayed at...
2018/0053002 ATTACK ASSESSMENT IN A VIRTUALIZED COMPUTING ENVIRONMENT
A computer implemented method to determine whether a target virtual machine (VM) in a virtualized computing environment is susceptible to a security attack,...
2018/0053001 SECURITY FIX OF A CONTAINER IN A VIRTUAL MACHINE ENVIRONMENT
A method, a computer program product, and a computer system for a security fix of a container in a VM (virtual machine) environment. A computer detects a...
2018/0053000 IMPLEMENTING LOCALE MANAGEMENT ON PAAS: LOCALE REPLACEMENT RISK ANALYSIS
A method and apparatus are provided for implementing system locale management including locale replacement risk analysis in a computer system. A Locale Update...
2018/0052999 Domain-Specific Hardwired Web Browser Machine
A domain-specific hardwired symbolic web browser machine is described that processes information via the hardwired mapping of symbols from one or more domains...
2018/0052998 Fine-Grained Analysis and Prevention of Invalid Privilege Transitions
A computer-implemented method for analyzing operations of privilege changes is presented. The computer-implemented method includes inputting a program and...
2018/0052997 DETERMINING WHETHER PROCESS IS INFECTED WITH MALWARE
Example implementations relate to determination as to whether a process is infected with malware. For example, in an implementation, information of a process...
2018/0052996 DETECTING UNAUTHORIZED REMOTE ADMINISTRATION USING DEPENDENCY RULES
Disclosed are a system and method for protecting computers from unauthorized remote administration. One exemplary method includes: intercepting events...
2018/0052995 AUTOMATED BLACKBOX INFERENCE OF EXTERNAL ORIGIN USER BEHAVIOR
Methods and systems for security analysis include determining whether a process has an origin internal to a system or external to the system using a processor...
2018/0052994 USER ACTIVITY MONITORING
Systems and methods are disclosed for associating an entity with a risk score that may indicate a security threat associated with the entity's activity. An...
2018/0052993 METHOD AND SYSTEM FOR ANALYZING RISK
The present invention provides a method, system and computer program product for analyzing risks, for example associated with potential data leakage. Risk for...
2018/0052992 AUTO-SANDBOXING WEBSITE OR PARTS OF WEBSITE IN BROWSER TO PROTECT USER PRIVACY AND SECURITY
Methods and devices for processing web content are disclosed. The method may include receiving a webpage with a browser and parsing the webpage with the...
2018/0052991 APPARATUS, METHOD AND ARTICLE TO FACILITATE AUTOMATIC DETECTION AND REMOVAL OF FRAUDULENT USER INFORMATION IN A...
A fraud detection system may obtain a number of known fraudulent end-user profiles and/or otherwise undesirable end-user profiles. Using statistical analysis...
2018/0052990 PASSWORD CHECK BY DECOMPOSING PASSWORD
A proposed password is decomposed into basic components to determine and score transitions between the basic components and create a password score that...
2018/0052989 ORAL AUTHENTICATION MANAGEMENT
A user manages security of one or more user devices by manipulating one or more sensors located in the user's mouth in a predetermined pattern corresponding to...
2018/0052988 INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM
An information processing system includes a data acquisition unit that acquires time-series data related to power consumption of a device, a specification unit...
2018/0052987 SERVER SYSTEM AND METHOD FOR CONTROLLING MULTIPLE SERVICE SYSTEMS
Each of one or more information element groups as for each user in management information kept by a server system (C.sup.(j)) includes mID (an ID that is...
2018/0052986 GESTURE BASED CAPTCHA TEST
One embodiment a method, including: providing, using a processor, a user challenge over a network, wherein the user challenge is associated with a ...
2018/0052985 ENHANCED ACCURACY OF USER PRESENCE STATUS DETERMINATION
Technologies are described herein for enhancing a user presence status determination. Visual data may be received from a depth camera configured to be arranged...
2018/0052984 EVALUATION DEVICE, EVALUATION METHOD, AND COMPUTER-READABLE NON-TRANSITORY MEDIUM
An evaluation device includes: a memory; and a processor coupled to the memory and the processor configured to execute a process, the process comprising:...
2018/0052983 PULSE SENSORS FOR BIOMETRIC IDENTIFICATION
One embodiment provides a method, including: obtaining, using one or more pulse sensors, user pulse data from two or more points; and identifying, using a...
2018/0052982 SITTING POSTURE FOR BIOMETRIC IDENTIFICATION
One embodiment provides a method, including: obtaining, using one or more sensors disposed in a seat, user posture data; and identifying, using a processor, a...
2018/0052981 SYSTEMS AND METHODS FOR IMPROVING KBA IDENTITY AUTHENTICATION QUESTIONS
Certain implementations include systems and methods for improving knowledge-based-authentication (KBA) identity authentication questions. A method is provided...
2018/0052980 METHOD FOR DISTRIBUTION OF LICENSES BASED ON GEOGRAPHICAL LOCATION
Systems and methods for distributing software licenses based on geographical location are provided. In one exemplary embodiment, a method performed by a local...
2018/0052979 SIMULATION METHOD FOR POLYMER MATERIAL
A simulation method for analyzing a breakage of a molecular chain of a polymer material using a computer comprises: defining a polymeric material model by...
2018/0052978 DISTRIBUTED COMPUTING SYSTEM FOR BLOOD PROCESSING PROCEDURES
A distributed computing system for managing blood processing procedures in a blood processing facility includes a system server, a plurality of computerized...
2018/0052977 Systems and Methods For Monitoring Compliance With Chronic Disease Prevention Programs
Systems and methods are provided for facilitating the delivery of chronic disease prevention programs. The method includes: receiving an electronic record for...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.