Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0060626 OPTICAL IMAGING DEVICES AND METHODS
The present invention relates to optical imaging devices and methods for reading optical codes. The image device comprises a sensor, a lens, a plurality of...
2018/0060625 METHODS, SYSTEMS AND APPARATUS FOR DETECTING OBJECT LOCATION AND GENERATING ALERTS
Methods, systems and apparatus for detecting object location and generating alerts are disclosed herein. An example disclosed method includes determining an...
2018/0060624 FRACTAL PLASMONIC SURFACE READER ANTENNAS
Plasmonic-surface antenna systems are described in which resonators, or cells, are closely arranged but do not touch. At least a portion of a radiating surface...
2018/0060623 SYSTEMS AND METHODS FOR CONSUMER PRODUCT ORGANIZATION AND PACKING
Systems, methods, and articles of manufacture provide for improved consumer product organization and packing.
2018/0060622 RFID APPARATUS AND METHOD FOR COMPARTMENT OCCUPANCY DETECTION IN A SHELF
An RFID apparatus for compartment occupancy detection in a shelf, the RFID apparatus including an antenna, an RF transceiver connected to the antenna and a...
2018/0060621 CONTAINER WITH A DETECTION SYSTEM
A portable container (2) for one or more articles (16) each tagged with a respective Radio Frequency Identification (RFID) device (18). The container (2)...
2018/0060620 METHOD OF GENERATING CODES FOR ANIMAL MARKING
A method of generating animal identification codes is described. A first and second number are selected, then each number is compared respectively against...
2018/0060619 IMPLICITLY CONFIRMING ITEM MOVEMENT
Disclosed are various embodiments for implicitly confirming movement of an item in a materials handling facility. In one embodiment, a radio-frequency...
2018/0060618 Device with RFID Window That Couples to the Mouth of a Shopping Cart or Another Container and Method of...
Device with RFID radio frequency identification window that couples to the mouth of a shopping cart, or another container, that includes a frame with a window...
2018/0060617 OBJECT TRACKING USING ENHANCED VIDEO SURVEILLANCE THROUGH A DISTRIBUTED NETWORK
Tracking a tagged object may include receiving, using a first processor, a first video of an object tagged with a radio frequency identification (RFID) tag and...
2018/0060616 Method for Configuring a Communication Module of at Least One Radio-Frequency Identification (RFID) Reader and...
A method for configuring a communication module of at least one RFID reader that is connected via the communication module to a communication network, wherein...
2018/0060615 STRESS SENSITIVE RADIO FREQUENCY IDENTIFICATION TAG
There is provided a Radio Frequency Identification tag that is sensitive to stress induced in a component to which the tag is coupled. In some embodiments, the...
2018/0060614 ID READER AND MONITORING EQUIPMENT
An ID reader, comprising: a base (1); a connecting frame (4) that is rotatably connected with the base (1) and rotates around a first axial line; and a reader...
2018/0060613 INTRUSION-PROTECTED MEMORY COMPONENT
Intrusion-protected memory-containing assembly including a substrate, a data storage component and processor on the substrate, and a chassis intrusion detector...
2018/0060612 DISTRIBUTED STORAGE WITH DATA OBFUSCATION AND METHOD FOR USE THEREWITH
A processing module of a dispersed storage network determines an obfuscation method is determined from a plurality of obfuscation methods for a data segment....
2018/0060611 APPARATUS AND METHOD FOR CROSS ENCLAVE INFORMATION CONTROL
A method for cross enclave information control is provided including causing the transmission of an information packet between a plurality of information...
2018/0060610 PROTECTING APPLICATION PROGRAMS FROM MALICIOUS SOFTWARE OR MALWARE
A computer system, includes a crypto mechanism that decrypts and integrity-checks Secure Object information as the Secure Object information moves into the...
2018/0060609 POLICIES FOR SECRETS IN TRUSTED EXECUTION ENVIRONMENTS
A computing device executes one or more trusted execution environment (TEE) processes in a TEE of a processor. The one or more TEE processes cryptographically...
2018/0060608 AUTHENTICATION AND SECURE TRANSMISSION OF DATA BETWEEN SIGNATURE DEVICES AND HOST COMPUTERS USING TRANSPORT...
A transport layer security (TLS) connection is established between a signature device and the host computer via an interface (e.g., a universal serial bus...
2018/0060607 Anti-Rollback Version Upgrade in Secured Memory Chip
A secured storage system includes a non-volatile memory and a controller. The non-volatile memory is configured to store a first data item and a respective...
2018/0060606 VIRTUAL REALITY SYSTEM FOR PROVIDING SECURED INFORMATION
A virtual reality (VR) or augmented reality (AR) system can be implemented for providing secured access to information and that is navigable using head or eye...
2018/0060605 IMAGE OBFUSCATION
A method to obfuscate images is provided. The method may include a monitoring engine determining which images and regions of images need to be obfuscated. The...
2018/0060604 PERFORMING SECURE QUERIES FROM A HIGHER SECURITY DOMAIN OF INFORMATION IN A LOWER SECURITY DOMAIN
A method generates, in a higher security domain (SD), public and secret keys using a first homomorphic encryption scheme (HES), passes the public key to a...
2018/0060603 FINE-GRAINED ACCESS CONTROL FOR DATA MANIPULATION LANGUAGE (DML) OPERATIONS ON RELATIONAL DATA
Embodiments allow, within database security policies, the grant of data change operation-specific privileges to particular users to be applied within...
2018/0060602 ABSTRACTIONS AND AUTOMATION FOR ENHANCED SHARING AND COLLABORATION
The present invention provides methods for using abstractions of people, including dynamic and static groups of people, to enhance the efficiency of the...
2018/0060601 LOCATION-BASED ACCESS CONTROL OF SECURED RESOURCES
Techniques described herein provide location-based access control to secured resources. Generally described, configurations disclosed herein enable a system to...
2018/0060600 SECURE STORAGE DECRYPTION SYSTEM
A system for secure retrieval of stored data includes an encrypted key database and a processor. The encrypted key database is configured to store an encrypted...
2018/0060599 CONDITIONAL DISCLOSURE OF INDIVIDUAL-CONTROLLED CONTENT IN GROUP CONTEXTS
Methods, apparatus, systems, and computer-readable media are provided for interactive assistant modules to safely access and provide restricted content in...
2018/0060598 Digital Rights Management using Geographic and Temporal Traits
Digital rights management using geographic and temporal traits is described. In one or more implementations, a digital medium environment is configured to...
2018/0060597 SYSTEMS AND METHODS FOR ZERO-KNOWLEDGE ENTERPRISE COLLABORATION
Systems and methods for zero-knowledge enterprise collaboration are provided herein. In some embodiments, the method may comprise receiving, at a host server,...
2018/0060596 SECURE STORAGE AUDIT VERIFICATION SYSTEM
A system for secure storage audit verification includes a transaction pool and a processor. The processor is configured to verify a transaction stored in the...
2018/0060595 EXTENSIBLE TOKEN-BASED AUTHORIZATION
A system and method for granting a user access to one or more resources managed by one or more resource servers may include authenticating a user of an...
2018/0060594 DATA PROCESSING SYSTEM
A data processing system is provided with a data verification system that is configured to perform a validation check upon receipt of a request from a field...
2018/0060593 SYSTEM AND METHOD FOR FAST PROBABILISTIC QUERYING ROLE-BASED ACCESS CONTROL SYSTEMS
A method includes extracting from a computer-based system, (e.g., a role-based access control system) information identifying users and information identifying...
2018/0060592 AUTOMATIC PARAMETER VALUE GENERATION
Automatic parameter value generation is disclosed. It is determined that a parameter value generation trigger associated with a parameter has occurred. A...
2018/0060591 Computing Device Protection Based On Device Attributes And Device Risk Factor
A computing device communicates a request to a risk determination system to determine whether particular content is malware. The content is oftentimes a file...
2018/0060590 SYSTEMS AND METHODS FOR VALIDATING AUXILIARY POWER UNIT OR COMPONENTS BY SECURE PIN ONE TIME PASSWORD
Systems and methods are provided for validating a vehicle component. The system includes a vehicle electronic control unit (ECU) in electronic communication...
2018/0060589 APPARATUS AND ASSOCIATED METHOD FOR AUTHENTICATING FIRMWARE
An apparatus comprising: a firmware authentication element configured to, based on received firmware and predetermined cryptographic authentication...
2018/0060588 OPERATING SYSTEM
Among other things, a guest operating system is refreshed from a master image of the guest operating system repeatedly in connection with use of one or more...
2018/0060587 AGGREGATING SERVICE DATA FOR TRANSMISSION AND RISK ANALYSIS
Methods, systems, and computer-readable storage media for risk identification of service data using operations of determining, by a client-side computing...
2018/0060586 Security Monitoring with Progressive Behavioral Query Language Databases
Automated security systems and methods include a set monitored systems, each having one or more corresponding monitors configured to record system state...
2018/0060585 SYSTEM FOR PROGRAM COUNTER ENCRYPTION
A method and system for protecting a device against return oriented programming attacks by encrypting a central processing unit (CPU) program counter value...
2018/0060584 Securing Code Execution in a Network Environment
Systems and methods for restricting code execution to a subset of language, runtime and instruction set capabilities. The subset of capabilities is preselected...
2018/0060583 Application Behavior Information
Described herein are various technologies pertaining to providing information to a user regarding behavior of a potentially unwanted application. In response...
2018/0060582 SECURE CONFIGURATION IN A VIRTUALIZED COMPUTING ENVIRONMENT
A computer implemented method to determine a configuration of a target virtual machine (VM) in a virtualized computing environment to protect against a...
2018/0060580 TRAINING A MACHINE LEARNING MODEL FOR CONTAINER FILE ANALYSIS
In one respect, there is provided a system for training a machine learning model to detect malicious container files. The system may include at least one...
2018/0060579 Detecting Malware by Monitoring Execution of a Configured Process
Described herein are various technologies pertaining detecting malware by monitoring execution of an instrumented process. An anti-malware engine can observe...
2018/0060578 MAGNETIC STRIPE CARD ANTI-HACKING METHOD AND DEVICE
A magnetic stripe (MS) card anti-hacking device provided in a financial service apparatus including an MS card reader includes a sensor detecting whether an...
2018/0060577 RENDER ENGINE, AND METHOD OF USING THE SAME, TO VERIFY DATA FOR ACCESS AND/OR PUBLICATION VIA A COMPUTER SYSTEM
A method and system to verify active content at a server system include receiving, at the server system a communication (e.g., an e-mail message or e-commerce...
2018/0060576 DETECTING MALICIOUS CODE IN SECTIONS OF COMPUTER FILES
A training data set for training a machine learning module is prepared by dividing normal files and malicious files into sections. Each section of a normal...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.