Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0181790 OBJECT DETECTION SYSTEM
An airborne mine countermeasure system includes a processor coupled to a memory having stored therein software instructions that, when executed by the...
2018/0181789 METHOD FOR ASSIGNING PARTICULAR CLASSES OF INTEREST WITHIN MEASUREMENT DATA
A method and system for surveying and/or metrology for assigning particular classes of interest within measurement data, wherein an assignment of at least one...
2018/0181788 FINGERPRINT IDENTIFICATION DEVICE, MOBILE DEVICE USING THE SAME AND METHOD FOR MANUFACTURING FINGERPRINT...
A fingerprint identification device and a method for manufacturing the fingerprint identification device are provided. The fingerprint identification device...
2018/0181787 TOUCH SENSOR, DISPLAY DEVICE INCLUDING THE SAME, AND OPERATING METHOD OF THE TOUCH SENSOR
An operating method of a touch sensor includes sensing first touch intensities in a first touch-sensing area by using first touch cells, sensing second touch...
2018/0181786 WHITE ILLUMINATION FOR BARCODE SCANNERS WITH IMPROVED POWER EFFICIENCY AND COST
One embodiment of a system and method for imaging objects from a barcode scanner may include generating a first color light source drive signal having a first...
2018/0181785 Detection Method and System for Characteristic Patterns of Han Xin Codes
The invention provides a detection method and system for characteristic patterns of Han Xin codes. The detection method comprises the steps: binarizing a...
2018/0181784 IMAGE CAPTURE DEVICE CAPABLE OF FORMING AIMING PATTERN ACCORDING TO SHAPE OF GRATING, AND ELECTRONIC APPARATUS...
An image capture device capable of forming an aiming pattern according to a shape of a grating includes a body, an image capture module, and a light source....
2018/0181783 ILLUMINATOR FOR DPM SCANNER
A compact illuminator for a direct part marking (DPM) scanner is provided to perform dual-field, multi-color, multi-directional, multi-distance illumination...
2018/0181782 TARGET OPTIONS FOR A DATA CAPTURE DEVICE WITH INTUITIVE AIMING INVOLVING SPECULAR OBJECTS
A presentation scanner allows an operator to easily place an object being scanned within the scanner's field of view in order to enhance usability of the...
2018/0181781 VIRTUAL WAVE DECODER FOR BLURRED IMAGES AND SUBPIXEL PERFORMANCE
A system and method for processing imaged machine readable indicia may include capturing an image of a machine readable indicia including multiple codewords. A...
2018/0181780 BOOK SORTING METHOD ON THE BASIS OF RSSI SIGNAL VALUE OF RFID TAG
A book sorting method based on RSSI signal values of RFID tags, including the following steps: reading book RFID tags placed in books by using an RFID device,...
2018/0181779 RFID DEVICE FOR DETERMINING THE OPERATING STATUS AND IDENTIFICATION OF AN ELECTRIC APPLIANCE
A device for identifying an electrical appliance when it is powered up, comprises: a current detector coupled to an electrical power supply cable of the...
2018/0181778 2D BARCODE-BASED BI-DIRECTIONAL WIRELESS TRANSMISSION SYSTEM
A 2D barcode-based bi-directional wireless transmission system includes a first apparatus and a second apparatus each including a display screen, a processing...
2018/0181777 RESTRICTING ACCESS TO A DEVICE
A computer system detects that a mobile device of a user is in a location that exceeds a threshold distance from a second device of the user. Based on at least...
2018/0181776 DETECTION OF UNAUTHORIZED USER ASSISTANCE OF AN ELECTRONIC DEVICE BASED ON THE DETECTION OR TRACKING OF EYES
Methods and systems are provided in this disclosure for operating an electronic device. The electronic device includes a user interface, a camera, and an...
2018/0181775 PHYSICAL UNCLONABLE FUNCTION (PUF) CHIP AND FABRICATION METHOD THEREOF
A physical unclonable function (PUF) chip and a fabrication method are provided. The fabrication method includes: forming an array of spaced electrode plates...
2018/0181774 ENCRYPTION ENGINE WITH AN UNDETECTABLE/TAMPER-PROOF PRIVATE KEY IN LATE NODE CMOS TECHNOLOGY
A private key of a public-private key pair with a corresponding identity is written to an integrated circuit including a processor, a non-volatile memory, and...
2018/0181773 Systems and methods for detecting data insertions in biometric authentication systems using pseudo data segments
Systems and methods of detecting an unauthorized data insertion into a stream of data segments extending between electronic modules or between electronic...
2018/0181772 ELECTRONIC DEVICE AND OPERATION METHOD THEREOF
An electronic device for de-identifying dynamic biometric data of a user and an operation method thereof are disclosed. The method includes the operations of...
2018/0181771 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM AND INFORMATION PROCESSING METHOD THAT GENERATE...
A memory stores first confidentialization-level information, which represents a confidentialization level of a first confidentialization process. A processor...
2018/0181770 Information Hiding Method and corresponding Terminal Device
An information hiding method and corresponding terminal device are provided. Terminal device sets a hiding time segment for first information to be hidden. The...
2018/0181769 DATA LOSS PREVENTION FOR AN ONLINE CONTENT MANAGEMENT PLATFORM
Disclosed are systems, methods, and non-transitory computer-readable storage media for providing content management features in a messaging service. A content...
2018/0181768 SYSTEM AND METHOD FOR THE CREATION AND MANAGEMENT OF DECENTRALIZED AUTHORIZATIONS FOR CONNECTED OBJECTS
Computing systems and methods for the creation and management of authorizations of blockchain objects. Systems and methods managed by a controlled number of...
2018/0181767 COMMUNICATING INFORMATION BETWEEN APPLICATIONS EXECUTING ON A CLIENT DEVICE VIA AUTHENTICATION INFORMATION...
An application associated with an online system executing on a client device identifies an additional application on the client device with which the...
2018/0181766 SECURED MEDIA FILE PRESENTATION
A method of encrypting a target media file that comprises using a processor of a client device associated with a sender for executing a code for: designating a...
2018/0181765 DIGITAL DATA SECURITY
Disclosed is a method enabling increasing the security of storing and archiving digital data and adjusting the security level, which level can be selected on...
2018/0181764 SYSTEM, APPARATUS AND METHOD FOR TRUSTED CHANNEL CREATION USING EXECUTE-ONLY CODE
In one embodiment, an apparatus includes a first virtual machine (VM) including an encryption logic to encrypt first information. The encryption logic may...
2018/0181763 COLLECTING AND STORING THREAT LEVEL INDICATORS FOR SERVICE RULE PROCESSING
Some embodiments of the invention provide a novel architecture for capturing contextual attributes on host computers that execute one or more machines, and for...
2018/0181762 TECHNIQUES FOR PERSISTENT FIRMWARE TRANSFER MONITORING
Techniques and computing devices for persistent firmware transfer monitoring and, more specifically, but not exclusively, to a resource filter within a...
2018/0181761 METHOD FOR RANSOMWARE IMPACT ASSESSMENT AND REMEDIATION ASSISTED BY DATA COMPRESSION
Assessing ransomware impact includes receiving an indication of a first plurality of files stored on a user device and a classification for each of the first...
2018/0181760 SECURE COMPUTATION ENVIRONMENT
A container corresponding to executable code may be received. In response to receiving the container, a container manager resident in a memory of a computation...
2018/0181759 DISTRIBUTED SECURE BOOT
Systems and methods may be used to securely booting multiple devices. A method may include initiating a boot sequence at a first device in an array of devices,...
2018/0181758 Firmware Loading for Exploit Resistance
In an embodiment, a system includes a processor and a non-volatile storage device. The non-volatile storage device may include a stored firmware program and a...
2018/0181757 FIRMWARE LOADER FOR ELECTRONIC DEVICES
In one embodiment, a request may be received to load firmware from an external component to a microcontroller of a device. The external component may be...
2018/0181756 HOST ATTESTATION
A service provider provides virtual computing services using a fleet of one or more host computer systems. Each of the host computer systems may be equipped...
2018/0181755 EXECUTION OF SOFTWARE WITH MONITORING OF RETURN ORIENTED PROGRAMMING EXPLOITS
In an embodiment, a processor comprises Return Oriented Programming (ROP) logic to: detect a first branch event at a first point in time; determine whether the...
2018/0181754 PERFORMING CONTEXT-RICH ATTRIBUTE-BASED PROCESS CONTROL SERVICES ON A HOST
Some embodiments of the invention provide a novel architecture for capturing contextual attributes on host computers that execute one or more machines, and for...
2018/0181753 PERSISTENCE PROBING TO DETECT MALWARE
A technique for detecting malware looks at startup hooks that may be created by malware to assist in ensuring that the malware is started upon a reboot of a...
2018/0181752 AUTOMATED CLASSIFICATION OF EXPLOITS BASED ON RUNTIME ENVIRONMENTAL FEATURES
Various approaches are described herein for the automated classification of exploit(s) based on snapshots of runtime environmental features of a computing...
2018/0181751 Anomaly Detection in Distributed Ledger Systems
In various implementations, a method of identifying anomalies is performed by a first network node that is configured to maintain a distributed ledger in...
2018/0181750 COMPUTER TELEMETRY ANALYSIS
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing telemetry to detect anomalous activity. One of...
2018/0181749 CYBER SECURITY
Systems and methods that use probabilistic grammatical inference and statistical data analysis techniques to characterize the behavior of systems in terms of a...
2018/0181748 HARDWARE MONITOR OF A PROCESSING UNIT STACK STRUCTURE
A hardware monitor circuit includes an electronic control circuit coupled to a processing unit. The electronic control circuit generates multi-bit protection...
2018/0181747 DYNAMIC RE-DISTRIBUTION OF DETECTION CONTENT AND ALGORITHMS FOR EXPLOIT DETECTION
A predetermined standard set of detection algorithms and content and a selected set of enhanced detection algorithms and content provide an improved technique...
2018/0181746 METHOD OF EXECUTING A SECURITY-RELEVANT APPLICATION, COMPUTER SYSTEM, AND ARRANGEMENT
A method of executing a security-relevant application on a computer system in a secured environment includes establishing a data network connection via an...
2018/0181745 METHOD AND SYSTEM FOR INTEROPERABLE IDENTITY AND INTEROPERABLE CREDENTIALS
Method, system, and programs for interoperable identity and interoperable credentials. In one example, an authentication request is received that originated...
2018/0181744 USER TRUSTED DEVICE FOR DETECTING A VIRTUALIZED ENVIRONMENT
A computer to boot from a user trusted device, the user trusted device comprising a connection interface enabling connection with said computer, the method...
2018/0181743 System For Device Authentication
Communication bus enables devices to communicate and exchange information and control signals. There is a growing concern over the security of such types of...
2018/0181742 SERVER SYSTEM, COMMUNICATION SYSTEM, COMMUNICATION TERMINAL DEVICE, PROGRAM, RECORDING MEDIUM, AND...
Provided is a network system which improves a security and prevents illegal use when providing services such as Internet banking services. A random graphic...
2018/0181741 OPPORTUNISTICALLY COLLECTING SENSOR DATA FROM A MOBILE DEVICE TO FACILITATE USER IDENTIFICATION
The inventors recently developed a system that authenticates and/or identifies a user of an electronic device based on passive factors, which do not require...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.