Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0189537 FINGERPRINT SENSING CIRCUIT AND ELECTRICAL DEVICE
The fingerprint sensing circuit including sensing electrodes, switches, a sensing line and flip flops. First terminals of the switches are respectively coupled...
2018/0189536 QR CODE GENERATION METHOD AND SYSTEM
The present invention relates to the field of data processing, in particular to a QR code generation method and system. A QR code is generated according to a...
2018/0189535 Item Having Barcode, Data Processing Device, Data Processing Method, and Merchandise Quality Management Method
Provided is means for obtaining required data, despite there being only one kind of reading device or one kind of reading method for a plurality of item types....
2018/0189534 Convertible Handheld Reader Device
A convertible handheld reader device is provided. The convertible handheld reader device includes a network assembly comprising a network component and a...
2018/0189533 INDICIA READER HAVING A FILTERED MULTIFUNCTION IMAGE SENSOR
An indicia reader that utilizes its image sensor for more than one function is disclosed. The image sensor's functionality is derived by designating areas on...
2018/0189532 Object Detection for Video Camera Self-Calibration
This document describes systems, methods, devices, and other techniques for video camera self-calibration based on video information received from the video...
2018/0189531 MEDIUM CONTAINING IDENTIFIER
The objective of the present invention is to effectively prevent fraud, theft, and the like occurring with respect to a medium manufactured from a source...
2018/0189530 HYBRID TAG FOR RADIO FREQUENCY IDENTIFICATION SYSTEM
RFID (radio frequency identification) systems are provided in which tag and interrogator devices implement a hybrid framework for signaling including an...
2018/0189529 BOOK PLACING ATTITUDE RECOGNITION METHOD BASED ON RSSI SIGNAL VALUE OF RFID
A book placement posture identification method based on an RSSI signal value of RFID, including: step 1, horizontally moving to read the signal of an RFID tag...
2018/0189528 TRACKING ASSETS WITH A BLOCKCHAIN
A blockchain of transactions may be referenced for various purposes and may be later accessed by interested parties for ledger verification. One example method...
2018/0189527 METHOD FOR ACTIVATING MULTI-FUNCTION DEVICE CARD
A multi-function device card is activated by a personal electronic device. The method to activate the card includes connecting the personal electronic device...
2018/0189526 SMART EQUIPMENT FOR THE IDENTIFICATION OF GARMENTS AND/OR THEIR CHARACTERISTICS AND PROCEEDING FOR THE SAID...
Smart equipment for the identification of garments and/or their characteristics and proceeding for the said identification that, particularly applicable to...
2018/0189525 USE OF A TAG AND READER ANTENNA FOR A SIMULATED THEREMIN EFFECT
The present disclosure provides methods and apparatuses for providing an audible feedback based on a proximity or a link quality between an external reader and...
2018/0189524 HIGH VOLTAGE INDUCTIVE ADDER
A high voltage inductive adder is disclosed. In some embodiments, the high voltage inductive adder comprising a first adder circuit and a second adder circuit....
2018/0189523 COUNTERFEIT MICROELECTRONICS DETECTION BASED ON CAPACITIVE AND INDUCTIVE SIGNATURES
Systems and methods for detecting counterfeit integrated circuits are provided. One exemplary embodiment of a method can include: providing an integrated...
2018/0189522 ARCHITECTURE FOR TELEMETRY AND ADAPTIVE LIFETIME CONTROL OF INTEGRATED CIRCUITS
Apparatus, method, and system for remotely affecting the functionality and lifetime of an integrated circuit are described herein. One embodiment of a method...
2018/0189521 ANALYZING DATA TO DETERMINE AN UPLOAD ACCOUNT
Technologies are described herein for analyzing data to determine an upload account. In some configurations, techniques disclosed herein cause the data, and...
2018/0189520 PROVISION OF RISK INFORMATION ASSOCIATED WITH COMPROMISED ACCOUNTS
Processes and systems described herein enable a computing device to detect compromised accounts. The computing device may obtain a user credential including a...
2018/0189519 Secure personal content server
A local content server system (LCS) for creating a secure environment for digital content is disclosed, which system comprises: a communications port in...
2018/0189518 User Controlled Access To Vehicle Relevant Information
A digital license plate can support methods for assuring preservation and user authorized electronic access to vehicle relevant information or vehicle history....
2018/0189517 INTELLIGENCE AND ANALYSIS DRIVEN SECURITY AND COMPLIANCE RECOMMENDATIONS
Hosted services provided by service provider tenants to their users are an increasingly common software usage model. The usage of such services and handling of...
2018/0189516 METHODS AND APPARATUS TO PROVIDE PRIVACY FROM DRONES USING SHORT TERM MEMORY LOSS
Methods and apparatus for preserving privacy from a drone are disclosed herein. An example drone includes a privacy mode controller to, when the drone is...
2018/0189515 Method and Systems using Privacy-Preserving Analytics for Aggregate Data
Systems and methods for protecting a privacy of aggregated data from third parties, while preserving analytical usefulness of the aggregated data. A processor...
2018/0189514 PRIVACY BREACH DETECTION
Systems and methods for privacy breach notification and protection enabled by the Internet of Things (IoT) are provided. Some embodiments establish a passive...
2018/0189513 GEOLOCATION-BASED ENCRYPTION METHOD AND SYSTEM
A geolocation-based encryption method and system. The geolocation-based encryption method and system may comprise the steps of: providing an encryption...
2018/0189512 DATA LOSS PREVENTION
Techniques for providing data loss prevention, including data exfiltration prevention and crypto-ransomware prevention, are provided. In some embodiments, a...
2018/0189511 Method and System for Range Search on Encrypted Data
A method for searching encrypted data includes identifying, with a client, a plurality of values within a predetermined search range in a search index stored...
2018/0189510 METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR CONTROLLING ACCESS TO AT LEAST ONE OR MULTIPLE IMAGES...
A method, apparatus and computer program product are provided to facilitate the concurrent capture of first and second images by a mobile terminal and the...
2018/0189509 Purpose-Based Control of Data Used by Computer Software Applications
Controlling computer-based access to data by receiving from a computer software application a request specifying a computer user, a type of data associated...
2018/0189508 METHOD AND APPARATUS FOR RANGE BASED CHECKPOINTS IN A STORAGE DEVICE
In one embodiment, a system comprises a processor to, in response to a determination that a write command is suspect, identify a logical address associated...
2018/0189507 APPLICATION CONTROL SYSTEM AND APPLICATION CONTROL METHOD
Provided is an application control system capable of improving the safety and operability of application control, by a control device that makes a control...
2018/0189506 SUBSCRIPTION MANAGEMENT COMPRISING SUBSCRIPTION-SPECIFIC PROFILES FOR RESTRICTING THE FUNCTIONALITIES OF THE...
A method and a system for subscription management in a security element for a mobile end device, wherein one subscription profile is associated with one...
2018/0189505 SYSTEM AND METHOD OF APPLYING ADAPTIVE PRIVACY CONTROL LAYERS TO ENCODED MEDIA FILE TYPES
Disclosed are systems to apply customized permission settings to protect particular regions of a document, and, in particular, documents that are of a `lossy`...
2018/0189504 SYSTEM AND METHOD OF APPLYING MULTIPLE ADAPTIVE PRIVACY CONTROL LAYERS TO SINGLE-LAYERED MEDIA FILE TYPES
Users desire a communications system that allows the users to apply customized privacy settings (and, optionally, encryption keys) differently to particular...
2018/0189503 SECURE DATABASE BACKUP AND RECOVERY
As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system...
2018/0189502 RESTRICTING ACCESS TO SENSITIVE DATA USING TOKENIZATION
A method includes receiving a security profile comprising user-defined rules for processing sensitive data, and identifying a plurality of sensitive data...
2018/0189501 SYSTEM AND METHOD OF TRANSFERRING DATA FROM A CLOUD-BASED DATABASE TO A PRIVATE NETWORK DATABASE FOR LONG-TERM...
A system and method for the protection of sensitive information by transferring data from a cloud-based database to a private network database for long-term...
2018/0189500 WEARABLE DEVICE AND DATA SECURITY METHOD THEREOF
Provided is an operating method of a wearable device, the method including setting a threshold voltage when there is not a physical contact of an outsider,...
2018/0189499 DYNAMIC SECURITY REPORT GENERATOR
A system provides a user interface for selecting one of a predefined plurality of computer security reports in a user interface that allows creating a new...
2018/0189498 DEVICE MONITORING POLICY
A method and device for generating a monitoring policy for a device and selectively monitoring multiple tasks executed by the device is disclosed. The...
2018/0189497 Rule Driven Patch Prioritization
An embodiment of an electronic processing apparatus may include a database constructor to construct a dependency database of deployed components in an...
2018/0189496 HARDWARE ASSISTED FAULT INJECTION DETECTION
Anti-fault injection systems and methods are disclosed. An anti-fault injection system includes a processor; a boot ROM configured to store a series of boot...
2018/0189495 SECURE BOOT SEQUENCER AND SECURE BOOT DEVICE
A boot secure device that performs a secure booting operation of a semiconductor system includes an external memory interface that provides an interface with...
2018/0189494 SYSTEMS AND METHODS FOR ADDING MICROSERVICES INTO EXISTING SYSTEM ENVIRONMENTS
Systems and methods are disclosed that relate to network security within a virtual network, and how to add microservices in a scalable virtual network. For...
2018/0189493 SECURE DEVICE STATE APPARATUS AND METHOD AND LIFECYCLE MANAGEMENT
A semiconductor chip device include device state fuses that may be used to configure various device states and corresponding security levels for the...
2018/0189492 NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM, INFORMATION PROCESSING APPARATUS AND METHOD
A non-transitory computer-readable storage medium storing a program that causes an information processing apparatus to execute a process, the process includes...
2018/0189491 SYSTEM AND METHOD FOR DISARMING MALICIOUS CODE
The disclosed embodiments include a method for disarming malicious code in a computer system having a processor. The method comprises accessing, by the...
2018/0189490 RANSOMWARE DETECTION AND DAMAGE MITIGATION
Systems and methods for file encrypting malware detection are provided. According to one embodiment, a monitoring module is installed within active processes...
2018/0189489 MALICIOUS OBJECT DETECTION IN A RUNTIME ENVIRONMENT
A malicious object detection system for use in managed runtime environments includes a check circuit to receive call information generated by an application,...
2018/0189488 MALWARE DETECTION AND CONTENT ITEM RECOVERY
Disclosed are systems, methods, and non-transitory computer-readable storage media for malware detection and content item recovery. For example, a content...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.