Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0373913 ULTRASONIC FINGERPRINT SENSOR FOR UNDER-DISPLAY APPLICATIONS
Disclosed are methods, devices, apparatuses, and systems for an under-display ultrasonic fingerprint sensor. A display device may include a platen, a display...
2018/0373912 PROXIMITY-BASED LINKING FOR WEARABLE GROUP COMMUNICATION DEVICE
Systems, methods, software and apparatus enable linking of a wearable end user communication device (EUD) to an intermediate communication device (ICD)...
2018/0373911 FILTERING INVENTORY OBJECTS USING IMAGES IN AN RFID SYSTEM
A method for filtering scanned objects displayed on a reader is provided. The reader may scan one or more transponders, and obtain, from a database, an image...
2018/0373910 POSITIONING AND MEASUREMENT APPARATUS, DATA STORAGE APPARATUS, DATA UTILIZATION APPARATUS, AND RECORDING MEDIUM
A three-dimensional position information generation unit generates three-dimensional position information using measured data acquired by a measurement...
2018/0373909 SYSTEMS AND METHODS FOR A RECONFIGURABLE ANTENNA
Systems and methods for a reconfigurable antenna are provided. One system includes a device having a plurality of antenna elements configured to read a...
2018/0373908 ANTENNA SUBSTRATE, IMAGE FORMING APPARATUS
An antenna substrate includes a substrate, a modulating/demodulating circuit and a switch circuit each mounted on the substrate, and a printed antenna printed...
2018/0373907 Method and Apparatus for Power Management for a Radio Frequency Identification System
A method and device of power management for a networked radio frequency identification ("RFID") system are disclosed. The described power management methods...
2018/0373906 RFID LOCATION DETECTION
A set of samples are returned by radio frequency identifier (RFID) reader corresponding to the readings of signals emitted from a particular RFID tag, each...
2018/0373905 MULTI-PROTOCOL RFID SYSTEM
A multi-protocol RFID interrogating system employs a synchronization technique (step-lock) for a backscatter RFID system that allows simultaneous operation of...
2018/0373904 METHOD AND RFID READER FOR OBTAINING A BACKSCATTER MODULATED RECEIVE SIGNAL
The disclosed subject matter relates to a method for obtaining a backscatter modulated receive signal in an radio-frequency identification (RFID) system,...
2018/0373903 METHOD AND SYSTEM FOR MARKING MANUFACTURED ITEMS TO DETECT UNAUTHORIZED REFILLING
A method for marking a manufactured item is provided, the manufactured item comprising a container and a removable closure for the container, the method...
2018/0373902 ANALOG SUB-MATRIX COMPUTING FROM INPUT MATRIXES
A circuit includes an engine to compute analog multiplication results between vectors of a sub-matrix, An analog to digital converter (ADC) generates a digital...
2018/0373901 ENHANCED LOCK SCREEN SECURITY
An apparatus is provided, e.g. a mobile electronic device such as a smart phone, that has a touch-screen, a processor, and a memory. The memory is coupled to...
2018/0373900 SECURELY WRITING DATA TO A SECURE DATA STORAGE DEVICE DURING RUNTIME
A computer system includes an independent compute core; and an isolated secure data storage device to store data accessible only to the independent compute...
2018/0373899 METHOD FOR CREATING A DECOY OF AN OPERATION OF AN INTEGRATED CIRCUIT AND CORRESPONDING INTEGRATED CIRCUIT
A circuit module of an integrated circuit is located in a first zone of a semiconductor substrate. A decoy cell includes an antenna above a second zone of the...
2018/0373898 SECURE MODE STATE DATA ACCESS TRACKING
A data processing apparatus is provided which uses flag circuitry (174) to set an access tracking flag (SFPA) to a first value when the processing circuitry...
2018/0373897 ENSURING USB ATTACK PROTECTION
For ensuring a universal serial bus, USB, attack protection between a communication device (CD) and an accessory device (AD), a protection device (PD) being...
2018/0373896 TECHNIQUES TO PROVIDE GRANULAR CONTROL FLOW ENFORCEMENT
Various embodiments are generally directed to an apparatus, method and other techniques to detect an attempt of an indirect flow instruction to redirect...
2018/0373895 Secure Public Cloud with Protected Guest-Verified Host Control
A host Virtual Machine Monitor (VMM) operates "blindly," without the host VMM having the ability to access data within a guest virtual machine (VM) or the...
2018/0373894 DIGITAL FORENSIC IMAGE VERIFICATION SYSTEM
A digital forensic image verification system according to an embodiment of the present disclosure includes an imaging device having a imaging unit configured...
2018/0373892 METHOD AND APPARATUS FOR SECURING RESTING DATA IN INTERNET CONNECTED DEVICES
An electronic device for securing information, and a method therefor are provided. The electronic device includes a receiver for receiving an encrypted data...
2018/0373891 DATA PROCESSING SYSTEMS FOR IDENTIFYING AND MODIFYING PROCESSES THAT ARE SUBJECT TO DATA SUBJECT ACCESS REQUESTS
In particular embodiments, in response a data subject submitting a request to delete their personal data from an organization's systems, the system may: (1)...
2018/0373890 DATA PROCESSING SYSTEMS FOR IDENTITY VALIDATION OF DATA SUBJECT ACCESS REQUESTS AND RELATED METHODS
In particular embodiments, a computer-implemented data processing method for responding to a data subject access request comprises: (A) receiving a data...
2018/0373889 DATA PROCESSING SYSTEMS FOR FULFILLING DATA SUBJECT ACCESS REQUESTS AND RELATED METHODS
Responding to a data subject access request includes receiving the request and validating an identity of the requestor. In response to validating the identity...
2018/0373888 PATTERN MATCHING FOR DATA LEAK PREVENTION
Systems and methods for preprocessing data to facilitate DLP pattern matching are provided. An input string is received by a Data Leak Prevention (DLP) system....
2018/0373887 DISTRIBUTED STORAGE SYSTEM FOR LONG TERM DATA STORAGE
A distributed storage system for the long-term storage of data objects that is implemented utilizing one or more distinct storage sites that may be comprised...
2018/0373886 CONTROLLING ACCESS TO APPLICATION DATA
A method, system and computer-readable storage medium for controlling access to application data associated with an application configured on a computing...
2018/0373885 HYBRID ON-PREMISES/SOFTWARE-AS-SERVICE APPLICATIONS
Provided is a process, including: obtaining, within a trusted computing environment, data comprising confidential values and non-confidential values;...
2018/0373884 METHOD OF PROVIDING CONTENTS, PROGRAM FOR EXECUTING THE METHOD ON COMPUTER, AND APPARATUS FOR PROVIDING THE...
A method of providing content according to at least one embodiment of this disclosure includes acquiring first information from an article, wherein the first...
2018/0373883 INFORMATION RIGHTS MANAGEMENT THROUGH EDITORS IMPLEMENTED IN A BROWSER
A system and method is described for implementing or managing IRM controls over digital content through a browser. The computer implementing or managing IRM...
2018/0373882 PRIVACY PRESERVING COMPUTATION PROTOCOL FOR DATA ANALYTICS
A privacy preserving computation protocol for data analytics is described. The protocol includes a method for privacy-preserving computation of aggregated...
2018/0373881 MUTUAL AUTHENTICATION WITH INTEGRITY ATTESTATION
A device is configured with a trusted platform module (TPM) executing in a trusted execution environment (TEE). Software/firmware updates, user data,...
2018/0373880 Machine Learning Statistical Methods Estimating Software System's Security Analysis Assessment or Audit Effort,...
A method, system and computer-usable medium for generating a security analysis effort, cost and process scope estimates, comprising: analyzing a software...
2018/0373879 SECURE BOOT OF VIRTUALIZED COMPUTING INSTANCES
In an embodiment, a secure boot method comprises writing a wrapped data encryption key (DEK) and a wrapped key encryption key (KEK) onto a label of a wrapped...
2018/0373878 SECURE BOOT FOR MULTI-CORE PROCESSOR
The disclosed technology is generally directed to a secure boot mechanism for a multi-core system. In some examples, multiple execution environments may be...
2018/0373877 DATA QUARANTINE AND RECOVERY
In some embodiments, disclosed subject matter involves proactive monitoring and detection of anomalies in user data hosted by a cloud storage server and user...
2018/0373876 SOFTWARE SECURITY
A computer implemented method of detecting malicious code in a software application executing with a runtime environment in a computer system, the method...
2018/0373875 PREVENTING MALWARE DOWNLOADS
An example embodiment of the present techniques determines, in response to a byte-serving request to download a portion of a resource, that the resource has...
2018/0373874 METHOD TO SCAN A FORENSIC IMAGE OF A COMPUTER SYSTEM WITH MULTIPLE MALICIOUS CODE DETECTION ENGINES...
A multi-engine malicious code scanning method for scanning data sets from a storage device is provided. The method includes, among other steps obtaining at...
2018/0373873 METHOD TO SCAN A FORENSIC IMAGE OF A COMPUTER SYSTEM WITH MULTIPLE MALICIOUS CODE DETECTION ENGINES...
A multi-engine malicious code scanning method for scanning data sets from a storage device is provided. The method includes, among other steps obtaining at...
2018/0373872 Mitigation of Malicious Actions Associated with Graphical User Interface Elements
Mitigating malicious actions associated with graphical user interface elements may be performed by a computing device. A user interface element is monitored in...
2018/0373871 HARDENED SAFE STACK FOR RETURN ORIENTED PROGRAMMING ATTACK MITIGATION
Techniques and computing devices for mitigating return-oriented programming (ROP) attacks are described. A hardened stack and an unhardened stack are provided....
2018/0373870 SYSTEM AND METHODS THEREOF FOR LOGICAL IDENTIFICATION OF MALICIOUS THREATS ACROSS A PLURALITY OF END-POINT...
A computerized method for logical identification of malicious threats across a plurality of end-point devices (EPD) communicatively connected by a network,...
2018/0373869 DETECTING MALICIOUS CODE EMBEDDED IN DOCUMENTS
A method for analyzing a document may include obtaining a runtime model for an application used to process the document, extracting, from the document, code...
2018/0373868 UTILIZATION OF DECEPTIVE DECOY ELEMENTS TO IDENTIFY DATA LEAKAGE PROCESSES INVOKED BY SUSPICIOUS ENTITIES
A method and system for the deployment of deceptive decoy elements in a computerized environment to identify data leakage processes invoked by suspicious...
2018/0373867 System and Method for Reverse Command Shell Detection
A system and method for detecting reverse command shell intrusions at a process-level on a user device is disclosed. In one embodiment, the system detects each...
2018/0373866 CYBER SECURITY SYSTEM FOR A VEHICLE
A method of providing cyber security for a vehicle includes monitoring, by a cyber security system of the vehicle, a plurality of parameters acquired from at...
2018/0373865 CALL FLOW-BASED ANOMALY DETECTION FOR LAYERED SOFTWARE SYSTEMS
Techniques for implementing call flow-based anomaly detection in a layered software system are provided. According to one set of embodiments, a service...
2018/0373864 SECURITY SANITIZATION OF USB DEVICES
Methods and systems for performing security sanitization of Universal Serial Bus (USB) devices are provided. According to one embodiment, existence of a...
2018/0373863 REMOTE ATTESTATION FOR MULTI-CORE PROCESSOR
The disclosed technology is generally directed to the authentication of software. In one example of the technology, a private attestation key is stored in...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.