Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,311,522 Apparatus and method for improving face recognition ratio
An apparatus for improving a face recognition ratio includes a digital signal processing unit which generates a first image having a size different from that of...
US-9,311,521 Method for providing images of a tissue section
A method for differentiating areas in a series of digital images, the method comprising the steps of: providing a series of images comprising undetermined...
US-9,311,520 Method and apparatus for performing and quantifying color changes induced by specific concentrations of...
Methods and electronic devices for performing color-based reaction testing of biological materials. The method includes capturing and interpreting digital...
US-9,311,519 Fingerprint recognition method and electronic device thereof
A method and apparatus for recognizing a fingerprint in an electronic device includes recognizing a fingerprint that is input through a touch-based device,...
US-9,311,518 Systems and methods for efficient comparative non-spatial image data analysis
Systems (100) and methods (300, 400) for efficient comparative non-spatial image data analysis. The methods involve ranking a plurality of non-spatial images...
US-9,311,517 Methods and systems for reducing the likelihood of false positive decodes
Systems and methods for reducing the likelihood of false positive decodes within a set of barcodes are disclosed. The method can be implemented in a computing...
US-9,311,516 Computer configured to display multimedia content
A computer can comprise a housing, a microprocessor disposed within the housing, a display, and a communication interface communicatively coupled to the...
US-9,311,515 Automatic tuning of scanner lighting
Various embodiments herein each include devices, system, methods, and software for automatic scanner lighting tuning. One method embodiment includes determining...
US-9,311,514 Imaging barcode scanner with multiple independent fields of view
A barcode scanner which uses different wavelengths of light to produce different fields of view. An example barcode scanner includes a plurality of light...
US-9,311,513 Metal tooth detection and locating
Methods and systems for tracking heavy machine teeth. One system includes a heavy machine tooth configured to be mounted on a bucket of a heavy machine, an...
US-9,311,512 Apparatus and method to harden computer system
In some embodiments, a processor-based system may include a processor, the processor having a processor identification, one or more electronic components...
US-9,311,511 Electronic device of board protection mechanism
An electronic device of a board protection mechanism includes: a substrate, a first shell, a first protection area, a second shell, a second protection area,...
US-9,311,510 Protection of a non-volatile memory by change of instructions
A method for protecting a volatile memory against a virus, wherein: rights of writing, reading, or execution are assigned to certain areas of the memory; and a...
US-9,311,509 Creation and delivery of encrypted virtual disks
The present application is directed to methods and systems for receiving a request for a virtual disk and creating a virtual disk that includes the virtual disk...
US-9,311,508 Processors, methods, systems, and instructions to change addresses of pages of secure enclaves
A processor of an aspect includes a decode unit to decode a user-level instruction. The user-level instruction is to indicate a page of a secure enclave and is...
US-9,311,507 Method and apparatus for remotely provisioning software-based security coprocessors
A virtual security coprocessor is created in a first processing system. The virtual security coprocessor is then transferred to a second processing system, for...
US-9,311,506 Storing and transmitting sensitive data
A method for storing and transmitting data across a computer network to one or more destinations is disclosed including storing source data on a secure data...
US-9,311,505 Method and apparatus for providing abstracted user models
An approach is provided for providing abstracted user models in accordance with one or more access policies. A model platform determines an ontology for...
US-9,311,504 Anti-identity-theft method and hardware database device
A hardware device (TCK) for securing data in a database accessed through an Internet server is presented. The TCK controls access to its internal database...
US-9,311,503 Detecting behavioral patterns and anomalies using activity data
Activity data is analyzed or evaluated to detect behavioral patterns and anomalies. When a particular pattern or anomaly is detected, a system may send a...
US-9,311,502 Method and system for assigning access control levels in providing access to networked content files
A method and system for assigning access control levels when granting access to resources includes a client node, a collection agent, and a policy engine. The...
US-9,311,501 Using different secure erase algorithms to erase chunks from a file associated with different security levels
Provided are a computer program product, system, and method for using different secure erase algorithms to erase chunks from a file associated with different...
US-9,311,500 Data security using request-supplied keys
Requests are submitted to a request processing entity where the requests include a cryptographic key to be used in fulfilling the request. The request...
US-9,311,499 Data security system and with territorial, geographic and triggering event protocol
The method, program and information processing system secures data, and particularly security sensitive words, characters or data objects in the data, in a...
US-9,311,498 Emergency information access on portable electronic devices
Improved techniques for facilitating emergency access to one or more contacts stored on a portable electronic device are disclosed. One or more contacts on the...
US-9,311,497 Computer-readable storage medium having stored information processing program therein, information processing...
An information processing apparatus, a computer-readable storage medium having stored an information processing program therein, an information processing...
US-9,311,496 Privacy screen-based security
A system for privacy screen-based security comprises an input interface and a processor. The input interface is configured to receive authentication...
US-9,311,495 Method and apparatus for associating data loss protection (DLP) policies with endpoints
A method of policy management in a Data Loss Prevention (DLP) system uses a policy model that associates a user with one or more DLP endpoints. When an endpoint...
US-9,311,494 Secure search method and secure search device
In search that uses searchable code, the search query and the secure index is collated in round-robins fashion, registering the required secure index and a...
US-9,311,493 System for processing an encrypted instruction stream in hardware
A system and method of processing an encrypted instruction stream in hardware is disclosed. Main memory stores the encrypted instruction stream and unencrypted...
US-9,311,492 Media storage structures for storing content, devices for using such structures, systems for distributing such...
Some embodiments of the invention provide a content-distribution system. In some embodiments, the content-distribution system distributes device-restricted...
US-9,311,491 Systems, methods, and computer program products for securely managing data on a secure element
Systems, methods, and computer program products are provided for managing applets. A first request to personalize the first applet is received over a...
US-9,311,490 Delivery of contextual data to a computing device while preserving data privacy
A method, device, system, or article of manufacture is provided for improved delivery of contextual data to a computing device while preserving data privacy. In...
US-9,311,489 Application forensics
Disclosed herein are systems, methods, and software for facilitating application forensics. In least one implementation, the identity of a user associated with...
US-9,311,488 System and method for removing customer personal information from an electronic device
A system and method for processing electronic devices to determine removal of customer personal information (CPI). An electronic device is connected to a test...
US-9,311,487 Tampering monitoring system, management device, protection control module, and detection module
A management device 200d comprises: a key share generation unit 251d generating a plurality of key shares by decomposing a decryption key, the decryption key...
US-9,311,486 Network based firmware feature configuration and firmware image generation
A computer-implemented method for modeling a configuration of components connected directly or indirectly to a baseboard of a computer system includes: (a)...
US-9,311,485 Device reputation management
A device reputation server recognizes malicious devices used in prior attacks and prevents further attacks by the malicious devices. Server computers require a...
US-9,311,484 Enhanced security and resource utilization in a multi-operating system environment
An approach is provided for operating a mobile device having first and second operating systems (OSs) installed. While the mobile device is executing the first...
US-9,311,483 Local secure service partitions for operating system security
Systems and methods provide multiple partitions hosted on an isolation technology such as a hypervisor where at least one of the partitions, a local secure...
US-9,311,482 Inoculator and antibody for computer security
In an embodiment of the invention, a method includes: determining, in a computer, an area where an undesired computer program will reside; and providing a data...
US-9,311,481 Systems and methods for classifying package files as trojans
A computer-implemented method for classifying package files as Trojans may include (1) detecting a resemblance between an unclassified package file and a known...
US-9,311,480 Server-assisted anti-malware client
An antimalware support system is provided to support one or more host-based antimalware clients. A query is received from a particular host device that...
US-9,311,479 Correlation and consolidation of analytic data for holistic view of a malware attack
According to one embodiment, a method for correlating and consolidating analytic data to provide a holistic view of a malware attack. The method comprises...
US-9,311,478 Behavioral tracking system, method, and computer program product for undoing events based on user input
A behavioral tracking system, method, and computer program product are provided for undoing events based on user input. In use, a plurality of unclassified...
US-9,311,477 Method and device for fault detection
The disclosure concerns a method implemented by a processing device. The method includes performing a first execution by the processing device of a computing...
US-9,311,476 Methods, systems, and media for masquerade attack detection by monitoring computer user behavior
Methods, systems, and media for masquerade attack detection by monitoring computer user behavior are provided. In accordance with some embodiments, a method for...
US-9,311,475 Trusted execution of binaries and modules
A computer system mechanism is provided that restricts execution of binaries, such as applications, kernel modules, shared libraries, on the computing system to...
US-9,311,474 Information processing apparatus, information processing method, program, storage medium, and information...
Provided is an information processing apparatus configured to execute at least one function, including: a storage configured to store a first code; an...
US-9,311,473 Unattended secure device authorization
Unattended secure device authorization techniques are provided. An operating system (OS) module, which is responsible for device validation when that device is...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.