Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,323,977 Apparatus and method for processing 3D information
An apparatus and method for processing three-dimensional (3D) information is described. The 3D information processing apparatus may measure first depth...
US-9,323,976 Anti-fraud device
The invention concerns an antifraud device (100) for validating the use of a real part of a body as an imprint-bearing substrate (150) and comprising: a...
US-9,323,975 Fingerprint sensing system and method
The present invention relates to a method of determining a representation of a fingerprint pattern. The method comprises the steps of acquiring a reference...
US-9,323,974 Fingerprint ridge image synthesis system, fingerprint ridge image synthesis method, and program thereof
A fingerprint ridge image synthesis system, configured to accurately extract the shape of the ridges contained in a fingerprint image and clearly reproduce the...
US-9,323,973 Device for capturing an image representing a print of a part of the body of a person
A device for capturing an image representing a print of a part of the body of a person, the capture device may include: a base layer; a reference electrode...
US-9,323,972 Finger biometric sensor including stacked die each having a non-rectangular shape and related methods
A finger biometric sensor may include first and second integrated circuit (IC) dies arranged in a stacked relation. The first IC die may include a first...
US-9,323,971 Biometric authentication apparatus and biometric authentication method
A biometric authentication apparatus of the present invention comprises: a finger-tip placing detecting means for detecting placing of a finger-tip onto a...
US-9,323,970 Trading interface retrieved based upon barcode data
Methods, systems, and apparatuses, including computer programs encoded on computer-readable media, for receiving barcode data including a company identifier....
US-9,323,969 Indicia reading terminal including frame quality evaluation processing
There is described an indicia reading terminal that can be operative to capture a succession of frames of image data and that can be operative so that a certain...
US-9,323,968 RFID reading apparatus for shelf occupancy detection
An RFID reading apparatus (20) for shelf occupancy detection, the RFID reading apparatus (20) having an antenna (16, 18, 24), wherein the antenna (16, 18, 24)...
US-9,323,967 Method and system of pallet packing, and method for providing data of pallet packing
There are provided a method and a system of pallet packing that generate information on an article to be loaded and a loading place of the article on a specific...
US-9,323,966 Device for backscatter communication
Backscatter communication includes receiving electromagnetic energy from a base station and encoding first data and second data. The first data is encoded at a...
US-9,323,965 Method for choosing RFID communication mode and RFID device which supports near-field and far-field communication
Provided is a method of choosing a communication mode of an RFID device which supports near-field communication and far-field communication, including:...
US-9,323,964 Card detection and selection
Techniques for CSC detection and selection include generating a radio frequency (RF) field that defines a range of communication for the CSC reader,...
US-9,323,963 Label printer, control method for a label printer, and non-transitory storage medium
Writing incorrect information to an IC tag affixed to a label is prevented. When a control command including recording information, an instruction to print the...
US-9,323,962 Electrical connector with grounding plate
An electrical connector comprises an insulative housing, a plurality of contacts retained in the insulative housing and a metal shell enclosing the insulative...
US-9,323,961 Portable electronic device
The problem of the present invention is to provide a tablet-type portable electronic device that can perform payment by way of a card, as well as having a...
US-9,323,960 Clone-proof monetary and security documents and preparation thereof
The present invention relates to particulate based compositions for deposition on substrates, a system and method for the deposition of the said compositions...
US-9,323,959 Buffer-less rotating coefficient filter
A circuit that provides a rotating coefficient FIR filter with all necessary coefficient sets present at the same time, without the need for delay elements,...
US-9,323,958 Method and apparatus for prevention of tampering and unauthorized use, and unauthorized extraction of...
The present invention considers an apparatus for prevention of tampering, unauthorized use, and unauthorized extraction of information from at least one secure...
US-9,323,957 Anti-tamper system based on dual random bits generators for integrated circuits
An apparatus includes a mesh block, a first number generator configured to generate a first number, a second number generator configured to generate a second...
US-9,323,956 Merging external NVRAM with full disk encryption
Methods and arrangements for managing a flash drive, hard disk, or connection between the two, in a manner to ensure that sensitive data is not decrypted at any...
US-9,323,955 Method for protecting a logic or mathematical operator installed in an electronic module with a microprocessor...
The method for protecting a logic or mathematical operator of the NOR operator type, able to be used for executing a program in a microprocessor electronic...
US-9,323,954 Method and apparatus for secure execution using a secure memory partition
A processor capable of secure execution. The processor contains an execution unit and secure partition logic that secures a partition in memory. The processor...
US-9,323,953 System for managing secure and nonsecure applications on one and the same microcontroller
An electronic microcontroller system including: plural processors; at least one interface for exchange with at least one peripheral, the peripheral being user...
US-9,323,952 Cryptographic equipment implementing red/black communication modes
The described technology relates to cryptographic equipment which includes an input interface, a red module, a cryptographic module, a black module, and an...
US-9,323,951 Encrypted warranty verification and diagnostic tool
According to one embodiment of the present disclosure, an approach is provided in which a diagnostic system retrieves encrypted utilization data from an...
US-9,323,950 Generating signatures using a secure device
An integrated circuit device comprises a processor and a secure protection zone with security properties that can be verified by a remote device communicating...
US-9,323,949 De-identification of data
The present invention relates to a method, computer program product and system for de-identifying data, wherein a de-identification protocol is selectively...
US-9,323,948 De-identification of data
The present invention relates to a method, computer program product and system for de-identifying data, wherein a de-identification protocol is selectively...
US-9,323,947 System, method and computer program product for controlling access to protected personal information
A computer-based system, method and computer program product for controlling access to protected personal information is disclosed. Protected personal...
US-9,323,946 Educating users and enforcing data dissemination policies
An authoring component determines the sensitivity of an authored document and generates a user interface conveying contextual educational information about data...
US-9,323,945 Systems, methods, and computer program products for managing secure elements
Systems, methods, and computer program products are provided for performing content management operations. At least one memory stores data, and a central...
US-9,323,944 Conforming passwords to a password policy
An apparatus, program product, and method are disclosed for receiving a password entered by a user, the password not conforming to one or more requirements of a...
US-9,323,943 Decrypt and encrypt data of storage device
Data read from a volume is decrypted using a first key. The decrypted data is encrypted using a second key. The encrypted data is written back to the volume. An...
US-9,323,942 Protecting information processing system secrets from debug attacks
Embodiments of an invention for protecting information processing system secrets from debug attacks are disclosed. In one embodiment, a processor includes...
US-9,323,941 Secure method for processing a content stored within a component, and corresponding component
The component comprises a first memory (MM) comprising a first portion (P1) having a content modified with a first modification entity (K1) and a second portion...
US-9,323,940 Rights control method and apparatus for digital living network alliance
Disclosed in the disclosure are a rights control method and an apparatus for Digital Living Network Alliance (DLNA). An address/rights recoding unit is expanded...
US-9,323,939 Multi-tenancy governance in a cloud computing environment
A cloud computing system includes a plurality of tenants that are permitted to access cloud hosted applications. The system includes an input governance layer...
US-9,323,938 Holistic XACML and obligation code automatically generated from ontologically defined rule set
Computer-based systems and methods for automatically generating both XACML rules and processed-based obligation code using a common ontologically defined ruleset.
US-9,323,937 Methods and systems for establishing and enforcing document visibility rights with an electronic signature service
Techniques for generating and enforcing document visibility rights associated with a document in use with an electronic signature service are described....
US-9,323,936 Using a file whitelist
A method and/or system for using a file whitelist may include receiving a request to approve an application for release in an application store. The request may...
US-9,323,935 User device security profile
Attribute data of an endpoint computing device is collected that describes attributes of the endpoint computing device. The attribute data is communicated to a...
US-9,323,934 Managing and tracking commands associated with a change on a computer system
A method, computer program product, and computer system for managing and tracking commands associated with a change on a managed computer system. The managed...
US-9,323,933 Apparatus and method for selecting and booting an operating system based on path information
An information processing apparatus includes a first storage storing an operating system program, a second storage including a boot program storage area, a...
US-9,323,932 Protecting memory contents during boot process
Embodiments include methods, systems, and computer storage devices directed to identifying that a trusted boot mode (TBM) control bit is set in an input/output...
US-9,323,931 Complex scoring for malware detection
Described systems and methods allow protecting a computer system from malware such as viruses, Trojans, and spyware. For each of a plurality of executable...
US-9,323,930 Systems and methods for reporting security vulnerabilities
A computer-implemented method for reporting security vulnerabilities may include (1) detecting that a malware application is present on an endpoint computing...
US-9,323,929 Pre-identifying probable malicious rootkit behavior using behavioral contracts
The various aspects provide for a computing device and methods implemented by the device to ensure that an application executing on the device and seeking root...
US-9,323,928 System and method for non-signature based detection of malicious processes
Systems and methods for detecting malicious processes in a non-signature based manner are disclosed. The system and method may include gathering features of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.