Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,373,020 Measurement data selection method for biometric device, light exit position determination method for biometric...
In measurement data selection, when a vector composed of measurement data obtained for respective combinations of light emitting positions, light detection...
US-9,373,019 Passive light-based data communication
Techniques are disclosed for light-based communication using a passive light-reflective device having specially coded reflective or printed optics. The optics...
US-9,373,018 Indicia-reader having unitary-construction
A hand-held indicia-reading device includes a housing and a cable having a unitary-construction. The indicia-reader has a head portion with an indicia-reading...
US-9,373,017 Scanning system
A scanning system has a collimated light source and a movable reflective surface. The surface receives light from the light source, reflects the received light...
US-9,373,016 Image capturing device
An image capturing device includes an image forming device including a sensor defining an optical reception axis, at least one reading distance, and a region...
US-9,373,015 Asset verification and tagging
A method for managing mobile assets includes initially certifying a physical existence and location of a mobile asset. The certifying includes receiving...
US-9,373,014 Systems and methods for event monitoring using aerial drones
A radio frequency identification (RFID) network and methods for even monitoring in a closed environment includes distributing RFID readers across the...
US-9,373,013 Card reader
A card reader to read information in an integrated circuit (IC) card includes a housing, a first antenna, a control circuit, and a switch unit. The first...
US-9,373,012 Powering RFID tags using multiple synthesized-beam RFID readers
Synthesized-beam RFID readers may be used to manage and provide information about RFID tag populations. In one embodiment, two or more synthesized-beam readers...
US-9,373,011 System and method for identification and authentication of precious metals and small jewelry items using radio...
A system and method is provided for the identification and authentication of precious metals and small jewelry. The system can include an embedded RFID tag,...
US-9,373,010 Passive RFID tag coil alignment and communication
A passive tag embedded in a package includes multiple conductive coils. A first coil receives radio frequency (RF) energy used to power the tag. Additional...
US-9,373,009 Tag clusters for silent tags
Tags may be grouped into a tag cluster to be represented by a master tag. Tag transmission reports may be received from one or more tag readers that receive...
US-9,373,008 Method for preventing an unauthorized use of disposable bioprocess components
This invention provides a system and apparatus that is able to authenticate and prevent illegal manufacturing and unauthorized operation of disposable...
US-9,373,007 Low-cost capacitive sensing decoder
A low-cost system comprising a pattern arranged to encode information and a decoder for decoding the information encoded in the pattern is described. In...
US-9,373,006 Card payment system
In one example embodiment, a card payment apparatus includes a member having a magnetic strip reader configured to read account information from a magnetic...
US-9,373,005 Data storage apparatus, coding unit, systems including the same, method of coding and method of reading data
In one embodiment, the data storage apparatus includes a control unit configured to decode at least one input command and configured to generate at least one of...
US-9,373,004 Methods and systems for deleting requested information
A method of deleting log records may include identifying a plurality of log records generated during a time period, for each identified log record, determining...
US-9,373,003 Systems and methods for automatically handling multiple levels of encryption and decryption
Systems and methods are provided for automatically handling multiple levels of encryption and decryption. An electronic file is received to add to encrypted...
US-9,373,002 Electronic document management and delivery
In one embodiment, system to manage and delivery electronic documents is disclosed.
US-9,373,001 Distributed encryption and access control scheme in a cloud environment
System, computer readable medium and method for decryption. The method may include receiving, by a third computerized system and from a fourth computerized...
US-9,373,000 Selective physical world correlation of virtual world interactions
Techniques described herein relate to facilitating interaction in the physical world, after initial interaction has occurred within the virtual world, while...
US-9,372,999 Method and system for child authentication
Methods and systems for child authentication are described. In one embodiment, a communication enablement request may be received to enable electronic...
US-9,372,998 Client-side encryption in a deduplication backup system
Client-side encryption in a deduplication backup system. In one example embodiment, a method includes a backup phase in which various steps are performed for...
US-9,372,997 Displaying private information on personal devices
A computing device is described that includes one or more processors and at least one module operable by the one or more processors to determine whether the...
US-9,372,996 Protecting data owned by an operating system in a multi-operating system mobile environment
An approach is provided for protecting data owned by an operating system on a mobile computing device having multiple operating systems. A map specifying...
US-9,372,995 Vulnerability countermeasure device and vulnerability countermeasure method
A vulnerability countermeasure device stores configuration information associating multiple computers connected via a network and software possessed by each...
US-9,372,994 Entity IP mapping
Systems and methods for mapping IP addresses to an entity include receiving at least one domain name associated with the entity. Embodiments may further include...
US-9,372,993 Methods and apparatus to protect memory regions during low-power states
A disclosed example method involves configuring a processor to, when transitioning the processor system to a low-power mode, use a key and a random or...
US-9,372,992 Ensuring integrity of a software package installer
A method comprises capturing a first state of a computer prior to installing a software package on the computer; using an installer to install the software...
US-9,372,991 Detecting malicious computer code in an executing program module
Prior to execution of computer program instructions, the computer identifies one or more addresses in memory corresponding to the locations of one or more of...
US-9,372,990 Detecting heap spraying on a computer
Detecting heap spraying on a computer by detecting a plurality of requests to allocate portions of heap memory, measuring the plurality of requests to determine...
US-9,372,989 Robust malware detector
A system, method and computer readable medium for detecting and diffusing malware on a computer. Malware is analyzed to generate signatures and determine a...
US-9,372,988 User controllable platform-level trigger to set policy for protecting platform from malware
Embodiments of systems, apparatuses, and methods to protect data stored in a storage system of a device from malware alternation are described. In some...
US-9,372,987 Apparatus and method for masking a real user controlling synthetic identities
A machine has a processor and a memory storing instructions executed by the processor to issue a challenge in response to a first request, evaluate a response...
US-9,372,986 Selective password synchronization
A mechanism is provided for selective password synchronization. An indication is received that a password is to be changed for an account in a plurality of...
US-9,372,985 Information processing device, information processing method, and computer program
There is provided an information processing device including a first program execution unit that loads, interprets, and executes code of a computer program...
US-9,372,984 Authenticated launch of virtual machines and nested virtual machine managers
An embodiment of the invention provides for an authenticated launch of VMs and nested VMMs. The embodiment may do so using an interface that invokes a VMM...
US-9,372,983 Apparatus and method of controlling permission to applications in a portable terminal
An apparatus and method of controlling permission to an application in a portable terminal, the apparatus including a controller for, when requested for an...
US-9,372,982 ID usage tracker
A system and computer program product for using a multi-user operating system. A user attempts to access the multi-user operating system. The system prompts the...
US-9,372,981 Electronic device and method for unlocking screen of electronic device
An electronic device and a method for unlocking a screen of the electronic device are provided. The electronic device includes a screen and a storage unit. The...
US-9,372,980 Orientation aware authentication on mobile platforms
Systems and methods may provide for receiving an authentication input and determining an authentication orientation of a mobile platform during entry of the...
US-9,372,979 Methods, devices, and systems for unobtrusive mobile device user recognition
The present invention discloses methods, devices, and systems for unobtrusively recognizing a user of a mobile device. Methods including the steps of:...
US-9,372,978 Device, method, and graphical user interface for accessing an application in a locked device
A device with a touch sensitive display and a plurality of applications, including a camera application, while the device is in a locked, passcode-protected...
US-9,372,977 Screen unlocking method, device and terminal
A screen unlocking method, device and terminal, wherein the method includes: a first terminal sending a key information acquisition message to a second...
US-9,372,976 Automatic learning multi-modal fraud prevention (LMFP) system
A computerized learning multi-modal fraud prevention system and method for generating a data signature of a user, such as one engaged in electronic commerce, to...
US-9,372,975 Secure recording and sharing system of voice memo
According to an aspect of an embodiment, a system for secure recording and sharing of audio data includes a communication interface, a registration module, a...
US-9,372,974 CAPTCHA challenge incorporating obfuscated characters
A method for determining if a user of a computer system is a human. A processor receives an indication that a computer security program is needed and acquires...
US-9,372,973 Provisioning user permissions attribute-based access-control policies
An attribute-based access control policy (e.g., XACML policy) for a set of elements depends on attributes carried by elements in one of several predefined...
US-9,372,972 System and method for establishing and monetizing trusted identities in cyberspace with personal data service...
A system and method for establishing and monetizing trusted identities in cyberspace relying upon user opt in. Users request to attain secure IDs for accessing...
US-9,372,971 Integration of verification tokens with portable computing devices
Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.