Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,396,371 Non-contact type information processing device
A non-contact type information processing device may include a flat plate-shaped substrate on which a communication antenna formed in a ring shape and a signal...
US-9,396,370 Carrier compensation reader
A carrier compensation reader compensates a carrier signal. The carrier compensation reader transmits, via an antenna, a first carrier signal and obtains a...
US-9,396,369 Electronic tag transmissions corresponding to physical disturbance of tag
In some embodiments, a seal is provided that includes an adhesive bottom layer, a non-adhesive top layer, and an electronic tag. The electronic tag can be...
US-9,396,368 Tuning a NFC antenna of a device
A NFC object reader's NFC antenna system configured to dynamically change an element of the NFC antenna system to maintain the NFC antenna system's antenna...
US-9,396,367 System and method for synchronizing RFID readers utilizing RF or modulation signals
A system and method are disclosed for synchronizing two RFID readers. The system includes a modulation detector to detect a modulated signal produced by a first...
US-9,396,366 Magnetic sensor device
A magnetic sensor device includes magnetic detection elements arrayed along a line intersecting the relative movement direction of a medium, and a magnet...
US-9,396,365 System and method for providing user-accessible card slot
Systems and methods for reducing problems and disadvantages associated with providing a user-accessible card slot are provided. A removable card carrier a...
US-9,396,364 Device and method for short range communication
There is provided a communication device and method for contactless short range communication between a device and a terminal. An exemplary communication device...
US-9,396,363 Gesture and motion operation control for multi-mode reading devices
A portable data reader and methods of operation for reading encoded data, such as optical code labels and RFID tags, from an object. The data reader includes a...
US-9,396,362 Analog multiplier circuit, variable gain amplifier, detector circuit, and physical quantity sensor
Provided is a technology capable of preventing arithmetic operation accuracy from deteriorating even when a bipolar transistor used to form a Gilbert multiplier...
US-9,396,361 Method and apparatus for protecting time values in wireless communications
A method and apparatus to establish a trustworthy local time based on trusted computing methods are described. The concepts are scaling because they may be...
US-9,396,360 System and method for secure control over performance state
The present disclosure relates to a method and system for securing a performance state change of one or more processors. A disclosed method includes...
US-9,396,359 System and method for encrypted disk drive sanitizing
A system and method for first changing the encryption key on a self-encrypting disk drive followed by a complete disk wipe. Either process can be separately...
US-9,396,358 Integrated circuit with a self-destruction mechanism
A method and apparatuses for securing an integrated circuit (IC) with a self-destruction mechanism are provided. The IC has a tamper detect circuit that will...
US-9,396,357 Physically unclonable function (PUF) with improved error correction
A cryptographic system for reproducibly establishing a reliable data string, such as a cryptographic key, from a noisy physically unclonable function (PUF, 110)...
US-9,396,356 Endorsement of unmodified photographs using watermarks
A method, device and system of a watermarking server authenticates a user in a watermarking application of a mobile device as the user of a trusted third-party...
US-9,396,355 Multi-part encrypted messages for support of sensitive systems
Methods and arrangements for handling encrypted messages are disclosed. The method comprising: generating a multi-part encrypted support message responsive to a...
US-9,396,354 Apparatus and method for automated privacy protection in distributed images
A method executed by a computer includes receiving an image from a client device. A facial recognition technique is executed against an individual face within...
US-9,396,353 Data allocation among devices with different data rates
An allocation instruction is received that includes a target data operand and a storage medium operand indicating a storage medium for storing the target data....
US-9,396,352 System and method to provide server control for access to mobile client data
Systems and methods for protecting a data item include, upon initiation of transfer of the data item from a server to a client device, determining a sensitivity...
US-9,396,351 Preventing conflicts of interests between two or more groups
To prevent conflicts of interest, an information management system is used to make sure two or more groups are kept apart so that information does not circulate...
US-9,396,350 Object-based commands with access control identifiers
Systems and methods are disclosed for object-based commands with access control identifiers. In an embodiment, an apparatus may comprise a data storage device...
US-9,396,349 Method and apparatus for sharing data from a secured environment
A method for sharing data from within a secure network perimeter includes providing a sharing folder associated with a first user for transferring data...
US-9,396,348 System and method for electronic stamping
A system and method for electronic stamping are disclosed. Personal fingerprint pre-stored is used to verify the fingerprint information collected, the document...
US-9,396,347 Providing status of site access requests
Concepts and technologies are described herein for providing status of site access requests. In accordance with the concepts and technologies disclosed herein,...
US-9,396,346 System and method for accessing and updating secured data
A method is provided for use on an electronic device having a display, a communication component, a memory, and a processor coupled to the display, the...
US-9,396,345 Electronic data sharing device and method of use
An electronic data sharing device configured to exchange a first tag with a corresponding tag from a further electronic data sharing device, wherein the first...
US-9,396,344 Registration mapping toolkit for geofences
Systems and methods for creating a database of geofences and registering geofences, with each geofence in the database being associated with an IP address,...
US-9,396,343 Policy access control lists attached to resources
Methods, storage systems and computer program products implement embodiments of the present invention that include defining, for an entity, a policy access...
US-9,396,342 Role based authorization based on product content space
A computer-implemented method for generating role-based authorizations includes collecting, by a processor, a plurality of permissions from an access control...
US-9,396,341 Data encryption in a de-duplicating storage in a multi-tenant environment
The present invention addresses encryption systems and methods in the de-duplication of data in a multi-tenant environment. The system provides isolation...
US-9,396,340 Method for encrypting a 3D model file and system thereof
The invention discloses a method for encrypting a 3D model file and system thereof. The system of the invention comprises a data reading module used to read...
US-9,396,339 Protecting computers using an identity-based router
A router is placed between a protected computer and devices with which the computer communicates, including peripherals and other computers. The router includes...
US-9,396,338 Method and system for providing a secure secrets proxy
A secure secrets proxy is instantiated in a first computing environment and includes secure secrets proxy authentication data for identifying itself to a...
US-9,396,337 Wireless sensor field enumeration
A system for authenticating data acquired by multiple sensors prior to storing the data in a database is described. The system also authenticates users...
US-9,396,336 Automatic correction of security downgraders
Systems for automatic correction of security downgraders include a security analysis module configured to perform a security analysis that disregards existing...
US-9,396,335 Arbitrary code execution and restricted protected storage access to trusted code
A method comprises signing boot code with a public/private cryptographic key pair, and writing to storage the boot code, the public cryptographic key, and the...
US-9,396,334 System and method for detecting harmful files executable on a virtual stack machine
Disclosed are method and system for detecting harmful files executed by a virtual stack machine. An example method includes: identifying data from a file...
US-9,396,333 Thin client for computer security applications
A system for scanning a file for malicious codes may include a client agent running in a client computer and a scan server running in a server computer, the...
US-9,396,332 Risk assessment modeling
One or more techniques and/or systems are provided for risk assessment. Historical authentication data and/or compromised user account data may be evaluated to...
US-9,396,331 Systems and methods for security management based on cursor events
Systems and methods for security management based on cursor events. Click coordinates on a webpage of user's activity are logged in order to detect multiple or...
US-9,396,330 Systems and methods for reducing denial of service attacks against dynamically generated next secure records
The present solution reduces denial of service (DoS) attacks against dynamically generated next secure (NSEC) records. A domain name system (DNS) proxy may...
US-9,396,329 Methods and apparatus for a safe and secure software update solution against attacks from malicious or...
Described herein are articles, systems, and methods for using a storage controller to protect secure data blocks through the enforcement of a read only policy....
US-9,396,328 Determining a contributing entity for a window
A method, system, and computer program product for presenting content indicative of one or more entities which contributed to a window being displayed using a...
US-9,396,327 Systems and methods for security verification in electronic learning systems and other systems
The embodiments described herein relate to security verification systems and methods. In some aspects, there is provided a security verification server...
US-9,396,326 User transparent virtualization method for protecting computer programs and data from hostile code
A secure computing environment that prevents malicious code from "illegitimately" interacting with programs and data residing on the computing platform. While...
US-9,396,325 Provisioning an app on a device and implementing a keystore
A keystore is installed on a mobile app where the keystore is created and provisioned on a server, such as an app wrapping server, under the control of an...
US-9,396,324 System and method for extending password time-to-live based on characteristics of proposed password
Systems and methods for use in enhancing the security of a system, network, device, data storage element, software application, document, account, data,...
US-9,396,323 Unauthorized account access lockout reduction
A method and system for determining unauthorized account access is provided. The method includes receiving a username of a user and a passcode for access to a...
US-9,396,322 Authentication mechanism
A computer-implemented method for preventing password leakage into a non-password field includes detecting that a user of an electronic device has entered a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.