Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,418,262 Method to differentiate radio frequency identification tags from other metal objects
Radio Frequency Identification (RFID) tags will be embedded into materials used to make various items (e.g., garments). Embedded RFID tags will be used to track...
US-9,418,261 Registering of a transponder tag via an alternating electromagnetic field
A transmitter circuit generates an electric source signal, and emits a corresponding alternating electromagnetic field. A receiver antenna registers the...
US-9,418,260 Methods and apparatus for ceiling-mounted RFID-enabled tracking
Systems and methods for tracking a subject using radio-frequency identification (RFID). In an embodiment, an antenna array comprising a plurality of...
US-9,418,259 Tag transmission apparatus and signal transmitting method thereof
Disclosed herein are a tag transmission apparatus and a signal transmitting method thereof. The tag transmission apparatus converts a plurality of data bits...
US-9,418,258 Data-detector circuit for RFID tags
Data-detector circuit for RFID labels, wherein the package is detected using two circuits, a polarizing circuit and a polarized circuit. The polarization signal...
US-9,418,257 Offline mode for tag transmission reports
Methods and systems for forwarding tag transmission reports are provided. A mobile device may receive a wireless transmission from a tag and store data received...
US-9,418,256 RFID system
The present invention provides an automated system for asset tracking and management and utilizes near field Radio Frequency IDentification (RFID) technology....
US-9,418,255 Media processing device, media processing system, and control method of a media processing device
Overwriting information that was correctly written to an IC tag that can communicate wirelessly but is not the IC tag on the medium intended to be processed is...
US-9,418,254 Integrated circuit film and method for manipulating the same
An integrated circuit film comprising a circuit board and a control circuit is provided. The circuit board has an IC-installation part and a contact part and...
US-9,418,253 Transponder unit, system and method for contactless data transmission
In various embodiments, a transponder unit for the contactless transmission of modulated data to a reader is provided. The transponder unit may include: a clock...
US-9,418,252 Symbol reading system having predictive diagnostics
A retail information network includes one or more POS scanning and checkout systems, each including (i) a bar code symbol reading subsystem, and (ii) a cash...
US-9,418,251 Mesh grid protection system
A mesh grid protection system is provided. The system includes assertion logic configured to transmit a first set of signals on a first set of grid lines and a...
US-9,418,250 Tamper detector with hardware-based random number generator
A system includes a tamper detector that includes a linear feedback shift register (LFSR) for generating pseudorandom coded detection signals as a function of...
US-9,418,249 System of providing a fixed identification of a transponder while keeping privacy and avoiding tracking
Transponder (180) having stored a fixed identification number, which expands said identification number with a random number, encrypts said expanded number with...
US-9,418,248 Image forming apparatus, image forming system, and method
An image forming apparatus is connectable to an external storage device and includes an authentication data generating section and a writing section. Upon...
US-9,418,247 Security system and methods for integrated devices
Systems and methods for implementing security mechanisms in integrated devices and related structures. This method can include validating a device ID,...
US-9,418,246 Decryption systems and related methods for on-the-fly decryption within integrated circuits
Methods and systems are disclosed for on-the-fly decryption within an integrated circuit that adds zero additional cycles of latency within the overall...
US-9,418,245 Encryption processing device, encryption processing method, and program
Included is an encryption processing unit configured to divide and input configuration bits of data to be data processed into a plurality of lines, and to...
US-9,418,244 Protecting content from third party using client-side security protection
Architecture that employs encryption and storage of encryption keys to protect trusted client message content from an untrusted third-party hosted service. Each...
US-9,418,243 Invoking a private browsing mode by selection of a visual control element within a browser tab
Activating a private browsing mode for a browser can include receiving an electronic document within the browser and detecting an indicator associated with the...
US-9,418,242 Computer implemented method for analyzing data of a user with the data being stored pseudonymously in a database
The invention relates to a computer implemented method for analyzing data of a first user, wherein an asymmetric cryptographic key pair is associated with the...
US-9,418,241 Unified platform for big data processing
This technology relate to methods and systems for big data processing. The system includes extraction modules for extracting data from the data sources. The...
US-9,418,240 Database hierarchical inheritance
A database system comprising a plurality of access keys stored in a first data memory device sector, each access key associated with a node value stored in a...
US-9,418,239 File access using counter locking mechanism
In an embodiment, a method is provided for accessing a file node. In this method, a file access request specifying a file node to be accessed by way of a file...
US-9,418,238 Search system, search method of search system, and information processing device
A searchable encryption resistant to frequency analysis. A conversion rule management device generates a conversion rule table associating a search keyword with...
US-9,418,237 System and method for data masking
A system, computer-readable medium, and method for masking data including receiving a request directed to a network service, applying a rule set to the request...
US-9,418,236 Method and system for dynamically and automatically managing resource access permissions
Employment role data, trust data, and special permissions data, associated with a party is automatically obtained and/or monitored. The employment role data...
US-9,418,235 Hierarchical pre-fetch pipelining in a hybrid memory server
A method, hybrid server system, and computer program product, prefetch data. A set of prefetch requests associated with one or more given datasets residing on...
US-9,418,234 Providing isolated entropy elements
Embodiments of the invention relate to providing isolated entropy elements for a virtual machine to increase entropy in a computing environment. At least one...
US-9,418,233 Information processing device for handling privacy information, information processing system for handling...
An information processing device for handling privacy information includes: a similar user extraction means for extracting a set of other user's identifiers...
US-9,418,232 Providing data loss prevention for copying data to unauthorized media
A processing device detects a file system call that is associated with copying data to a destination file. The processing device identifies an application...
US-9,418,231 Perturbation of field programmable gate array code to prevent side channel attack
Technologies are provided to automatically vary a structure of a netlist computation arranged to configure a field programmable gate array (FPGA). In an example...
US-9,418,230 Automated tools for building secure software programs
A computer implemented tool is described that includes an assertion generator module that can automatically generate assertions, which are usable to verify...
US-9,418,229 Firmware security
One embodiment provides an apparatus adapted to perform a secure firmware upgrade. The apparatus includes a first memory and a second memory. The first memory...
US-9,418,228 Information technology enterprise intrusion prevention implementation tool
The software application for implementing intrusion prevention devices of the present invention has an information flow schema, mathematical calculation...
US-9,418,227 Detecting malicious software
A computer implemented method, apparatus, and program code for detecting malicious software components. A series of calls made by a software component is...
US-9,418,226 Apparatus and method for assessing financial loss from threats capable of affecting at least one computer network
Apparatus for assessing threat to at least one computer network in which a plurality of systems (30.sub.1, 30.sub.2, 30.sub.3, 30.sub.4, 30.sub.5, . . ....
US-9,418,225 Transmitting device and method of overlaying signals with the device
A transmitting device that transmits data signals into a primary electricity grid, wherein the transmitting device connects to a power input of a computer...
US-9,418,224 Portable electronic device and control method of portable electronic device
An IC card stores history information indicating information relating to a command executed for each logical channel in a storage portion and determines the...
US-9,418,223 System and method for securing embedded controller communications by verifying host system management mode...
An information handling system includes a processor operable to provide a branch trace message, and an embedded controller coupled to the processor via a...
US-9,418,222 Techniques for detecting advanced security threats
Techniques for detecting advanced security threats are disclosed. In one particular embodiment, the techniques may be realized as a method for detecting a...
US-9,418,221 Method, device, and system of differentiating among users based on responses to injected interferences
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a cyber-attacker. An end-user...
US-9,418,220 Controlling access to memory using a controller that performs cryptographic functions
A system includes a memory and a controller. The controller controls access to the memory and is adapted to be programmed with a key that is associated with a...
US-9,418,219 Inter-process message security
An inter-process messaging security management may be provided. A message comprising an operation to be performed may be sent from a process operating in a...
US-9,418,218 Dynamic rendering of a document object model
The present application relates to a computer having a processor configured to execute a set of instructions to render a customized version of a restricted...
US-9,418,217 Information processing system and information processing method
An information processing system includes a device registration unit that stores device identification information of a device in a first storage unit in...
US-9,418,216 Cloud service authentication
One or more techniques and/or systems are provided for obtaining access to a cloud service. In particular, a user may log into a client device using an...
US-9,418,215 Optical security enhancement device
An optical security device can be used to view sensitive information provided in an obscured format via a potentially untrusted and/or compromised computer. The...
US-9,418,214 Anonymous biometric enrollment
In the present invention systems and methods to perform the biometric anonymous enrollment of an individual into an anonymous biometric engine are disclosed. An...
US-9,418,213 Delegated permissions in a distributed electronic environment
Permissions can be delegated to enable access to resources associated with one or more different accounts, which might be associated with one or more different...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.