Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,443,119 Portable encoded information reading terminal configured to locate groups of RFID tags
A portable radio-frequency identifier (RFID) reading terminal can comprise a microprocessor, a memory, an RFID reading device, and a display. The portable EIR...
US-9,443,118 Pairing techniques for a wireless card reader
Methods, systems, and apparatus, for pairing a wireless card reader and a computing device, including: receiving first user input setting the wireless card...
US-9,443,117 Self-optimizing method of and system for efficiently deploying radio frequency identification (RFID) tag...
Radio frequency identification (RFID) tag readers are integrated with individual RFID tags to form integrated RFID units that are initially deployed to cover a...
US-9,443,116 Authentication in a flexible display computing device
Embodiments of the invention provide for device authentication in a flexible display computing device. In an embodiment of the invention, a method for device...
US-9,443,115 System and method for circuit card insertion tracking
Embodiments of systems and methods for circuit card insertion tracking are described. In an embodiment, a method may include detecting insertion of a pluggable...
US-9,443,114 Auto-logging of read/write commands in a storage network
A system and method for verifying an identifier of a command. The method includes receiving an incoming command and sending a first alert to auto-logging...
US-9,443,113 Response to tamper detection in a memory device
In response to a tamper-attempt indication, a memory device selectively disables one or more memory operations. Disabling can be accomplished by different...
US-9,443,112 Secure media container
Embodiments of a secure media container and a method of using same are provided. In some embodiments, the secure media container includes a portable power...
US-9,443,111 Device security using an encrypted keystore data structure
Apparatus and method for data security through the use of an encrypted keystore data structure. In accordance with some embodiments, first and second sets of...
US-9,443,110 Secure island computing system and method
A method for generating an n-bit result includes a secured containment device (SCD) receiving a request to generate the n-bit result. The request includes an...
US-9,443,109 Computing device and method of processing secure services for computing device
A method of processing secure services is provided. The method is applied to a processing unit of a computing device to control the processing unit to process...
US-9,443,108 Secure timestamping
A method and system for retrieving a current and previous timestamp value, retrieving a previous accumulator value reflecting a previous state of the...
US-9,443,107 Method for protecting the integrity of a group of memory elements using an aggregate authentication code
One feature pertains to an efficient algorithm to protect the integrity of a plurality of data structures by computing an aggregate message authentication code...
US-9,443,106 Filtering means for tracking information flow in android operated devices
Security features of an ANDROID.RTM. operating system device using a data flow tracking filter are described. The data flow tracking filter uses a message...
US-9,443,105 Method and system for protecting user choices
A system, method, and computer-accessible medium for protecting user choice settings are provided. The system and method provide an application programming...
US-9,443,104 Tokenization of structured data
Structured data, such as email addresses, social security numbers, and the like is accessed for encoding. A set of encoding rules including one or more encoding...
US-9,443,103 System for encoding customer data
A system for transforming customer data includes a network interface and a processor. The network interface communicates a request for customer data associated...
US-9,443,102 Protecting content displayed on a mobile device
A system for protecting content includes a mobile device screen including a plurality of pixels, whereby each of the plurality of pixels have first sub-pixel...
US-9,443,101 Low-cost specification and enforcement of a privacy-by-consent-policy for online services
A system and method for implementing a privacy policy in an application to be run are provided. Definitions are received for a set of fields. At least one of...
US-9,443,100 Security mechanism for increased personal data protection
Apparatus, systems, and methods provide a mechanism to enhance the management of data security in a system for users of the systems. Various embodiments include...
US-9,443,099 Method and apparatus for accessing secure data in a dispersed storage system
A method begins with a first computing device receiving a first request from a user device to access secure data. The method continues with the first computing...
US-9,443,098 Multi-layered metadata management system
A metadata layer management system is presented. Layers of metadata objects can be constructed where each metadata layer object comprises a rights policy. As...
US-9,443,097 Systems and methods for securing data in motion
The systems and methods of the present invention provide a solution that makes data provably secure and accessible--addressing data security at the bit...
US-9,443,096 Systems and methods for controlling access to supplemental content integrated into existing content
Methods and systems to allow for selective access to supplemental content that is associated with more generally distributed original content. In an embodiment,...
US-9,443,095 Method in a processor, an apparatus and a computer program product
There is disclosed a method in which information relating to a sequence of instructions of a thread is examined to determine a security condition of the thread....
US-9,443,094 Methods and systems for controlling levels of geolocation access
A communication device may be configured to control access to geolocation services for applications on the communication device utilizing a first privacy access...
US-9,443,093 Policy enforcement delays
Policies are used to control access to resources. Requests to change a set of policies may be fulfillable, at least in some circumstances, only if the requests...
US-9,443,092 System and method for matching data sets while maintaining privacy of each data set
A system and method that allows two parties to find common records in their data sets without having to actually share the data sets with each other or a third...
US-9,443,091 Method and system for protecting execution of cryptographic hash functions
A method of protecting the execution of a cryptographic hash function, such as SHA-256, in a computing environment where inputs, outputs and intermediate values...
US-9,443,090 System and method for targeted messaging, workflow management, and digital rights management for geofeeds
The disclosure relates to systems and methods for targeted messaging, workflow management, and digital rights management for geofeeds, including content that is...
US-9,443,089 System and method for mobile proactive secret sharing
Described is a system for mobile proactive secret sharing. The system utilizes a Secret-Share protocol to share, by server P.sub.j, a secret s among a set of...
US-9,443,088 Protection for multimedia files pre-downloaded to a mobile device
Embodiments of the disclosure relate generally to methods and systems for pre-downloading at least a portion of a media event to a mobile device and the...
US-9,443,087 Synchronization of transactional data and analytical data between data centers
Synchronization of transactional data and analytical data between data centers. Metadata is received by a transactional system from a user interface included in...
US-9,443,086 Systems and methods for fixing application vulnerabilities through a correlated remediation approach
The invention relates to a system and method for fixing application vulnerabilities through a correlated remediation approach. This invention involves...
US-9,443,085 Intrusion detection using taint accumulation
A method operable in a computing device adapted for handling security risk can use taint accumulation to detect intrusion. The method can comprise receiving a...
US-9,443,084 Authentication in a network using client health enforcement framework
A network with authentication implemented using a client health enforcement framework. The framework is adapted to receive plug-ins on clients that generate...
US-9,443,083 Systems, methods and apparatuses for protection of antivirus software
The systems, methods and apparatuses described herein provide a computing system for executing an antivirus software program. In one aspect, a non-transitory...
US-9,443,082 User evaluation
Improving the integrity of a computer system including a plurality of user accounts by, for each user account, monitoring events on the computer system that are...
US-9,443,081 Method and apparatus for controlling access to a resource in a computer device
A computer device and method are described for controlling access to a resource. An execution environment executes a user process with access privileges...
US-9,443,080 Application execution in a restricted application execution environment
Application programming interface (API) calls made by an application are intercepted at runtime. A determination is made as to whether each intercepted API call...
US-9,443,079 Application execution in a restricted application execution environment
Application programming interface (API) calls made by an application are intercepted at runtime. A determination is made as to whether each intercepted API call...
US-9,443,078 Secure access to a virtual machine
A management appliance includes at least one processor; and a memory communicatively coupled to the at least one processor. The memory comprising executable...
US-9,443,077 Flagging binaries that drop malicious browser extensions and web applications
A program binary file is identified as part of a webpage, where the file can be downloaded from the webpage for execution by a client. A browser-executable web...
US-9,443,076 Protection of user application setting from third party changes
Methods, systems, and apparatuses for protecting user settings of an application from third-party application changes are provided. An example method for...
US-9,443,075 Interception and policy application for malicious communications
Disclosed herein are system, method, and computer program product embodiments for adapting to malware activity on a compromised computer system. An embodiment...
US-9,443,074 Techniques for attesting to information
Systems and methods for attesting to information about a computing resource involve electronically signed documents. For a computing resource, a document...
US-9,443,073 System and method for verifying status of an authentication device
A system and method that includes receiving a first device profile and associating the first device profile with a first application instance that is assigned...
US-9,443,072 Methods and devices for granting access to and enabling passcode protection for a file
Methods and electronic devices configured to grant access to a file, and of enabling passcode protection for a file. The methods may include displaying file...
US-9,443,071 Proximity based device security
Devices, systems and methods are disclosed for additional security, functionality, and convenience in the operation of a wireless communication device with the...
US-9,443,070 Secure social network
Systems and methods for facilitating and securing the exchange of digital information between individuals within the social network of a person or group of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.