Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,449,215 Information processing apparatus, information processing method and information processing program
Information corresponding to a face image preferred by a user as a whole is presented while considering a face element preferred by the user. An information...
US-9,449,214 Fingerprint sensing device with protective coating
A sensing device comprising a plurality of sensing elements, each of the sensing elements being configured to provide a signal indicative of an electromagnetic...
US-9,449,213 Anti-shock relief print scanning
One or more techniques, devices and/or systems are disclosed for mitigating a perceived electrical sensation for a relief print scanning device. A current...
US-9,449,212 Capacitive fingerprint sensor with sensing elements comprising timing circuitry
The present invention relates to a capacitive fingerprint sensing device for sensing a fingerprint pattern of a finger, the capacitive fingerprint sensor...
US-9,449,211 Scanner with adjustable field of view
A scanner having a single integrated camera and a mechanism to adjustable alter the field of view of the camera to provide a field of view coverage area...
US-9,449,210 Method and system for detecting a correction pattern in a QR code
Method and system for detecting a correction pattern in a QR code are disclosed. In the detection of a correction pattern, coordinates of the correction pattern...
US-9,449,209 3D-structured pattern reading system
A 3D-structured pattern reading system, including: an object having a front face formed with a 3D-structured pattern for representing predetermined data; and a...
US-9,449,208 Compartmentalized smart refrigerator with automated item management
A smart refrigerator system includes a plurality of compartments for storing food items and one or more tag readers. The smart refrigerator system may read a...
US-9,449,207 RFID reader device and antenna device
An RFID reader device and an antenna device have a first antenna implemented as a near-field antenna, wherein the first antenna has a first dual strip line. The...
US-9,449,206 Network cable tracking system
Embodiments relate to a system and method of identifying a cable terminal plug and port on a computer system. An aspect includes a method having a step of...
US-9,449,205 Method and system for correctly identifying specific RFID tags
A system and method for identifying a specific RFID tag includes RFID reader circuitry, such as within an RFID reader, configured for sending and receiving RF...
US-9,449,204 Anti-recording card reading device
This anti-recording card reading device includes: a magnetic card reading head having a data reading terminal and a flexible circuit board, where the flexible...
US-9,449,203 Card reader with power efficient architecture that includes a power supply and a wake-up circuit
These and other objects of the present invention are achieved in a card reader with a read head positioned in a housing. The read head is configured to be...
US-9,449,202 Localizing tagged assets in a configurable monitoring device system
In a tag communication system, a method includes determining range information representative of a distance between two tags, and estimating parameter...
US-9,449,201 Integrated unit for reading identification information base on inherent disorder
The invention provides an authentication unit for reading identification and/or authentication information from a tag or object. The authentication unit...
US-9,449,200 Methods, systems and apparatus to secure devices via physical and/or virtual locking
Methods, systems, apparatus and articles of manufacture are disclosed to secure devices. An example disclosed apparatus includes a platform detector to...
US-9,449,199 Feature enablement within a printer
In one embodiment, an apparatus that removably connects to a first printer is validated, the validating including comparing first data stored within the...
US-9,449,198 Prime field elliptic cryptography processor
A system including a first circuit and a second circuit. The first circuit includes a multiplier array to receive a first operand and a second operand and...
US-9,449,197 Pooling entropy to facilitate mobile device-based true random number generation
A mobile device operating system pools any available entropy. The resulting entropy pool is stored in device memory. When storing entropy in memory, preferably...
US-9,449,196 Security data path verification
A formal verification approach verifies data access and data propagation paths in a circuit design by proving the unreachability of path cover properties of the...
US-9,449,195 Method and apparatus to perform online credential reporting
Embodiments of the invention provide a process for displaying a graphical indicator on an Internet enabled device which conveys relationships between an entity...
US-9,449,194 Secure access to running client application features from a browser application
A secure access is provided to a plurality of software application features associated with a plurality of software applications running on a user's device,...
US-9,449,193 Information processing apparatus
According to one embodiment, an information processing apparatus includes a nonvolatile semiconductor memory and a processor. The nonvolatile semiconductor...
US-9,449,192 Magnetic stripe reader tamper protection
A technique for tamper protection of incoming data signal to an electronic device is disclosed. An intentional interference signal is generated and modulated...
US-9,449,191 Device, system and method for securing and comparing genomic data
The present disclosure presents methods, systems, and devices for encrypting and comparing genomic data. The comparison of genomic data allows the owner of the...
US-9,449,190 Method and system for run-time dynamic and interactive identification software authorization requirements and...
A system, method and computer program product for identifying security authorizations and privileged-code requirements; for validating analyses performed using...
US-9,449,189 Protection of state data in computer system code
Method and system are provided for protecting state data of computer system code. The computer system code may be operating system code, subsystem code or...
US-9,449,188 Integration user for analytical access to read only data stores generated from transactional systems
The technology disclosed preserves the tenant specificity and user specificity of the tenant data by associating user IDs to complementary special IDs referred...
US-9,449,187 Environment-aware security tokens
The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about...
US-9,449,186 System for and method of managing access to a system using combinations of user information
The present invention is directed to systems for and methods of controlling access to computer systems. A method in accordance with the present invention...
US-9,449,185 Extensible and/or distributed authorization system and/or methods of providing the same
In certain example embodiments, an extensible and/or distributed security system is provided. In certain example embodiments the security system provides...
US-9,449,184 Time based access control in social software
An embodiment of the invention provides a method for controlling access to content in a social networking website, wherein a connection is established between a...
US-9,449,183 Secure file drawer and safe
An online file storage system comprising individual secure file drawers and safes is disclosed for securely storing and sharing confidential files. The system...
US-9,449,182 Access control for a document management and collaboration system
A method and apparatus for controlling access to documents retained by a document management and collaboration system is disclosed. The document management and...
US-9,449,181 Control and enforcement of access of user data
Control and enforcement of access of user data are described, including receiving a request from an application to access data associated with a user;...
US-9,449,180 Secure data parser method and system
The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention...
US-9,449,179 Information processor
Disclosed herein is an information processor that allows for manipulation of raw data to a certain extent with an application program while protecting the...
US-9,449,178 System, method and computer product for fast and secure data searching
A system for fast secured searching may include a user interface, a web layer configured for executing application logic and configured for interacting with a...
US-9,449,177 General protocol for proactively secure computation
Described is a system for proactively secure multi-party computation (MPC). Secret shares representing data are constructed to perform computations between a...
US-9,449,176 Computer system vulnerability analysis apparatus and method
Apparatus and methods to evaluate computing systems' vulnerability implement a series of steps wherein a system may be selected, and a specific component...
US-9,449,175 Method and apparatus for analyzing and detecting malicious software
A method for providing analysis and detection of malicious software may include directing a comparison of patterns within sample code to a predetermined set of...
US-9,449,174 Fingerprint analysis for anti-virus scan
Disclosed are systems and methods for fingerprint analysis for anti-virus scanning. In an embodiment, a method of scanning for infected data items is disclosed....
US-9,449,173 Techniques for enabling co-existence of multiple security measures
Various embodiments are directed enabling anti-malware software to co-exist with protective features of an operating system. An apparatus may include a...
US-9,449,172 Memory arrangement and method for detecting an attack on a memory arrangement
According to various embodiments, a memory arrangement is described having a first bit line, a first precharge device for precharging the first bit line to a...
US-9,449,171 Methods, systems, and computer readable mediums for providing supply chain validation
Methods, systems, and computer readable mediums for providing supply chain validation are disclosed. According to one exemplary embodiment, a method for...
US-9,449,170 Inhibiting denial-of-service attacks using group controls
A processor receives within a user interface of a process server on a first computer system a first signal that includes a request to create an isolated...
US-9,449,169 Block storage virtualization on commodity secure digital cards
One embodiment of the present invention provides a system that facilitates storing an image file of a virtual machine on a potentially unprotected flash storage...
US-9,449,168 Method and system for tracking machines on a network using fuzzy guid technology
A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality...
US-9,449,167 Method and system for securely accessing different services based on single sign on
An embodiment for securely accessing services of a service provider based on single sign on. The user device is authenticated by an authentication server if the...
US-9,449,166 Performing authentication based on user shape manipulation
In one embodiment, an apparatus comprises: a first logic to receive a user selection of an authentication shape, the authentication shape to be displayed on a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.