Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,465,965 Methods, systems and apparatuses for radio frequency identification
A system for radio frequency identification (RFID) includes an enclosure defining an interior region interior to the enclosure, and a feed for generating an...
US-9,465,964 Systems and methods using single antenna for multiple resonant frequency ranges
A radio frequency device utilizing an antenna having a single antenna structure resonant on multiple resonant frequency ranges. The antenna can be configured to...
US-9,465,963 Arrangement for and method of optimally adjusting the scan rate of scan beams generated bya radio frequency...
Retail items movable from an inventory location at a retail venue through a portal to a retail exit are automatically tracked. The items are individually...
US-9,465,962 Method and apparatus for verifying two dimensional mark quality
A method and system for applying a two dimensional mark on a first surface of a component and assessing mark quality, the method comprising the steps of...
US-9,465,961 Methods and circuits for securing proprietary memory transactions
Described are systems and method for protecting data and instructions shared over a memory bus and stored in memory. Independent and separately timed stream...
US-9,465,960 Physics-based authentication
In some examples, a controller is configured to generate a key based on a physics-based output of a component. The controller may, for example, use the key to...
US-9,465,959 Persistent agent supported by processor
A tamper resistant servicing Agent for providing various services (e.g., data delete, firewall protection, data encryption, location tracking, message...
US-9,465,958 Persistent agent supported by operating system in handheld device
A tamper resistant servicing Agent for providing various services (e.g., data delete, firewall protection, data encryption, location tracking, message...
US-9,465,957 Preventing predetermined type of configuration changes to computing devices in a computing system servicing a...
Preventing changes to computing devices in a computing system servicing a critical job, including: identifying, by a job protection module, a critical job...
US-9,465,956 System and method for privacy-aware information extraction and validation
Disclosed herein is a system to validate information about a user, or users, derived from publicly-accessible data. The system comprises a validation system...
US-9,465,955 System for and methods of controlling user access to applications and/or programs of a computer
A system includes an application access manager driver and an operating system (OS) kernel module in a kernel-mode address space of an OS. The system also...
US-9,465,954 Method and system for tracking masking of data
Methods and systems for tracking masking of one or more data elements in a datastore are disclosed. The methods involve monitoring one or more masking...
US-9,465,953 Secure virtual file management system
Virtual file management is disclosed. Managed content from multiple separate storage domains is organized into a virtual file system that maintains with respect...
US-9,465,952 Systems and methods for secure multi-tenant data storage
Systems and methods are provided for transmitting data for secure storage. For each of two or more data sets, a plurality of shares are generated containing a...
US-9,465,951 Systems and methods for resource management and certification
Systems for managing access to a plurality of resources for an organization are disclosed, and may include a plurality of resources associated with an...
US-9,465,950 Methods, apparatuses, and computer-readable storage media for securely accessing social networking data
An approach is provided for controlling access to social networking data for each of a plurality of members by issuing one or more first keys for at least one...
US-9,465,949 Information processing apparatus executing print preview according to different modes, and recording medium
An information processing apparatus includes: a first acquisition unit that acquires, as a first mode, a security mode of a first execution process regarding a...
US-9,465,948 Trust level activation
An isolation execution environment provides an application with limited resources to execute an application. The application may require access to secured...
US-9,465,947 System and method for encryption and key management in cloud storage
A cloud storage system includes an encryption server configured to encrypt a plurality of data by using encryption keys having a hierarchy, the hierarchy of...
US-9,465,946 Identification and execution of subsets of a plurality of instructions in a more secure execution environment
Embodiments of apparatus, computer-implemented methods, systems, devices, and computer-readable media are described herein for identifying and encrypting a...
US-9,465,945 Media service delivery system providing conditional access to media content from various client devices
A system for protecting the digital rights of content owners allows digital media to be delivered to only those media rendering client devices that have been...
US-9,465,944 Electronic system, electronic device and method capable of erasing password from basic input/output system...
A method capable of erasing a password from a BIOS automatically includes steps of the BIOS determining whether a password erasing flag has been set when an...
US-9,465,943 Extension of a platform configuration register with a known value
A computing system calculates a hash value of binary of a component of the computing system using a hash function and determines whether a signature that is...
US-9,465,942 Dictionary generation for identifying coded credentials
Techniques are described for identifying security credentials or other sensitive information by creating a dictionary of data elements included in documents...
US-9,465,941 Method, system, and apparatus for detecting malicious code
A method, a system, and an apparatus for detecting malicious code to solve the problem that detection efficiency is low and that more resources are occupied....
US-9,465,940 Wavelet decomposition of software entropy to identify malware
A plurality of data files is received. Thereafter, each file is represented as an entropy time series that reflects an amount of entropy across locations in...
US-9,465,939 Mitigation of malware
Systems and methods are provided in example embodiments for mitigating malicious calls. The system can be configured to determine a series of checksums for a...
US-9,465,938 Integrated circuit and method for detection of malicious code in a first level instruction cache
An integrated circuit may comprise a processor, a first level instruction cache having a first storage capacity, and a second level cache having a second...
US-9,465,937 Methods and systems for securely managing file-attribute information for files in a file system
A computer-implemented method for securely managing file-attribute information for files in a file system may comprise: 1) identifying at least one file, 2)...
US-9,465,936 Systems and methods for detecting return-oriented programming (ROP) exploits
Described systems and methods allow protecting a computer system from malware, such as return-oriented programming (ROP) exploits. In some embodiments, a set of...
US-9,465,935 Systems, methods, and apparatus for securing user documents
The invention is directed to systems, methods and apparatus for securing documents. The system comprises a server having a processor and a data storage device...
US-9,465,934 Control method for accessing java card object
It is provided a control method for accessing a Java card object, which includes: obtaining, by a Java card virtual machine, a type of a current accessing...
US-9,465,933 Virtualizing a hardware monotonic counter
Embodiments of an invention for virtualizing a hardware monotonic counter are disclosed. In one embodiment, an apparatus includes a hardware monotonic counter,...
US-9,465,932 Anti-peeping display system and method, anti-peeping display and anti-peeping glasses
The present disclosure discloses an anti-peeping display system includes an anti-peeping display, anti-peeping glasses and a controller. The anti-peeping...
US-9,465,931 Secure online gaming registration system with privacy controls
An online gaming registration system allows online gaming patrons to register once and use this registration to create online gaming accounts with gaming Web...
US-9,465,930 Fingerprint gestures
User authentication for a user device can leverage one or more fingerprint sensor regions installed in the device capable of detecting and/or recognizing a...
US-9,465,929 System and method for controlling user access to an electronic device
A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and...
US-9,465,928 No-CAPTCHA CAPTCHA
A device generates parameters identifying selectively revealed un-obfuscated information associated with administering and assessing a Turing test. The device...
US-9,465,927 Validating input by detecting and recognizing human presence
Techniques are disclosed for validating input on a handheld device. In response to receiving an input and a request to access a computing resource, an...
US-9,465,926 Method of obfuscating a code
A method of obfuscating a code is provided, wherein the method comprises performing a first level obfuscating technique on a code to generate a first obfuscated...
US-9,465,925 System for regulating access to and distributing content in a network
There is provided a system for regulating access and managing distribution of content in a network, such as the Internet. The system includes communication...
US-9,465,924 Apparatus for preventing replay attack and method for preventing replay attack
An apparatus for preventing replay attacks and a method for preventing replay attacks are provided in this invention, wherein the apparatus for preventing...
US-9,465,923 Blackouts architecture
In embodiments, apparatuses, methods and storage media are described that are associated with blackout rules for media content. In embodiments, one or more...
US-9,465,922 Methods for secure data distribution
A method for secure distribution of data in an interchange network, comprises having a network in which data records stored on at least one computer; and...
US-9,465,921 Systems and methods for selectively authenticating queries based on an authentication policy
A computer-implemented method for selectively authenticating a request based on an authentication policy is described. A request is received from a client. A...
US-9,465,920 Providing assistance with reporting
A system for maintaining corresponding information in a structured document and in a report is disclosed. The structured document comprises structured data...
US-9,465,919 Pill dispenser
A pill dispenser is disclosed that includes a housing defining an opening, a pill-dispensing mechanism disposed within the housing and operatively coupled to...
US-9,465,918 Electronic drug dispenser system
A medication administration and tracking system is described. The system is equipped with an electric medication dispenser configured to administer medication...
US-9,465,917 Hazard based assessment patterns
Methods and devices for retrospectively assessing continuous monitoring reference pattern data to determine a risk of a patient glucose level measurement taken...
US-9,465,916 Caregiver rounding communication system
An information technology system for a healthcare facility is provided. The system includes a first computer device to keep track of rounding intervals for...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.