Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,471,827 Method of validation of the use of a real finger as support of a fingerprint
Validation of using a finger as support of a fingerprint may include: placing the support such that it bears; capturing a captured image of the print;...
US-9,471,826 Determining fingerprint scanning mode from capacitive touch sensor proximate to lens
A photography subsystem is configured to be operated in fingerprint scanning mode and a normal mode. An autofocus module may be initialized to control a lens...
US-9,471,825 Method of manufacturing an electronic card
The present application relates to overcoming some of the physical problems associated with putting a biometric sensor into the body of an electronic card, such...
US-9,471,824 Embedded barcodes for displaying context relevant information
Described herein are systems and methods employing embedded barcodes to convey supplemental information about an image, for example a motion picture. In some...
US-9,471,823 Multiple barcode processing apparatus, systems, and methods
Various embodiments of apparatus, systems, and methods operate to identify, by a scanning device, whether barcode data includes one of a primary type or a...
US-9,471,822 Demarcating a redaction area within a field of view of a video stream
A system, such as a barcode scanner, can include a camera directed at a scene. The scene can include an area that occasionally includes sensitive information;...
US-9,471,821 External access to memory on an RFID tag
In embodiments of the present invention improved capabilities are described for an RFID tag comprising a radio frequency (RF) network node and a communication...
US-9,471,820 Method and system for locating objects
Method and systems for locating objects, in particular RFID tags, employ one or more RFID reading devices. The methods and/or systems make it possible to...
US-9,471,819 System and method for quality control, inspection and audit of utility assets
Method for capturing, organizing and retrieving data for utility assets using RFID tags, including: storing data related to a plurality of utility assets in a...
US-9,471,818 Communication station for communication with transponders and further communication stations with the aid of...
A communication station (1) is suitable for contactless communication with transponders and with further communication stations and has a first ...
US-9,471,817 Action-triggered radio-frequency identification tag
A radio-frequency identification (RFID) system includes at least one tag having tag circuitry configured to detect activation of a trigger switch resulting from...
US-9,471,816 Increasing dynamic range of RFID tag self-tuning
An RFID tag tuning circuit is capable of tuning the impedance matching between an RFID integrated circuit (IC) and an antenna on an RFID tag to increase the...
US-9,471,815 Diagnosing a magnetic reader
The illustrative embodiments provide a magnetic reader assembly, a magnetic reader subassembly, a computer implemented method, and a computer program product...
US-9,471,814 Reader and method for reading data
A reader (112) for reading a plurality of data, wherein each data in the plurality of data is associated with a respective source (16) and is carried by a...
US-9,471,813 Portable encoded information reading terminal configured to adjust transmit power level
A system and method of adjusting the transmission strength emitted by an integrated RFID reader. The system may stores the location of the RFID when moved...
US-9,471,812 Method for implementing security of non-volatile memory
An integrated circuit includes a non-volatile memory module that can censor access to various memory regions based upon a censorship criteria. Information used...
US-9,471,811 Learning a new peripheral using a security provisioning manifest
A secure provisioning manifest used to authenticate and securely communicate with peripherals attached to a computer is provided with techniques to learn about...
US-9,471,810 Method and system for determining hidden states of a machine using privacy-preserving distributed data...
A method classifies data to determine hidden states of a machine by first acquiring data from the machine in a client, which is permuting randomly, and then...
US-9,471,809 Method and system for providing secure transactions via a broadband gateway
A broadband gateway may be used to authorize transactions associated with one or more accounts, which may be associated with a user of the broadband gateway....
US-9,471,808 File management system and method
A file management system comprises an identification device, an administration device, and a supervisory device. A first computing processor of the...
US-9,471,807 System and method for creating a security slices with storage system resources and related operations relevant...
Exemplary methods include receiving a message from an agent requesting to perform a first set of operations on a first set of storage namespaces mapped to a...
US-9,471,806 Protection of state data in computer system code
Method and system are provided for protecting state data of computer system code. The computer system code may be operating system code, subsystem code or...
US-9,471,805 Selective encryption of data stored on removeable media in an automated data storage library
In an automated data storage library, selective encryption for data stored or to be stored on removable media is provided. One or more encryption policies are...
US-9,471,804 Method and system for managing and controlling direct access of an administrator to a computer system
A method, computer program product, and computer system for managing and controlling direct access of an administrator to a computer system. An interceptor...
US-9,471,803 System and method for secure multi-tenancy in an operating system of a storage system
Exemplary methods for providing secure multi-tenancy in a Purpose Built Backup Appliance include creating a set of tenant-units (TUs), associating file system...
US-9,471,802 Hybrid file systems
Methods may provide a virtual system with direct access to one or more sectors of a resource of a computer system. The method may include providing, by a...
US-9,471,801 Method and apparatus to support privileges at multiple levels of authentication using a constraining ACL
Embodiments of the present invention provide systems and techniques for creating, updating, and using an ACL (access control list). A database system may...
US-9,471,800 Securing visual information on images for document capture
Techniques to provide secure access to data are disclosed. An indication that an operator is assigned to index a data value extracted from a document image is...
US-9,471,799 Method for privileged mode based secure input mechanism
A system and method are disclosed for securely receiving data from an input device coupled to a computing system. The system includes an interface configured to...
US-9,471,798 Authorization policy objects sharable across applications, persistence model, and application-level...
A global policy store, in which policies applicable to multiple applications in an enterprise environment can be stored, can be stored in association with that...
US-9,471,797 Automatic role tuning in a computer system
Embodiments are directed to a computer-based system for tuning roles. The system includes a memory and a processor system communicatively coupled to the memory....
US-9,471,796 Intelligent key selection and generation
A method, computer program product, and system for selecting and generating a key to perform a cryptographic operation are described. The method includes...
US-9,471,795 System and method providing permission based access to automotive computers
A Link device has a processor connected to an internal Link bus, a non-transitory memory, a digital device ID, one or both of firmware or software executing...
US-9,471,794 Determining whether a data storage is encrypted
A method, program and/or system reads a file through a first path from a data storage to obtain a first data. The file is read through a second path from the...
US-9,471,793 System on chip with embedded security module
An embedded security module includes a security processor, volatile and non-volatile memory, and an interface. The security processor includes transistors...
US-9,471,792 Detection arrangement
There is provided a detection arrangement for detecting an attack to internal signals in a semiconductor device. The detection arrangement comprises a first...
US-9,471,791 Private decayed sum estimation under continual observation
Described herein is a method and system for providing privacy guarantees with an improved privacy-accuracy trade-off. Dynamic data can be accessed from a...
US-9,471,790 Remediation of security vulnerabilities in computer software
Processing a downgrader specification by constructing a set of candidate downgrader placement locations found within a computer software application, where each...
US-9,471,789 Compliance method for a cyber-physical system
The present invention provides for analysis of cyber-physical systems with relation to compliance requirements such as regulatory compliance, maintenance...
US-9,471,788 Evaluation of software applications
Software applications receive input data, perform processing of the received data and generate output. In one aspect the output is modification of data...
US-9,471,787 Detecting stored cross-site scripting vulnerabilities in web applications
A system for detecting security vulnerabilities in web applications, the system including, a black-box tester configured to provide a payload to a web...
US-9,471,786 Method for booting and dumping a confidential image on a trusted computer system
A method for dumping a confidential image on a trusted computer system. A trusted computer system loads an encrypted client dumper image key. The trusted...
US-9,471,785 Systems and methods for secure boot ROM patch
A data processing system includes a boot read only memory (ROM) configured to store boot code; one time programmable (OTP) storage circuitry configured to store...
US-9,471,784 Automated firmware settings verification
Systems and methods are described for managing computing resources. In one embodiment, data representative of an abstracted firmware framework is maintained....
US-9,471,783 Generic unpacking of applications for malware detection
A technique for detecting malware in an executable allows unpacking of a packed executable before determining whether the executable is malware. In systems with...
US-9,471,782 File scanning method and system, client and server
A file scanning method and a file scanning system, a client and a server are disclosed. The server may determine a property indicator of a file, that represents...
US-9,471,781 Method and apparatus for monitoring and filtering universal serial bus network traffic
In one embodiment, a method includes obtaining at least one packet from a first element on a Universal Serial Bus (USB) bus. The at least one packet is intended...
US-9,471,780 System, method, and computer program product for mounting an image of a computer system in a pre-boot...
A system, method, and computer program product are provided for controlling loading of an operating system, including mounting an image of an operating system...
US-9,471,779 Information processing system, information processing device, monitoring device, monitoring method
An information processing system in which a monitoring device can detect illegal and/or abnormal operations in a system to be monitored, without using detailed...
US-9,471,778 Automatic baselining of anomalous event activity in time series data
Software that automatically creates baselines from time series data of computer system activity, thereby providing immediate value from observed system data....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.