Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,483,671 Methods and apparatuses to identify devices
Embodiments of the present invention include systems with Readers and Tags in which a Reader queries the Tags with a parameter that includes a level of...
US-9,483,670 RFID tag writing system and method for writing RFID tag data
According to one embodiment, a RFID tag writing system has a conveying unit configured to convey a plurality of RFID tags, an antenna configured to transmit a...
US-9,483,669 Barcode imaging workstation having sequentially activated object sensors
A workstation includes a proximity system having multiple object sensors each associated with an object field of view for detecting a target object outside the...
US-9,483,668 Method of securing volumes of space in card readers
Capacitive sensing electrodes may be placed in strategic locations inside, outside or inside and outside of a card reader, wherein touch sensor circuitry is...
US-9,483,667 Dip card reader
In accordance an example embodiment, there is disclosed herein a card reader having an opening allowing for card to be inserted. The card reader determines how...
US-9,483,666 Logarithmic and exponential function generator for analog signal processing
The logarithmic and exponential function generator for analog signal processing is implemented with CMOS circuits operating in current mode and includes current...
US-9,483,665 Method for monitoring an electronic security module
A method and a computer program are provided for implementing memory accesses. A hypervisor is used for this purpose, via which the memory access takes place.
US-9,483,664 Address dependent data encryption
Encryption of data within a memory 6 is provided by key generation circuitry 12 which serves to generate a key as a function of the address within the memory 6...
US-9,483,663 Countermeasure method for protecting stored data
A method of read or write access by an electronic component of data, including generating a first secret key for a first data of an ordered list of data to...
US-9,483,662 Method and apparatus for remotely provisioning software-based security coprocessors
A virtual security coprocessor is created in a first processing system. The virtual security coprocessor is then transferred to a second processing system, for...
US-9,483,661 Facilitating electronic signatures based on physical proximity of devices
Systems and methods for requesting transmission of a document from a sender device to a signer device, for purposes of obtaining an e-signature from the signer...
US-9,483,660 Enterprise content management platform validator
The present invention is directed to a system that enables a user (an associate, a data specialist, a researcher, an adjuster, an agent, a teller, or the like)...
US-9,483,659 Instant personalization security
Some embodiments involve methods and systems for instant personalization security. For example, a social networking system can provide a platform for a user to...
US-9,483,658 Display device
A method of operating a display device, such as a tablet device, comprises displaying a plurality of covers corresponding to respective different data items,...
US-9,483,657 Secure online distributed data storage services
The data vaporizer provides secure online distributed data storage services that securely store and retrieve data in a public distributed storage substrate such...
US-9,483,656 Efficient and secure data storage utilizing a dispersed data storage system
A method of securely storing data to a dispersed data storage system is disclosed. A data segment is arranged along the columns or rows of an appropriately...
US-9,483,655 File backup with selective encryption
A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The...
US-9,483,654 Method and apparatus for storing, sharing, and/or organizing personal information
Embodiments of the subject invention relate to systems and methods for presenting and managing user information. Specific embodiments allow creating, editing,...
US-9,483,653 Secure display element
Techniques for securely displaying sensitive information against attempts to capture such information via screenshots are introduced. Similar to the pieces of a...
US-9,483,652 Enabling user privacy for changes of access to shared content
In one embodiment, a method for enabling user privacy for content on a network includes receiving input from a first user instructing at least one change in...
US-9,483,651 Methods and apparatus for transfer of content to a self contained wireless media device
Systems and techniques for transferring data to a storage device. A storage device includes storage, a processor, and a wireless transceiver, as well as a...
US-9,483,650 Systems and methods for managing data incidents
Systems and methods for managing a data incident are provided herein. Exemplary methods may include receiving data breach data that comprises information...
US-9,483,649 Image processing device, image processing system, image processing method, and program
There is provided an image processing device including a photographic subject position acquisition unit that acquires position information of a photographic...
US-9,483,648 Security testing for software applications
A mapping engine may be used to determine an attack model enumerating software attacks, the software attacks being represented by linked attack components, and...
US-9,483,647 Firmware verified boot
Methods and apparatus for verifying a boot process of a computing system are disclosed. An example computer-implemented method includes reading, by a computing...
US-9,483,646 Data exfiltration prevention from mobile platforms
Technology is disclosed for preventing an exfiltration of a data associated with an application executing on a mobile device. The technology can migrate the...
US-9,483,645 System, method, and computer program product for identifying unwanted data based on an assembled execution...
A system, method, and computer program product are provided for identifying unwanted data based on an assembled execution profile of code. In use, an execution...
US-9,483,644 Methods for detecting file altering malware in VM based analysis
According to one embodiment, a threat detection platform is integrated with at least one virtual machine that automatically performs a dynamic analysis of a...
US-9,483,643 Systems and methods for creating behavioral signatures used to detect malware
The disclosed computer-implemented method for creating behavioral signatures used to detect malware may include (1) maintaining a database that identifies (A)...
US-9,483,642 Runtime detection of self-replicating malware
A method for detecting malicious active processes and self replicating executable binary files on a computing device. The method comprises monitoring in runtime...
US-9,483,641 Method and device for the performance of a function by a microcircuit
A method for the performance of a function by a microcircuit, includes: at least one step of determining (205) whether an anomaly is detected or whether the...
US-9,483,640 System and method for deterring malicious network attacks
A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to...
US-9,483,639 Service partition virtualization system and method having a secure application
A secure application system and method for a host computing device. The system includes an ultraboot application divides the host computing device into a...
US-9,483,638 Method and system for preventing unauthorized processor mode switches
A system comprising a processor adapted to activate multiple security levels for the system and a monitoring device coupled to the processor and employing...
US-9,483,637 Program execution integrity verification for a computer system
A computer system may be employed to verify program execution integrity by receiving a request to launch a program that has been instrumented to include at...
US-9,483,636 Runtime application integrity protection
Systems, methods, apparatuses, and computer program products are described for checking the integrity of applications installed on a computing device and...
US-9,483,635 Methods, systems, and computer readable medium for active monitoring, memory protection and integrity...
Methods, systems, and computer readable media for active monitoring, memory protection, and integrity verification of a target device are disclosed. For...
US-9,483,634 Password generator
Methods and apparatus are disclosed for generating a short term password that may be used to access a data warehouse. According to aspects of the disclosure, a...
US-9,483,633 Method and terminal for authenticating a stlyus
Disclosed are a terminal authentication method and a terminal. The authentication method comprises: setting on the terminal a detection device; setting on a...
US-9,483,632 Intelligent controller system and method for smart card memory modules
A storage device contains a smart-card device and a memory device, both of which are accessed though a controller. The storage device may be used in the same...
US-9,483,631 System and method for remotely assigning and revoking access credentials using a near field communication...
The present invention is generally directed toward a mobile device that can be used in a secure access system. More specifically, the mobile device can have...
US-9,483,630 Information processing apparatus, method of controlling the same and storage medium
An information processing apparatus, a method of controlling the same, and a non-transitory computer-readable storage medium. The information processing...
US-9,483,629 Document authentication based on expected wear
Systems and methods are disclosed that enable authentication based on a physical document. Specifically, a document authentication service is disclosed that...
US-9,483,628 Methods and systems for altering settings or performing an action by a user device based on detecting or...
Systems and methods according to one or more embodiments are provided for detecting or recognizing a user and intelligently altering or adjusting user device...
US-9,483,627 Abstracting credentials for mobile client authentication
A computing system receives an authentication request from a user device for access to a web application hosted in a cloud and determines that the ...
US-9,483,626 Multi-security-CPU system
A computing system includes a first security central processing unit (SCPU) of a system-on-a-chip (SOC), the first SCPU configured to execute functions of a...
US-9,483,625 Delayed validation for software licensing and activation
A method for performing a delayed license validation may include receiving a request to execute a software application. In response to receiving the request to...
US-9,483,624 Method and apparatus for configuring privacy settings for publishing electronic images
A method and apparatus configure privacy settings for publishing electronic images. An image including first image content and second image content can be...
US-9,483,623 Displaying targeted website content based on social user profile data
Displaying targeted website content based on social user profile data is disclosed. In some embodiments, the displaying of targeted website content based on...
US-9,483,622 Pain visualization system and method
A computerized pain visualization system and method. A web-based application and interface allows individuals to anonymously share information about where they...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.