Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,501,677 Data entry device with enhanced aiming
An improvement is made to a scanning device to increase item throughput at the point of sale (POS). The scanning device implements a mirror that allows a...
US-9,501,676 Data management device, contactless storage medium, and data management method
A data management device configured to manage data stored in a contactless storage medium mounted to an electronic apparatus has a data storage unit that stores...
US-9,501,675 RFID tag and reader authentication by trusted authority
A Radio Frequency Identification (RFID) reader containing a reader key authenticates an RFID tag containing a tag key by receiving a tag identifier from the...
US-9,501,674 Terminal for line-of-sight RFID tag reading
There is provided a terminal for use in determining which of one or more candidate RFID tags having unique data stored thereon is a target RFID tag within an...
US-9,501,673 Method and apparatus for transmitting a signal by a radio frequency identification reader
A Radio Frequency Identification (RFID) reader is provided that receives a digital input signal, converts the digital input signal to an analog input signal,...
US-9,501,672 Electrical card connector preventing card from flying out of the receiving space
An electrical card connector (100) includes an insulative housing (1), a number of contacts (2) retained in the insulative housing, a metal shell (3) covering...
US-9,501,671 Barcode and electronic tag reader
A reader includes a body and a scan member. The body includes a scan zone configured for placing at least one barcode and an electronic tag. The scan member is...
US-9,501,670 Labeling and authenticating using a microtag
A system for decoding energy peaks of an identifier includes an interface and a processor. The interface is configured to receive a reference peak position...
US-9,501,669 Method and apparatus for location-based recovery of stolen mobile devices
A method, apparatus, and system for locating mobile devices. The system includes a location-aware mobile device. The location-aware mobile device includes a...
US-9,501,668 Secure video ouput path
Systems and methods for secure delivery of output surface bitmaps to a display engine. An example processing system comprises: an architecturally protected...
US-9,501,667 Security domain prediction
A data processing apparatus supports operation in both a secure domain and a less secure domain. The secure domain has access to data that is not accessible...
US-9,501,666 Polymorphic computing architectures
Polymorphic computing architectures can support and control separate, independently executable domains and other components on a computing platform. In some...
US-9,501,665 Method and apparatus for remotely provisioning software-based security coprocessors
A virtual security coprocessor is created in a first processing system. The virtual security coprocessor is then transferred to a second processing system, for...
US-9,501,664 Method, apparatus and system to compensate for drift by physically unclonable function circuitry
Techniques and mechanisms to detect and compensate for drift by a physically uncloneable function (PUF) circuit. In an embodiment, first state information is...
US-9,501,663 Systems and methods for videophone identity cloaking
A system, method, and computer-usable medium are disclosed for masking the identity of a human agent by transforming a live video transmission into a persona...
US-9,501,662 System and method for online data processing
Customer online data is collected via script on customer computers and is communicated to a server hosted by an organization, such as a card issuer. The...
US-9,501,661 Systems and methods for implementing an encrypted search index
A search index stored within the system having a plurality of individual search index files having information stored therein. At least one of the individual...
US-9,501,660 Privacy protection for a life-log system
Technologies are generally described for privacy protection for a life-log system. In some examples, a method performed under control of a life-log system may...
US-9,501,659 Inheriting social network information
Various embodiments provide for inheriting social network information from a first user to one or more other users. In various examples, rule-based criteria...
US-9,501,658 Avoiding file content reading using machine information
A method, system and computer program product for protecting access to a computer file are disclosed. In embodiments, the method comprises a user, employing a...
US-9,501,657 Sensitive data protection during user interface automation testing systems and methods
There is provided systems and method for sensitive data protection during user interface automation testing. A user may transmit sensitive data to the test...
US-9,501,656 Mapping global policy for resource management to machines
A global policy is applied to only select resources (e.g., certain file folders) based on property settings associated as metadata with those resources. The...
US-9,501,655 System and method for authentication
A multi-functional device is attached to a secure network and includes a control circuit. The control circuit receives indications as to whether a user is...
US-9,501,654 Sensitive data obfuscation in output files
Embodiments include method, systems and computer program products for protecting sensitive data. Aspects include accessing computer readable program...
US-9,501,653 Method and apparatus of verifying usability of biological characteristic image
A method and an apparatus of verifying a usability of a biological characteristic image are disclosed. The method includes: receiving a biological...
US-9,501,652 Validating sensitive data from an application processor to modem processor
An electronic circuit 120 includes a more-secure processor (600) having hardware based security (138) for storing data. A less-secure processor (200) eventually...
US-9,501,651 Distinguish valid users from bots, OCRs and third party solvers when presenting CAPTCHA
Embodiments of the present invention relate to a method of providing an automated public Turing test to a client display system. The method includes providing...
US-9,501,650 Application security testing
The present disclosure provides a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed...
US-9,501,649 Systems and methods for determining potential impacts of applications on the security of computing systems
A computer-implemented method for determining potential impacts of applications on the security of computing systems may include (1) identifying an application...
US-9,501,648 Configuring configuration settings using a user context
An illustrative embodiment of a computer-implemented process for configuring configuration settings authenticates a user of a predetermined system to form an...
US-9,501,647 Calculating and benchmarking an entity's cybersecurity risk score
Determining an entity's cybersecurity risk and benchmarking that risk includes non-intrusively collecting one or more types of data associated with an entity....
US-9,501,646 Program verification apparatus, program verification method, and computer readable medium
A necessary information extraction unit extracts, from variables used in a target program, an output variable to which output information to be output by an...
US-9,501,645 System and method for the protection of computers and computer networks against cyber threats
Systems and methods for protecting against cyber threats are disclosed. The system includes an external network accessing layer (ENAL) and a core computing...
US-9,501,644 Malware protection
According to a first aspect of the present invention there is provided a method of protecting a computer system from malware, which malware attempts to prevent...
US-9,501,643 Systems and methods for detecting malicious executable files containing an interpreter by combining emulators
Systems and methods to detect malicious executable files having a script language interpreter by combining a script emulator and a machine code emulator. A...
US-9,501,642 Render engine, and method of using the same, to verify data for access and/or publication via a computer system
A method and system to verify active content at a server system include receiving, at the server system a communication (e.g., an e-mail message or e-commerce...
US-9,501,641 Method of intrusion detection in terminal device and intrusion detecting apparatus
A method of intrusion detection in a terminal device that supports driving of a plurality of operating systems, is provided. The method includes collecting at a...
US-9,501,640 System and method for statistical analysis of comparative entropy
In accordance with one embodiment of the present disclosure, a method for determining the similarity between a first data set and a second data set is provided....
US-9,501,639 Methods, systems, and media for baiting inside attackers
Methods, systems, and media for providing trap-based defenses are provided. In accordance with some embodiments, a method for providing trap-based defenses is...
US-9,501,638 Techniques for managing security modes applied to application program execution
A device includes a memory and a processor coupled to the memory. The processor is configured to execute a management program, an application program, and a...
US-9,501,637 Hardware shadow stack support for legacy guests
Technologies for shadow stack support for legacy guests include a computing device having a processor with shadow stack support. During execution of a call...
US-9,501,636 Automatically altering and encrypting passwords in systems
In an approach for changing a password. Aspects of an embodiment of the present invention include an approach for changing a password, wherein the approach...
US-9,501,635 Isolation of services or processes using credential managed accounts
This disclosure describes methods, systems, and application programming interfaces for creating a credential managed account. This disclosure describes creating...
US-9,501,634 Efficient browser-based identity management providing personal control and anonymity
A system allows a reliable and efficient identity management that can, with full interoperability, accommodate to various requirements of participants. For that...
US-9,501,633 Information processing device, information processing method, and computer program
An information processing device includes a display that displays an input screen including a plurality of images, an image selecting section that selects at...
US-9,501,632 Visual authentication to a computing device
For visually authenticating to a computing device, a method is disclosed that includes receiving an authentication request at a computing device, displaying a...
US-9,501,631 Biometric sensor for touch-enabled device
One or more techniques and/or systems are disclosed for a biometric imager that can be integrated into a touch enabled computing device, and may be used to...
US-9,501,630 Method for generating a human likeness score
One embodiment of the invention is a method utilizing a CAPTCHA to generate a human likeness score including blocks: a) receiving a user solution to the...
US-9,501,629 Transparent reconnection
In the event of an unintentional interruption, a token issued by a host system to a client system is used to reestablish communications without disrupting...
US-9,501,628 Generating a distrubition package having an access control execution program for implementing an access control...
A data distribution system, method and program for generating a distribution package for distribution data to a client. An environment of a requesting client...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.