Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,507,978 Antenna device for RFID reader/writer
An antenna device that includes a pair of antenna elements for an RFID reader/writer to communicate information with an RFID tag is provided. The antenna...
US-9,507,977 Enabling proximate host assisted location tracking of a short range wireless low power locator tag
A host and a communicatively linked paired tag can be identified. The tag can be associated with a tracked entity. The tag can be a low power computing device...
US-9,507,976 Encoded information reading terminal with item locate functionality
An encoded information reading terminal can comprise a microprocessor, a memory communicatively coupled to the microprocessor, a communication interface, and an...
US-9,507,975 Protection of communication between an electromagnetic transponder and a terminal
A method for protecting communication between an electromagnetic transponder and a terminal, wherein the transmission of a polling request by the terminal is...
US-9,507,974 Indicia-reading systems having an interface with a user's nervous system
Indicia-reading systems that interface with a user's nervous system include a device with electrodes capable of detecting electromagnetic signals produced in...
US-9,507,973 Device capable of having a plurality of SIM cards
An apparatus with the middle structure being layered between the first outer structure and the second outer structure. The operational circuitry includes a...
US-9,507,972 Wireless card reader with contactless and contact card interfaces
Methods, systems, and apparatus, for a payment card reader comprising: a frame, where the frame includes a top surface, a bottom surface, a first side surface,...
US-9,507,971 Systems and methods for barcode integration in packaging design and printing
Methods and systems for barcode integration in packaging design and printing are described. The method includes receiving a request for a For Position Only...
US-9,507,970 CMOS current-mode squaring circuit
The CMOS current-mode squaring circuit includes a translinear loop. A rectifier is used to produce the absolute value of the input current. Carrier mobility...
US-9,507,969 Method of protecting power receiver and related wireless charging device
A method for a power receiver for protecting a power receiver from being taken without permission while charged wirelessly includes receiving wireless power...
US-9,507,968 Flying sense electrodes for creating a secure cage for integrated circuits and pathways
A system and method for disposing one or a plurality of flying sense electrode segments so as to physically cover integrated circuits, circuit pathways and...
US-9,507,967 Thwarting attacks that involve analyzing hardware sensor output
A hardware sensor and a hardware user-input component are integrated in a portable electronic device. The hardware sensor is operable to produce hardware sensor...
US-9,507,966 Information processing device and operation control method
According to one embodiment, a firmware stored in a ROM in an information processing device connects the information processing device to a first server through...
US-9,507,965 Always-available embedded theft reaction subsystem
A system comprising a platform protected by an always-on always-available security system is described. The system, in one embodiment, includes a core logic...
US-9,507,964 Regulating access using information regarding a host machine of a portable storage drive
Described herein are techniques for regulating access to a remote resource using two-factor authentication based on information regarding a host machine of a...
US-9,507,963 Method and apparatus for secure execution using a secure memory partition
A processor capable of secure execution. The processor contains an execution unit and secure partition logic that secures a partition in memory. The processor...
US-9,507,962 Method and apparatus for secure execution using a secure memory partition
A processor capable of secure execution. The processor contains an execution unit and secure partition logic that secures a partition in memory. The processor...
US-9,507,961 System and method for providing secure access control to a graphics processing unit
Systems, methods, and computer programs are disclosed for providing secure access control to a graphics processing unit (GPU). One system includes a GPU, a...
US-9,507,960 Systems and methods for automated data privacy compliance
Systems and methods for automated data privacy compliance involve a data privacy operations server receiving information via a web server regarding an...
US-9,507,959 Electronic equipment having display having divided screen and control method thereof
Provided is an electronic equipment, where divided display is performed and different user operates each screen, to protect privacy of showing contents....
US-9,507,958 Information disclosure system, information disclosure server, communication terminal, information disclosing...
An information disclosure system includes: an information disclosing unit; a setting unit; a history storage unit; and an interaction frequency calculating...
US-9,507,957 Providing features in a database system environment
A system and method for providing features in a database system. In one embodiment, a method includes receiving, from a user, a request for a feature, where the...
US-9,507,956 Stored data access controller
A stored data access controller, configured to control access to data items, stored in a data storage apparatus, composed of data values encoding a labelled...
US-9,507,955 System and method for executing code securely in general purpose computer
The various embodiments of the invention provide a method for executing code securely in a general purpose computer. According to one embodiment, a code is...
US-9,507,954 Monitoring digital images
Digital images are monitored by enabling access to a digital image, receiving a notification associated with the digital image from a first user, and regulating...
US-9,507,953 Information processing system, information processing method, and information processing apparatus
An information processing system includes one or more information processing apparatuses that implement an output data reception unit that receives sets of...
US-9,507,952 Launching a secure kernel in a multiprocessor system
In one embodiment of the present invention, a method includes verifying a master processor of a system; validating a trusted agent with the master processor if...
US-9,507,951 Technologies for secure input and display of virtual touch user interfaces
Technologies for secure input and display of a virtual touch user interface include a computing device having a security monitor that may protect memory regions...
US-9,507,950 System and method for handling peripheral connections to mobile devices
Systems and methods for establishing a data connection between a mobile device and a peripheral. The mobile device is configured to determine whether to handle...
US-9,507,949 Device and methods for management and access of distributed data sources
A device and method for provided access to distributed data sources includes a cloud security server configured to associate any number of data sources and...
US-9,507,948 Digital identity device
A digital identity device for uniquely identifying legal entities. The digital identity device is used for secure electronic communications.
US-9,507,947 Similarity-based data loss prevention
A technique performs similarity-based data loss prevention on content from a content source. The technique involves generating multiple variants from the...
US-9,507,946 Program vulnerability identification
In one embodiment, a system for identifying and tracking application vulnerabilities includes an interface, a processor, and a memory. The interface is operable...
US-9,507,945 Method and apparatus for automated vulnerability detection
A method executable via operation of configured processing circuitry to identify vulnerabilities in program code may include receiving a program and employing a...
US-9,507,944 Method for simulation aided security event management
A method for simulation aided security event management, the method comprises: generating attack simulation information that comprises multiple simulation data...
US-9,507,943 Analysis tool for data security
Technologies are described herein for an analysis tool for data security. An analysis tool can be configured to analyze data using a dynamic analysis and a...
US-9,507,942 Secure BIOS mechanism in a trusted computing system
An apparatus including a ROM and a microprocessor. The ROM includes BIOS contents that are stored as plaintext and an encrypted digest. The encrypted digest...
US-9,507,941 Method of verifying integrity of electronic device, storage medium, and electronic device
Disclosed herein are techniques for verifying the integrity of an electronic device. A normal world virtual processor and a secure world virtual processor are...
US-9,507,940 Adapting a security tool for performing security analysis on a software application
A system and method for adapting a security tool for performing security analysis on a software application. In one embodiment, a method includes maintaining a...
US-9,507,939 Systems and methods for batch processing of samples using a bare-metal computer security appliance
Described systems and methods allow conducting computer security operations, such as detecting malware and spyware, in a bare-metal computer system. In some...
US-9,507,938 Real-time code and data protection via CPU transactional memory support
A technique allows for memory bounds checking for dynamically generated code by using transactional memory support in a processor. The memory bounds checking...
US-9,507,937 Reporting malicious activity to an operating system
An apparatus includes a memory that is accessible by an operating system; and a basic input/output system (BIOS) handler. The BIOS handler, in response to...
US-9,507,936 Systems, methods, apparatuses, and computer program products for forensic monitoring
Systems, methods, apparatuses, and computer program products are provided for forensic monitoring. A system may include a forensic analysis apparatus and one or...
US-9,507,935 Exploit detection system with threat-aware microvisor
An exploit detection system deploys a threat-aware microvisor to facilitate real-time security analysis, including exploit detection and threat intelligence, of...
US-9,507,934 Filtering mechanism for securing Linux kernel
Systems and methods for providing security to the Linux kernel are described. Wrappers are provided around the kernel, thereby reducing the amount of testing...
US-9,507,933 Program execution apparatus and program analysis apparatus
Execute a countermeasure process for vulnerability reliably before an attack aiming at vulnerability occurs. A vulnerability countermeasure processing unit...
US-9,507,932 Policy enforcement in a topology abstraction system
A capability for providing policy enforcement in a topology abstraction system is presented. The capability for providing policy enforcement in a topology...
US-9,507,931 Security device and controlling method thereof
A security device and controlling method thereof are provided. The security device includes: a storage configured to store a plurality of passwords, wherein a...
US-9,507,930 Physical key secure peripheral interconnection
A multi-display device can interface with two or more different types of docking stations. The device can determine the type of dock and change the pin outs for...
US-9,507,929 Decentralized information flow securing method and system for multilevel security and privacy domains
The present invention discloses a method for securing information flow in an information system. The method comprises intercepting access requests to...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.