Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,536,123 Data application method and system of RFID tags
A data application method and system of radio-frequency identification (RFID) tags are provided. The method includes: when a first-type RFID tag is within a...
US-9,536,122 Disposable multivariable sensing devices having radio frequency based sensors
A multivariable sensing device for sensing one or more parameters of a process fluid disposed in a container is provided. The multivariable sensing device...
US-9,536,121 Semiconductor device and chip identifier setting method
A semiconductor chip transmits a request signal which requests notification of the setting state of a chip identifier to another semiconductor chip connected to...
US-9,536,120 Method for enhancing stability of communication between a contactless card and a card reader
The invention discloses a method for enhancing stability of communication between a contactless card and a card reader, relating to communication field. In the...
US-9,536,119 Network cable tracking system
Embodiments relate to a system and method of identifying a cable terminal plug and port on a computer system. An aspect includes a method having a step of...
US-9,536,118 Card reader and method of operating the same
A card reader performing a wireless communication with a card includes a first pulse generation unit generating a first detection pulse for detecting the card,...
US-9,536,117 Pluggable small form-factor UHF RFID reader
Systems and methods for reading Radio Frequency Identified (RFID) tags. In an embodiment, an enclosure having, within it, an antenna and processor is provided....
US-9,536,116 Active component embedded in cable
Examples disclose a cable to secure data transmission. Examples of the cable include a connector to connect to a computing device for data transmission....
US-9,536,115 Electronic device and method for unlocking the electronic device
In a method for unlocking an electronic device with a touch screen and a distance sensor, a triggering signal to unlock the electronic device is received....
US-9,536,114 Secure mobile proactive multiparty computation protocol
Described is system for secure mobile proactive multi-party computation. The system securely evaluates a circuit in the presence of an adversary. The circuit...
US-9,536,113 Information processing apparatus, information processing system, and computer program product
According to an embodiment, an information processing apparatus includes a main processor, a secure operating system (OS) module, a non-secure OS module, a...
US-9,536,112 Delaying or deterring counterfeiting and/or cloning of a component
In an embodiment, to deter or delay counterfeiting/cloning of a replacement component of a host device, the replacement component is provided with a code value....
US-9,536,111 Secure processing unit systems and methods
A hardware Secure Processing Unit (SPU) is described that can perform both security functions and other information appliance functions using the same set of...
US-9,536,110 Secure processor and a program for a secure processor
The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated...
US-9,536,109 Method and system for administering a secure data repository
A method, system and computer program product for administering a secure data repository. Rather than using a specific database, an application may use an...
US-9,536,108 Method and apparatus for generating privacy profiles
A privacy processing system may use privacy rules to filter sensitive personal information from web session data. The privacy processing system may generate...
US-9,536,107 System and method enabling multiparty and multi level authorizations for accessing confidential information
Disclosed is a method and system for enabling multi-party and multi level authorizations for accessing confidential information. A first set of access privilege...
US-9,536,106 System and method for the display of restricted information on private displays
The present invention is directed to a system and method for restricting data, or portions thereof, to specific display devices when accessed by a user....
US-9,536,105 Method and apparatus for providing data access via multi-user views
An approach is provided for providing data access via multi-user views. An access management platform determines at least one view of data, wherein the at least...
US-9,536,104 Managing global cache coherency in a distributed shared caching for clustered file systems
Various embodiments are provided for managing a global cache coherency in a distributed shared caching for a clustered file system (CFS). The CFS manages access...
US-9,536,103 Secure cloud storage distribution and aggregation
Methods and systems for vendor independent and secure cloud storage distribution and aggregation are provided. According to one embodiment, an application...
US-9,536,102 Privacy-protective data transfer
A method receives authentication credentials for a user from a client device and receives a request from the user for content stored on a remote storage system....
US-9,536,101 System and method for controlling access to data using API for users with disabilities
Disclosed are systems and methods for controlling access to data on mobile devices using an accessibility API for users with disabilities. An exemplary method...
US-9,536,100 Scalable secure execution
In one embodiment a controller comprises logic configured to establish a pairing with a remote processor in a second electronic device, create a first secure...
US-9,536,099 Information processing apparatus and method of setting security thereof
An information processing apparatus includes an accepting unit that accepts from a user a command relating to security; a setting unit that makes a setting...
US-9,536,098 Methods and systems for concealing information
A retrieving system for retrieving information concealed within a sequence of symbols. The system includes a decoder configurable using rule information and...
US-9,536,097 Method and apparatus for secure display of visual content
Methods and apparatus for displaying visual content on a display such that the content is comprehensible only to an authorized user for a visual display system...
US-9,536,096 Presenting visualizations of business intelligence data
A system and method for managing business intelligence data is described. In some example embodiments, the system extracts data and metadata from a business...
US-9,536,095 System for booting and dumping a confidential image on a trusted computer system
A computer system for booting a confidential image on a trusted computer system. A trusted computer system loads an encrypted client image key onto a protected...
US-9,536,094 Mediated secure boot for single or multicore processors
A system and methods are disclosed for securely booting a processing system using a three step secure booting process. Several embodiments are presented,...
US-9,536,093 Automated verification of a software system
Software code of a software system (e.g., a software stack) may be verified as conforming to a specification. A high-level language implementation of the...
US-9,536,092 Method, system, and program product for remotely attesting to a state of a computer system
A method, system, and program product for remotely attesting to a state of computing system is provided. Specifically, the present invention allows a remote...
US-9,536,091 System and method for detecting time-bomb malware
According to one embodiment, a system comprises one or more counters; comparison logic; and one or more hardware processors communicatively coupled to the one...
US-9,536,090 Method of defending a computer from malware
To defend a computer against malware, first executable code, of the computer, that includes a signature that identifies an address, in the computer's memory, of...
US-9,536,089 Atomic detection and repair of kernel memory
A method for detecting memory modifications includes allocating a contiguous block of a memory of an electronic device, and loading instructions for detecting...
US-9,536,088 System and method for protection of memory in a hypervisor
Disclosed are systems and methods for enabling secure execution of code in hypervisor mode. An exemplary method comprises: loading a hypervisor configured to...
US-9,536,087 Controlling malicious activity detection using behavioral models
Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based...
US-9,536,086 Circuit arrangement, a method for forming a circuit arrangement, and method for integrity checking
A circuit arrangement is provided, the circuit arrangement including a processor; a memory circuit connected to the processor, wherein the processor is...
US-9,536,085 Data management of potentially malicious content
In a data management system, examination of first data for malicious content by a malicious content scanner is initiated in response to a request to write first...
US-9,536,084 Systems and methods for delivering event-filtered introspection notifications
Described systems and methods enable a computer security module to protect a set of guest virtual machines against computer security threats. In some...
US-9,536,083 Securing data on untrusted devices
One example method for securing data on untrusted devices includes the steps of identifying, by a first process, a command in a command queue, the command from...
US-9,536,082 Isolated program execution environment
Embodiments relate to an isolated program execution environment. An aspect includes receiving, by the isolated program execution environment on a computer...
US-9,536,081 System and process for managing network communications
A communication protocol and system is disclosed for network communications between a data service residing on a client that provides network communications...
US-9,536,080 Method for validating dynamically loaded libraries using team identifiers
According to one embodiment, in response to a request received from an application by a launch module hosted by an operating system and executed by a processor...
US-9,536,079 Safely executing an untrusted native code module on a computing device
A system that safely executes a native code module on a computing device. During operation, the system receives the native code module, which is comprised of...
US-9,536,078 Integrated circuit for cyber security processing
In one aspect, an integrated circuit (IC) includes a secure router configured as a trust anchor, a non-volatile random access memory (RAM) direct memory access...
US-9,536,077 Method for detecting attacks and for protection
A method is provided for attack detection and protection of a set of virtual machines in a system, which includes at least one first host server hosting said...
US-9,536,076 Software verification for automatic train operation
An automatic train operation system includes a first control system configured to run a first software for controlling a first vehicle subsystem and a second...
US-9,536,075 Dynamic resource sharing
Representative implementations of devices and techniques provide dynamic secure sharing of resources. A resource module can be partitioned into a plurality of...
US-9,536,074 Method and apparatus for providing single sign-on for computation closures
An approach is provided for providing single sign-on for computation closures. A single sign-on management platform determines to create a single sign-on...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.