Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,542,581 Asset tracking system
Embodiments of the subject technology provide a multi-tenant asset tracking system that disambiguates or filters RFID tags.
US-9,542,580 RFID communication system and method for controlling same
Described herein is a system and method for the continuous operation of an RFID communication system in a user-friendly manner and to ensure the reliability...
US-9,542,579 Facilitating gesture-based association of multiple devices
Gesture-based association of multiple devices may be facilitated, which may effectuate presentation of content related to associated devices. Gesture detection...
US-9,542,578 RFID system and method
An RFID system includes an RFID antenna assembly configured to be positioned on a product module assembly of a processing system. The product module assembly is...
US-9,542,577 Information RFID tagging facilities
In embodiments of the present invention improved capabilities are described for a system of information RFID tagging facilities comprising a first radio...
US-9,542,576 Magnetic helical physical unclonable function measured above flight
A helical physical unclonable function is disclosed. The helical physical unclonable function may be used to authenticate a supply item for an imaging device....
US-9,542,575 Transaction terminal device
In a transaction terminal device, a magnetic head module that supports a magnetic head which reads a magnetic card, and a plurality of communication antennas...
US-9,542,574 Programmable logic controller
A programmable logic controller includes a device that stores therein data, an authentication-information storage unit that stores therein authentication...
US-9,542,573 Privacy server for protecting personally identifiable information
A privacy server protects private information by substituting a token or an identifier for the private information. The privacy server recognizes that a...
US-9,542,572 Method of managing map information, navigation system, information terminal, and navigation device
A method of managing map information including: attaching a retrieval identifier, according to input information, to map information which is obtained by...
US-9,542,571 System and method of owner application control of electronic devices
Systems and methods of owner application control of an electronic device are provided. Owner application control information is stored on the electronic device...
US-9,542,570 Permission control
In some example implementations, there is provided a method including determining, from a received request, one or more attributes; sending, by a permission...
US-9,542,569 Information processing system, information processing apparatus, storage medium having stored therein...
An example of an information processing system includes first storage means for storing saved data of an application and a second storage means. The information...
US-9,542,568 Systems and methods for enforcing third party oversight of data anonymization
A modifiable server is utilized to reliably seal and unseal data according to a measurement of the server, by structuring the server to have a modifiable...
US-9,542,567 Methods and systems for enabling media guidance application operations based on biometric data
Methods and systems are disclosed herein for encouraging particular behavior or performing particular actions based on biometric data of a user. Specifically,...
US-9,542,566 Develop and deploy software in multiple environments
Developing, deploying, and operating an application in a plurality of environments is disclosed, including: defining runtime specific configuration information...
US-9,542,565 Display device and method for controlling the same
A display device and a method for controlling the same are disclosed. The method for controlling a display device comprises the steps of displaying a control...
US-9,542,564 Personal site privacy policy
A request, from a requester, is received to view user information on a user's personal site associated with a user. A relationship is determined between the...
US-9,542,563 Accessing protected content for archiving
According to one embodiment of the present invention, a system for accessing protected content includes a first computing device with at least one processor....
US-9,542,562 Display system, display method, display terminal and non-transitory computer-readable recording medium stored...
A display system for displaying a document includes a tablet terminal and a head mounted display device (HMD). The tablet terminal includes a display device...
US-9,542,561 Instructions processors, methods, and systems to process secure hash algorithms
A method of an aspect includes receiving an instruction. The instruction indicates a first source of a first packed data including state data elements a.sub.i,...
US-9,542,560 Methods and systems for providing access control to secured data
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all...
US-9,542,559 Detecting exploitable bugs in binary code
Systems and methods for performing hybrid symbolic execution to detect exploitable bugs in binary code are described. In some example embodiments, the systems...
US-9,542,558 Secure factory data generation and restoration
In various embodiments, methods, devices and systems for securely generating, sealing, and restoring factory-generated calibration and provisioning data for an...
US-9,542,557 Snoop-based kernel integrity monitoring apparatus and method thereof
A snoop-based kernel integrity monitoring apparatus and a method thereof are provided. More particularly, provided are a kernel integrity monitoring apparatus...
US-9,542,556 Malware family identification using profile signatures
A potential malware sample is received from a security device at a server associated with a security cloud service. The sample is executed in a sandbox...
US-9,542,555 Malware detection system and method for compressed data on mobile platforms
A system and method for detecting malware in compressed data. The system and method identifies a set of search strings extracted from compressed executables,...
US-9,542,554 Deduplicating malware
Detecting duplicate malware samples is disclosed. A first guest clock is set to a first value in a first virtual machine instance. A first malware sample is...
US-9,542,553 Systems and methods of identity protection and management
In an embodiment, a computing system, such as a monitoring computer, receives a request from a user to monitor an account of the user with an online service...
US-9,542,552 Extensible platform for securing apps on a mobile device using policies and customizable action points
An extensible platform gives app developers more control and granularity when developing apps and making them secure. App developers are able to use an app...
US-9,542,551 Information processing apparatus, information processing method, and non-transitory computer-readable medium
An information processing apparatus comprises: a manual login unit configured to display a login screen, and to perform user authentication using user...
US-9,542,550 Method of mutual authentication between a radio tag and a reader
A method of mutual authentication between a radio tag and a radio reader. The method includes: authentication of the tag by the reader, implemented on a first...
US-9,542,549 Toolbar for single sign-on and non-single sign-on sites, applications, systems, and sessions
A method including receiving a request to connect to a single sign-on site, a non-single sign-on site, a system, a mainframe, or to use a mainframe or user...
US-9,542,548 Computer application security
A method of providing restricted access to computer application information via a computing device includes: displaying a limited-access icon on a display of...
US-9,542,547 Identification to access portable computing device
A portable computing device receives an identity card and restricts access to the portable computing device if the identity card is unassociated with the...
US-9,542,546 System and method for implicitly resolving query scope in a multi-client and multi-tenant datastore
An apparatus comprising a multi-tenant datastore and a processor coupled to the multi-tenant datastore, wherein the processor is configured to receive a request...
US-9,542,545 System, method and computer program product for access authentication
A method and technique for access authentication includes: responsive to receiving an access request from a user for a secure resource, logging an Internet...
US-9,542,544 Correlated display of biometric identity, feedback and user interaction state
Aspects of the subject disclosure are directed towards providing feedback to users of multi-user system that has biometric recognition capabilities, so that a...
US-9,542,543 Biometric authentication device, biometric authentication method and computer readable, non-transitory medium
A biometric authentication device including: a data-for-matching generation portion generating a data for matching from biometric information; an update-demand...
US-9,542,542 Single step transaction authentication using proximity and biometric input
A system and method provide efficient, secure and highly reliable authentication for transaction processing and/or access control applications in which only...
US-9,542,541 System and method for distinguishing human swipe input sequence behavior
Recording, analyzing and categorizing of user interface input via touchpad, touch screens or any device that can synthesize gestures from touch and pressure...
US-9,542,540 System and method for managing application program access to a protected resource residing on a mobile device
A computer-implemented method for managing application program access to a protected resource residing on a mobile device is provided. The method includes...
US-9,542,539 Managing software deployment
The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of...
US-9,542,538 Electronic content management and delivery platform
An education digital reading platform provides aggregation, management, and distribution of digital education content and services. The platform ingests content...
US-9,542,537 Method and system for confidentially providing software components
A method and system for confidentially providing a software component which is encrypted using a secret cryptographic key of a software component manufacturer,...
US-9,542,536 Sustained data protection
Among other things, one or more techniques and/or systems are provided for sustained data protection. In particular, a data protector may define a set of access...
US-9,542,535 Systems and methods for recognizing behavorial attributes of software in real-time
A computer-implemented method for recognizing behavioral attributes of software in real-time is described. An executable file is executed. One or more runtime...
US-9,542,534 Prescription control system
A medication dispensing device comprises a case having a front panel, a back panel and sidewalls. The case defines a medication holding area and a dosage...
US-9,542,533 Medication dosage dispensing system and methods having customization and modification for medicine dispensing...
A device for monitoring and correction of a functional condition of a human body on the basis of measurement of thresholds of temperature painful sensitivity...
US-9,542,532 Decision support recommendation optimization
Systems, methods, and computer-readable media are provided for facilitating clinical decision making by directing the emission of computer-generated health-care...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.