Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,576,178 Capacitive sensor packaging
An apparatus comprises a fingerprint sensor having a set of capacitive elements configured for capacitively coupling to a user fingerprint. The fingerprint...
US-9,576,177 Fingerprint sensing device
A fingerprint sensing device (and associated method of manufacturing) comprises a sensing chip arranged on a substrate with readout circuitry. The sensing chip...
US-9,576,176 Noise compensation in a biometric sensing device
An electronic device includes a biometric sensing device connected to a processing channel that includes at least one amplifier having a gain. One or more...
US-9,576,175 Generating emoticons based on an image of a face
A device is configured to receive an image of a person. The image may include an image of a face. The device may create an emoticon based on the image of the...
US-9,576,174 Systems and methods for serving pixel mapped content to merchandising communication systems
Described herein are systems and methods configured for serving pixel mapped content to one or more merchandising communication systems. A merchandising...
US-9,576,173 Methods and systems for a bind free pivoting trigger mechanism
A trigger assembly including a cylindrical pivot shaft having a pivot-shaft longitudinal axis; a trigger key having a front face, a back face opposite the front...
US-9,576,172 Systems and methods for simultaneously providing and reading machine-readable codes
Systems, methods, and non-transitory computer-readable media can acquire a first machine-readable code. The first machine-readable code can be provided on a...
US-9,576,171 Portable scanning device
A portable scanning device includes a first outer shell defining a receiving space therein, a second outer shell configured to couple with the first outer shell...
US-9,576,170 Host device for obtaining operating instructions for a barcode reader from a remote server
A host device is configured to (i) establish a point-to-point connection with a barcode reader via a point-to-point communication interface, (ii) determine that...
US-9,576,169 Image reader having image sensor array
An image reader can include an image sensor array. An image reader in one embodiment can include an optical system capable of directing light reflected from a...
US-9,576,168 Conditional retrieval
In one aspect of the present disclosure, a method is disclosed. The method involves: a reader detecting an eye-mountable device within a wireless communication...
US-9,576,167 Locating parts with electromagnetic identification (EMID) tags for contextual visualization
In one or more embodiments, a disclosed method involves transmitting a first transmit signal(s) having a first signal strength and/or a first field of view...
US-9,576,166 Apparatus, non-transient computer readable media, and methods for automatically quantifying space within a...
Improved methods, non-transient computer readable media, and apparatus are described for automatically quantifying space within a container using a scanning...
US-9,576,165 Multiple-speed interface
The present invention provides a security module having a communication interface being capable of operating according to any from a selection from a plurality...
US-9,576,163 Passively coupled RFID receiver
A passively coupled RFID receiver is disclosed. The apparatus according to embodiments of the invention can reduce the cost of the RFID reader while...
US-9,576,162 Information processing apparatus, information management method, and information management program
An information processing apparatus, including a reading apparatus which reads an electronic recording card, is disclosed. The apparatus includes a reading unit...
US-9,576,161 Card reader and control method therefor
A card reader for use with a card incorporated with an IC chip may include an insertion port into which the card is inserted; a metal detection mechanism...
US-9,576,160 Card reader
A card reader may include a card insertion part which is formed with an insertion port into which the card is inserted; and a magnetic sensor which is provided...
US-9,576,159 Multiple payment card reader system
Approaches provide for a mobile point-of-sale system configured to facilitate the transfer of funds between entities (e.g., customers and merchants). A card...
US-9,576,158 Decodable indicia reading terminal with indicia analysis functionality
A decodable indicia reading terminal can comprise a multiple pixel image sensor, an imaging lens configured to focus an image of decodable indicia on the image...
US-9,576,157 Method for mitigating the unauthorized use of a device
The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device...
US-9,576,156 Download security system
A download security system (100) includes a server (102) and an information processing apparatus (10). The information processing apparatus (10) includes a...
US-9,576,155 Trusted computing host
A trusted computing host is described that provides various security computations and other functions in a distributed multitenant and/or virtualized computing...
US-9,576,154 Methods of operating storage systems including using a key to determine whether a password can be changed
An embodiment of a method of operating a storage system includes combining a password, a first number, and a number of iterations to produce a first key,...
US-9,576,153 Device and method for providing information from a backend component to a frontend component by a secure device...
An exemplary system that includes a computing device that stores an abstraction and unification module, the abstraction and unification module being executable...
US-9,576,152 Data privacy employing a k-anonymity model with probabalistic match self-scoring
According to one embodiment of the present invention, a system for protecting data determines a desired duplication rate based on a level of desired anonymity...
US-9,576,151 Data privacy employing a k-anonymity model with probabalistic match self-scoring
According to one embodiment of the present invention, a system for protecting data determines a desired duplication rate based on a level of desired anonymity...
US-9,576,150 Validating a user of a virtual machine for administrator/root access
In one example, a method for validating a user includes transmitting, to a management server, a request for a shared secret, and receiving, from the management...
US-9,576,149 Methods, systems and computer program product for providing verification code recovery and remote authentication
The described embodiments relate to methods, systems, and products for providing verification code recovery and remote authentication for a plurality of devices...
US-9,576,148 Method, an apparatus, a computer system, a security component and a computer readable medium for defining...
The invention relates to a method for a computer system storing electronic objects being defined by metadata items. The method comprises deriving access rights...
US-9,576,147 Security policy application through data tagging
Techniques are described for applying data usage policies through data tagging. A metadata tag may be applied to data to indicate a type of the data. In some...
US-9,576,146 Service oriented secure collaborative system for compartmented networks
A system receives a request to store a document in a database, receives a user security token, analyzes the document to determine an adjudicated security level...
US-9,576,145 Alternate files returned for suspicious processes in a compromised computer network
Methods and systems are presented of presenting false and/or decoy content to an intruder operating on a computer system by obfuscating critical files on a...
US-9,576,144 Secured file system management
Systems and methods for accessing data secured and encrypted using a file system manager are disclosed. One method includes determining whether a community of...
US-9,576,143 Information processing apparatus, information processing method, and computer-readable medium
An information processing apparatus includes a determination unit, an operator change unit, and an image change unit. The determination unit determines whether...
US-9,576,142 Execution environment file inventory
A method is described to maintain (including generate) an inventory of a system of a plurality of containers accessible by a computer system. At least one...
US-9,576,141 Access controls on the use of freeform metadata
Approaches are described for security and access control for computing resources. Various embodiments utilize metadata, e.g., tags that can be applied to one or...
US-9,576,140 Single sign-on system for shared resource environments
Systems and methods for enhancing security of single sign-on are described. These systems and methods can reduce the amount of sensitive information stored on a...
US-9,576,139 Techniques for a secure graphics architecture
Techniques for implementing a secure graphics architecture are described. In one embodiment, for example, an apparatus may comprise a processor circuit and a...
US-9,576,138 Mitigating ROP attacks
Mitigating return-oriented programming attacks. From program code and associated components needed by the program code for execution, machine language...
US-9,576,137 Method and system for analyzing integrity of encrypted data in electronic control system for motor vehicle
A method for improving the functional security and increasing the availability of an electronic control system, particularly a motor vehicle control system,...
US-9,576,136 Method and device for providing a private page
Methods and devices for providing a private page are provided. A method includes operations of entering a security mode based on a user input; extracting the...
US-9,576,135 Profiling user behavior through biometric identifiers
This disclosure describes systems and methods for profiling user behavior through biometric identifiers. A first biometric identifier associated with a first...
US-9,576,134 Global platform health management
The use of one or more device health values to indicate the health status of a computing device may enable operating system developers to directly manage the...
US-9,576,133 Detection of data tampering of encrypted data
A device includes storage hardware to store a secret value and processing hardware coupled to the storage hardware. The processing hardware is to receive an...
US-9,576,132 Information processing apparatus and information processing method
The hash value for an entire system file partition for storing firmware of an information processing apparatus is calculated. Alteration of the firmware is...
US-9,576,131 Malware detection system and method for mobile platforms
In one example, a management server is configured to provide malware protection for one or more client mobile platforms in communication with the management...
US-9,576,130 Detecting malware on mobile devices
In one example, a mobile device includes a network interface configured to receive data for an application including a set of application permissions describing...
US-9,576,129 Defensive techniques to increase computer security
Among other disclosed subject matter, a computer-implemented method includes changing access permission level associated with a descriptor table responsive to...
US-9,576,128 Interlinking routines with differing protections using stack indicators
Corruption of program stacks is detected by using guard words placed in the program stacks. A called routine executing on a processor checks a guard word in a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.