Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,594,934 RFID remote antenna security system
A remote antenna security system for preventing unauthorized reading of RFID cards. The RFID remote antenna security system generally includes at least one...
US-9,594,933 Printable, writeable article for tracking counterfeit and diverted products
A device includes a first reader capable of reading a seed value from an object, a second reader capable of accessing and retrieving an original value from a...
US-9,594,932 Method for connecting a portable RFID reader to a handheld computing device via an audio connection
Methods and systems for efficiently communicating information to/from an RFID reader are provided. According to one embodiment, a command is received by a...
US-9,594,931 Card connector
A card connector including a body, a slider in the body, an urging member, and a cover. The body has a slot for insertion and removal of a card. The slider is...
US-9,594,930 Extended analog computer apparatus
An extended analog computer includes an electrically conductive material with a plurality of sides. At least one of the sides is isolated from an electrical...
US-9,594,929 Open architecture security methods and systems
Devices, methods, systems, and computer-readable media for open architecture security are described herein. One or more embodiments include a method for open...
US-9,594,928 Multi-channel, multi-lane encryption circuitry and methods
Encryption/authentication circuitry includes an encryption portion having a first number of encryption lanes, each encryption lane including a plurality of...
US-9,594,927 Providing a trusted execution environment using a processor
In an embodiment, a system on a chip includes: a single core to execute a legacy instruction set, the single core configured to enter a system management mode...
US-9,594,926 Data processing apparatus, data processing system, and data processing method
A data processing apparatus includes a first communication interface configured to acquire the history data; a memory configured to store the acquired history...
US-9,594,925 Method to delay locking of server files on edit
A server is implemented with a modified file open action, which, when a user performs the modified open, initially opens a file without locking the file. When a...
US-9,594,924 Managing global cache coherency in a distributed shared caching for clustered file systems
Various embodiments are provided for managing a global cache coherency in a distributed shared caching for a clustered file system (CFS). The CFS manages access...
US-9,594,923 Data protection systems and methods
Systems and methods are provided for protecting electronic content from the time it is packaged through the time it is experienced by an end user. Protection...
US-9,594,922 Non-persistent shared authentication tokens in a cluster of nodes
Implementations are provided herein for a token to be generated on one node within the cluster of nodes, and then used on any of the nodes to authenticate...
US-9,594,921 System and method to provide server control for access to mobile client data
Systems and methods for protecting a data item include, upon initiation of transfer of the data item from a server to a client device, determining a sensitivity...
US-9,594,920 Managing keys used for encrypting data
A method, a data processing system, and a computer program product for managing cryptographic information. A determination is made as to whether a first time...
US-9,594,919 System and method for executing file by using biometric information
Provided are a first device for transmitting data, a second device for receiving data, and a system including the same. The first device includes: a controller...
US-9,594,918 Computer data protection using tunable key derivation function
A computer-implemented method of protecting digital data includes applying a key derivation function to a first value to generate a first derived key, the first...
US-9,594,917 Secured multi-directional, multi-interface transaction processing
Embodiments of the present disclosure describe an apparatus, method, and computer readable medium for processing a secure transaction. One embodiment describes...
US-9,594,916 Method and devices for providing secure data backup from a mobile communication device to an external computing...
A method and devices for providing secure data backup from a mobile communication device to an external computing device is described. In one embodiment, there...
US-9,594,915 Information processing apparatus
A hardware TPM has a plurality of registers, and performs data protection by encryption of data associated with the value of one of the plurality of registers....
US-9,594,914 Collecting data from processor-based devices
In accordance with some embodiments, information may be collected from processor-based devices after the processor-based devices have already been deployed....
US-9,594,913 System, method, and non-transitory computer-readable storage media for analyzing software application modules...
In different embodiments of the present invention, systems, methods, and computer-readable storage media allow a user to analyze software application modules,...
US-9,594,912 Return-oriented programming detection
According to one embodiment, a threat detection system is integrated with at least a dynamic analysis engine. The dynamic analysis engine is configured to...
US-9,594,911 Methods and apparatus for multi-factor authentication risk detection using beacon images
Methods and apparatus are provided for multi-factor authentication of a user using beacon images. Access is provided to a protected resource by receiving a...
US-9,594,910 In-system provisioning of firmware for a hardware platform
A hardware platform includes a nonvolatile storage device that can store system firmware as well as code for the primary operating system for the hardware...
US-9,594,909 Software updating apparatus, software updating system, invalidation method, and invalidation program
To aim provide a software update apparatus including an install module group composed of a plurality of install modules. Each of the install modules has a...
US-9,594,908 Identifying an evasive malicious object based on a behavior delta
A security device may receive actual behavior information associated with an object. The actual behavior information may identify a first set of behaviors...
US-9,594,907 Unauthorized activity detection and classification
Systems and methods are provided for identifying and detecting unauthorized user activity and for decreasing the rate of false-positives. The disclosed systems...
US-9,594,906 Confirming a malware infection on a client device using a remote access connection tool to identify a malicious...
A device may receive a trigger to determine whether one or more client devices, of a set of client devices, are infected by a malicious file. The device may...
US-9,594,905 Framework for efficient security coverage of mobile software applications using machine learning
For one embodiment, a method is described that involves the instrumenting of an application of a computing system with at least one monitoring function, where...
US-9,594,904 Detecting malware based on reflection
According to one embodiment of the disclosure, a computerized method is described to detect a malicious object through its attempt to utilize reflection. The...
US-9,594,903 Reputation scoring of social networking applications
A method and apparatus for reputation scoring of applications on social networking services is described. A reputation score system scans a profile area of an...
US-9,594,902 Analyzing a password-protected file for malware
A device may receive a password-protected file to be accessed for analysis. The device may identify a contextual term, associated with the password-protected...
US-9,594,901 Methods, systems, and products for secure access to file system structures
Methods, systems, and products are disclosed for securing access to a file system. A directory is established in a hierarchical file structure having access...
US-9,594,900 Isolating applications hosted by plug-in code
Described is a technology in which one application running in a browser can host another application (e.g., an advertisement) in an isolated manner that...
US-9,594,899 Apparatus and method for managing operation of a mobile device
A power charger includes a first storage area to store control software, a charging circuit to send power through an interface, and a processor to generate at...
US-9,594,898 Methods and systems for controlling access to resources and privileges per process
To control privileges and access to resources on a per-process basis, an administrator creates a rule that may be applied to modify a token of a process. The...
US-9,594,897 Crum chip mountable in comsumable unit, image forming apparatus for authentificating the crum chip, and method...
Provided herein is an image forming apparatus, comprising: a consumable unit where a CRUM (Customer Replaceable Unit Monitoring) chip is mounted; and a main...
US-9,594,896 Two factor authentication using near field communications
There is provided a method and apparatus for communications using short range communications such as Near Field Communications (NFC). A mobile device comprising...
US-9,594,895 Information processing system and authentication information providing method for providing authentication...
An information processing system includes an electronic device; a service providing system including information processing devices connected to the image...
US-9,594,894 System and method for enabling a camera used with an electronic device using detection of a unique motion
A biometric recognition system for providing security for an electronic device includes a digital camera for providing a biometric image from a user of the...
US-9,594,893 Multi-touch local device authentication
An embodiment provides a method, including: detecting, at a touch sensitive surface of an information handling device, user input including at least one...
US-9,594,892 User authentication method and apparatus based on electrocardiogram (ECG) signal
An authentication apparatus includes an electrocardiogram (ECG) signal receiver configured to receive a target ECG signal, and a preprocessor configured to...
US-9,594,891 Personal authentication method and personal authentication device
(Purpose) The present invention provides a technology capable of simply performing individual authentication with high accuracy by extracting the feature of the...
US-9,594,890 Identity-based content access control
In embodiments, apparatuses, methods and storage media are described that are associated with performing identity-based access control for content. A content...
US-9,594,889 System and method for remotely assigning and revoking access credentials using a near field communication...
The present invention is generally directed toward a mobile device that can be used in a secure access system. More specifically, the mobile device can have...
US-9,594,888 User authentication device
There is disclosed a user authentication device for issuing authentication information. The user authentication device comprising a photovoltaic panel...
US-9,594,887 Monetized online content systems and methods and computer-readable media for processing requests for the same
One aspect of the invention provides a computer system having processing and memory means operable to provide a monetized online content system. The computer...
US-9,594,886 Application and open source information technology policy filter
The present invention is directed to a software distribution architecture in which an enterprise has a filter that screens user requested software, software...
US-9,594,885 Licensing using a cloud public-messaging infrastructure
In various embodiments, methods and systems for license-messaging using cloud public-messaging infrastructures are provided. A cloud public-messaging...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.