Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,646,187 Systems and methods for automated device pairing
A system is provided that includes a scanner movable relative to seat units and controllable devices each having RFID tags, the scanner configured to obtain a...
US-9,646,186 Rectifier biasing for self-tuning RFID tags
Impedance matching between an RFID IC and an antenna may be tuned to increase the amount of power that the IC can extract from an RF wave incident on the...
US-9,646,185 System and method for managing RFID tags
A system for managing a population of RFID tags where the system may include: an interrogator configured to transmit a select command to the population of RFID...
US-9,646,184 Information reading system, reading control device, reading control method, and recording medium
An information reading system includes a passive-type IC tag that identifies a device installed on side of an environment, a tag reader that reads...
US-9,646,183 Reading apparatus and reading method
A reading apparatus reading information from an RFID tag attached to a commodity configured to comprise: a casing consisting of an opening serving as an...
US-9,646,182 Interrogator and interrogation system employing the same
The present invention is directed to an interrogator, method of discerning metal and radio frequency identification (RFID) objects, and an interrogation system...
US-9,646,181 Card reader
A card reader may include a recording and reproducing means to perform reading of data or writing of data, a first cable configured to transmit a data signal...
US-9,646,180 Device monitoring using multiple servers optimized for different types of communications
An electronic device monitoring system uses two different types of servers to communicate with electronic devices of users. One type of server, which may be a...
US-9,646,179 Mechanical locking device for computer ports and portable storage devices
The present invention is directed to a mechanical locking device for securing computer Input/Output (I/O) ports that are in use and for securing unused computer...
US-9,646,178 Secure data storage based on physically unclonable functions
Technologies are generally described for partial programming of memory having physically unclonable functions for secure data storage. In some examples, a...
US-9,646,177 Systems and methods for preventing data remanence in memory systems
Methods, circuits, and systems for preventing data remanence in memory systems are provided. Original data is stored in a first memory, which may be a static...
US-9,646,176 Method for encrypting database
According to an embodiment of the present invention, a computer program stored in a computer-readable medium for encrypting a data value included in a data...
US-9,646,175 Two-way parity error detection for advanced encryption standard engines
A method of improving the operation of a processor executing a cryptographic process, by automatically detecting faults during both encryption and decryption...
US-9,646,174 Learning a new peripheral using a security provisioning manifest
A secure provisioning manifest used to authenticate and securely communicate with peripherals attached to a computer is provided with techniques to learn about...
US-9,646,173 Comment plug-in for third party system
In particular embodiments, one or more computing devices associated with a third-party system generate a web page comprising one or more references configured...
US-9,646,172 Data storage system for securely storing data records
Systems and methods are disclosed for securely storing and accessing data records. In an embodiment, a random seed value and a time period counter received from...
US-9,646,171 Method and apparatus for correctly binding form objects to encrypted XML data
A method and apparatus for correctly binding form objects to encrypted XML data is described. In one embodiment, the method includes examining at least one data...
US-9,646,170 Secure endpoint file export in a business environment
Embodiments for preventing data loss in a business environment are provided. In some embodiments, a secure endpoint file export application assigns users to...
US-9,646,169 Systems, methods, and apparatuses for implementing cross organizational data sharing
In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing cross organizational data sharing including, for...
US-9,646,168 Data access control method in cloud
A data access control method includes requesting, by the data owner unit, the generation of a data encryption key (DEK) from the manager unit, generating, by...
US-9,646,167 Unlocking a portable electronic device by performing multiple actions on an unlock interface
The disclosure provided herein includes a multi-step authentication process to unlock a portable electronic device. To unlock the device, a user can use a touch...
US-9,646,166 Masking query data access pattern in encrypted data
A method for encrypting a database includes the following step. Keywords in the database are encrypted to obtain encrypted search tags for the keywords. A table...
US-9,646,165 Managing electronic keys
Users of a social networking platform may provide electronic keys to other users of the social networking platform. Use of an electronic key may be subject to...
US-9,646,164 System and method for evaluating a reverse query
Real-time techniques for determining all access requests to an attribute-based access control policy which evaluate to a given decision, "permit" or "deny". The...
US-9,646,163 Communicating data between client devices using a hybrid connection having a regular communications pathway and...
A technique communicates data between a first client device and a second client device. The technique involves establishing a regular communications pathway...
US-9,646,162 Dynamic adaptive streaming over hypertext transfer protocol service protection
A method comprising encrypting a segment in response to receiving a segment request to generate an encrypted segment, and sending the encrypted segment, wherein...
US-9,646,161 Relational database fingerprinting method and system
Disclosed is a relational database fingerprinting system and method to identify a user of the relational database, the fingerprint provided by an originator of...
US-9,646,160 Apparatus and method for providing resilience to attacks on reset of the apparatus
An apparatus and method are provided for enhancing resilience to attacks on reset of the apparatus. The apparatus comprises at least one storage element, and...
US-9,646,159 Multi-file malware analysis
A device may identify a plurality of files for a multi-file malware analysis. The device may execute the plurality of files in a malware testing environment....
US-9,646,158 Systems and methods for detecting malicious files
A computer-implemented method for detecting malicious files may include (1) identifying a length of at least one line within a textual file, (2) assessing,...
US-9,646,157 Systems and methods for identifying repackaged files
A computer-implemented method for identifying repackaged files may include (1) identifying an application package that packages files for a mobile device...
US-9,646,156 System and method for detecting OBD-II CAN BUS message attacks
The present application discloses method and system for detecting potential security attacks against a vehicle networking through an OBD-II port. The system...
US-9,646,155 Systems and methods for evaluation of events based on a reference baseline according to temporal position in a...
Systems and methods for evaluation of events are provided. A user-specific reference baseline comprising a set of temporally-ordered sequences of events. An...
US-9,646,154 Return oriented programming (ROP) attack protection
Return oriented programming (ROP) attack prevention techniques are described. In one or more examples, a method is described of protecting against return...
US-9,646,153 Securing content from malicious instructions
A method and system is provided for securing content from malicious shaders. The method includes determining the content the shader is to execute. A signature...
US-9,646,152 Multi-profile mobile device interface for same user
A multi-environment computer device configured for providing a work environment type and a personal environment type via a user interface for a device user,...
US-9,646,151 Access token management
Provided is a server including: a user authenticating unit that authenticates, using an access token, a user of a user device; a token receiving unit that...
US-9,646,150 Electronic identity and credentialing system
Described is an electronic credentialing system that allows personal identity devices to interact; each interacting device has an installed identity engine that...
US-9,646,149 Accelerated application authentication and content delivery
A samples service is configured to provide accelerated application authentication and content delivery. A proof of identity of a client application is exchanged...
US-9,646,148 Method and apparatus for providing subscriber identity module-based data encryption and remote management of...
Portable storage devices and methods for remotely managing such portable storage devices are disclosed. For example, a method receives a request from an...
US-9,646,147 Method and apparatus of three-type or form authentication with ergonomic positioning
A system and methods for authenticating a user for access to a system input terminal that includes an infrared imager, a user input terminal, and a processing...
US-9,646,146 Utilization of biometric data
A system for capturing fingerprint data is provided. The system comprises a sensor configured to capture fingerprint data, wherein the sensor is configured to...
US-9,646,145 Method and system for dynamically assignable user interface
With their ubiquitous nature and perceived personalized character portable electronic devices are increasingly forming part of individual's life as applications...
US-9,646,144 Extending user authentication across a trust group of smart devices
Particular embodiments described herein provide for a wearable electronic device with a biometric sensor and logic. At least a portion of the logic is...
US-9,646,143 Semantic obfuscation of data in real time
Systems and methods for automatically maintaining the anonymity or privacy of a stream of data as it is transmitted over a network or provided for other use, by...
US-9,646,142 Ensuring authenticity in a closed content distribution system
A technique for maintaining encrypted content received over a network in a secure processor without exposing a key used to decrypt the content in the clear is...
US-9,646,141 Fast start of streaming digital media playback with deferred license retrieval
One embodiment of the present invention sets forth a technique for deferring license retrieval when streaming digital media content. The perceived delay between...
US-9,646,140 Method and apparatus for protecting online content by detecting noncompliant access patterns
Methods to detect and hamper or thwart noncompliant access to online data examine access patterns, history and statistical records, and which may send no,...
US-9,646,139 Chemical structure-informed metabolomics data analysis
This invention relates to statistically significant methods for metabolomics data analysis that incorporate the structure information of metabolites....
US-9,646,138 Bioimaging grid
A method may include standardizing an input image to produce a standardized input image; structurizing the standardized input image to be characterized by a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.