Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,740,900 Systems and devices controlled responsive to data bearing records
A device (12, 312, 494) operates to cause financial transfers responsive to data read from data bearing records. The device includes a reader (20, 314) that is...
US-9,740,899 RFID-based sensory monitoring of sports equipment
In aspects of RFID-based sensory monitoring of sports equipment, a number of RFID readers are positioned throughout a sports area to interrogate RFID tags that...
US-9,740,898 Person-monitoring system
The person monitoring system is a proximity surveillance system. The person monitoring system comprises an interrogator, a tag, and an accessory. A...
US-9,740,897 Inventory management system and method
An inventory management system includes an RFID reader, a multiplexing device operably connected to the RFID reader, and a plurality of shelving units. Each...
US-9,740,896 Method and system for managing an efficient production floor, via the internet of things
The invention discloses a computerized method for planning and monitoring an efficient production floor. A production site is provided with communication access...
US-9,740,895 Method and system for identifying and tracking tagged, physical objects
A controller device with one or more processors and memory determines an identity and a location of a tagged physical object based on contextual information...
US-9,740,894 Silent RFID state and restore back
Silent radio frequency identifier (RFID) state and restore back is described herein. An RFID tag enters a silent state by receiving a sleep command from an RFID...
US-9,740,893 Systems with interactive management of environmental objects relative to human appendages
Systems are described for analyzing an environment. A system embodiment includes, but is not limited to, a plurality of tags, at least one tag configured to be...
US-9,740,892 Method and system for asset tracking in an enterprise environment
A method and system for tracking an asset in an indoor facility. The method includes receiving, from a first mobile device, an asset tracking tag collision...
US-9,740,891 Tag-to-tag communication using RFID readers
Messages may be passed between Radio Frequency Identification (RFID) tags using RFID readers. A first tag with a message intended for a second tag sends the...
US-9,740,890 Card insertion part and card reader
A card insertion part for use with a card may include a card insertion port; a light guide member surrounding at least a part of a periphery of the card...
US-9,740,889 Determining a computer's position and system for manufacturing a tag
A method for accurately positioning a computer position, and identifying a specific rack position where the computer is without manual intervention. A camera is...
US-9,740,888 Tamper evident detection
Systems or methods can be used to detect evidence of tampering. The tampering can be physical tampering, such as the turning of a screw, or removal or...
US-9,740,887 Methods and systems to restrict usage of a DMA channel
In at least some embodiments, a system comprises a processor and a direct memory access (DMA) subsystem coupled to the processor. The system further comprises a...
US-9,740,886 Enhanced security for hardware decoder accelerator
A software security layer may be used to protect a system against exploitation of a hardware encoder accelerator by malicious data embedded in the one or more...
US-9,740,884 Method and device for generating a code
Methods and devices arranged to provide functions for generating a security code are described. These functions include defining a set of locations in the one...
US-9,740,883 System and method for enabling control of mobile device functional components
A system is provided including a non-transitory computer readable storage medium that causes a mobile device to store client states indicating statuses of...
US-9,740,882 Sensor privacy mode
Technologies for sensor privacy on a computing device include receiving, by a sensor controller of the computing device, sensor data from a sensor of the...
US-9,740,881 Defense against search engine tracking
Techniques for enhancing electronic privacy utilize noise to prevent third parties from determining certain information based on search queries. Users submit...
US-9,740,880 Encrypted virtual machines in a cloud
A method, system, and computer program product for intercepting communication between a virtual machine and an encrypted replication data stored on a storage...
US-9,740,879 Searchable encryption with secure and efficient updates
Methods, systems, and computer-readable storage media for selecting columns for using searchable encryption to query a database storing encrypted data....
US-9,740,878 Protection of state data in computer system code
A method, system, and computer program product are provided for protecting state data of computer system code. The computer system code may be operating system...
US-9,740,877 Systems and methods for data loss prevention while preserving privacy
Systems and methods for data loss prevention while preserving privacy are described, including receiving a data communication originating from an online account...
US-9,740,876 Securely storing and provisioning security telemetry of multiple organizations for cloud based analytics
A cloud based system receives multiple types of security telemetry from multiple participating organizations. The received security telemetry can be...
US-9,740,874 Content preview including sharable information
A user of a content management system can store one or more content items at the user's account with the system. In some instances, the system can generate and...
US-9,740,873 Documents with location attributes for access and storage
In electronic document access control, a document controller receives a document access request from an access device. The request is to access an electronic...
US-9,740,872 Data access control systems and methods
Various hardware and software configurations are described herein which provide improved security and control over protected data. In some embodiments, a...
US-9,740,871 System and method for initializing tokens in a dictionary encryption scheme
Computer systems and applications are provided for encrypting data that preserves the ability to process the encrypted data. The method includes receiving data...
US-9,740,870 Access control
An access control technology is described. Ownership control information is stored for an object in a computing system. Access control to objects in the...
US-9,740,869 Enforcement of document element immutability
In some embodiments, techniques for computer security comprise parsing an electronic document; determining that a first element of the electronic document...
US-9,740,868 Customizing a security report using static analysis
Respective edge weights are assigned to edges of a plurality of paths in a control flow graph representing a model of data flow of a computer program. Edge...
US-9,740,867 Securely passing user authentication data between a pre-boot authentication environment and an operating system
Systems and methods for securely passing user authentication data between a Pre-Boot Authentication (PBA) environment and an Operating System (OS) are...
US-9,740,866 Automatic measuring boot process using an automatic measuring processor coupled to a memory
An apparatus includes a first interface configured to be coupled to a storage device via a first bus. The apparatus includes a second interface configured to be...
US-9,740,865 System and method for configuring antivirus scans
Disclosed are systems and method for configuring antivirus scans on a computer. An example method comprising: identifying, by a hardware processor, a software...
US-9,740,864 System and method for emulation of files using multiple images of the emulator state
Disclosed are systems, methods, and computer program products for emulation of files using multiple images of the emulator state. In one example, the method...
US-9,740,863 Protecting a secure boot process against side channel attacks
Embodiments of an invention for protecting a secure boot process against side channel attacks are disclosed. In one embodiment, an apparatus includes...
US-9,740,862 Identifying malware based on a relationship between a downloader file and a downloaded file
A device may analyze a first file for malware. The device may determine that the first file causes a second file to be downloaded. The device may store linkage...
US-9,740,861 Method for detecting eavesdropping activity and terminal device
A method for detecting an eavesdropping activity and a terminal device. The method includes determining whether a terminal device is in a conversation; when the...
US-9,740,860 Device, system, and method of preventing unauthorized recording of visual content displayed on an electronic device
The present disclosure involves preventing unauthorized recording of visual content displayed on an electronic device. Via a mobile computing device, it is...
US-9,740,859 Threat detection using reputation data
Threat detection is improved by monitoring variations in observable events and correlating these variations to malicious activity. The disclosed techniques can...
US-9,740,858 System and method for identifying forged emails
Forged emails are detected by extracting email address parts of a sender email address. The email address parts include an account name, a subdomain, and a base...
US-9,740,857 Threat-aware microvisor
A threat-aware microvisor is configured to facilitate real-time security analysis, including exploit detection and threat intelligence, of operating system...
US-9,740,856 Apparatus and method for managing gaming engine file in a mobile platform
The present invention relates to managing a UNITY file in a mobile platform in order to forestall a UNITY library executable in a mobile platform from being...
US-9,740,855 System and method for modifying a software distribution package without recalculating digital signatures
Disclosed are systems, methods and computer program products for modifying a software distribution package. An example method includes receiving a software...
US-9,740,854 System and method for code protection
Systems, methods, and techniques are disclosed for. An example method of providing code protection includes identifying a set of methods including one or more...
US-9,740,853 Configuring a sandbox environment for malware testing
A device may receive a file to be analyzed in a sandbox environment, and may determine configuration information for configuring the sandbox environment. The...
US-9,740,852 System and method for assessing an application to be installed on a mobile communications device
A system and method checks for harmful behavior of an application to be installed on a mobile communications device. A server computer receives from the mobile...
US-9,740,851 Sending a password to a terminal
A mechanism is provided for sending a password to a terminal. A password send request is received. The status of each of a plurality of terminals coupled to the...
US-9,740,850 Controlling which users from an organization are to be part of a community space in an easy and error-free manner
A method, system and computer program product for controlling which users from an organization are to be part of a community space. A community collaboration...
US-9,740,849 Registration and authentication of computing devices using a digital skeleton key
A method for registering a computing device to a user account using at least one user-selected fingerprintable device externally accessible to the computing...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.