At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-9,740,900 |
Systems and devices controlled responsive to data bearing records A device (12, 312, 494) operates to cause financial transfers responsive to data read from data bearing records. The device includes a reader (20, 314) that is... |
US-9,740,899 |
RFID-based sensory monitoring of sports equipment In aspects of RFID-based sensory monitoring of sports equipment, a number of RFID readers are positioned throughout a sports area to interrogate RFID tags that... |
US-9,740,898 |
Person-monitoring system The person monitoring system is a proximity surveillance system. The person monitoring system comprises an interrogator, a tag, and an accessory. A... |
US-9,740,897 |
Inventory management system and method An inventory management system includes an RFID reader, a multiplexing device operably connected to the RFID reader, and a plurality of shelving units. Each... |
US-9,740,896 |
Method and system for managing an efficient production floor, via the
internet of things The invention discloses a computerized method for planning and monitoring an efficient production floor. A production site is provided with communication access... |
US-9,740,895 |
Method and system for identifying and tracking tagged, physical objects A controller device with one or more processors and memory determines an identity and a location of a tagged physical object based on contextual information... |
US-9,740,894 |
Silent RFID state and restore back Silent radio frequency identifier (RFID) state and restore back is described herein. An RFID tag enters a silent state by receiving a sleep command from an RFID... |
US-9,740,893 |
Systems with interactive management of environmental objects relative to
human appendages Systems are described for analyzing an environment. A system embodiment includes, but is not limited to, a plurality of tags, at least one tag configured to be... |
US-9,740,892 |
Method and system for asset tracking in an enterprise environment A method and system for tracking an asset in an indoor facility. The method includes receiving, from a first mobile device, an asset tracking tag collision... |
US-9,740,891 |
Tag-to-tag communication using RFID readers Messages may be passed between Radio Frequency Identification (RFID) tags using RFID readers. A first tag with a message intended for a second tag sends the... |
US-9,740,890 |
Card insertion part and card reader A card insertion part for use with a card may include a card insertion port; a light guide member surrounding at least a part of a periphery of the card... |
US-9,740,889 |
Determining a computer's position and system for manufacturing a tag A method for accurately positioning a computer position, and identifying a specific rack position where the computer is without manual intervention. A camera is... |
US-9,740,888 |
Tamper evident detection Systems or methods can be used to detect evidence of tampering. The tampering can be physical tampering, such as the turning of a screw, or removal or... |
US-9,740,887 |
Methods and systems to restrict usage of a DMA channel In at least some embodiments, a system comprises a processor and a direct memory access (DMA) subsystem coupled to the processor. The system further comprises a... |
US-9,740,886 |
Enhanced security for hardware decoder accelerator A software security layer may be used to protect a system against exploitation of a hardware encoder accelerator by malicious data embedded in the one or more... |
US-9,740,884 |
Method and device for generating a code Methods and devices arranged to provide functions for generating a security code are described. These functions include defining a set of locations in the one... |
US-9,740,883 |
System and method for enabling control of mobile device functional
components A system is provided including a non-transitory computer readable storage medium that causes a mobile device to store client states indicating statuses of... |
US-9,740,882 |
Sensor privacy mode Technologies for sensor privacy on a computing device include receiving, by a sensor controller of the computing device, sensor data from a sensor of the... |
US-9,740,881 |
Defense against search engine tracking Techniques for enhancing electronic privacy utilize noise to prevent third parties from determining certain information based on search queries. Users submit... |
US-9,740,880 |
Encrypted virtual machines in a cloud A method, system, and computer program product for intercepting communication between a virtual machine and an encrypted replication data stored on a storage... |
US-9,740,879 |
Searchable encryption with secure and efficient updates Methods, systems, and computer-readable storage media for selecting columns for using searchable encryption to query a database storing encrypted data.... |
US-9,740,878 |
Protection of state data in computer system code A method, system, and computer program product are provided for protecting state data of computer system code. The computer system code may be operating system... |
US-9,740,877 |
Systems and methods for data loss prevention while preserving privacy Systems and methods for data loss prevention while preserving privacy are described, including receiving a data communication originating from an online account... |
US-9,740,876 |
Securely storing and provisioning security telemetry of multiple
organizations for cloud based analytics A cloud based system receives multiple types of security telemetry from multiple participating organizations. The received security telemetry can be... |
US-9,740,874 |
Content preview including sharable information A user of a content management system can store one or more content items at the user's account with the system. In some instances, the system can generate and... |
US-9,740,873 |
Documents with location attributes for access and storage In electronic document access control, a document controller receives a document access request from an access device. The request is to access an electronic... |
US-9,740,872 |
Data access control systems and methods Various hardware and software configurations are described herein which provide improved security and control over protected data. In some embodiments, a... |
US-9,740,871 |
System and method for initializing tokens in a dictionary encryption
scheme Computer systems and applications are provided for encrypting data that preserves the ability to process the encrypted data. The method includes receiving data... |
US-9,740,870 |
Access control An access control technology is described. Ownership control information is stored for an object in a computing system. Access control to objects in the... |
US-9,740,869 |
Enforcement of document element immutability In some embodiments, techniques for computer security comprise parsing an electronic document; determining that a first element of the electronic document... |
US-9,740,868 |
Customizing a security report using static analysis Respective edge weights are assigned to edges of a plurality of paths in a control flow graph representing a model of data flow of a computer program. Edge... |
US-9,740,867 |
Securely passing user authentication data between a pre-boot
authentication environment and an operating system Systems and methods for securely passing user authentication data between a Pre-Boot Authentication (PBA) environment and an Operating System (OS) are... |
US-9,740,866 |
Automatic measuring boot process using an automatic measuring processor
coupled to a memory An apparatus includes a first interface configured to be coupled to a storage device via a first bus. The apparatus includes a second interface configured to be... |
US-9,740,865 |
System and method for configuring antivirus scans Disclosed are systems and method for configuring antivirus scans on a computer. An example method comprising: identifying, by a hardware processor, a software... |
US-9,740,864 |
System and method for emulation of files using multiple images of the
emulator state Disclosed are systems, methods, and computer program products for emulation of files using multiple images of the emulator state. In one example, the method... |
US-9,740,863 |
Protecting a secure boot process against side channel attacks Embodiments of an invention for protecting a secure boot process against side channel attacks are disclosed. In one embodiment, an apparatus includes... |
US-9,740,862 |
Identifying malware based on a relationship between a downloader file and
a downloaded file A device may analyze a first file for malware. The device may determine that the first file causes a second file to be downloaded. The device may store linkage... |
US-9,740,861 |
Method for detecting eavesdropping activity and terminal device A method for detecting an eavesdropping activity and a terminal device. The method includes determining whether a terminal device is in a conversation; when the... |
US-9,740,860 |
Device, system, and method of preventing unauthorized recording of visual
content displayed on an electronic device The present disclosure involves preventing unauthorized recording of visual content displayed on an electronic device. Via a mobile computing device, it is... |
US-9,740,859 |
Threat detection using reputation data Threat detection is improved by monitoring variations in observable events and correlating these variations to malicious activity. The disclosed techniques can... |
US-9,740,858 |
System and method for identifying forged emails Forged emails are detected by extracting email address parts of a sender email address. The email address parts include an account name, a subdomain, and a base... |
US-9,740,857 |
Threat-aware microvisor A threat-aware microvisor is configured to facilitate real-time security analysis, including exploit detection and threat intelligence, of operating system... |
US-9,740,856 |
Apparatus and method for managing gaming engine file in a mobile platform The present invention relates to managing a UNITY file in a mobile platform in order to forestall a UNITY library executable in a mobile platform from being... |
US-9,740,855 |
System and method for modifying a software distribution package without
recalculating digital signatures Disclosed are systems, methods and computer program products for modifying a software distribution package. An example method includes receiving a software... |
US-9,740,854 |
System and method for code protection Systems, methods, and techniques are disclosed for. An example method of providing code protection includes identifying a set of methods including one or more... |
US-9,740,853 |
Configuring a sandbox environment for malware testing A device may receive a file to be analyzed in a sandbox environment, and may determine configuration information for configuring the sandbox environment. The... |
US-9,740,852 |
System and method for assessing an application to be installed on a mobile
communications device A system and method checks for harmful behavior of an application to be installed on a mobile communications device. A server computer receives from the mobile... |
US-9,740,851 |
Sending a password to a terminal A mechanism is provided for sending a password to a terminal. A password send request is received. The status of each of a plurality of terminals coupled to the... |
US-9,740,850 |
Controlling which users from an organization are to be part of a community
space in an easy and error-free manner A method, system and computer program product for controlling which users from an organization are to be part of a community space. A community collaboration... |
US-9,740,849 |
Registration and authentication of computing devices using a digital
skeleton key A method for registering a computing device to a user account using at least one user-selected fingerprintable device externally accessible to the computing... |