Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,792,469 Wireless physical property sensor with digital communications
The present disclosure provides systems and methods implemented using physical property sensors. A physical/property sensor includes a sensor coil configured to...
US-9,792,468 Time slot communication system
A system, comprising a communication station for communicating with a number of radio tags in a time slot communication process, in which a number of time slots...
US-9,792,467 Wireless card reader and method for storing data
A wireless card including a wireless power receiving module configured to receive wireless power supply from a first wireless user equipment in a first time...
US-9,792,466 Lump sequences for multi-track magnetic stripe electronic data transmission
A system and method of validating electronic encoded information from magnetic stripe card data transmitted as electronic stripe data includes a lump...
US-9,792,465 Automatic touch identification system and method thereof
An automatic identification system for communicating identifying information by coupling signals through the human body is provided. The system includes a...
US-9,792,463 Combination magnetic stripe and contactless chip card reader
A combination magnetic-stripe card reader with integrated contact-less chip card read/write functions, a direct replacement for a standard player tracking...
US-9,792,462 Suspicious portable device movement determination
A system and method to determine suspicious movement of a portable device are disclosed. A determination is made that an update received by a local device was...
US-9,792,461 Control apparatus
PROBLEM Unauthorized reproduction by a third party is to be prohibited by preventing waveform monitoring on a circuit board and by providing security from the...
US-9,792,460 Method and apparatus for processing biometric information in electronic device
A method and apparatus for processing biometric information in an electronic device including a processor that operates at a normal mode or at a secure mode,...
US-9,792,459 Flexible policy arbitration control suite
A policy arbitration system manages the fundamental communications and isolation between executable components and shared system resources of a computing...
US-9,792,458 Platform to build secure mobile collaborative applications using dynamic presentation and data configurations
System and method to provide access to protected data for a communication terminal, the system including: a publisher database configured to store protected...
US-9,792,457 Systems and methods for trigger-based modification of privacy settings associated with posts
Systems, methods, and non-transitory computer-readable media can identify a post to be published via a social networking system. A privacy schedule for...
US-9,792,456 Methods and systems for regulating user engagement
Methods and systems are provided for regulating interaction with respect to an object in a database. One exemplary method involves creating an engagement record...
US-9,792,455 Sensor aware security policies with embedded controller hardened enforcement
An information handling system (IHS) performs security policy enforcement using security policy data maintained in an embedded controller, which operates within...
US-9,792,454 Record level data security
A database security system protects a data table at both the column level and the individual data record level. Access to data records within the data table is...
US-9,792,453 Remote computer lockdown
A method and system are disclosed for placing a computer in a safe and secure lock down state from a remote location using a remote command device such as a...
US-9,792,452 Pervasive intermediate network attached storage application
A Pervasive Intermediate Network Attached Storage Application (PINApp) enables users to digitally assign (pin/tack) a folder or drive to a public cloud storage...
US-9,792,451 System and methods for using cipher objects to protect data
Systems, methods, and devices configured to build and utilize an intelligent cipher transfer object are provided. The intelligent cipher transfer object...
US-9,792,449 Cryptic notes and related methods
A computer-implemented method is described. A first portion and a second portion of a message are received from a user via a user interface of a computer...
US-9,792,448 Cryptographic protection of information in a processing system
A processor employs a hardware encryption module in the processor's memory access path to cryptographically isolate secure information. In some embodiments, the...
US-9,792,447 Method and apparatus for differently encrypting different flows
For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by...
US-9,792,446 System and method for protecting data stored on a removable data storage device
A system for protecting data stored in a removable data storage device includes a personal electronic device, a removable solid state data storage device...
US-9,792,445 Method and end device for securely inputting access code
The invention provides a method for securely inputting an access code to an input interface of a mobile end device. During an input time period covering the...
US-9,792,444 Inoculator and antibody for computer security
In an embodiment of the invention, a method includes: determining, in a computer, an area where an undesired computer program will reside; and providing a data...
US-9,792,443 Position analysis of source code vulnerabilities
Techniques for performing position analysis on a representation of an application source code are disclosed herein. An application source code is scanned to...
US-9,792,442 Visualization of security risks
Examples disclosed herein relate to visualization of security risks. The examples enable obtaining counts of security risks found in a plurality of...
US-9,792,441 Portable desktop device and method of host computer system hardware recognition and configuration
A portable desktop device and method for host computer system hardware recognition and configuration are provided. The portable desktop device causes on a first...
US-9,792,440 Secure boot for vehicular systems
A method for a secure boot of a vehicular system is provided. The method includes performing a security self-verification on a first electronic control unit...
US-9,792,439 Method and system for securely updating firmware in a computing device
Embodiments of a method are disclosed. One embodiment is a method for securely updating firmware in a computing device, in which the computing device includes a...
US-9,792,438 Protecting user input against focus change
In an embodiment, a system includes a processor having at least one core and a security engine, the security engine having a focus change logic to inform a...
US-9,792,437 System and method for securing embedded controller communications by providing a security handshake
An information handling system includes a processor operable to receive a system management interrupt, and an embedded controller coupled to the processor via a...
US-9,792,436 Techniques for remediating an infected file
Techniques for remediating an infected file are disclosed. In one embodiment, a method may have the steps of maintaining a plurality of file identities within a...
US-9,792,435 Anomaly detection for vehicular networks for intrusion and malfunction detection
A security monitoring system for a Controller Area Network (CAN) comprises an Electronic Control Unit (ECU) operatively connected to the CAN bus. The ECU is...
US-9,792,434 Systems and methods for security data analysis and display
Systems and methods are provided for improved security services. In one aspect, a method is provided for controlling an autonomous data machine situated near a...
US-9,792,433 Method and device for detecting malicious code in an intelligent terminal
The present invention discloses a method and device for detecting malicious code in an intelligent terminal. The method comprises: acquiring a virtual machine...
US-9,792,432 Method and apparatus for privacy-oriented code optimization
Methods and apparatuses are provided for automatically optimizing application program code for minimized access to privacy data. A privacy-oriented code...
US-9,792,431 Systems and methods for selectively masking data on virtual storage devices
A computer-implemented method for selectively masking data on virtual storage devices may include (1) identifying data stored on a virtual storage device that...
US-9,792,430 Systems and methods for virtualized malware detection
Systems and methods for virtualized malware enabled detection are described. In some embodiments, a method comprises intercepting an object provided from a...
US-9,792,429 Detection of malicious software packages
A software repository offering a software package or a computing system downloading a software package can utilize a security tool to verify the security of the...
US-9,792,428 Dynamic password generation
Providing access to electronic information. A first password string and a rule for configuring and generating a second password string from the first password...
US-9,792,427 Trusted execution within a distributed computing system
Methods for enforcing confidentiality and integrity of code and data while running the code over the data in a distributed computing system are described. In an...
US-9,792,426 System and method for providing anonymous access to shared resources
In one embodiment, a method is performed on a shared-resources system. The method includes creating an anonymous target. The method further includes assigning...
US-9,792,425 System and method for controlling state tokens
The system and method for controlling state tokens described herein may secure sensitive application state tokens, link one application state token to other...
US-9,792,424 Chained authentication using musical transforms
A service receives a request from a user of a group of users to perform one or more operations requiring group authentication in order for the operations to be...
US-9,792,423 Hardening security images
Methods and systems are provided for electronic authentication. A modified electronic image is generated by altering at least a pixel of an electronic image....
US-9,792,422 Authentication and control interface of a security system
Techniques are described for providing control of a security system. A user is authorized in the security system and user identification inputs, provided...
US-9,792,421 Secure storage of fingerprint related elements
The present disclosure relates to secure storage of a detailed set of elements relating to fingerprint features for a finger and to a method for authenticating...
US-9,792,420 Device and method for biometric authentication
A biometric authentication device includes: a storage unit to store a first enrolled template and first information including a parameter representing an input...
US-9,792,419 Starvationless kernel-aware distributed scheduling of software licenses
Methods, systems, and apparatuses for implementing shared-license software management are provided. Shared-license software management may be performed by...
US-9,792,418 Secure connected digital media platform
An embodiment of the invention provides a method for a secure connected digital media platform where a request is received to create a secure partition for...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.