Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,009,5901 Content verification system for opaque sealed containers
A method, system, and database for facilitating verification of a content of a sealed container are provided. The method includes receiving one or more images...
US-1,009,5900 Barcode-reading system that requires an accessory for enhanced operation of a barcode reading application
A barcode-reading system for a mobile device may include a camera assembly. The barcode-reading system may include a barcode-reading enhancement accessory and a...
US-1,009,5898 Method of specimen tracking via barcode and RFID correlation at accession time
A specimen holder includes an RFID tag that exhibits an RFID unique identifier. The specimen holder also includes a barcode that exhibits a barcode unique...
US-1,009,5897 Location information within an area defined by a grid of radio-frequency tag circuits
A system for determining a location within an area defined by a grid of radio-frequency (RF) tag circuits includes RF exciters that are configured to emit...
US-1,009,5896 Method and device for performing spatial positioning on electronic tag, 3D signing and human-computer interaction
Provided are a method and a device for performing spatial positioning on an electronic tag, 3D signature and human-computer interaction. The method for...
US-1,009,5895 Active user identification system
A method and system can include: a station including a station communication unit, a station control unit, and a station storage unit; receiving transmissions...
US-1,009,5894 Systems and methods for density-based RFID network configuration
A system and method for density-based RFID network configuration. In various aspects, an RFID reader executes a read cycle defined by dwell times for a low RFID...
US-1,009,5893 RFID-enabling system and method for containers
An RFID-enabling system and method include a probe antenna to introduce a robust EM field into a container to activate RFID tags within the container,...
US-1,009,5892 RFID reader and method for recognizing RFID tags
An RFID reader includes a transmitter, a receiver, and an evaluator. The receiver receives signals from RFID tags within a given number of slots of a time frame...
US-1,009,5891 Secure access to peripheral devices over a bus
An apparatus includes an interface and a processor. The interface is configured for communicating over a bus. The processor is configured to disrupt on the bus...
US-1,009,5890 Secure processor and a program for a secure processor
The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated...
US-1,009,5889 Techniques for protecting security features of integrated circuits
An integrated circuit includes a control circuit, a one-time programmable circuit, and a security feature. The control circuit determines if the one-time...
US-1,009,5888 Secure decentralized system utilizing smart contracts, a blockchain, and/or a distributed file system
A node associated with an organization may receive a storage identifier for new credit data associated with an individual. A distributed ledger and distributed...
US-1,009,5886 Systems and methods for verification and deployment of applications to programmable devices
A system for verifying applications for Real-Time Execution (RTE) devices is provided. The system includes a memory, at least one processor coupled to the...
US-1,009,5885 Privacy-protecting inter-user digital communication message search
Digital communication messages processed by each specific one of a plurality of client computers are tracked and indexed. A query made by a first client...
US-1,009,5884 System and method for using customer information in electronic commerce
A system and method for using customer information in electronic commerce using the Internet are provided. The system includes a customer information database...
US-1,009,5883 Method/system for the online identification and blocking of privacy vulnerabilities in data streams
A method and system for automatically identifying and protecting privacy vulnerabilities in data streams includes indexing data values for each attribute of the...
US-1,009,5882 Private data processing in a cloud-based environment
In one embodiment, a method for securing data on a semi-trusted server is implemented on a computing device and includes: receiving at least a current session...
US-1,009,5881 System and methods for providing query-based permissions to data
A method includes generating a database query in a database; receiving a first request to execute the database query on behalf of a first user; in response to...
US-1,009,5880 Performing secure queries from a higher security domain of information in a lower security domain
A method generates, in a higher security domain (SD), public and secret keys using a first homomorphic encryption scheme (HES), passes the public key to a first...
US-1,009,5879 Restrictive access control list
The present technology pertains to a organization directory hosted by a synchronized content management system. The corporate directory can provide access to...
US-1,009,5878 Internal controls engine and reporting of events generated by a network or associated applications
Provided is a process including: obtaining, with a network controls engine, network traffic, wherein: the network traffic is sent across the network between...
US-1,009,5877 Systems and methods for authenticating photographic image data
The present disclosure provides systems and methods for authenticating photographic data. In one embodiment, a method comprises providing an image...
US-1,009,5876 Systems and methods for allowing a user to access blocked media
Systems and methods are provided herein for enabling a user to access a blocked media asset. These systems and methods allow a user to request that a parent, or...
US-1,009,5875 Multi-level access control for distributed storage systems
System and method for accessing a distributed storage system uses a storage-level access control process at a distributed file system that interfaces with the...
US-1,009,5874 Systems and methods for providing information security using context-based keys
Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in...
US-1,009,5873 Paperless application
Systems, methods, and programs of processing and transmitting information between devices are disclosed. A receiving device may generate a key. A transmitting...
US-1,009,5872 Accessing data based on a dispersed storage network rebuilding issue
A method begins by a set of storage units of a dispersed storage network (DSN) storing a plurality of encoded data slices, where each storage unit stores a...
US-1,009,5871 System, method, and computer program product for detecting and assessing security risks in a network
The present disclosure is directed to a system, method, and computer program for detecting and assessing security risks in an enterprise's computer network. A...
US-1,009,5870 Virtual machine creation method and apparatus
A virtual machine creation method and apparatus are disclosed. The method includes: acquiring a first installation package of a first application; determining...
US-1,009,5869 Machine learning statistical methods estimating software system's security analysis assessment or audit effort,...
A method, system and computer-usable medium for generating a security analysis effort, cost and process scope estimates, comprising: analyzing a software...
US-1,009,5868 Event-based apparatus and method for securing bios in a trusted computing system during execution
An apparatus is provided for protecting a basic input/output system (BIOS) in a computing system. The apparatus includes a BIOS read only memory (ROM), an event...
US-1,009,5867 Antivirus scan during a data scrub operation
For an antivirus scan during a data scrub operation, the antivirus scan is concurrently performed as an overlap with the data scrub operation, wherein the data...
US-1,009,5866 System and method for threat risk scoring of security threats
A system configured to generate a risk score for a threat activity including a digital device. The digital device configured to extract one or more threat...
US-1,009,5865 Detecting unauthorized remote administration using dependency rules
Disclosed are a system and method for protecting computers from unauthorized remote administration. One exemplary method includes: intercepting events occurring...
US-1,009,5864 System and method for performing event inquiries in a network
A remote server dispatches an instruction packet to a node in a network through a linear communication orbit formed by a collection of nodes. The instruction...
US-1,009,5863 Automating monitoring of a computing resource in a cloud-based data center
Provided is a method of identifying a computing resource requiring monitoring for a security purpose in a cloud-based data center during creation of a service...
US-1,009,5862 System for executing code with blind hypervision mechanism
A system for executing code with blind hypervision mechanism comprises: at least one addressable physical memory, a processor operating in at least two modes, a...
US-1,009,5861 Secure invocation of stored procedures in database management systems
Securing invocation of stored procedures is provided herein. A first database management system (DBMS) can include a first database with first tables, a first...
US-1,009,5860 Validating sign-out implementation for identity federation
Disclosed are various embodiments for validating that relying parties of a federated identity provider have correctly implemented sign-out functionality. In one...
US-1,009,5859 Authentication system and car onboard control device
The present invention prevents a maintenance tool for carrying out maintenance work of an electronic control unit (ECU) from being abused by a third person. In...
US-1,009,5858 Systems and methods to secure industrial sensors and actuators
Various embodiments of the invention provide for secure data communication in industrial process control architectures that employ a network of sensors and...
US-1,009,5857 3D challenge-response tests to distinguish human users from bots
The present disclosure provides a challenge-response testing systems for distinguishing between human users and bots. When a user requests to access an...
US-1,009,5856 Communication device capable of performing a wireless communication according to NFC (abbreviation of near...
A communication device may receive a first specific signal not including authentication information from a first terminal device via an NFC interface, change an...
US-1,009,5855 Computer system and operating method therefor
Code upgrades for computer components. After being powered on, a central processing unit (CPU) of a computer system loads a start-up authenticated code module...
US-1,009,5854 Vehicle authorization based on near field communication
In an approach for automated vehicle authorization. A processor receives a first set of credentials from at least a first near field communication device,...
US-1,009,5853 Methods and systems for ensuring that an individual is authorized to conduct an activity
A method for ensuring that an individual is authorized to conduct an activity is provided. The method includes conducting, using a processor, an authentication...
US-1,009,5852 Method for secure operation of a computing device
In a computing device, when a user requests to carry out an operation, the device determines the type of operation requested and the time period since the user...
US-1,009,5851 Electronic device and inputted signature processing method of electronic device
An operation method of an electronic device is provided. The operation method includes registering, as reference signature data, at least one handwritten...
US-1,009,5850 User identity authentication techniques for on-line content or access
On-line course offerings can be made available to users using computational techniques that reliably authenticate the identity of individual student users...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.