Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,013,3912 Multiple match of template elements
A system and method for selectively variably enhancing template matching when testing a pattern-under-test against a pattern template having two or more...
US-1,013,3911 Method and device for verifying fingerprint
Methods and devices are provided for verifying a fingerprint in the field of computer technology. The method includes: N pressing operations successively...
US-1,013,3910 Electronic device with key module and method of manufacturing the same
An electronic device according to the present disclosure includes: a housing including a first plate directed in a first direction, a second plate facing a...
US-1,013,3909 Composite substrate sensor device
A composite substrate sensor device comprises: a first substrate sensing chip having an upper surface, a lower surface, side surfaces and sensing circuit cells;...
US-1,013,3908 Ultrasonic fingerprint sensor and fingerprint recognition module
The present disclosure discloses an ultrasonic fingerprint sensor. The ultrasonic fingerprint sensor includes a piezoelectric layer, a number of emitters, and a...
US-1,013,3907 Fingerprint recognition chip packaging structure and packaging method
A fingerprint recognition chip packaging structure and a packaging method. The packaging structure includes: a substrate provided with a substrate surface; a...
US-1,013,3906 Audio device and display device
The present invention provides an audio device and a display device. The audio device comprises a vibrating diaphragm, an ultrasonic emitting element and a...
US-1,013,3905 Capacitive fingerprint sensing unit and enhanced capacitive fingerprint reader
A capacitive fingerprint sensing unit and enhanced capacitive fingerprint reader using the capacitive fingerprint sensing units are disclosed. The enhanced...
US-1,013,3904 Fully-addressable sensor array for acoustic imaging systems
An acoustic imaging system can contain a plurality of individual acoustic elements that each contain an acoustic transducer, drive circuitry, and low voltage...
US-1,013,3903 Remote control device and operating method thereof
An operating method of a remote control device according to an embodiment of the present invention includes searching at least one of the image display device...
US-1,013,3902 Barcode reader
A barcode reader may perform image processing functions to generate distinct image data records from the frame of image data of a barcode, select an image data...
US-1,013,3901 System for reading information code
A system including a reader and an information terminal is provided. The information terminal displays an information code, while the reader optically reads the...
US-1,013,3900 Controlling the output of contextual information using a computing device
A method for controlling the output of contextual information to assist a user to perform a sequence of activities using a computing device, the computing...
US-1,013,3899 Baggage management system
A baggage management system according to an embodiment includes a storage unit and a processor. The storage unit stores a baggage terminal identification...
US-1,013,3898 Protection barrier and laser irradiation system
A protection barrier including openings through which an irradiation target passes through the protection barrier, wherein the protection barrier is configured...
US-1,013,3897 Aiming system based on multiple colors transition spot pattern
Two or more colors are used in an aiming pattern, where the high contrast between the edges of the two illuminated portions identifies the centerline of the...
US-1,013,3896 Payoff information determination
An example electronic device includes a watermark scanner to scan a watermark embedded on an initial page of a physical medium. The electronic device also...
US-1,013,3895 Fixed position reader of coded information and camera based checkout system using the same
A reader contains a housing with a window having a peripheral rim. The housing has a device for reading coded information which generates a field projecting...
US-1,013,3894 Systems and methods for stirring electromagnetic fields and interrogating stationary RFID tags
RFID tags are used for many purpose including tracking RFID interrogators are used to retrieve information from tags. In many applications, RFID interrogators...
US-1,013,3893 Fractal plasmonic surface reader antennas
Plasmonic-surface antenna systems are described in which resonators, or cells, are closely arranged but do not touch. At least a portion of a radiating surface...
US-1,013,3892 System for characterizing a passive antenna network and elements in a distributed antenna system
A distributed antenna system includes a plurality of remote antenna units with a passive element coupled to at least one of the remote antenna units at a...
US-1,013,3891 Portable terminal, data communication system, data communication method and program
A portable terminal includes a wireless communication unit configured to perform data communication with a wireless tag in a non-contact manner, a position...
US-1,013,3890 Stress sensitive radio frequency identification tag
There is provided a Radio Frequency Identification tag that is sensitive to stress induced in a component to which the tag is coupled. In some embodiments, the...
US-1,013,3889 Power scheduling for short-range wireless tags
A reader device for short-range wireless tags comprises a sensing module coupled to one or more RF antennas. The sensing module is arranged to selectively...
US-1,013,3888 Data reader and positioning system
A data reader can read data regardless of the position of a radio IC tag. The data reader reads data at a separate position from a radio IC tag provided with a...
US-1,013,3887 Card reader and electronic protection module thereof
A card reader and an electronic protection module thereof are provided. The electronic protection module includes a circuit substrate, a first outer cover, a...
US-1,013,3886 Card detector and method of card detection
A card detector configured to be communicatively coupled to a card reader comprises: a first comparator configured to output periodically a first comparison...
US-1,013,3885 Method of and system for reading visible and/or invisible code symbols in a user-transparent manner using...
A digital imaging based symbol reading system has the capacity to automatically read both visible and invisible symbols in the same application environment....
US-1,013,3884 Electronic and paper combined data submission, printing, and retrieval method and its system
An electronic and paper combined data submission, printing, and retrieval method includes: completing an application in a client terminal, sending the...
US-1,013,3883 Rapid safeguarding of NVS data during power loss event
A method, system, and computer program product for safeguarding nonvolatile storage (NVS) data by a processor in communication with a memory device following a...
US-1,013,3882 Implementation method for driving of software and hardware supporting OpenSC
Disclosed is an implementation method for driving of software and hardware supporting OpenSC. The method is implemented by middleware invoking an interface...
US-1,013,3881 Method and circuit arrangement for protecting against scanning of an address space
A circuit arrangement and method for securing an integrated electronic circuit against scans of an address space, wherein the circuit arrangement has at least...
US-1,013,3880 System and method of preventing unfair evaluation of applications by users
Disclosed are systems and methods for blocking access to interface elements of a page of an application in an applications store. The computing device executes...
US-1,013,3879 Technique used in text analysis in a safe manner
A first character string in a logic used for the text analysis with a second character string which is different form the first character string is replaced...
US-1,013,3878 Stochastic privacy
A stochastic privacy service provider may provide users with a guaranteed upper bound on a probability that personal data will be accessed while enabling the...
US-1,013,3877 System and method for secure reciprocal exchange of data
A social media computer system includes a database that is in network communication with a first mobile phone and a second mobile phone. The database receives a...
US-1,013,3875 Digital rights management system implementing version control
A server in a digital rights management system implements version control for the digital documents being managed. Each document belongs to a document series...
US-1,013,3874 Performing snapshot replication on a storage system not configured to support snapshot replication
In one aspect, a method includes receiving, from a splitter, an I/O to be written from a virtual machine to a production virtual machine disk; sending an...
US-1,013,3873 Temporary concealment of a subset of displayed confidential data
The present invention addresses the deficiencies of the art in respect to data security control and provides a method, system and computer program product for...
US-1,013,3872 Enabling access to data
Methods, systems, apparatus and computer programs for enabling access to data by a requesting party. A plurality of sets of data are generated. A one one-way...
US-1,013,3871 Method and system for identifying functional attributes that change the intended operation of a compiled binary...
Vulnerable code allows outside actors to interfere with the normal operation of current systems. To help defend against these outside actors, it is desirable to...
US-1,013,3870 Customizing a security report using static analysis
A control graph representing a model of data flow of a computer program can be generated during a static analysis. Respective edge weights can be assigned to...
US-1,013,3868 Switching users and sync bubble for EDU mode
Systems and methods are disclosed for implementing an educational mode on a portable computing device, such as a tablet computer, that is a single-user system,...
US-1,013,3867 Trusted malware scanning
A trusted co-processor can provide a hardware-based observation point into the operation of a host machine owned by a resource provider or other such entity....
US-1,013,3866 System and method for triggering analysis of an object for malware in response to modification of that object
According to one embodiment, a system featuring one or more processors and memory that includes monitoring logic. In operation, the monitoring logic monitors...
US-1,013,3865 Systems and methods for detecting malware
The disclosed computer-implemented method for detecting malware may include (1) identifying a plurality of programs represented in machine code, (2) deriving a...
US-1,013,3864 Methods and systems for implementing a secure application execution environment using derived user accounts for...
Methods and systems are disclosed for implementing a secure application execution environment using Derived User Accounts (SAE DUA) for Internet content....
US-1,013,3863 Zero-day discovery system
A method for determining a zero-day attack by an electronic device is described. According to one embodiment, the method comprises instantiating, by the...
US-1,013,3862 Timer and content security
A method, computer system, and a computer program product for timing secured content is provided. The present invention may include receiving a connection...
US-1,013,3861 Method for controlling access to a production system of a computer system not connected to an information...
A method (M) for controlling access to a production system (SIP) of a computer system not connected to an information system (SIC), includes: A) an initial...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.