Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,027,5623 Toggling activation of lasers in scanner systems
Scanners, methods, and computer storage media having computer-executable instructions embodied thereon that process variable sized objects with high package...
US-1,027,5622 Radio tag reading apparatus and control method
In one embodiment, a radio tag reading apparatus has an antenna device, a storage device, and a controller. The controller judges what frequency band is usable...
US-1,027,5621 Determining compatibility of components for assembling approved personal protection configurations
This disclosure relates generally to methods and systems for determining whether at least a first component and a second component of a personal protection (PP)...
US-1,027,5620 Book sorting method on the basis of RSSI signal value of RFID tag
A book sorting method based on RSSI signal values of RFID tags, including the following steps: reading book RFID tags placed in books by using an RFID device,...
US-1,027,5619 Luggage management system
Disclosed embodiments provide techniques for managing luggage within a premises such as an airport. A group identifier is established that includes multiple...
US-1,027,5618 Finding sensor data in an RFID network
A system and method of selectively reading sensor data from a memory device is able to search the memory device for an indicator that identifies the sensor...
US-1,027,5617 Object tracking using enhanced video surveillance through a distributed network
Tracking a tagged object may include receiving, using a first processor, a first video of an object tagged with a radio frequency identification (RFID) tag and...
US-1,027,5616 Transmission/reception sensor system, multi-function card, and wearable device
A multi-function card has a non-contact IC card function, a magnetic stripe card function, a function of generating a magnetic card signal and an NFC signal,...
US-1,027,5615 Communications bus data transmission using relative ground shifting
Methods are described herein for communications bus data transmission using relative ground shifting. A plurality of voltage lines of at least one electronic...
US-1,027,5614 Data processing systems for generating and populating a data inventory
In particular embodiments, a data processing data inventory generation system is configured to: (1) generate a data model (e.g., a data inventory) for one or...
US-1,027,5613 Identity breach notification and remediation
In one aspect, the present disclosure relates to a method for improved security in a networked computing environment, the method comprising: receiving, from a...
US-1,027,5612 Combining the smoothed posterior distribution with empirical distribution for cohorts with small sample size
In an example embodiment, posterior distribution based percentiles for confidential data submitted to a computer system are computed. Then empirical percentiles...
US-1,027,5611 Methods and apparatus for sharing and searching encrypted data
In some embodiments, a method includes receiving, at an encrypted sharing server and from a source compute device, a share request to share first encrypted...
US-1,027,5610 Time of flight sensing for providing security and power savings in electronic devices
An electronic device includes a time-of-flight sensor configured to sense a distance between the electronic device and at least one object proximate the...
US-1,027,5609 File sharing system and method
According to the present application, systems, devices and methods for sharing media files may promote sharing of media without permitting the media to be...
US-1,027,5608 Object-centric video redaction
Techniques are described for video redaction. In one aspect, techniques include receiving a video for redaction; analyzing the video to generate an appearance...
US-1,027,5607 Location and time based mobile app policies
Location, time, and other contextual mobile application policies are disclosed. Access state information associated with a managed set of applications may be...
US-1,027,5606 Indexing and searching documents with restricted portions
One or more computer devices may receive a document from private content that is accessible by a set of users, and may extract metadata from the document. The...
US-1,027,5605 System and method for supporting secure document tags for use in traditionally unsupported workflows
A system and method to recognize the utilization of an unsupported workflow process to process the document to be rendered; write, when it is recognized that an...
US-1,027,5604 Security record transfer in a computing system
An input monitoring agent detects storage of a security record by a security scanning application, encrypts a copy of the security record, and deletes the...
US-1,027,5603 Containerless data for trustworthy computing and data services
A digital escrow pattern and trustworthy platform is provided for data services including mathematical transformation techniques, such as searchable encryption...
US-1,027,5602 Method and apparatus for an end user identity protection suite
An end user identity protection suite (IPS) is discussed. In one embodiment, the IPS includes a identity validation system to evaluate a security level of at...
US-1,027,5600 Assessment and analysis of software security flaws
Security analysis and vulnerability testing results are "packaged" or "bound to" the actual software it describes. By linking the results to the software...
US-1,027,5599 Device and method for providing trusted platform module services
The invention concerns a circuit having a first processing device which has one or more first platform configuration registers for storing one or more data...
US-1,027,5598 Providing a secure execution mode in a pre-boot environment
In one embodiment, the present invention includes a method to establish a secure pre-boot environment in a computer system and performs at least one secure...
US-1,027,5597 System and method of execution of code by an interpreter
Disclose are systems and methods for execution of program code by an interpreter. One exemplary method comprises: executing, by the interpreter, instructions of...
US-1,027,5596 Activating malicious actions within electronic documents
A method and system for activating malicious actions within electronic documents is described. In one embodiment, the method may include receiving, by a...
US-1,027,5595 System and method for characterizing malware
An embodiment may create a memory image including a representation of a thread environment block (TEB) and representation of a process environment block (PEB)...
US-1,027,5594 Mitigation of malware
Systems and methods are provided in example embodiments for mitigating malicious calls. The system can be configured to determine a series of checksums for a...
US-1,027,5593 Secure computing device using different central processing resources
A computing device includes central processing resources, memory, a network interface, and a security control module. The security control module determines...
US-1,027,5592 Information processing device, information processing method, and computer program product
According to an embodiment, an information processing device includes a first manager, a second manager, and a generator. The first manager loads a first class...
US-1,027,5591 Context-based secure controller operation and malware prevention
In one implementation, a method for providing security on an externally connected controller includes launching, by the controller, a security layer that...
US-1,027,5590 Distributed trust as secondary authentication mechanism
A computer system supports secondary authentication mechanism for authentication of a user, where the computer system may provide a variety of services...
US-1,027,5589 Identity verification using autonomous vehicles
Various embodiments are generally directed to identity verification using autonomous vehicles. A security policy may be used to determine when identity...
US-1,027,5588 Providing multi-factor security for electronic devices through body area network and radiofrequency network...
A method performed by a processor of a first electronic device includes transmitting first authentication information through a Body Area Network (BAN)...
US-1,027,5587 Biometric ticketing
In biometric ticketing, physical token-less ticketing system using biometrics, a person may be identified using a digital representation of a biometric....
US-1,027,5586 Method for power management using fingerprint identification in mobile terminal and mobile terminal
An unlocking method and a mobile terminal are provided. The method includes the following. An original fingerprint image is acquired to perform a fingerprint...
US-1,027,5585 Embedded authentication systems in an electronic device
This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system...
US-1,027,5584 Method and system for unlocking mobile terminal on the basis of a high-quality eyeprint image
A method and a system for unlocking a mobile terminal on the basis of a high-quality eyeprint image may include collecting an original image of a current user...
US-1,027,5583 Expression recognition in messaging systems
Some embodiments include a messaging system capable of expression-based communication and/or expression-based actions. The messaging system can run on a...
US-1,027,5582 Online account access control by mobile device
Systems and methods for controlling access to an online account are described. An access control message including an action to be performed on an online...
US-1,027,5581 Method and apparatus for sharing content between electronic devices
A method of a first device and an electronic device are provided. The method includes receiving a request signal related to contents stored in the first device...
US-1,027,5580 Method of authenticating a user of a terminal with a service provider
A method of authenticating a user of a terminal referred of as a first terminal, and suitable for communicating with a service provider via a first...
US-1,027,5579 Video file attribution
Methods, computer program products, and systems are set forth herein and can include examining a video file using content of an authorship attribution database,...
US-1,027,5578 Continuous content identification of broadcast content
The present disclosure provides identification and continuous monitoring of content, such as broadcast content, in real time, using a hierarchical, distributed...
US-1,027,5577 Digital media content management apparatus and method
A digital media content management apparatus and method for securely storing a content file on a computer readable medium and playing the content file from the...
US-1,027,5576 Automatic medical coding system and method
An automatic medical coding system is provided. The system parses features of natural language diagnosis and procedure information. The features are compared to...
US-1,027,5575 Interactive meal-dataset-based map
A method to integrate location signals received from indoor positioning systems in order to generate an interactive dataset-based map is disclosed. The method...
US-1,027,5574 Retail pharmacy customer recognition and sales
A retail pharmacy sales system for identifying a customer and identifying which prescriptions the customer is authorized to pick up is disclosed. The system may...
US-1,027,5573 User interface for diabetes management system
A diabetes management system including a pump for dispensing a medicant and a control device for controlling the pump includes a user interface for controlling...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.