Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,028,2569 Dual purpose press-bar and heat sink for high data transfer integrated circuit card reader
Various embodiments provide a dual purpose press-bar and heat sink for an integrated circuit card (ICC) reader. The dual purpose press-bar and heat sink...
US-1,028,2568 Card reader
A card reader may include a main body frame, an IC contact block and a guide shaft for moving the IC contact block between a contact position and a retreated...
US-1,028,2567 High voltage inductive adder
A high voltage inductive adder is disclosed. In some embodiments, the high voltage inductive adder comprising a first adder circuit and a second adder circuit....
US-1,028,2566 Computing device security lock
A base member for a tablet computing device including a fastener to removably couple a tablet computing device to the base. A receptacle can receive a security...
US-1,028,2565 Computer security environment
A computer security environment that delays physical access to a computer system, detects intrusion attempts upon that computer system, using one or more...
US-1,028,2564 Distributed storage with auxiliary data interspersal and method for use therewith
A data segment is encrypted to produce an encrypted data segment. The encrypted data segment is dispersed storage error encoded to produce a set of encoded data...
US-1,028,2563 Video-based privacy supporting system
Computer display privacy and security for computer systems. In one aspect, the invention provides a computer-controlled system for regulating the interaction...
US-1,028,2562 Secure digital data collection
Systems and methods for generating certified images and incident reports are disclosed. An image capture device can be used to capture an image and integrate...
US-1,028,2561 Method and apparatus for managing application
The present disclosure provides a method and an apparatus for managing an application. Whether an application is allowed to run in the background of a terminal...
US-1,028,2560 Randomized input device heating
A security code input may be obfuscated from a thermal imaging device by randomly heating a random set of inputs of an input device. The security code is...
US-1,028,2559 Data processing systems for identifying, assessing, and remediating data processing risks using data modeling...
In various embodiments, a Data Model Adaptive Execution System may be configured to take one or more suitable actions to remediate an identified risk in view of...
US-1,028,2558 System and method for maintaining a segregated database in a multiple distributed ledger system
An apparatus maintains a segregated database in a multiple distributed ledger system. The apparatus includes a storage device that stores software instructions...
US-1,028,2557 Systems and methods for protecting sensitive data against data loss
The disclosed computer-implemented method for protecting sensitive data against data loss may include (1) identifying a resource comprising sensitive data, (2)...
US-1,028,2556 Secure cloud-based storage of data shared across file system objects and clients
Techniques to provide secure cloud-based storage of data shared across file system objects and clients are disclosed. In various embodiments, a primary...
US-1,028,2555 Validation and authentication of digital documents issued by an architect
A method and system for authenticating and validating electronic architectural documents. A document approved by a licensed architect has the architects digital...
US-1,028,2554 System and method for providing a cryptographic platform for exchanging information
A system and method configured for providing a cryptographic platform for exchanging information. One or more information transactions including encrypted...
US-1,028,2553 Systems and methods for controlling data exposure using artificial-intelligence-based modeling
Systems and methods for controlling the exposure of data privacy elements are provided. The systems and methods may generate an artificial profile model. The...
US-1,028,2552 Device blanking
A method and apparatus is disclosed for protecting electronic devices from security breaches (e.g., in the form of DPA attacks) by managing input/output (I/O)...
US-1,028,2551 Systems and methods to control publication of user content in a virtual world
A computing system and method to implement a three-dimensional virtual reality world having user created virtual objects. During the creation of a virtual...
US-1,028,2550 Auto-remediation workflow for computer security testing
Techniques for performing auto-remediation on computer system vulnerabilities in source code are disclosed herein. An application source code representation is...
US-1,028,2549 Modifying service operating system of baseboard management controller
In an example, a device comprises a baseboard management controller (BMC). The BMC comprises non-volatile storage storing a service operating system (OS). The...
US-1,028,2548 Method for detecting malware within network content
Systems and methods for detecting malicious content are provided. In an exemplary embodiment, a method for detecting malicious content is described that detects...
US-1,028,2546 Systems and methods for detecting malware based on event dependencies
The disclosed computer-implemented method for detecting malware based on event dependencies may include (1) applying, to a malware detection system capable of...
US-1,028,2545 Detection of malware-usable clean file
There are provided measures for enabling the detection of a malware-usable clean file or, stated differently, the detection of malware using a clean file. Such...
US-1,028,2544 Identifying suspected malware files and sites based on presence in known malicious environment
Disclosed herein is a system and method for identifying potential sources of malicious activity as well as identifying potentially malicious files that...
US-1,028,2543 Determining whether to destage write data in cache to storage based on whether the write data has malicious data
Provided are a computer program product, system, and method for determining whether to destage write data in cache to storage based on whether the write data...
US-1,028,2542 Information processing apparatus, information processing method, and computer readable medium
An attack activity definition information database 111 stores, for a plurality of events, attack activity definition information describing an event, a...
US-1,028,2541 Method and system for verifying an access request
A system for verifying a request for access to data is provided, the system comprising a first module 20 and a second module 30. The first module 20 is arranged...
US-1,028,2540 Securing source devices using a display device filter
Source devices can be secured using a display device filter. When a display device is connected to a source device, a display device filter can identify the...
US-1,028,2539 Authentication and secure communication with application extensions
Systems and methods authenticate with application extensions. An application extension requests a token from a local application. The local application...
US-1,028,2538 Technologies for providing hardware subscription models using pre-boot update mechanism
Technologies to enable, disable and control hardware subscription features. Computing devices communicate over a network to a subscription server to provide...
US-1,028,2537 Single prompt multiple-response user authentication method
A request for authentication from a user of a computer system is received. An authentication prompt is transmitted to the user, wherein the authentication...
US-1,028,2536 Method and system for performing purchase and other transactions using tokens with multiple chips
An embodiment of the present invention is directed to devices with multiple chips for facilitating small purchase transactions through a stored value account...
US-1,028,2535 Method and system to validate identity without putting privacy at risk
A method and system to verify identity while protecting private data. To locally verify identity without requiring communication with an external database or...
US-1,028,2534 System with physical data authorization
A system for enabling data syncing between a host device and an electronic device includes a first port configured to be coupled to a first electronic device, a...
US-1,028,2533 System and method for eye tracking during authentication
A system, apparatus, method, and machine readable medium are described for performing eye tracking during authentication. For example, one embodiment of a...
US-1,028,2532 Secure storage of fingerprint related elements
The present disclosure relates to secure storage of a detailed set of elements relating to fingerprint features for a finger and to a method for authenticating...
US-1,028,2531 Quick-logon for computing device
Methods and systems for verifying a user's identity on a computing device using two-factor authentication are described. More particularly, the system can use a...
US-1,028,2530 Verifying identity based on facial dynamics
A computer-implemented technique is described for verifying the identity of a user using two components of face analysis. In a first part, the technique...
US-1,028,2528 Portable terminal and method of setting and releasing use restriction therefor
A portable terminal with a body having a front surface with a display unit and rear surface including a rear password input device provided on a rear surface of...
US-1,028,2527 Information processing apparatus, information processing method, program, storage medium, and password entry...
An information processing apparatus that generates a second password different from a first password in response to a password change request from a terminal,...
US-1,028,2526 Generation of randomized passwords for one-time usage
An electronic device dynamically generates a password for one-time only usage. The one-time password is constructed by placing, in a random sequential order:...
US-1,028,2525 Information processing system, information processing apparatus, access control method, and program
An information processing system including at least one information processing apparatus includes an access control unit configured to receive a request from a...
US-1,028,2524 Content selection and delivery for random devices
Intelligent content delivery enables content to be delivered to different devices in formats appropriate for those devices based on the capabilities of those...
US-1,028,2523 License management solution for central-management products
A license manager running on a central-management server receives a license request for licensing a managed node as a client of a central-management product...
US-1,028,2522 Cross-application authentication on a content management system
Systems, methods, and computer-readable media for cross-application authentication on a content management system. A client application running at a client...
US-1,028,2521 Medication management and reporting technology
Medication management and reporting technology, in which output from at least one sensor configured to sense physical activity in a building in which medication...
US-1,028,2520 Method and system for microbiome-derived diagnostics and therapeutics for neurological health issues
A method for at least one of characterizing, diagnosing and treating a neurological health issue in at least a subject, the method comprising: receiving an...
US-1,028,2519 Method and apparatus for providing nursing service
A method performed by an apparatus for providing nursing service is provided. The method includes: receiving result information about nursing service provided...
US-1,028,2518 Systems and methods for viewing electrocardiograms
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for displaying an electrocardiogram (ECG) on a computing...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.