Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0330010 NANOSTRUCTURE BASED SUPER-CAPACITOR FOR PRESSURE AND FINGERPRINT SENSOR
An arrangement of individually addressable nanostructures (200) in an array format on a substrate (100) (non-conducting, flexible or rigid) with electrical...
2017/0330009 DECODING VISUAL CODES
Various algorithms are presented that enable an image of a data matrix to be analyzed and decoded for use in obtaining information about an object or item...
2017/0330008 ILLUMINATION SYSTEM WITH ACTIVE ELEMENT FOR GENERATING DIFFERENT ILLUMINATION PATTERNS FOR A DATA READER
A data reader for reading and decoding a code from an item. The data reader includes an imager operable to form an image of the code from an item located in a...
2017/0330007 RECONFIGURABLE SLED FOR A MOBILE DEVICE
A reconfigurable sled for a mobile device with camera is provided. The reconfigurable sled may be moved into different configurations in order to facilitate...
2017/0330006 METHOD AND APPARATUS FOR SENSING ENVIRONMENT USING A WIRELESS PASSIVE SENSOR
A method begins with a first reader sending a first radio frequency (RF) signal prior to exposing a vehicle to moisture testing. The method continues with a...
2017/0330005 METHOD AND APPARATUS FOR TRACKING ONE OR MORE PLANTS AND/OR PLANT BASED PRODUCTS AND/OR TRACKING THE SALE OF...
This invention is for tracking at least one plant. A method of this invention comprises: putting at least one seed or at least one stem in a corresponding at...
2017/0330004 CHEMICAL SENSORS BASED ON CHIPLESS RADIO FREQUENCY IDENTIFICATION (RFID) ARCHITECTURES
A method and structure for a radio frequency identification (RFID) sensor that may be used to monitor various environmental conditions. The environmental...
2017/0330003 PRINTED ELECTRONIC SENSING FILMS FOR DETECTING LARGE-SCALE PHENOMENA
A system for remote sensing includes a flexible sheet, having printed thereon electronic sensors, logic components arranged in circuits, the circuits...
2017/0330002 Electronic device suitable for writing information to wireless tags and information update method
Provided is an electronic device that increases operability when writing information (for example, unique user information) that allows writing to a wireless...
2017/0330001 INVENTORY SYSTEM FOR OBJECTS CONTAINED IN A SPACE BOUNDED BY AN ENCLOSURE AS WELL AS AN INVENTORY METHOD...
An inventory system for objects contained in a space bounded by an enclosure, said system including a tag fixed to each of the objects to be inventoried and a...
2017/0330000 ELECTROMAGNETIC COUPLING READER
An electromagnetic coupling reader may include: an antenna, a management module, and a supervision unit, the supervision unit comprising a sleep mode...
2017/0329999 RFID Tag Programming in a Duplexer
A method of programming an RFID tag in an image-forming device is disclosed. The RFID tag is programmed while media is paused in a duplex media path. The RFID...
2017/0329998 A MULTI-TIER SECURITY FRAMEWORK
A security framework for a multi-tenant, multi-tier computer system with embedded processing is described. A multi-tenant security framework is created for a...
2017/0329997 SECURE MECHANISM FOR FINITE PROVISIONING OF AN INTEGRATED CIRCUIT
This application discloses an electronic system including active circuitry configured to be selectively enabled for authorized number of times. The electronic...
2017/0329996 Authenticating Printed Paper Documents and Websites Against a Blockchain Record
A system and method are disclosed for rendering published documents tamper evident. Embodiments render classes of documents tamper evident with cryptographic...
2017/0329995 ANTI-REPLAY TECHNIQUES USING SECURE EXTERNAL NON-VOLATILE MEMORY
Techniques for providing data protection in an integrated circuit are provided. A method according to these techniques includes exchanging messages with an...
2017/0329994 TECHNIQUES FOR DETERMINING AN ANTI-REPLAY COUNTER FOR PREVENTING REPLAY ATTACKS
Techniques for maintaining an anti-replay counter (ARC) for providing data protection in an integrated circuit are provided. A method according to these...
2017/0329993 METHOD AND DEVICE FOR CONVERTING DATA CONTAINING USER IDENTITY
A method for automatically converting electronic data is disclosed. The method comprises scanning a source data table containing data fields; determining a...
2017/0329992 METHOD FOR ALLOWING DATA CLASSIFICATION IN INFLEXIBLE SOFTWARE DEVELOPMENT ENVIRONMENTS
Abstract system and method for enabling data modification, classification and enforcement of IRM capabilities in standard isolated software applications is...
2017/0329991 DYNAMIC MANAGEMENT OF DATA WITH CONTEXT-BASED PROCESSING
Techniques for using contextual information to manage data that is subject to one or more data-handling requirements are described herein. In many instances,...
2017/0329990 CONTENT PREVIEW INCLUDING SHARABLE INFORMATION
A user of a content management system can store one or more content items at the user's account with the system. In some instances, the system can generate and...
2017/0329989 SYSTEMS AND METHODS FOR SHARING MEDIA CONTENT WITH RECOGNIZED SOCIAL CONNECTIONS
Systems, methods, and non-transitory computer-readable media can detect a set of images locally stored on a computing system. The computing system can be...
2017/0329988 PATTERN FOR SECURE STORE
A computer system, computer product, and method for accessing a secure store, which includes receiving a request to access a secure store, checking the file...
2017/0329987 Database Security Tool
A database security tool includes a user interface, a retrieval engine, an authorization engine, an alert engine, and an update engine. The user interface...
2017/0329986 METHOD AND DEVICE FOR PROCESSING MULTIMEDIA FILE
A method and a device for processing a multimedia file are provided. In some embodiments, for a multimedia file to be processed, encoding information of the...
2017/0329985 APPLICATION CONTROL
A method for controlling application operations on data elements includes identifying an activity by an instance of an application running on a host to perform...
2017/0329984 FACILITATING OFFLINE OR OTHER CONTEMPORANEOUS EDITING OF TABULAR DATA
Methods and systems are presented for identifying user accounts selectively authorized to modify at least respective first and second fields of a data table,...
2017/0329983 CONTEXTUAL EVALUATION FOR MULTIMEDIA ITEM POSTING
Approaches presented herein enable evaluating a multimedia item to be posted to a website (e.g., social networking site, forum, blog, etc.) to determine...
2017/0329982 PERFORMING AN OPERATION ON A DATA STORAGE
A method of performing an operation on a data storage for storing data being encrypted with a key KD associated with an owner of the data is provided. The...
2017/0329981 CAPTIVE PORTAL THAT MODIFIES CONTENT RETRIEVED FROM DESIGNATED WEB PAGE TO SPECIFY BASE DOMAIN FOR RELATIVE...
The described captive portal techniques cause client devices to render and display designated web pages. One designated web page may be different than a...
2017/0329980 SECURE AND SCALABLE DATA TRANSFER USING A HYBRID BLOCKCHAIN-BASED APPROACH
Techniques for facilitating secure and scalable data transfers using a hybrid blockchain-based approach are provided. In one embodiment, a first computer...
2017/0329979 PROTECTING ENTERPRISE DATA AT EACH SYSTEM LAYER
One embodiment provides a method, including: utilizing at least one processor to execute computer code that performs the steps of: receiving, on an electronic...
2017/0329978 DEVICE AND METHODS FOR MANAGEMENT AND ACCESS OF DISTRIBUTED DATA SOURCES
A device and method for provided access to distributed data sources includes a cloud security server configured to associate any number of data sources and...
2017/0329977 ENCODING-LOCKED METHOD FOR AUDIO PROCESSING AND AUDIO RECEIVING DEVICE
An encoding-locked method for audio processing for audio receiving device includes the following steps: inserting a first encryption key into a first digital...
2017/0329976 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
There is provided an information processing apparatus. An internal storage unit encrypts a data encryption key used for encryption of data to an encrypted data...
2017/0329975 THREAT AND DEFENSE EVASION MODELING SYSTEM AND METHOD
A system and method for modeling viable threats and for evading deployed defenses on a network are described. As a defensive tool used for threat modeling, the...
2017/0329974 SYSTEMS AND METHODS FOR ADAPTIVE ANALYSIS OF SOFTWARE
Systems and methods for software verification. In some embodiments, an application architecture model is generated for a software application, wherein: the...
2017/0329973 SYSTEM AND METHOD FOR PREVENTING EXECUTION OF MALICIOUS INSTRUCTIONS STORED IN MEMORY AND MALICIOUS THREADS...
In one embodiment, a malicious code prevention module identifies potentially malicious instructions in volatile memory of a computing device and replaces them...
2017/0329972 DETERMINING A THREAT SEVERITY ASSOCIATED WITH AN EVENT
Systems and techniques for assessing a risk associated with a data loss prevention (DLP) policy violation are described. Characteristics of data associated...
2017/0329971 PROTECTION OF SECURED BOOT SECRETS FOR OPERATING SYSTEM REBOOT
Protecting secured boot secrets while starting an operating system. Embodiments include identifying that a second operating system is to be started to replace...
2017/0329970 MEDIA PROTECTION POLICY ENFORCEMENT FOR MULTIPLE-OPERATING-SYSTEM ENVIRONMENTS
Technologies for media protection policy enforcement include a computing device having multiple operating systems and a data storage device partitioned into a...
2017/0329969 INFORMATION PROCESSING DEVICE AND COMPUTER PROGRAM PRODUCT
An information processing device includes an execution program management unit and an update unit. The execution program management unit includes an update...
2017/0329968 CYBERSECURITY SYSTEMS AND TECHNIQUES
Cybersecurity systems and techniques are described. A cybersecurity method may include generating a process fingerprint of a process, wherein the process...
2017/0329967 DUMMY INFORMATION INSERTION DEVICE, DUMMY INFORMATION INSERTION METHOD, AND STORAGE MEDIUM
Provided is a more versatile technique that makes it possible to input dummy information in response to an attacker seeking to collect normal information that...
2017/0329966 ELECTRONIC DEVICE BASED SECURITY MANAGEMENT
Methods, apparatus, and computer program products for providing security for an electronic device are described. An example of a method includes monitoring, by...
2017/0329965 Detecting Irregularities on a Device
A system and method for the detection of irregularities, such as fraud or malware, running on a device, is disclosed. The system comprises a monitoring program...
2017/0329964 OUTPUT DEVICE, ANALYSIS DEVICE, AND RECORDING MEDIUM IN WHICH COMPUTER PROGRAM IS STORED
The present invention provides an output device, etc., with which it is possible to present an alert indicating an abnormality of network to an operator in...
2017/0329963 METHOD FOR DATA PROTECTION USING ISOLATED ENVIRONMENT IN MOBILE DEVICE
Embodiments of the application provide a mobile device architecture having non-protected environment and one or more protected containers for isolating...
2017/0329962 IDENTIFICATION DEVICE, IDENTIFICATION METHOD, AND IDENTIFICATION PROGRAM
A command server identification device adds a tag to data received by malware upon execution of the malware, the tag capable of uniquely identifying...
2017/0329961 Attack Protection For Valid Gadget Control Transfers
In one embodiment, a processor comprises: a first register to store a first bound value for a stack to be stored in a memory; a second register to store a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.