Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0087619 DECODING BARCODES
Systems and methods are provided for decoding barcodes. A scan signal is acquired along a scan through a barcode. A first character unit grid for a unit width...
2019/0087618 BARCODE READER
A barcode reader may perform image processing functions to generate distinct image data records from the frame of image data of a barcode, select an image data...
2019/0087617 SLIP PROCESSING DEVICE, SLIP PROCESSING METHOD AND STORAGE MEDIUM
A slip processing device including a scanner which irradiates a slip with a light beam and reads identification information from a barcode provided on the...
2019/0087616 Scanning Device and Method for Use in an Automated Analyser
A scanning method with simple mechanics for use in an automated analyser to scan objects or codes on objects. The invention enables one to move a scanning unit...
2019/0087615 MOVABLE READING APPARATUS WITH A PLURALITY OF ANTENNAS
A movable reading apparatus includes antennas, a controller, a reader, and a processor. The antennas perform transmission/reception of signals for...
2019/0087614 EMPHASIZING EQUIPMENT BASED ON AN EQUIPMENT TAG
For emphasizing equipment based on an equipment tag, a processor receives a given equipment reference code for a given equipment instance. The processor...
2019/0087613 PORTABLE OBJECT AND NFC ANTENNA THEREOF
A portable object for near field communication with an external reader able to provide a magnetic field. The object has no internal power supply or energy...
2019/0087612 Wireless Tag Apparatus and Related Methods
An asset tag apparatus and methods of monitoring assets with an asset tag are provided. The asset tag apparatus includes a housing and a wireless transmitter...
2019/0087611 MAGNETIC HEAD AND CARD READER
A magnetic head to detect a change of a magnetic field caused by a passing of a magnetic recording medium may include a head main body including a core...
2019/0087610 ASSET PROTECTION OF INTEGRATED CIRCUITS DURING TRANSPORT
An integrated circuit (IC) provisioned for asset protection has a primary circuit portion, such as a microprocessor or system-on-chip, that can be selectively...
2019/0087609 METHOD AND SYSTEM FOR CONTROLLING POWER KEY OF TERMINAL
The present disclosure provides a method and a system for controlling a power key of a terminal, where the method includes: determining type of control command...
2019/0087608 PROVIDING PRIVACY PROTECTION FOR DATA CAPTURING DEVICES
Systems and methods for providing privacy protection in the use of data capturing device are provided. A set of data capturing components of a mobile...
2019/0087607 SECURITY METHOD FOR RESISTING HARDWARE TROJAN INDUCED LEAKAGE IN COMBINATIONAL LOGICS
The invention is a method for designing combinational logics with resistance to hardware Trojan induced data leakage. The invention solves the untrustworthy...
2019/0087606 METHODS AND APPARATUS TO PROVIDE USER-LEVEL ACCESS AUTHORIZATION FOR CLOUD-BASED FIELD-PROGRAMMABLE GATE ARRAYS
Methods and apparatus to provide user-level access authorization for cloud-based filed-programmable gate arrays are disclosed. An example apparatus includes a...
2019/0087605 DATA SECURITY
Disclosed herein is a computer-implemented method of including signatures of source data in redundant data, wherein there are K source nodes of source data and...
2019/0087604 APPLYING A DIFFERENTIAL PRIVACY OPERATION ON A CLUSTER OF DATA
Embodiments for data anonymity by a processor. A dataset may be transformed into an anonymous dataset by applying a differential privacy operation and a...
2019/0087603 MOBILE DEVICE AND METHOD FOR ENABLING PATIENTS TO CONTROL ACCESS TO THEIR MEDICAL RECORDS
System and method for enabling patients to control access to their medical records are provided. Information identifying one or more medical care providers may...
2019/0087602 OFFLINE DOCUMENT DE-IDENTIFICATION APPARATUS AND METHOD, AND OFFLINE DOCUMENT RESTORATION APPARATUS
An offline document de-identification apparatus and method, and an offline document restoration apparatus, are disclosed. The offline document...
2019/0087601 METHODS TO COMPRESS, ENCRYPT AND RETRIEVE GENOMIC ALIGNMENT DATA
A genomic data decoder may jointly compress and encrypt genomic data alignment information while preserving the privacy of sensitive genomic data elements at...
2019/0087600 SECURE DATA MANAGEMENT SYSTEM AND METHOD
A secure data management system and method which separates query processing operations from transaction management and data storage operations to provides...
2019/0087599 COMPRESSING A SLICE NAME LISTING IN A DISPERSED STORAGE NETWORK
A method begins by receiving a list range request for a plurality of slice names within a slice name range. The method continues with identifying slice names...
2019/0087598 SYSTEM AND METHOD FOR DATA MANAGEMENT AND SECURITY FOR DIGITAL MANUFACTURING
A method and system for providing secure delivery, transport, modification, exchange of digital design and build files that have been bundled into a digital...
2019/0087597 SECURELY STORING CONTENT WITHIN PUBLIC CLOUDS
Systems, methods, and computer-readable storage media are provided for securely storing and accessing content within a public cloud. A processor manufacturer...
2019/0087596 GENERATING A STUB FILE CORRESPONDING TO A CLASSIFIED DATA FILE
Protecting data files is disclosed, including: in response to an indication that a data file has been generated by a client device, determining a security...
2019/0087595 OBJECT LEVEL ENCRYPTION SYSTEM INCLUDING ENCRYPTION KEY MANAGEMENT SYSTEM
Objects in separate cells or groups of cells in a database are encrypted individually. Respective authentications and authorizations are incorporated into each...
2019/0087594 CRYPTOGRAPHIC UNIT FOR PUBLIC KEY INFRASTRUCTURE (PKI) OPERATIONS
A module such as an M2M device or a mobile phone can include a removable data storage unit. The removable data storage unit can include a nonvolatile memory, a...
2019/0087593 MANAGEMENT OF DATA PRIVACY AND SECURITY IN A PERVASIVE COMPUTING ENVIRONMENT
A method to provide negotiation control to data such that a person or entity can negotiate the use of data gathered beyond what is needed for a particular use...
2019/0087592 DATA PROTECTION METHOD
A data protection method includes a data protection application that stores a security policy when executed on a portable electronic device. The security...
2019/0087591 METHOD, DEVICE AND STORAGE MEDIUM FOR PRINTING INFORMATION
The present disclosure relates to a method, a device and a storage medium for printing information. The method includes: acquiring authentication information...
2019/0087590 ENABLING ACCESS TO DATA
Methods, systems, apparatus and computer programs for enabling access to data by a requesting party. A plurality of sets of data are generated. A one one-way...
2019/0087589 PRIVACY-PRESERVING ANALYSIS SYSTEM FOR SECURE MULTIPARTY COMPUTING
A privacy-preserving analysis system that provides functionality to analyze disparate data sets (and identify correlations) while making individual...
2019/0087588 SECURED ENCRYPTED SHARED CLOUD STORAGE
Secure shared access to encrypted data in a data store is facilitated by using a data control server (DCS) to maintain a data storage reference table (DSRT)...
2019/0087587 METHOD AND SYSTEM FOR DATA DESTRUCTION IN A PHASE CHANGE MEMORY-BASED STORAGE DEVICE
One embodiment facilitates data destruction in a phase change memory-based storage device. During operation, the system detects, by the storage device, a power...
2019/0087586 METHOD AND APPARATUS TO PROVIDE SECURE APPLICATION EXECUTION
A technique to enable secure application and data integrity within a computer system. In one embodiment, one or more secure enclaves are established in which...
2019/0087585 IMAGE PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAM
An image processing apparatus includes: an information storage unit that stores plural application programs; an information acquisition section that acquires...
2019/0087584 CONTROLLED STARTING OF AN ELECTRONIC CIRCUIT
A method of checking the authenticity of the content of a non-volatile memory of an electronic device including a microcontroller and an embedded secure...
2019/0087583 FIRMWARE VERIFIED BOOT
Methods and apparatus for verifying a boot process of a computing system are disclosed. An example computer-implemented method includes reading, by a computing...
2019/0087582 BIOS SECURITY
Examples associated with basic input/output system (BiOS) security are described. One example includes detecting a mismatch between an active BiOS setting and...
2019/0087581 INTERNET-OF-THINGS MODULE
An Internet of Things module includes a memory including a boot area for storing boot firmware and first security information and a security area for storing a...
2019/0087580 SECURE LAUNCH FOR A HYPERVISOR
This disclosure generally relates to securely launching a hypervisor and subsequently validating that the hypervisor was securely launched. As is described...
2019/0087579 Password Power Switch Circuit and Electronic Device
A password power switch circuit for an electronic device includes a thermal energy conversion circuit and a programmable control chip. The thermal energy...
2019/0087578 ELECTRONIC DEVICES AND METHODS SUPPORTING UNSECURED SYSTEM-ON-CHIP SECURE BOOT FUNCTIONALITIES
Electronic device and methods supporting secure boot functionalities performed utilizing an unsecured System-on-Chip (SoC) are provided. In various...
2019/0087577 METHOD FOR PROTECTING THE CONFIDENTIALITY AND INTEGRITY OF FIRMWARE FOR AN INTERNET OF THINGS DEVICE
A method is provided for secure firmware provisioning of a device. In the method, an integrated circuit (IC) is manufactured by a first entity for use in the...
2019/0087576 SYSTEM FOR VERIFICATION OF INTEGRITY OF UNMANNED AERIAL VEHICLES
A system for verifying the integrity of unmanned aerial vehicles (UAVs), which is configured to reside in a UAV and interface with both the communications...
2019/0087575 PROVIDING ISOLATION IN VIRTUALIZED SYSTEMS USING TRUST DOMAINS
Implementations describe providing isolation in virtualized systems using trust domains. In one implementation, a processing device includes a memory ownership...
2019/0087574 REAL-TIME JAVASCRIPT CLASSIFIER
Aspects of the present disclosure are operable to protect against malicious objects, such as JavaScript code, which may be encountered, downloaded, or...
2019/0087573 DETECTING EXECUTABLE CODE WITHIN A DATA ENTITY
A method for protecting a computer, including receiving a data block, discovering code within the data block that can be disassembled for a machine...
2019/0087572 RANSOMWARE ATTACK MONITORING
Examples associated with ransomware attack monitoring are described. One example includes a monitor module to monitor files stored on the system for sequences...
2019/0087571 METHOD AND SYSTEM FOR DETECTING ATTACKS ON CYBER-PHYSICAL SYSTEMS USING REDUNDANT DEVICES AND SMART CONTRACTS
One embodiment facilitates detection of attacks in a cyber-physical system of interacting elements with physical inputs and outputs. During operation, the...
2019/0087570 SYSTEM FOR GENERATION AND EXECUTION OF EVENT IMPACT MITIGATION
Embodiments of the present invention provide a system for mitigating impact of one or more predicted events. The system is typically configured for estimating...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.