Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,025,5473 Geological log data processing methods and apparatuses
A method and a resistivity image logging tool connected or connectable to one or more processing devices process geological log data to construct missing...
US-1,025,5472 Apparatus and method for transmitting traffic-related data in road traffic
An apparatus and a method for transmitting traffic-related data in road traffic include transmitting the traffic-related data in the form of dynamically...
US-1,025,5471 Code recognition device
According to one embodiment, a code recognition device includes a reader, a processor for region detection, for first extraction, and for second extraction. The...
US-1,025,5470 Barcode reader and accessory for the barcode reader
A barcode reader and an accessory are disclosed. The accessory may include an interface system and a wireless and/or wired interface for communication with a...
US-1,025,5469 Illumination apparatus for a barcode reader
Illumination systems for illuminating objects to be read or imaged by optical readers, such barcode scanners and direct part marking (DPM) barcode readers, are...
US-1,025,5468 Transmission RFID test systems
An RFID test system is disclosed that establishes a minimum coupling between two ports without an RFID tag present and a higher coupling when the RFID tag is...
US-1,025,5467 Hybrid tag for radio frequency identification system
RFID (radio frequency identification) systems are provided in which tag and interrogator devices implement a hybrid framework for signaling including an optical...
US-1,025,5466 Methods for organizing the disinfection of one or more items contaminated with biological agents
The invention provides method for organizing the disinfection of one or more items contaminated with biological agent(s) comprising (a) attaching a...
US-1,025,5465 Magnetic information processing device and magnetic information processing method
A magnetic information processing device for use with a magnetic recording medium storing a magnetic signal may include a magnetic card detection unit...
US-1,025,5464 Systems and methods for determining clock rates for communicating with processing devices
A payment terminal such as a payment reader may receive and form electrical connections with an electronic transaction card such as an EMV chip card. The...
US-1,025,5463 Secure computer architecture
A secure computer architecture is provided. With this architecture, data is received, in a component of an integrated circuit chip implementing the secure...
US-1,025,5462 Apparatus and method for obfuscating power consumption of a processor
An apparatus for obfuscating power consumption associated with one or more operations of a logic circuitry of a processor. The apparatus comprises...
US-1,025,5461 Secure device chamber
For a secure device chamber, the device chamber is disposed in a chassis and includes a device port. A door latches to obstruct access to the device chamber. A...
US-1,025,5460 Authenticating printed paper documents and websites against a blockchain record
A system and method are disclosed for rendering published documents tamper evident. Embodiments render classes of documents tamper evident with cryptographic...
US-1,025,5459 Privacy enabled runtime
Technical solutions are described for preventing unauthorized transmission of data by a communication apparatus. An example computer-implemented method includes...
US-1,025,5458 Trust based access to records via encrypted protocol communications with authentication system
Systems and techniques are disclosed for trust based access to records via encrypted protocol communications with an authentication system. An example system is...
US-1,025,5457 Outlier detection based on distribution fitness
In an example, a submission of a confidential data value of a first confidential data type is received from a first user with one or more attributes. A...
US-1,025,5456 Remote server encrypted data provisioning system and methods
Embodiments of the invention are directed to methods, systems and devices for providing sensitive user data to a mobile device using an encryption key. For...
US-1,025,5455 Method and system for accessing centralised patient data
A system and method is provided to allow access to centralized patient data captured from a medical device across an open network to a third party. The system...
US-1,025,5454 Controlling security in relational databases
A security controller controls secure processing of queries in an encrypted relational database. A query controller receives, from a client device, a secure...
US-1,025,5453 Controlling privacy in a face recognition application
Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A...
US-1,025,5451 Progressive device lock
A method for securing an enterprise application on a computing device includes: defining at least one monitored action, where the monitored action is an access...
US-1,025,5450 Customer load of field programmable gate arrays
Customer content is securely loaded on a field programmable gate array (FPGA) located on a secure cryptography card. The customer content is loaded such that it...
US-1,025,5449 Permission request
To perform a restricted action, such as access a restricted content item, a subordinate user account can transmit a permission request to an authorizing user...
US-1,025,5448 Data security using high speed serial equalization
A system includes a transmit equalizer to equalize a data stream using a set of transmit parameters to generate an input signal. The system further includes a...
US-1,025,5447 Secure message-sending method using personalized template and apparatus using the same
Disclosed herein are a secure message-sending method using a personalized template and an apparatus using the method. A personalized template for a message...
US-1,025,5446 Clipboard management
Embodiments provide methods, devices and computer program arranged to control access to clipboards by applications. In one embodiment a user device comprises:...
US-1,025,5445 Identifying destinations of sensitive data
Some embodiments of the invention may enhance security, usability, and/or efficiency for entities by identifying destination servers on behalf of the entity. In...
US-1,025,5444 Method and system for utilizing secure profiles in event detection
The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a...
US-1,025,5443 Method, apparatus, system and non-transitory computer readable medium for code protection
A code protection method may include storing, using a processor of a computer, a package file that includes files for an application on a storage device of the...
US-1,025,5442 Controlled publication of sensitive content
Systems and methods are disclosed herein for publishing sensitive content at a future time, where prior to the future time, receiving an encrypted version of...
US-1,025,5441 Electronic device and method of managing image by electronic device
A method of managing an image by an electronic device may include: generating a first encryption image by encrypting a first image; acquiring bitstream data...
US-1,025,5440 Secure processing systems and methods
This disclosure relates to systems and methods for enabling the use of secret digital or electronic information without exposing the sensitive information to...
US-1,025,5439 Threat modeling systems and related methods including compensating controls
Threat modeling methods include, in response to receiving user input using computing device interfaces: storing threat model components, threats, and security...
US-1,025,5438 Operating system agnostic validation of firmware images
Examples relate to providing operating system (OS) agnostic validation of firmware images. In some examples, a request to verify a number of firmware images is...
US-1,025,5437 IPTV devices and methods adapted for such devices
Methods and apparatus for enabling upgrading of a television (TV) device that is connectable to an internet protocol TV (IPTV) system including an operator...
US-1,025,5436 Creating rules describing malicious files based on file properties
Systems and methods automatically determine rules for detecting malware. A fingerprint representing a file is received. A set of nearest neighbor fingerprints...
US-1,025,5435 Systems and methods for establishing a reputation for related program files
The disclosed computer-implemented method for establishing a reputation for related program files may include (1) identifying a set of related program files,...
US-1,025,5434 Detecting software attacks on processes in computing devices
Various embodiments include methods for detecting software attacks on a process executing on a computing device. Various embodiment methods may include...
US-1,025,5433 Executing process code integrity verificaton
A system and method to monitor executing processes are disclosed. A respective starting fingerprint of memory of each executing process within at least one...
US-1,025,5432 Detecting malicious instructions on a virtual machine using profiling
A system that includes a trusted measurement machine comprising a profiling tool, a semantics virtual machine profiling engine interface, a semantics virtual...
US-1,025,5431 System and method of detecting unwanted software
Disclosed are system and method for detecting one or more unwanted applications in a computing device. One exemplary method comprises: obtaining information...
US-1,025,5430 Sending a password to a terminal
A mechanism is provided for sending a password to a terminal. A password send request is received. The status of each of a plurality of terminals coupled to the...
US-1,025,5429 Setting an authorization level at enrollment
Systems, methods, and other embodiments associated with setting an authorization level at enrollment. According to one embodiment, a method includes a accessing...
US-1,025,5428 Apparatus and method for testing normality of shared data
According to an embodiment, a test apparatus that is connected to an electronic device through a network includes a generator, a transmitter, and a...
US-1,025,5427 Authorization of unique computer device specimens
The authorization of unique computer peripheral specimens to connect to a host computer employs a computer connected device storing both a unique identifier...
US-1,025,5426 Keyboard device and data communication method using the same
A keyboard device and a data communication method using the keyboard device. The data communication method includes generating, by the keyboard device, data...
US-1,025,5425 Secure authentication protocol systems and methods
An input device of a secure authentication protocol system may receive at least one user authentication factor in a pre-boot session. The input device may...
US-1,025,5423 Systems and methods for providing image-based security measures
Systems, methods, and non-transitory computer-readable media can detect an operation that causes a challenge response process to be initiated. An image category...
US-1,025,5422 Identity proxy for access control systems
A hardware security token in contact with a user's body can send a signal via interbody communication to one or more electronic devices associated with a system...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.