At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
APPARATUS AND METHOD FOR PRODUCING IMAGE PROCESSING FILTER
In order to produce an image processing filter by utilizing genetic programming, a taught parameter acquiring unit acquires a taught parameter indicating a...
GLOSS DETERMINATION DEVICE AND GLOSS DETERMINATION METHOD
A gloss determination device includes: an image acquiring unit that acquires a parallelly polarized image obtained by photographing an object illuminated by...
APPARATUS, METHOD AND PROGRAM FOR IMAGE SEARCH
One or more representative images extracted from an image group comprising a plurality of images is/are displayed. A part or all of the representative image or...
STATISTICAL APPROACH TO IDENTIFYING AND TRACKING TARGETS WITHIN CAPTURED
A facility implementing systems and/or methods for creating statistically significant signatures for targets of interest and using those signatures to identify...
TEXT ENTITY RECOGNITION
Various embodiments enable the identification of semi-structured text entities in an imager. The identification of the text entities is a relatively simple...
SYSTEM, DEVICE, AND METHOD FOR GEO-LOCATING OBJECTS
A method, system, and device for analyzing images captured by a vehicle-based camera includes establishing a communication connection between a mobile...
A video analysis device and a method of operating a video analysis device
A video analysis device (3), configured to receive video sequences of an environment within a field of view (8) of a camera (7), and to analyze the video...
SYSTEM AND METHOD FOR SCENE TEXT RECOGNITION
Apparatus and method for performing accurate text recognition of non-simplistic images (e.g., images with clutter backgrounds, lighting variations, font...
VEHICLE IDENTIFICATION BASED ON AN IMAGE
A machine may be configured as a vehicle identification machine to identify a model of a vehicle based on an image that depicts a dashboard of the vehicle. As...
Approaching-Object Detection System and Vehicle
An approaching-object detection system detects an approaching object based on images captured by an imaging device. The approaching-object detection system...
LANE BOUNDARY LINE INFORMATION ACQUIRING DEVICE
In a lane boundary line information acquiring device, a detection unit detects lane boundary lines. A driving environment acquiring unit acquires a driving...
TRAILER TRACK ESTIMATION SYSTEM AND METHOD BY IMAGE RECOGNITION
The present invention provides a trailer track estimation system by image recognition including: an image photographing unit which photographs a trailer which...
DEPTH CAMERA BASED DETECTION OF HUMAN SUBJECTS
Depth camera-based human subject detecting includes receiving an image captured by a depth camera, converting the image, in a depth camera coordinate system,...
METHOD FOR COMPUTING A SIMILARITY MEASURE FOR VIDEO SEGMENTS
The digital comments of the viewers who posted comments on videos are used to determine a similarity measure between two video segments. The results include...
METHOD AND SYSTEM FOR A MOBILE TERMINAL TO ACHIEVE USER INTERACTION BY
SIMULATING A REAL SCENE
A method and a system for a mobile terminal to achieve use interaction by simulating a real scene are disclosed. The method comprises: formulating a scene task...
DATASET CREATION FOR TRACKING TARGETS WITH DYNAMICALLY CHANGING PORTIONS
A mobile platform visually detects and/or tracks a target that includes a dynamically changing portion, or otherwise undesirable portion, using a feature...
Microform Word Search Method and Apparatus
A digital imaging system for real-time searching for expressions that appear on a microform medium, the system comprising a computer including a processor, a...
DYNAMIC VECTOR MAP TILES
The present disclosure relates to systems and processes for providing vector map data for generating a view of a map in a mapping application. In one example...
METHODS AND SYSTEMS THAT GENERATE FEATURE SYMBOLS WITH ASSOCIATED
PARAMETERS IN ORDER TO CONVERT IMAGES TO...
The current application is directed to methods and systems that convert document images, which contain Arabic text and text in other languages in which symbols...
METHODS AND SYSTEMS FOR PROCESSING DOCUMENTS
Methods and systems for classifying a region of interest in an electronic document. A first region from the electronic document is extracted. The first region...
Partial Overlap and Delayed Stroke Input Recognition
An optimal recognition for handwritten input based on receiving a touch input from a user may be selected by applying both a delayed stroke recognizer as well...
ELECTRONIC APPARATUS, PROCESSING METHOD AND STORAGE MEDIUM
According to one embodiment, an electronic apparatus includes a receiver and circuitry. The receiver is configured to receive a first image including a...
SHAPE RECOGNITION USING PARTIAL SHAPES
Shape recognition is performed based on determining whether one or more ink strokes is not part of a shape or a partial shape. Ink strokes are divided into...
SYSTEM AND METHOD FOR DETECTING INVISIBLE HUMAN EMOTION
A system and method for emotion detection and more specifically to an image-capture based system and method for detecting invisible and genuine emotions felt...
METHOD AND DEVICE FOR MATCHING SIGNATURES ON THE BASIS OF MOTION SIGNATURE
A method for matching signatures based on motion signature information including acquiring a first signature and at least one second signature that are to be...
Image Adaptive Physiologically Plausible Color Separation
The subject disclosure presents systems and methods for separating colors in an image by automatically and adaptively adjusting reference vectors based on...
Applying Pixelwise Descriptors to a Target Image that are Generated by
Segmenting Objects in Other Images
Both pixel-oriented analysis and the more accurate yet slower object-oriented analysis are used to recognize patterns in images of stained cancer tissue....
METHODS AND SYSTEMS FOR REDUCING THE LIKELIHOOD OF FALSE POSITIVE DECODES
Systems and methods for reducing the likelihood of false positive decodes within a set of barcodes are disclosed. The method can be implemented in a computing...
DATA DETERMINATION DEVICE, LIBRARY DEVICE, AND DATA DETERMINATION METHOD
A data determination device includes a plurality of determination units that determine, based on respective different criteria, whether each of plural pieces...
SEMANTIC NOTE TAKING SYSTEM
A semantic note taking system and method for collecting information, enriching the information, and/or binding the information to services is provided....
IDENTIFYING ONE- OR TWO-DIMENSIONAL BAR CODES VIA WEIGHTED IMAGE DATA
A method for identifying a one- or two-dimensional barcode in input image data, the method comprising the steps of: obtaining first image data of a first image...
A CODED LIGHT DEVICE, AND A PRODUCT INFORMATION SYSTEM COMPRISING SUCH A
CODED LIGHT DEVICE
A coded light device comprising a light source configured to emit coded light, an identifier detection unit configured to detect a product identifier, and a...
CARD READER COMMUNICATION METHOD
A card reader includes a body, the body being configured for coupling with a device, the device including a device light sensor and a device light source; a...
WORKING METHOD OF A MULTI-SLOT CARD READER BASED ON THE STANDARD CCID
A working method of a multi-slot card reader based on the standard CCID protocol comprises: powering up to perform initialization, and establishing a...
Method And System For Tracking And Authenticating Articles
The present invention relates to a method and system for tracking, issuing, and authenticating gear or articles, such as uniforms, badges, equipment, weapons,...
BUS PROTECTION WITH IMPROVED KEY ENTROPY
An apparatus includes a processor and a bus encryption unit. The processor is configured to communicate information over a secured data bus, and to communicate...
SYSTEMS AND METHODS FOR UNLOCKING A WEARABLE DEVICE
Systems and methods allow a user to interact with an augmented reality device. In one implementation, a lockable, wearable device is provided. The wearable...
SYSTEM AND METHOD FOR PERSISTENT DATA INTEGRITY IN DOCUMENT COMMUNICATION
A system, method, and computer readable medium for verifying data integrity of documents involves adding a machine-readable stamp on a document generated by a...
Systems and Methods for Context-Based Permissioning of Personally
A method is provided, including establishing a plurality of context profiles for a user, at least one context profile is associated with: (i) subject areas...
Cognitive Digital Security Assistant
An approach is provided in which a cognitive digital security assistant intercepts a personal data request from a client that is requesting personal data from...
ELECTRONIC SYSTEMS OF ELECTRONIC TERMINALS AND SERVERS FOR SECURING
INFORMATION INTEGRITY IN THE DISTRIBUTED...
In some embodiments, the present invention provides for a computer-implemented method, including: electronically receiving, first terminal data where the first...
SYSTEMS AND METHODS TO MANAGE FILE ACCESS
A file system configured to use tags to control operations on files stored in the system. Each tag is usable to tag one or more of the files stored in the...
Securing a Distributed File System
System and methods for a secured distributed file system (DFS) achieved by providing access control to the data stored in the DFS based on mapping of access...
Providing Integrated Role-based Access Control
An example method includes, identifying a request from a user associated with a user role. The request corresponds to: an application request to access a first...
TRUSTED USER CIRCLES
A trusted user circle server for encryption key distribution and authentication support, as well as a client-side application which resides on user's devices...
Method and Apparatus for Determining Permission of Application Program
A method for determining a permission of an application program is presented. The method for determining a permission of an application program in the present...
AVOIDING ENCRYPTION IN A DEDUPLICATION STORAGE
Avoiding encryption in a deduplication vault. In one example embodiment, a method may include analyzing an allocated plain text block stored in the source...
CLIENT-SIDE ENCRYPTION IN A DEDUPLICATION BACKUP SYSTEM
Client-side encryption in a deduplication backup system. In one example embodiment, a method includes a backup phase in which various steps are performed for...
METHOD, ELECTRONIC DEVICE, AND NON-TRANSITORY COMPUTER READABLE RECORDING
MEDIA FOR IDENTIFYING CONFIDENTIAL DATA
A method, an electronic device, and a non-transitory computer readable recording medium for identifying confidential data are provided. The electronic device...
PROVIDING APPLICATION PRIVACY INFORMATION
A system includes a data processing device, a memory, identifications of applications, and a privacy indication module. Each identification of the application...