Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0155006 DEVICE AND METHOD FOR SKIN DETECTION
A device and a corresponding method for skin detection to enable a reliable, accurate and fast detection are disclosed. The proposed device comprises an...
2016/0155005 Identification Method Based on Connectivity Profiles
The present invention relates to a medical data processing method for identifying an entity of the nervous system, in particular the brain, of a patient,...
2016/0155004 DATA PROCESSING APPARATUS
A data processing apparatus processes moving image data that shows a vicinity of a vehicle and that is recorded while the vehicle is running The data...
2016/0155003 VIDEO SURVEILLANCE SYSTEM EMPLOYING VIDEO PRIMITIVES
A video surveillance system is set up, calibrated, tasked, and operated. The system extracts video primitives and extracts event occurrences from the video...
2016/0155002 HAZARD WARNING METHOD AND PORTABLE DEVICE UTILIZING THE SAME
A hazard warning method for a portable device comprises the steps of: capturing an environmental image toward a first direction when receiving a control...
2016/0155001 IDENTIFYING STORIES IN MEDIA CONTENT
Techniques associated with identifying stories in media content are described in various implementations. In one example implementation, a method may include...
2016/0155000 ANTI-COUNTERFEITING FOR DETERMINATION OF AUTHENTICITY
An anti-counterfeiting method and an anti-counterfeiting apparatus are disclosed. The anti-counterfeiting method includes: acquiring an image of an object on...
2016/0154999 OBJECTION RECOGNITION IN A 3D SCENE
A method comprising: obtaining a three-dimensional (3D) point cloud about at least one object of interest; detecting ground and/or building objects from 3D...
2016/0154998 SYSTEM AND METHOD FOR RECOGNIZING GEOMETRIC SHAPES
A system and method that is able to recognize a user's natural drawing of geometric shapes. The system and method is able to process single-stroke and...
2016/0154997 HANDWRITING INPUT APPARATUS AND CONTROL METHOD THEREOF
A handwriting input apparatus and method are provided. The handwriting input apparatus includes: a touch screen configured to display a handwriting...
2016/0154996 ROBOT CLEANER AND METHOD FOR CONTROLLING A ROBOT CLEANER
A robot cleaner and a method for controlling a robot cleaner are provided. The robot cleaner may include a casing, a drive disposed in the casing, a camera...
2016/0154995 IMAGE PROCESSING METHOD, IMAGE PROCESSING APPARATUS, AND RECORDING MEDIUM
When a human skin region is detected, misdetection or detection failure is prevented. An image processing apparatus of the present invention acquires an image...
2016/0154994 METHOD AND APPARATUS FOR REGISTERING FACE, AND METHOD AND APPARATUS FOR RECOGNIZING FACE
A method and an apparatus for registering a face, and a method and an apparatus for recognizing a face are disclosed, in which a face registering apparatus may...
2016/0154993 AUTOMATIC SEGMENTATION OF HAIR IN IMAGES
Based on a multi-step process, an automatic hair segmentation method and system are disclosed. By extracting various information components from an image,...
2016/0154992 WRINKLE CARE SUPPORT DEVICE AND METHOD FOR SUPPORTING WRINKLE CARE
A wrinkle care support device includes: a wrinkle change detector that detects a change made in a wrinkle after occurrence of the wrinkle, the wrinkle having...
2016/0154991 MULTI-BIOMETRIC ENROLLMENT KIOSK INCLUDING BIOMETRIC ENROLLMENT AND VERIFICATION, FACE RECOGNITION AND...
A biometric and identity enrollment kiosk for collecting personal data includes a slidable main module and at least one modifiable section removably coupled to...
2016/0154990 SIMULTANEOUS ACQUISITION OF BIOMETRIC DATA AND NUCLEIC ACID
Disclosed are devices and methods for collection and analyzing biological samples containing nucleic acid in conjunction with collecting at least one ridge and...
2016/0154989 FINGERPRINT IDENTIFICATION CHIP WITH ENHANCED ESD PROTECTION
A fingerprint identification chip with enhanced ESD protection includes receiving pads disposed on a surface of a chip and arranged in a matrix format. The...
2016/0154988 BIOMETRIC IMAGE SENSING
An novel sensor is provided having a plurality of substantially parallel drive lines configured to transmit a signal into a surface of a proximally located...
2016/0154987 METHOD FOR BARCODE DETECTION, BARCODE DETECTION SYSTEM, AND PROGRAM THEREFOR
A method for barcode detection, barcode detection system and program. In method for detecting a barcode, an information processing apparatus executes the steps...
2016/0154986 DATA COLLECTION SYSTEM HAVING RECONFIGURABLE DATA COLLECTION TERMINAL
There is provided in one embodiment a data collection system including a data collection terminal having an encoded information reader device and a computer...
2016/0154985 POINT-OF-SALE SCANNER
A method of verifying the authenticity of an identification card, including capturing, with a point-of-sale scanner, a first image of the identification card,...
2016/0154984 HOST DEVICE FOR OBTAINING OPERATING INSTRUCTIONS FOR A BARCODE READER FROM A REMOTE SERVER
A host device is configured to (i) establish a point-to-point connection with a barcode reader via a point-to-point communication interface, (ii) determine...
2016/0154983 ELECTROTEXTILE RFID ANTENNA
A system for reading transponders may include a printed circuit board and an electrotextile antenna. The printed circuit board may include an RFID reading...
2016/0154982 ANTI-THEFT RECOVERY TOOL
An anti-theft protection disablement solution is provided to authorized users and authorized customer service representatives. An anti-theft protection...
2016/0154981 Tamper Responsive Sensor
There is provided a tamper responsive sensor comprising a carrier printed circuit board, carrier PCB, holding a mesh of one or more electrically conductive...
2016/0154980 METHOD OF SECRET INFORMATION ENTERING INTO ELECTRONIC DIGITAL DEVICES
The solution provides a method of secret information entering into an electronic digital device by a user via the input/output device, when the electronic...
2016/0154979 APPARATUS AND METHOD FOR GENERATING IDENTIFICATION KEY
Provided is an apparatus for generating an identification key by a probabilistic determination of a short occurring between nodes constituting a circuit, by...
2016/0154978 METHOD OF RE-IDENTIFICATION RISK MEASUREMENT AND SUPPRESSION ON A LONGITUDINAL DATASET
In longitudinal datasets, it is usually unrealistic that an adversary would know the value of every quasi-identifier. De-identifying a dataset under this...
2016/0154977 TRANSMITTING MEDICAL DATASETS
The present embodiments relate to a method for transmitting medical datasets. The method includes receiving a patient dataset from an internal data storage,...
2016/0154976 TERMINAL AND METHOD FOR HIDING AND RESTORING MESSAGE
A terminal to hide a message includes an input unit to receive a signal to hide a message and a signal to restore a hidden message; a display unit to display...
2016/0154975 Social Media and Data Sharing Controls
Social media and data sharing controls may be provided. Upon receiving a request to transmit an element of data to a recipient, a determination may be made as...
2016/0154974 SOCIAL NETWORK PUBLICATION SYSTEM
A method and system providing a Social Network Publication System (SNPS). Users create publications using cards. Catalog cards hold other cards and are used to...
2016/0154973 Security Policy for Device Data
Techniques for providing security policy for device data are described. In implementations, data on a device is stored in an encrypted form. To protect the...
2016/0154972 TIERED APPLICATION PERMISSIONS
Methods, systems, and computer-readable media for granting application permissions and providing notifications of API activity are provided. An example method...
2016/0154971 System and Method for Confidentiality-Preserving Rank-Ordered Search
A confidentiality preserving system and method for performing a rank-ordered search and retrieval of contents of a data collection. The system includes at...
2016/0154970 Method and Apparatus for Secure Communication
Secrecy scheme systems and associated methods using list source codes for enabling secure communications in communications networks are provided herein....
2016/0154969 COMMUNITY-BASED PARENTAL CONTROLS
According to a general aspect, a method includes maintaining rating groups, each rating group providing a rating for content compiled based on information...
2016/0154968 SECURE ENDPOINT FILE EXPORT IN A BUSINESS ENVIRONMENT
Embodiments for preventing data loss in a business environment are provided. In some embodiments, a secure endpoint file export application assigns users to...
2016/0154967 METHODS OF DATA TRANSFER IN ELECTRONIC DEVICES
A method of data transfer in an electronic device including a secure module, which includes a processor and a secure element, an application processor, and a...
2016/0154966 Hiding Information in Noise
A process of hiding a key or data inside of random noise is introduced, whose purpose is to protect the privacy of the key or data. In some embodiments, the...
2016/0154965 Transforming Policies to Enforce Control in an Information Management System
In an information management system, policies are deployed to targets and targets can evaluate the policies whether they are connected or disconnected to the...
2016/0154964 Method and System of Managing Digital Multimedia Content
Methods and systems of managing content. More particularly, methods and systems of managing digital media content are provided. A Content Manager Application...
2016/0154963 REDUNDANT KEY MANAGEMENT
A data storage service redundantly stores data and keys used to encrypt the data. Data objects are encrypted with first cryptographic keys. The first...
2016/0154962 AUTOMATED SECURITY ASSESSMENT OF BUSINESS-CRITICAL SYSTEMS AND APPLICATIONS
Systems and methods which provide a new application security assessment framework that allows auditing and testing systems to automatically perform security...
2016/0154961 Evaluating Customer Security Preferences
Methods and systems for evaluating customer security preferences are presented. In some embodiments, a computer system may receive, from a security dashboard...
2016/0154960 SYSTEMS AND METHODS FOR RISK RATING FRAMEWORK FOR MOBILE APPLICATIONS
Systems, methods and computer readable medium for training a risk rating system for assessing a risk of a mobile application are disclosed. One or more...
2016/0154959 A METHOD AND SYSTEM FOR MONITORING WEBSITE DEFACEMENTS
This invention relates to a method for real time communication with expression of personal emotions at the same time via instant messages and graphical...
2016/0154958 SYSTEM AND METHOD FOR SECURE AUTHENTICATION OF A "SMART" BATTERY BY A HOST
Systems and methods for providing a battery module 110 with secure identity information and authentication of the identity of the battery 110 by a host 120. In...
2016/0154957 Protecting Data in Memory of a Consumable Product
A non-transitory memory storing a digital signature of a consumable product where the digital signature indicates that an identifier and host device setting...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.