Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0196468 EXTRACTION OF USER BEHAVIOR FROM DEPTH IMAGES
Embodiments described herein use depth images to extract user behavior, wherein each depth image specifies that a plurality of pixels correspond to a user. In...
2016/0196467 Three-Dimensional Face Recognition Device Based on Three Dimensional Point Cloud and Three-Dimensional Face...
The invention describes a three-dimensional face recognition device based on three-dimensional point cloud and a three-dimensional face recognition method...
2016/0196466 METHOD AND APPARATUS FOR REALIZING TOUCH BUTTON AND FINGERPRINT IDENTIFICATION, AND TERMINAL DEVICE USING SAME
An apparatus for realizing a touch button and fingerprint identification, includes: a fingerprint identification sensor, disposed below a cover glass of a...
2016/0196465 EYE TRACKING
Examples are disclosed herein that relate to eye tracking based on two-dimensional image data. One example provides, on a computing device, a method of...
2016/0196464 DETECTION CONTROL DEVICE, DETECTION SYSTEM, NON-TRANSITORY STORAGE MEDIUM, AND DETECTION CONTROL METHOD
A detection control device includes a detection target image acquiring unit that acquires an imaged image resulting from imaging a specimen that is to be...
2016/0196463 METHOD AND APPARATUS FOR IMPLEMENTING TOUCH KEY AND FINGERPRINT IDENTIFICATION, AND TERMINAL DEVICE
An apparatus for implementing touch key and fingerprint identification includes a fingerprint identification sensor arranged below a cover glass of a terminal...
2016/0196462 APPARATUS AND METHOD FOR IMPLEMENTING TOUCH CONTROL AND FINGERPRINT IDENTIFICATION
An apparatus for implementing touch control and fingerprint identification includes: a fingerprint identification sensor including a plurality of sub-sensors...
2016/0196461 FINGERPRINT CORE EXTRACTION DEVICE FOR FINGERPRINT MATCHING, FINGERPRINT MATCHING SYSTEM, FINGERPRINT CORE...
To extract a fingerprint core for alignment of a fingerprint image for fingerprint matching. The present invention comprises: a core extraction unit which has...
2016/0196460 REMOVABLE MODULE FOR MOBILE COMMUNICATION TERMINAL
A decodable indicia reading system can comprise a mobile communication terminal and a removable module. The mobile communication terminal can comprise a...
2016/0196459 Accuracy-Enhanced Scanner
An accuracy-enhanced scanner provides (in response to a first user input) illumination of potential scan targets and scans (in response to a second user input)...
2016/0196458 PROCESSING VISIBLE CODING SEQUENCE, PLAYING VISIBLE CODING SEQUENCE
Embodiments of the present invention generally relate to data processing, and further the embodiments of the invention relate to a method of processing a...
2016/0196457 LINE REPLACEABLE UNIT HEALTH NODES AND METHODS FOR DETERMINING MAINTENANCE ACTIONS RELATING TO LINE REPLACEABLE...
Line Replaceable Unit (LRU) health nodes are provided, as are methods for determining maintenance actions with respect to LRU health nodes. In one embodiment,...
2016/0196456 REGISTRATION OF MEDICAL EQUIPMENT
An RFID registration apparatus for registering units comprising RFID tags. The registration apparatus comprises: a detector space defined by a top, a bottom...
2016/0196455 COMPUTATIONAL BLUETOOTH TAG WITH BACKSCATTER
A backscatter modulation radio-frequency (RF) sensor and method for using the same are disclosed herein. In one embodiment, the RF sensor comprises: an energy...
2016/0196454 USB SECURITY DEVICE, APPARATUS, METHOD AND SYSTEM
Methods, devices and system for enhancing computer information security by physically blocking unused USB ports with self-locking devices, or by providing USB...
2016/0196453 DATA SECURING DEVICE, RECORDING MEDIUM, AND DATA SECURING METHOD
A data securing device according to an embodiment includes a processor that executes a process including: receiving individual data and a parameter for...
2016/0196452 CLOUD KEY DIRECTORY FOR FEDERATING DATA EXCHANGES
Embodiments are directed to providing attribute-based data access. In an embodiment, a data request specifies one or more search data attributes describing...
2016/0196451 MANAGING DATA ON COMPUTER AND TELECOMMUNICATIONS NETWORKS
Protecting personal information by generating entity-specific aliases for use in communication with third parties is disclosed.
2016/0196450 Systems, Methods, and Computer Program Products for Managing Secure Elements
Systems, methods, and computer program products are provided for performing content management operations. At least one memory stores data, and a central...
2016/0196449 Apparatus for and Method of Preventing Unsecured Data Access
Shown and depicted is preventing sensitive information from being exfiltrated from an organization using hypervisors. A Data Loss Prevention system is composed...
2016/0196448 COMMENT PLUG-IN FOR THIRD PARTY SYSTEM
In particular embodiments, one or more computing devices associated with a third-party system generate a web page comprising one or more references configured...
2016/0196447 Secure personal content server
A local content server system (LCS) for creating a secure environment for digital content is disclosed, which system comprises: a communications port in...
2016/0196446 LIMITING EXPOSURE TO COMPLIANCE AND RISK IN A CLOUD ENVIRONMENT
Minimizing data security risks may be provided. A number and type of confidential data in a computing environment may be determined to generate a metric for...
2016/0196445 LIMITING EXPOSURE TO COMPLIANCE AND RISK IN A CLOUD ENVIRONMENT
Minimizing data security risks may be provided. A number and type of confidential data in a computing environment may be determined to generate a metric for...
2016/0196444 METHOD AND APPARATUS FOR LOGICALLY DETERMINING WHETHER RECEIVED QUERIES QUALIFY FOR STRAIGHT-THROUGH-PROCESSING
An apparatus for validating entitlement capabilities, and determining, based on the entitlement capabilities, whether an account request associated with the...
2016/0196443 ON-DEMAND DATABASE SERVICE SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR CONDITIONALLY ALLOWING AN...
In accordance with embodiments, there are provided mechanisms and methods for conditionally allowing an application of an entity access to data of another...
2016/0196442 SECURING DATA ON UNTRUSTED DEVICES
One example method for securing data on untrusted devices includes the steps of identifying, by a first process, a command in a command queue, the command from...
2016/0196441 PHOTOGRAPHIC COPY PREVENTION OF A SCREEN IMAGE
A method for preventing photographic capture of a displayed image on an electronically controlled screen using a photographic capture device is provided. The...
2016/0196440 SYSTEMS AND METHODS FOR SECURE DATA SHARING
Systems and methods are provided for creating and using a sharable file-level key to secure data files. The file-level key is generated based on a workgroup...
2016/0196439 AUDIO ENCRYPTION SYSTEMS AND METHODS
Encryption systems and methods for audio data, and more particularly, for complete audio encryption of recorded data for transmission, management, review, and...
2016/0196438 VIRTUAL SERVICE PROVIDER ZONES
A service proxy services as an application programming interface proxy to a service, which may involve data storage. When a request to store data is received...
2016/0196437 METHOD OF USING TOUCH SCREEN DEVICE FOR SYSTEM ENCRYPTION AND PROTECTION
A method of using touch screen device for system encryption and protection includes sending plaintext to a touch screen controller by a host; and receiving and...
2016/0196436 SECURE FUNCTION EVALUATION OF TREE CIRCUITS
A first circuit representation of a given function is obtained at a first processing device. The given function comprises at least two computer programming...
2016/0196435 METHOD AND ELECTRONIC DEVICE FOR MANAGING DATA
An electronic device is provided. The electronic device includes a memory configured to store at least one application, a communication module configured to...
2016/0196434 REMEDIATION OF SECURITY VULNERABILITIES IN COMPUTER SOFTWARE
Processing a downgrader specification by constructing a set of candidate downgrader placement locations found within a computer software application, where...
2016/0196433 DETECTING EXPLOITABLE BUGS IN BINARY CODE
Systems and methods for performing hybrid symbolic execution to detect exploitable bugs in binary code are described. In some example embodiments, the systems...
2016/0196432 OPERATING SYSTEM INTEGRATED DOMAIN MANAGEMENT
A computing device operating system providing a plurality of secure domains. A domain manager selectively creates a plurality of secure domains, and one of the...
2016/0196431 SYSTEMS AND METHODS OF PROCESSING DATA ASSOCIATED WITH DETECTION AND/OR HANDLING OF MALWARE
The present disclosure relates to malware and, more particularly, towards systems and methods of processing information associated with detecting and handling...
2016/0196430 Protection Method and Computer System Thereof
A protection method to be utilized for a user equipment against an attack of a malware includes obtaining an observed information including at least one of a...
2016/0196429 REMEDIATION OF SECURITY VULNERABILITIES IN COMPUTER SOFTWARE
Processing a downgrader specification by constructing a set of candidate downgrader placement locations found within a computer software application, where...
2016/0196428 System and Method for Detecting Stack Pivot Programming Exploit
Systems, methods and media are shown for detecting a stack pivot programming exploit that involve extracting return addresses from a call stack from a snapshot...
2016/0196427 System and Method for Detecting Branch Oriented Programming Anomalies
Systems, methods and media are shown for detecting branch oriented program code involving searching one or more pages of memory to identify a list of code...
2016/0196426 ULTRA-LOW COST SANDBOXING FOR APPLICATION APPLIANCES
The disclosed architecture facilitates the sandboxing of applications by taking core operating system components that normally run in the operating system...
2016/0196425 System and Method for Detection of Malicious Code by Iterative Emulation of Microcode
Examples of systems, methods and media are shown for iteratively emulating potentially malicious code involving, for each offset of a microarchitecture for the...
2016/0196424 SECURING DATA ON UNTRUSTED DEVICES
One example method for securing data on untrusted devices includes the steps of identifying, by a first process, a command in a command queue, the command from...
2016/0196423 SMART DEVICE AND METHOD FOR DYNAMICALLY DETECTING APPLICATIONS
A method for dynamically detecting applications is provided, the method including the following steps: opening a smart device, and executing a testing program...
2016/0196422 METHOD AND APPARATUS FOR CONTROLLING INVOKING OF HARDWARE INSTRUCTION
Disclosed are a method and a system for controlling invoking of a hardware instruction. The method comprises: receiving a hardware instruction; determining...
2016/0196421 MOBILE DEVICE, AND AUTHENTICATION PROGRAM
A mobile device includes a housing, a sensor and a deformation detecting IC which detect deformation of the housing, a memory which stores a pattern database...
2016/0196420 ELECTRONIC SYSTEM AND DEVICE UNLOCK METHOD OF THE SAME
An electronic system is provided. The electronic system includes a first electronic device and a second electronic device. The first electronic device...
2016/0196419 MULTI-ACTION LOCK SCREEN
Aspects of the subject technology relate to a lock screen having multiple available actions. A computer-implemented method includes displaying a lock screen...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.