At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Wink Gesture Based Control System
A wink gesture based control technique for selecting, controlling and manipulating virtual objects and smart applications on a display using facial gestures of...
SYSTEMS AND METHODS FOR USING CURVATURES TO ANALYZE FACIAL AND BODY
Systems, and methods of providing attractiveness analysis are disclosed. In some embodiments, an electronic analysis platform is configured to obtain image...
FEATURE POINT LOCATION ESTIMATION DEVICE, FEATURE POINT LOCATION
ESTIMATION METHOD, AND FEATURE POINT LOCATION...
Provided is a feature point location estimation device, whereby fitting of a model is less prone to local solutions, and it is possible to detect a facial...
SYSTEM FOR PRODUCING COMPLIANT FACIAL IMAGES FOR SELECTED IDENTIFICATION
A method of recoding a photograph for use in a personal photo identification document such as a passport includes using a digital image capture system,...
STANDARD CALIBRATION TARGET FOR CONTACTLESS FINGERPRINT SCANNERS
A contactless, three-dimensional fingerprint scanner apparatus, method, and system are described. The contactless fingerprint scanner can provide either, or...
METHOD, APPARATUS, AND SYSTEM FOR RECOGNIZING FINGERPRINT
A fingerprint recognition method includes determining a code corresponding to a query image based on features of blocks in the query image, obtaining...
An electronic device is provided. The electronic device includes a substrate, a first refractive layer, a second refractive layer and an electronic component....
USING SCANABLE CODES TO OBTAIN A SERVICE
Disclosed are methods, systems and computer program products for surveying a user using a scanable information encoded graphic image, such as a bar code or a...
INDICIA READING TERMINAL INCLUDING OPTICAL FILTER
Embodiments of the present invention comprise an indicia reading terminal that is operatively configured to decode visible and non-visible decodable indicia....
HEAT-DISSIPATION STRUCTUREFOR AN INDICIA READING MODULE
Small mobile computing devices place stringent requirements on the electronic modules integrated within. High temperatures inside these mobile computing...
Proximity-Based System for Object Tracking
A system and method provides for tracking of an object. A personal digital key (PDK) includes a profile uniquely associated with the object. A reader is...
PASSIVE RFID TAG COIL ALIGNMENT AND COMMUNICATION
A passive tag embedded in a package includes multiple conductive coils. A first coil receives radio frequency (RF) energy used to power the tag. Additional...
LOW-FREQUENCY RECEIVING FOR RADIO FREQUENCY IDENTIFICAITON
A radio frequency identification (RFID) tag includes a power source, a transmitter to transmit a unique identifier, and a receiver operatively coupled to the...
SMART CARD SYSTEM COMPRISING A CARD AND A CARRIER
A system and method for facilitating wireless transactions using a smart card, the system comprising a housing having an opening configured to accept a smart...
APPARATUS AND SYSTEM FOR OPERATING A HANDHELD BARCODE SCANNER IN A
An apparatus and system for operating a handheld barcode scanner in a presentation mode are provided. The apparatus includes an upright stand having a lower...
Electronic Device Protected against Tampering
An electronic device comprises a microprocessor having a data input; a data output and a control input as well as at least one memory unit, especially a memory...
SECURED KVM SYSTEM HAVING REMOTE CONTROLLER-INDICATOR
A secure peripheral switching system comprises a secure peripheral switch remotely coupled to a secure remote controller-indicator, wherein the secure...
MEMORY SYSTEM AND INFORMATION PROCESSING SYSTEM
A memory system includes a controller configured to write data to a nonvolatile memory. The controller includes a buffer unit configured to hold write data...
Method and Circuit Arrangement for Protecting Against Scanning of an
A circuit arrangement and method for securing an integrated electronic circuit against scans of an address space, wherein the circuit arrangement has at least...
METHOD AND APPARATUS FOR SECURELY SAVING AND RESTORING THE STATE OF A
An apparatus and method for securely suspending and resuming the state of a processor. For example, one embodiment of a method comprises: generating a data...
METHODS AND SYSTEMS FOR DETECTING DEVICE OR CARRIER CHANGE CONVERSIONS
Systems and methods for detecting device or carrier change conversions based on device information and carrier information that is received with requests to...
IDENTIFYING PRIVATE INFORMATION FROM DATA STREAMS
A method and apparatus for an automated classification of data in a data stream as private data includes receiving a data stream, parsing the data stream to...
System, Apparatus and Method for Anonymizing Data Prior to Threat
A computerized method involves obfuscating one or more segments of data that is part of a flow prior to analysis of the flow for malware. Each of the one or...
APPLICATION DATA STORAGE AREA GENERATION METHOD, APPLICATION DATA STORAGE
AREA GENERATION APPARATUS, AND...
An application data storage area generation method that is executed by a processor includes, (a) generating an application data storage area including a data...
METHOD AND APPARATUS FOR UTILITY-AWARE PRIVACY PRESERVING MAPPING IN VIEW
OF COLLUSION AND COMPOSITION
The present embodiments focus on the privacy-utility tradeoff encountered by a user who wishes to release some public data to an analyst, which is correlated...
METHOD AND APPARATUS FOR UTILITY-AWARE PRIVACY PRESERVING MAPPING AGAINST
The present principles focus on the privacy-utility tradeoff encountered by a user who wishes to release some public data (denoted by X) to an analyst, that is...
PERSONAL INFORMATION PROTECTION FOR NAVIGATION SYSTEMS
Arrangements related to the protection of personal information associated with a navigation system are described. The navigation system can be operatively...
PROTECTING PRIVATE INFORMATION IN INPUT UNDERSTANDING SYSTEM
Examples of the present disclosure include capturing an input at a local platform and transmitting the captured input to a service platform separate from the...
CODE REPOSITORY INTRUSION DETECTION
The disclosed subject matter provides for code repository intrusion detection. A code developer profile can be generated based on characteristic features...
WORKFLOW AND USER CREDENTIALS
Disclosed herein are a system, non-transitory computer readable medium, and method for managing workflows. Credentials in a user profile are used to access...
A scramble unit (501) subjects data to be written into twin cells (505) in a first storage unit (502) to scramble processing with the use of scramble data. A...
EDGE ACCESS CONTROL IN QUERYING FACTS STORED IN GRAPH DATABASES
Methods and arrangements for managing user access to a graph database. Nodes are represented in a graph, along with edges which interconnect the nodes. One or...
SECURING DATA GATHERING DEVICES OF A PERSONAL COMPUTING DEVICE WHILE
PERFORMING SENSITIVE DATA GATHERING...
A functional library can secure data gathering devices of a personal computing device on behalf of a secure application program to provide a more secure...
METHOD FOR PROTECTING AN INTEGRATED CIRCUIT AGAINST UNAUTHORIZED ACCESS
A method for protecting an integrated circuit against unauthorized access to key registers, wherein functions and/or applications of the integrated circuit are...
PRICE MINING PREVENTION SYSTEMS AND RELATED METHODS
A price-mining prevention system, in various embodiments, is configured for: (A) detecting an access request for a particular web page; (B) at least partially...
METHOD AND SYSTEM FOR SECURING DATA
A method for securing user data includes the steps of: a) setting the user data as input data; b) randomly fragmenting the input data into a plurality of Atoms...
DECOUPLED NAME SECURITY BINDING FOR CCN OBJECTS
A data-hosting system facilitates binding a decoupled name to a data object. During operation, the system can receive a command to generate a decoupled name...
DATA DETECTION AND PROTECTION POLICIES FOR E-MAIL
Systems and/or methods for deploying and implementing data loss prevention (DLP) policy definition that may encapsulate the requirements, control objectives...
Privacy Protection for Mobile Devices
Described systems and methods allow a mobile device, such as a smartphone or a tablet computer, to protect a user of the respective device from fraud and/or...
System and Method For Providing Technology-Driven End-to-End Managed
Security Service Products Through a...
A platform provides customers with complete and compelling consumption-based service while using the information it gathers to improve the customer's...
SYSTEM AND METHOD FOR AUTOMATED MACHINE-LEARNING, ZERO-DAY MALWARE
Improved systems and methods for automated machine-learning, zero-day malware detection. Embodiments include a method for improved zero-day malware detection...
METHOD AND SYSTEM FOR MONITORING CALLS TO AN APPLICATION PROGRAM INTERFACE
A method and device for monitoring calls to an application program interface (API) function includes monitoring for a memory permission violation of a...
ACTIVITY MODEL FOR DETECTING SUSPICIOUS USER ACTIVITY
Embodiments are directed to generating an account process profile based on meta-events and to detecting account behavior anomalies based on account process...
SYSTEM AND METHOD FOR GRANTING ACCESS TO SECURED ENVIRONMENTS
A controlled access device includes at least one processor, at least one computer readable medium, and program instructions stored on the at least one computer...
SEARCHING DATA USING PRE-PREPARED SEARCH DATA
Methods and devices for searching are described. In one aspect, the method includes: receiving a search query; identifying a search data file associated with a...
METHOD AND APPARATUS FOR MODIFYING A COMPUTER PROGRAM IN A TRUSTED MANNER
A computer system having a system memory and being arranged to permit a target program (90) installed on the system to be modified in a trusted manner. The...
METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR RECOVERING A PASSWORD
USING USER-SELECTED THIRD PARTY...
A password recovery technique for access to a system includes receiving a request from a first party to recover the first party's password to access the...
AUTHORIZATION OF UNIQUE COMPUTER DEVICE SPECIMENS
The authorization of unique computer peripheral specimens to connect to a host computer employs a computer connected device storing both a unique identifier...
SYSTEMS AND METHODS FOR CYBER SECURITY OF INTRA-VEHICULAR PERIPHERALS
POWERED BY WIRE
Systems and methods are provided for securing and authenticating a network of a vehicle. At least one network key is generated by an electronic control module...
INPUT DEVICE FOR INPUTTING PASSWORD OR THE LIKE AND MOBILE TELEPHONE
HAVING THE INPUT DEVICE
A contact sensor capable of inputting a character by tracing a character with user's finger is arranged in a region of a ten-key unit of a mobile telephone....