Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0203359 Wink Gesture Based Control System
A wink gesture based control technique for selecting, controlling and manipulating virtual objects and smart applications on a display using facial gestures of...
2016/0203358 SYSTEMS AND METHODS FOR USING CURVATURES TO ANALYZE FACIAL AND BODY FEATURES
Systems, and methods of providing attractiveness analysis are disclosed. In some embodiments, an electronic analysis platform is configured to obtain image...
2016/0203357 FEATURE POINT LOCATION ESTIMATION DEVICE, FEATURE POINT LOCATION ESTIMATION METHOD, AND FEATURE POINT LOCATION...
Provided is a feature point location estimation device, whereby fitting of a model is less prone to local solutions, and it is possible to detect a facial...
2016/0203356 SYSTEM FOR PRODUCING COMPLIANT FACIAL IMAGES FOR SELECTED IDENTIFICATION DOCUMENTS
A method of recoding a photograph for use in a personal photo identification document such as a passport includes using a digital image capture system,...
2016/0203355 STANDARD CALIBRATION TARGET FOR CONTACTLESS FINGERPRINT SCANNERS
A contactless, three-dimensional fingerprint scanner apparatus, method, and system are described. The contactless fingerprint scanner can provide either, or...
2016/0203354 METHOD, APPARATUS, AND SYSTEM FOR RECOGNIZING FINGERPRINT
A fingerprint recognition method includes determining a code corresponding to a query image based on features of blocks in the query image, obtaining...
2016/0203353 ELECTRONIC DEVICE
An electronic device is provided. The electronic device includes a substrate, a first refractive layer, a second refractive layer and an electronic component....
2016/0203352 USING SCANABLE CODES TO OBTAIN A SERVICE
Disclosed are methods, systems and computer program products for surveying a user using a scanable information encoded graphic image, such as a bar code or a...
2016/0203351 INDICIA READING TERMINAL INCLUDING OPTICAL FILTER
Embodiments of the present invention comprise an indicia reading terminal that is operatively configured to decode visible and non-visible decodable indicia....
2016/0203350 HEAT-DISSIPATION STRUCTUREFOR AN INDICIA READING MODULE
Small mobile computing devices place stringent requirements on the electronic modules integrated within. High temperatures inside these mobile computing...
2016/0203349 Proximity-Based System for Object Tracking
A system and method provides for tracking of an object. A personal digital key (PDK) includes a profile uniquely associated with the object. A reader is...
2016/0203348 PASSIVE RFID TAG COIL ALIGNMENT AND COMMUNICATION
A passive tag embedded in a package includes multiple conductive coils. A first coil receives radio frequency (RF) energy used to power the tag. Additional...
2016/0203347 LOW-FREQUENCY RECEIVING FOR RADIO FREQUENCY IDENTIFICAITON
A radio frequency identification (RFID) tag includes a power source, a transmitter to transmit a unique identifier, and a receiver operatively coupled to the...
2016/0203346 SMART CARD SYSTEM COMPRISING A CARD AND A CARRIER
A system and method for facilitating wireless transactions using a smart card, the system comprising a housing having an opening configured to accept a smart...
2016/0203345 APPARATUS AND SYSTEM FOR OPERATING A HANDHELD BARCODE SCANNER IN A PRESENTATION MODE
An apparatus and system for operating a handheld barcode scanner in a presentation mode are provided. The apparatus includes an upright stand having a lower...
2016/0203344 Electronic Device Protected against Tampering
An electronic device comprises a microprocessor having a data input; a data output and a control input as well as at least one memory unit, especially a memory...
2016/0203343 SECURED KVM SYSTEM HAVING REMOTE CONTROLLER-INDICATOR
A secure peripheral switching system comprises a secure peripheral switch remotely coupled to a secure remote controller-indicator, wherein the secure...
2016/0203342 MEMORY SYSTEM AND INFORMATION PROCESSING SYSTEM
A memory system includes a controller configured to write data to a nonvolatile memory. The controller includes a buffer unit configured to hold write data...
2016/0203341 Method and Circuit Arrangement for Protecting Against Scanning of an Address Space
A circuit arrangement and method for securing an integrated electronic circuit against scans of an address space, wherein the circuit arrangement has at least...
2016/0203340 METHOD AND APPARATUS FOR SECURELY SAVING AND RESTORING THE STATE OF A COMPUTING PLATFORM
An apparatus and method for securely suspending and resuming the state of a processor. For example, one embodiment of a method comprises: generating a data...
2016/0203338 METHODS AND SYSTEMS FOR DETECTING DEVICE OR CARRIER CHANGE CONVERSIONS
Systems and methods for detecting device or carrier change conversions based on device information and carrier information that is received with requests to...
2016/0203337 IDENTIFYING PRIVATE INFORMATION FROM DATA STREAMS
A method and apparatus for an automated classification of data in a data stream as private data includes receiving a data stream, parsing the data stream to...
2016/0203336 System, Apparatus and Method for Anonymizing Data Prior to Threat Detection Analysis
A computerized method involves obfuscating one or more segments of data that is part of a flow prior to analysis of the flow for malware. Each of the one or...
2016/0203335 APPLICATION DATA STORAGE AREA GENERATION METHOD, APPLICATION DATA STORAGE AREA GENERATION APPARATUS, AND...
An application data storage area generation method that is executed by a processor includes, (a) generating an application data storage area including a data...
2016/0203334 METHOD AND APPARATUS FOR UTILITY-AWARE PRIVACY PRESERVING MAPPING IN VIEW OF COLLUSION AND COMPOSITION
The present embodiments focus on the privacy-utility tradeoff encountered by a user who wishes to release some public data to an analyst, which is correlated...
2016/0203333 METHOD AND APPARATUS FOR UTILITY-AWARE PRIVACY PRESERVING MAPPING AGAINST INFERENCE ATTACKS
The present principles focus on the privacy-utility tradeoff encountered by a user who wishes to release some public data (denoted by X) to an analyst, that is...
2016/0203332 PERSONAL INFORMATION PROTECTION FOR NAVIGATION SYSTEMS
Arrangements related to the protection of personal information associated with a navigation system are described. The navigation system can be operatively...
2016/0203331 PROTECTING PRIVATE INFORMATION IN INPUT UNDERSTANDING SYSTEM
Examples of the present disclosure include capturing an input at a local platform and transmitting the captured input to a service platform separate from the...
2016/0203330 CODE REPOSITORY INTRUSION DETECTION
The disclosed subject matter provides for code repository intrusion detection. A code developer profile can be generated based on characteristic features...
2016/0203329 WORKFLOW AND USER CREDENTIALS
Disclosed herein are a system, non-transitory computer readable medium, and method for managing workflows. Credentials in a user profile are used to access...
2016/0203328 SEMICONDUCTOR DEVICE
A scramble unit (501) subjects data to be written into twin cells (505) in a first storage unit (502) to scramble processing with the use of scramble data. A...
2016/0203327 EDGE ACCESS CONTROL IN QUERYING FACTS STORED IN GRAPH DATABASES
Methods and arrangements for managing user access to a graph database. Nodes are represented in a graph, along with edges which interconnect the nodes. One or...
2016/0203326 SECURING DATA GATHERING DEVICES OF A PERSONAL COMPUTING DEVICE WHILE PERFORMING SENSITIVE DATA GATHERING...
A functional library can secure data gathering devices of a personal computing device on behalf of a secure application program to provide a more secure...
2016/0203325 METHOD FOR PROTECTING AN INTEGRATED CIRCUIT AGAINST UNAUTHORIZED ACCESS
A method for protecting an integrated circuit against unauthorized access to key registers, wherein functions and/or applications of the integrated circuit are...
2016/0203324 PRICE MINING PREVENTION SYSTEMS AND RELATED METHODS
A price-mining prevention system, in various embodiments, is configured for: (A) detecting an access request for a particular web page; (B) at least partially...
2016/0203323 METHOD AND SYSTEM FOR SECURING DATA
A method for securing user data includes the steps of: a) setting the user data as input data; b) randomly fragmenting the input data into a plurality of Atoms...
2016/0203322 DECOUPLED NAME SECURITY BINDING FOR CCN OBJECTS
A data-hosting system facilitates binding a decoupled name to a data object. During operation, the system can receive a command to generate a decoupled name...
2016/0203321 DATA DETECTION AND PROTECTION POLICIES FOR E-MAIL
Systems and/or methods for deploying and implementing data loss prevention (DLP) policy definition that may encapsulate the requirements, control objectives...
2016/0203320 Privacy Protection for Mobile Devices
Described systems and methods allow a mobile device, such as a smartphone or a tablet computer, to protect a user of the respective device from fraud and/or...
2016/0203319 System and Method For Providing Technology-Driven End-to-End Managed Security Service Products Through a...
A platform provides customers with complete and compelling consumption-based service while using the information it gathers to improve the customer's...
2016/0203318 SYSTEM AND METHOD FOR AUTOMATED MACHINE-LEARNING, ZERO-DAY MALWARE DETECTION
Improved systems and methods for automated machine-learning, zero-day malware detection. Embodiments include a method for improved zero-day malware detection...
2016/0203317 METHOD AND SYSTEM FOR MONITORING CALLS TO AN APPLICATION PROGRAM INTERFACE (API) FUNCTION
A method and device for monitoring calls to an application program interface (API) function includes monitoring for a memory permission violation of a...
2016/0203316 ACTIVITY MODEL FOR DETECTING SUSPICIOUS USER ACTIVITY
Embodiments are directed to generating an account process profile based on meta-events and to detecting account behavior anomalies based on account process...
2016/0203315 SYSTEM AND METHOD FOR GRANTING ACCESS TO SECURED ENVIRONMENTS
A controlled access device includes at least one processor, at least one computer readable medium, and program instructions stored on the at least one computer...
2016/0203314 SEARCHING DATA USING PRE-PREPARED SEARCH DATA
Methods and devices for searching are described. In one aspect, the method includes: receiving a search query; identifying a search data file associated with a...
2016/0203313 METHOD AND APPARATUS FOR MODIFYING A COMPUTER PROGRAM IN A TRUSTED MANNER
A computer system having a system memory and being arranged to permit a target program (90) installed on the system to be modified in a trusted manner. The...
2016/0203312 METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR RECOVERING A PASSWORD USING USER-SELECTED THIRD PARTY...
A password recovery technique for access to a system includes receiving a request from a first party to recover the first party's password to access the...
2016/0203311 AUTHORIZATION OF UNIQUE COMPUTER DEVICE SPECIMENS
The authorization of unique computer peripheral specimens to connect to a host computer employs a computer connected device storing both a unique identifier...
2016/0203310 SYSTEMS AND METHODS FOR CYBER SECURITY OF INTRA-VEHICULAR PERIPHERALS POWERED BY WIRE
Systems and methods are provided for securing and authenticating a network of a vehicle. At least one network key is generated by an electronic control module...
2016/0203309 INPUT DEVICE FOR INPUTTING PASSWORD OR THE LIKE AND MOBILE TELEPHONE HAVING THE INPUT DEVICE
A contact sensor capable of inputting a character by tracing a character with user's finger is arranged in a region of a ten-key unit of a mobile telephone....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.