At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
IMAGE AND VIDEO PROCESSING AND OPTIMIZATION
A system comprising a computer-readable storage medium storing at least one program and a computer-implemented method for capturing an optimal quality image...
METHOD AND APPARATUS FOR BIOMETRIC DATA CAPTURE
A method and apparatus for biometric data capture are provided. The apparatus includes in interactive head-mounted eyepiece worn by a user that includes an...
FALL DETECTION DEVICE, FALL DETECTION METHOD, FALL DETECTION CAMERA AND
Disclosed is a fall detection device and the like such that even when a video with low frame rate is used, and a CPU that demonstrates inferior performance is...
MULTI-SENSOR EVENT ANALYSIS AND TAGGING SYSTEM
A system that analyzes data from multiple sensors, potentially of different types, that track motions of players, equipment, and projectiles such as balls....
POSITIONAL LOCATING SYSTEM AND METHOD
A method and system are disclosed for locating or otherwise generating positional information for an object, such as but not limited generating positional...
INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER
[Object] To provide an information processing device able to automatically understand action possibilities of an environment for a person, and reflect such...
SYSTEM AND METHOD FOR INSPECTING EMOTION RECOGNITION CAPABILITY USING
MULTISENSORY INFORMATION, AND SYSTEM AND...
The present invention relates to a system and a method for inspecting an emotion recognition capability using multisensory information, and a system and a...
SYSTEMS AND METHODS FOR ANALYZING FACIAL EXPRESSIONS WITHIN AN ONLINE
CLASSROOM TO GAUGE PARTICIPANT ATTENTIVENESS
Systems, methods, and non-transitory computer readable analyzing facial expressions within an interactive online event to gauge participant level of...
FACIAL RECOGNITION WITH BIOMETRIC PRE-FILTERS
Embodiments of the present invention disclose a method for facial recognition processing using biometric pre-filters. The computer determines a first...
UNIFIED FACE REPRESENTATION FOR INDIVIDUAL RECOGNITION IN SURVEILLANCE
VIDEOS AND VEHICLE LOGO SUPER-RESOLUTION...
A new image-based representation and an associated reference image is disclosed called the emotion avatar image (EAI), and the avatar reference, respectively,...
IMAGE PROCESSING DEVICE, IMAGE PROCESSING METHOD, AND PROGRAM
An image processing device (10) includes a posture estimation unit (110) that estimates posture information including a yaw angle and a pitch angle of a...
METHOD FOR THE LOCALIZATION OF GRIPPING POINTS OF OBJECTS
The invention relates to a method for the localization of gripping points of objects, wherein the objects are scanned by means of a 3D sensor and the objects...
ARTICLE RECOGNITION DEVICE, SALES DATA PROCESSING DEVICE, AND CONTROL
An article recognition device of an embodiment includes each of a selection unit, an election unit, and an input unit. The selection unit selects a display...
SYSTEMS, METHODS, AND APPARATUS FOR IN VITRO SINGLE-CELL IDENTIFICATION
Described herein are systems, methods, and apparatus for automatically identifying and recovering individual cells of interest from a sample of biological...
FINGERPRINT AUTHENTICATION SYSTEM AND METHOD OF AUTHENTICATION USING THE
Provided is a fingerprint authentication system and a method of authentication. The fingerprint authentication system may have a configuration to analyze a...
METHODS, DEVICES, AND COMPUTER-READABLE MEDIA FOR BIOMETRIC COLLECTION,
QUALITY CHECKING, AND MATCHING
A user interface device and method for biometric information processing in a user interface device for biometric collection, quality checking, and matching are...
Biometric Device Utilizing Finger Sequence for Authentication
A system and method for enhancing biometric security utilizing a fingerprint sequence authentication process. The method comprising, during an enrollment...
Biometric Sensor Chip Having Distributed Sensor And Control Circuitry
A sensor includes a sensor array formed on a first side of a substrate and at least one circuit operative to communicate with the sensor array formed on a...
SYSTEM AND METHOD FOR PARTIAL FINGERPRINT ENROLLMENT AND MATCHING USING
SMALL SIZE FINGERPRINT SENSORS
A system and a method for enabling a fingerprint registration on a mobile device are provided. The mobile device includes a fingerprint registration unit...
PORTABLE RFID TAGGED CARRIER FOR STERILE IMPLANTS AND BIOLOGICAL PRODUCTS
Intelligent portable carrier device for supporting movement in product tracking and monitoring of regulated products, such as tissue and biologics. Embodiments...
MAGNETIC BAR CODE CHIP AND READING METHOD THEREOF
Disclosed are a magnetic bar code chip and a reading method thereof. The magnetic bar code chip comprises binary information bits formed by N rows and M...
USB TYPE-C CABLE AND METHOD FOR READING/WRITING A CHIP IN A USB TYPE-C
A method for reading/writing a chip in a USB type-C cable comprises converting a read/write command into unstructured vendor defined message (UVDM) that is...
RFID TAG COMMUNICATION TRIGGERED BY SENSED ENERGY
An RFID tag is equipped with an energy sensor for receiving an appropriate energy signal or registering an appropriate temperature/environmental level. The...
DECODABLE INDICIA READING TERMINAL WITH INDICIA ANALYSIS FUNCTIONALITY
A decodable indicia reading terminal can comprise a multiple pixel image sensor, an imaging lens configured to focus an image of decodable indicia on the image...
UNLOCKING A STORAGE DEVICE
An electronic device has a lower power state in which power to a storage device is disabled. Predetermined information stored in a memory is useable to unlock...
METHOD FOR CRYPTOGRAPHICALLY PROCESSING DATA
In a method for cryptographically processing data which are exchanged between a first unit and a control unit, a derived key is used in this process, which is...
HIGH-SPEED, HACKER-RESISTANT COMPUTER DATA STORAGE AND RETRIEVAL SYSTEM
According to one embodiment, a computer system includes one or more programmable processors configured to receive a first set of data, and generate a parent...
ATTRIBUTE INFORMATION PROVISION METHOD AND ATTRIBUTE INFORMATION PROVISION
A user attribute information provision system processes attribute information of users while preventing a leakage of attribute information. A provision...
APPARATUS AND METHOD FOR PROTECTING PERSONAL INFORMATION OF RECORDED
IMAGE, AND COMPUTER-READABLE RECORDING...
Disclosed are an apparatus which is capable of easily performing the personal information protection processing without changing the original image recorded in...
METHOD FOR AUTOMATED SEPARATION AND PARTITIONING OF DATA IN A PAYROLL AND
RESOURCE PLANNING SYSTEM
A system for separation of data is provided. The data separation is implemented using a special data structure--a common attribute. The common attribute is a...
FLEXIBLE SECURITY CONTROL ENVIRONMENT
An automation control system is provided that includes an interface device configured to enable a user to monitor, control, or monitor and control processes of...
DYNAMICALLY LINKED CONTENT CREATION IN A SECURE PROCESSING ENVIRONMENT
A method of creating content within a secure processing environment can include detecting a wiki identifier, indicating a phrase, within a parent document. The...
TRUSTED FUNCTION BASED DATA ACCESS SECURITY CONTROL
According to an example, trusted function based data access security control may include determining a restriction set by a first entity and related to access...
PRIVATE AND PUBLIC SHARING OF ELECTRONIC ASSETS
The embodiments set forth techniques for implementing a cloud service that enables cloud data to be shared between different users in a secure manner. One...
MASKING OF HAPTIC DATA
A method comprising using at least one hardware processor for: obtaining haptic data comprising multiple data channels representing multiple characteristics of...
Methods And Systems For Controlling Levels Of Geolocation Access
A communication device may be configured to control access to geolocation services for applications on the communication device utilizing a first privacy...
TRANSACTION AUTOMATION FOR OPERATIONAL SYSTEMS
Read-and-reply console messages may be received and a reply automatically generated. Further, a message system may test the availability of an automation...
DATA SECURITY USING REQUEST-SUPPLIED KEYS
Requests are submitted to a request processing entity where the requests include a cryptographic key to be used in fulfilling the request. The request...
SYSTEM AND METHOD FOR CONTROLLING HARD DRIVE DATA CHANGE
A system for controlling hard drive data change is disclosed which comprises a hard drive having a first volume and a second volume, the first volume for...
SYSTEM, METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIA FOR
ANALYZING SOFTWARE APPLICATION MODULES...
In different embodiments of the present invention, systems, methods, and computer-readable storage media allow a user to analyze software application modules,...
SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PROTECTING SOFTWARE VIA
CONTINUOUS ANTI-TAMPERING AND...
Method, system and computer program product for applying existing anti-tampering and obfuscation techniques to virtual machine technology and offers several...
SECURITY POLICY MANAGEMENT
A method performed by a computing system includes, with a computing system, receiving an application and a security policy corresponding to the application,...
Method and Product for Providing a Predictive Security Product and
Evaluating Existing Security Products
A method, product and computer program product for evolving malware variants, the method including the steps of: receiving a malware specimen; generating a...
Detecting Heap Spraying on a Computer
Detecting heap spraying on a computer by determining that values of characteristics of a plurality of requests to allocate portions of heap memory are...
Method for Logging Firmware Attack Event and System Therefor
A violation of a firmware access rule is detected, and an entry is generated at a log file stored at a baseboard management controller, the entry identifying...
OPERATING SYSTEM CONSISTENCY AND MALWARE PROTECTION
Methods, systems, and computer program products are included for determining the risk that a file includes malware. The risk is determined by sending...
LOCATION BASED PROCESS-MONITORING
Disclosed are systems, apparatus, devices, methods, computer program products, and other implementations, including a method that includes determining location...
SYSTEM AND METHOD FOR INTEGRATING TWO-FACTOR AUTHENTICATION IN A DEVICE
A system and method for providing secondary-factor authentication with a third party application that can include enrolling a device application instance of an...
TECHNIQUES FOR BIOMETRIC AUTHENTICATION OF USER OF MOBILE DEVICE
A method for biometric authentication of a user of a mobile device, and a case for performing the method is provided. The method includes, by the case,...
AUTHENTICATION APPARATUS AND AUTHENTICATION METHOD THAT REGISTER
FINGERPRINT DATA FOR COLLATION EASILY
Provided is an authentication apparatus that can register the fingerprint data for collation for comparing with the read fingerprint data, easily. A...