At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Digital Video Content Fingerprinting Based on Scale Invariant Interest
Region Detection with an Array of...
Video sequence processing is described with various filtering rules applied to extract dominant features for content based video sequence identification....
FORENSIC VERIFICATION UTILIZING FORENSIC MARKINGS INSIDE HALFTONES
A forensic verification system extracts a print signature via a print signature extractor from an interior of a halftone contained in an image. The system...
Method for Authenticating a Security Element, and Optically Variable
The invention relates to a method for authenticating an optically variable security element (1), in particular a diffractive security element, with the steps: ...
DIGITAL IMAGE MANIPULATION
Techniques for assigning context to a digitally captured image, and for manipulating recognized data fields within such image. In an exemplary embodiment, a...
Chinese, Japanese, or Korean Language Detection
Disclosed are systems, computer-readable mediums, and methods for determining that text contains Chinese, Japanese, or Korean characters. One method includes...
TWO-DIMENSIONAL INFRARED DEPTH SENSING
A signal encoding an infrared (IR) image including a plurality of IR pixels is received from an IR camera. Each IR pixel specifies one or more IR parameters of...
ROTATION AND PACE INDEPENDENT MOBILE GAIT ANALYSIS
A method for identifying individuals using inertial sensor based gait biometrics. A method for identifying individual persons using orientation and pace...
IMAGE PROCESSING APPARATUS FOR FACIAL RECOGNITION
An apparatus including an image capture device including a lens, a shutter, an image sensor, and an aperture is provided. The image capture device receives,...
DUPLICATE REDUCTION FOR FACE DETECTION
In one embodiment, a method for detecting faces in video image frames is implemented on a computing device including: comparing current image frames to...
Storing, Capturing, Updating and Displaying Life-Like Models of People,
Places And Objects
A digital processing application may provide identifying a present context associated with user data submitted to an interactive application and retrieving a...
A SYSTEM AND A METHOD FOR IMAGE RECOGNITION
The invention discloses an image recognition system, comprising: a robot having an image collection module configured to drive an image collection module to...
STEREOSCOPIC OBJECT DETECTION DEVICE AND STEREOSCOPIC OBJECT DETECTION
A stereoscopic object detection device including a first detection unit configured to detect a road surface and a stereoscopic object; a second detection unit...
FINGERPRINT RECOGNITION-BASED CONTROL METHOD AND DEVICE
A fingerprint recognition-based control method may include acquiring, by a fingerprint sensor, sensor data in response to a contact between a physical object...
USER IDENTIFICATION ON A PER TOUCH BASIS ON TOUCH SENSITIVE DEVICES
Techniques for communicating particular information from a user to a touch screen device by way of a touch event is provided. Sensors that are operatively...
METHOD AND APPARATUS FOR RECOGNIZING FINGERPRINT
A fingerprint recognition method includes receiving an input partial image corresponding to a partial image of a fingerprint of a first user; partitioning the...
TOUCH DEVICE WITH FINGERPRINT IDENTIFICATION FUNCTION
A touch device with fingerprint identification function includes a glass substrate having a first and a second face, a first electrode layer having multiple...
FINGERPRINT DETECTION DEVICE AND DRIVING METHOD THEREFOR
A fingerprint detection device including a sensor array including a plurality of fingerprint sensor elements arranged in a form of a matrix having a plurality...
Sensor For Detecting Fingerprint And Identification Apparatus And
Controlling Method Of Sensor For Detecting...
A sensor for detecting a fingerprint, a fingerprint identification apparatus and a controlling method of a sensor for detecting a fingerprint are provided. The...
Capacitance Detecting Device For Fingerprint Identification And
Fingerprint Identification Apparatus Comprising...
A capacitance detecting device for fingerprint identification and a fingerprint identification apparatus are provided. The device includes a conductive border;...
Tuning Process for a Handheld Scanner
Methods and systems for auto-tuning a handheld scanning device that can account for changes in the orientation between the handheld scanning device and a...
USER INTERFACE FACILITATING SPECIFICATION OF A DESIRED DATA FORMAT FOR AN
INDICIA READING APPARATUS
Aspects describe herein facilitate specification of a desired data format for bar code data to be presented by an indicia reading apparatus. Bar code data...
METHOD FOR READING A TWO-DIMENSIONAL CODE BY MEANS OF A CAMERA USED FOR
THREE-DIMENSIONAL OPTICAL MEASUREMENT...
Disclosed is a method for reading a two-dimensional code (17) by means of a camera (1) used for the three-dimensional optical measurement of an object using...
METHOD OF USING CAMERA SENSOR INTERFACE TO TRANSFER MULTIPLE CHANNELS OF
SCAN DATA USING AN IMAGE FORMAT
A computer system for decoding a signal of decodable indicia is disclosed. The computer system includes a laser scanner configured that outputs a signal of...
Method and Apparatus for Fractal Identification of an Object
A method and system for applying and reading a fractal image to and from a plurality of objects to act as an identification label is provided. The system...
METHOD AND APPARATUS FOR TRACKING ONE OR MORE PLANTS AND/OR PLANT BASED
PRODUCTS AND/OR TRACKING THE SALE OF...
This invention is for tracking at least one plant. A method of this invention comprises: putting at least one seed or at least one stem in a corresponding at...
UTILIZING RADIO FREQUENCY IDENTIFICATION TAGS TO DISPLAY MESSAGES AND
NOTIFICATIONS ON PERIPHERAL DEVICES
Pursuant to at least some embodiments, the present invention relates to a method that includes equipping a peripheral device with an RFID tag. The RFID tag...
UTILIZING A RADIO FREQUENCY IDENTIFICATION TAG TO CONTROL ONE OR MORE
OPERATIONAL STATES OF A PERIPHERAL DEVICE
Pursuant to at least some embodiments, the present disclosure relates to a peripheral device that is equipped with an RFID tag. The RFID tag includes a memory...
SYSTEMS AND METHODS FOR TUNING AN ANTENNA OF A MOBILE COMPUTING DEVICE
A system and method for tuning are provided. One system includes at least one antenna, at least one matching network configured to retune the at least one...
SEMICONDUCTOR DEVICE AND COMMUNICATION SYSTEM
It is an object of the present invention to provide a semiconductor device in which a sophisticated integrated circuit using a polycrystalline semiconductor is...
Method and Apparatus for Power Management for a Radio Frequency
A method and device of power management for a networked radio frequency identification ("RFID") system are disclosed. The described power management methods...
UTILIZING A RADIO FREQUENCY IDENTIFICATION TAG TO ASSESS THE BATTERY LEVEL
OF A PERIPHERAL DEVICE
Pursuant to at least some embodiments, the present disclosure relates to a method that includes configuring an RFID tag to store information related to a...
SYSTEM AND METHOD TO AUTOMATICALLY DISCRIMINATE BETWEEN DIFFERENT DATA
There is described a system and method for automatically discriminating between different types of data with an image reader. In brief overview of one...
Label, Information Verification System, and Information Verification
An anti-counterfeit label includes a label body provided thereon with a first code and a second code. The second code is superimposed on the first code. The...
EXTENDED USE OF LOGARITHM AND EXPONENT INSTRUCTIONS
Embodiments of the present disclosure are based on a recognition that some processors are configured with instructions to compute logarithms and exponents...
Secure Display Element
Techniques for securely displaying sensitive information against attempts to capture such information via screenshots are introduced. Similar to the pieces of...
METHOD AND APPARATUS FOR DISPLAYING INFORMATION CONTENT
A computing device receives information content, which is rendered in a predefined display area of the display. When the information content satisfies...
NUMERIC KEYPAD ENCRYPTION FOR AUGMENTED REALITY DEVICES
Embodiments of the present invention provide methods and systems for numeric keypad encryption using an augmented reality device. The method may include...
INDEX-SIDE DIACRITICAL CANONICALIZATION
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for index-side synonym expansion. One method includes obtaining...
SYSTEMS, METHODS, AND COMPUTER-READABLE MEDIA FOR DE-IDENTIFYING
Methods, systems, and computer-readable media for de-identifying information are described. The information de-identified using the described methods may...
STACK FUSION ARCHITECTURE INCLUDING DISTRIBUTED SOFTWARE CLUSTERS TO
ENABLE SOFTWARE COMMUNICATION SERVICES
A stack fusion architecture enables a cloud provider to provide Software-as-a-Service (SaaS) offerings to multiple organizations. Each organization operates a...
PORTABLE E-WALLET AND UNIVERSAL CARD
Universal cards are used in place of all the other traditional cards which a person may want to carry. The universal card can include a short range...
SOCIAL DRIVE FOR SHARING DATA
Particular embodiments described herein provide for an electronic device that can be configured to receive a request to share data, determine metadata for the...
Customized Trusted Computer For Secure Data Processing and Storage
The techniques discussed herein facilitate the transmission, storage, and manipulation of data in an encrypted database management system (EDBMS). An untrusted...
Methods and Systems for User Authentication in a Computer System Using
Multi-Component Log-Ins, Including...
In computer-based user authentication, a user performs an image-based log-in comprising a set of actions on at least one verification image on a display...
LOCATION BASED DISK DRIVE ACCESS
Methods, apparatuses, systems, and devices are described for providing data security. In one method, data security is provided for a computing device having a...
CONTENT ITEM ENCRYPTION ON MOBILE DEVICES
Applications are stored on removable storage of a mobile device in an encrypted form to provide isolation and piracy protection. In one implementation, each...
Self Service Portal for Tracking Application Data File Dissemination
A graphical user interface for uploading an application data file may be generated by a computing platform and communicated to a computing device. The...
API Version Testing Based on Query Schema
In one embodiment, a method includes receiving, from a third-party system, a data query requesting data items to be retrieved from hierarchical graphs...
DATA STORAGE AND ACCESS PLATFORM WITH JURISDICTIONAL CONTROL
There is disclosed a modular data storage and access platform with jurisdictional control. The platform ensures alignment of jurisdictional compliance between...
PROVIDING SECURE ACCESS TO DATA IN MOBILE DEVICES
Embodiments of the present disclosure provide a method, system and computer program product for providing a secure access to data in mobile devices by...