Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0342833 Text Extraction From Graphical User Interface Content
Systems and methods for extracting text from images rendered on a display screen, the method comprising capturing a color image rendered on a display screen;...
2016/0342832 Real-time Visual Feedback for User Positioning with Respect to a Camera and a Display
Systems, methods, and computer program products provide near real-time feedback to a user of a camera-enabled device to guide the user to capture self-imagery...
2016/0342831 APPARATUS AND METHOD FOR NECK AND SHOULDER LANDMARK DETECTION
A device is configured to perform a method for neck and shoulder detection. The method includes receiving an image that includes a face. The method also...
2016/0342830 OPERATION ESTIMATION APPARATUS, ROBOT, AND OPERATION ESTIMATION METHOD
An operation estimation apparatus includes a distance measurement unit configured to measure a distance for a predetermined range, a human-body processing unit...
2016/0342829 INFORMATION PROCESSING APPARATUS AND METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
An information processing apparatus includes a receiving unit, a detecting unit, and an associating unit. The receiving unit receives a captured moving image...
2016/0342828 METHOD AND APPARATUS FOR RECOGNISING EXPRESSION USING EXPRESSION-GESTURE DICTIONARY
An apparatus for recognizing expression using an expression-gesture dictionary, includes a learning image acquisitor to obtain data from a learning expression,...
2016/0342827 BIOLOGICAL INFORMATION DISPLAYING APPARATUS AND BIOLOGICAL INFORMATION DISPLAYING METHOD
A biological information displaying apparatus includes: a measuring section which is configured to measure a biological information waveform containing a...
2016/0342826 FINGERPRINT BASED SMART PHONE USER VERIFICATION
A touch screen, now incorporated in most smart phones, presents an effective and transparent method to incorporate continuous active user verification schemes....
2016/0342825 FINGERPRINT PREVIEW QUALITY AND SEGMENTATION
A ridge flow based fingerprint image quality determination can be achieved independent of image resolution, can be processed in real-time and includes...
2016/0342824 BIOMETRIC RECOGNITION APPARATUS WITH REFLECTION-SHIELDING ELECTRODE
A biometric recognition apparatus with reflection-shielding electrode includes a substrate, a sensing electrode layer arranged on one side of the substrate,...
2016/0342823 BIOMETRIC RECOGNITION APPARATUS WITH DEFLECTION ELECTRODE
A biometric recognition apparatus with deflection electrode includes a substrate, a multi-function electrode layer including a plurality of sensing electrodes,...
2016/0342822 DIFFUSE BRIGHT FIELD ILLUMINATION SYSTEM FOR A BARCODE READER
One aspect of the present disclosure is related to a barcode reader that includes a bright field illumination system, a dark field illumination system, and an...
2016/0342821 DETACHABLE RADIO FREQUENCY IDENTIFICATION SWITCH TAG
A radio frequency identification (RFID) switch tag is disclosed. This RFID switch tag includes a base component having an ultra-high frequency (UHF) booster,...
2016/0342820 RFID DETECTION SYSTEM
Systems and methods for use in detecting the presence of an RFID device are provided. One RFID detection system includes a detection circuit that includes an...
2016/0342819 TUNING A NFC ANTENNA OF A DEVICE
A NFC object reader's NFC antenna system configured to dynamically change an element of the NFC antenna system to maintain the NFC antenna system's antenna...
2016/0342818 SYSTEMS AND METHODS FOR SECURE SUPPLY CHAIN MANAGEMENT AND INVENTORY CONTROL
Systems for encoding and reading RFID tags on a collection of items are shown. One embodiment of the invention includes a plurality of items, where each item...
2016/0342817 SYSTEM AND METHOD FOR CONTROLLING ACCESS TO PORTABLE COMPUTING DEVICES
A system and method for controlling access to portable computing devices are disclosed. Identification information of a user is obtained and a portable...
2016/0342816 SECURED KEYPAD DEVICES
A data entry device including a housing including a top housing portion including key apertures, a plurality of data entry keys mounted in the housing to have...
2016/0342815 Multi-Function, Modular System for Network Security, Secure Communication, and Malware Protection
Representative embodiments are disclosed for providing network and system security. A representative apparatus includes an input-output connector coupleable to...
2016/0342814 MAINTAING ENCRYPTION KEYS TO PROVIDE ENCRYPTION ON TOP OF DATA DEDUPLICATION
Exemplary methods, apparatuses, and systems generate an encryption key based upon data content of a portion of data to be encrypted by the encryption key. The...
2016/0342813 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING SYSTEM
An information processing apparatus includes a first memory that stores a registered identification name of a user who is eligible to use the information...
2016/0342812 SYSTEM FOR ANONYMIZING AND AGGREGATING PROTECTED INFORMATION
A system for anonymizing and aggregating protected information (PI) from a plurality of data sources includes a master index server coupled to a data...
2016/0342811 Secure Storage and Access to Sensitive Data
A method and system for securely storing and accessing sensitive user data (e.g., personally identifying information or PII) is described. In an aspect, PII is...
2016/0342810 Obtaining Data of Interest From Remote Environmental Sensors
A controller associated with an environmental sensor that captures data about an individual controls data capture of the environmental sensor in accordance...
2016/0342809 SYSTEM AND METHOD OF AUTHENTICATION OF A FIRST PARTY RESPECTIVE OF A SECOND PARTY AIDED BY A THIRD PARTY
A method and system for authenticating a service to access data respective of a user on a low-end mobile device. The method includes sending, from a...
2016/0342808 STORAGE AND PRIVACY SERVICE
In one embodiment, a storage and privacy system stores and manages information associated with users and ensures and enforces access-control rules specified...
2016/0342807 RECORDING MEDIUM, MOBILE ELECTRONIC DEVICE, AND OPERATION CONTROL METHOD
A processor of a mobile terminal refers to an app table that stores a reference flag on a per-app basis, the flag indicating whether the operation-unlock app...
2016/0342806 Method And System For Protecting User Choices
A system, method, and computer-accessible medium for protecting user choice settings are provided. The system and method provide an application programming...
2016/0342805 Analyzing Activity Data of an Information Management System
In an information management system, activity data is collected and analyzed for patterns. The information management system may be policy based. Activity data...
2016/0342804 STACKABLE FILE SYSTEM WITH USER SPACE POLICY MANAGEMENT
A computing device and method for managing file access control policies on a computing device are disclosed. The method includes maintaining file-access...
2016/0342803 COMPUTER DEVICE AND METHOD FOR CONTROLLING ACCESS TO A RESOURCE VIA A SECURITY SYSTEM
A computer system 300 contains an agent 303 which modifies the ordinary behaviour of a native security system 103, such as to allow security decisions with...
2016/0342802 CREATING MULTIPLE WORKSPACES IN A DEVICE
Embodiments relate to a system that includes a managed application and a workspace manager that are executable by a computing device. The workspace manager...
2016/0342801 CONTAINERIZED SECURITY AS A SERVICE
Systems, methods, and software described herein provide security preferences to application containers executing independently on a host computing system. In...
2016/0342800 ELECTRONIC DEVICE AND HARD DISK DEVICE OF ELECTRONIC DEVICE
A hard disk device includes a storage module, a control chip, an encryption chip, and a power switching module to power the storage module. The control chip...
2016/0342799 AUTOMATIC FOLDER ACCESS MANAGEMENT
Methods and systems are provided for decentralizing user data access rights control activities in networked organizations having diverse access control models...
2016/0342798 PROTECTED DEVICE MANAGEMENT
A method, apparatus, system, and computer program product for management of storage devices protected by encryption, user authentication, and password...
2016/0342797 SYSTEM AND METHOD OF CONCEALING A USER'S MEASUREMENTS
A system and method of concealing a user's size information is provided. The user is first measured for a size of at least one body part. The measured size is...
2016/0342796 SECURITY ASSESSMENT INCENTIVE METHOD FOR PROMOTING DISCOVERY OF COMPUTER SOFTWARE VULNERABILITIES
In one aspect, the disclosure provides: A method comprising: assessing a plurality of researchers as a precondition for receiving an invitation to be a...
2016/0342795 EXTENSION COMPONENT FOR AUTHENTICATING GAME DATA
Disclosed are methods, apparatus and systems, including computer program products, implementing and using techniques for authenticating data for playing a game...
2016/0342794 IDENTIFYING AN EVASIVE MALICIOUS OBJECT BASED ON A BEHAVIOR DELTA
A security device may receive actual behavior information associated with an object. The actual behavior information may identify a first set of behaviors...
2016/0342793 Automatic Library Detection
The automated, real-time detection of specific blocks of code within a larger body of source code is described. Specific implementations relate to the...
2016/0342792 DETERMINING PRIVACY LEAKS
Techniques for determining privacy leaks are described herein. The techniques may include (i) providing private data as input for an application, wherein the...
2016/0342791 SYSTEMS, METHODS, AND APPARATUSES FOR INTRUSION DETECTION AND ANALYTICS USING POWER CHARACTERISTICS SUCH AS...
Some embodiments described herein include a system that collects and learns reference side-channel normal activity, process it to reveal key features, compares...
2016/0342790 PROTECTING ANTI-MALWARE PROCESSES
Anti-malware process protection techniques are described. In one or more implementations, an anti-malware process is launched. The anti-malware process is...
2016/0342789 Injection of Data Flow Control Objects into Application Processes
A callback, which may be assigned to a creation event of an application process, may be executed. In response to the execution of the callback, a data flow...
2016/0342788 GENERATING PACKAGES FOR MANAGED APPLICATIONS
Embodiments relate to a managed application package generator that creates an executables file, a resource file, and a manifest file for a managed application....
2016/0342787 DETECTING MALICIOUS FILES
Detecting malicious files is disclosed, including: receiving a file checking task, wherein the file checking task comprises a storage address of a candidate...
2016/0342786 METHOD AND APPARATUS FOR APPLYING APPLICATION CONTEXT SECURITY CONTROLS FOR SOFTWARE CONTAINERS
According to one aspect of the present disclosure, resource requests between software containers are accepted or rejected based on whether the software...
2016/0342785 PASSWORD PROCESSING DEVICE
A device to process information is provided. According to an embodiment, a display unit is configured to display computer-generated objects. A processor is...
2016/0342784 MOBILE DEVICE AUTHENTICATION
A desktop is unlocked or locked using a mobile client device, such as a smart phone, tablet, smart watch, etc. The authentication mechanism of the mobile...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.