Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0249506 STRUCTURE, SYSTEM, METHOD , AND RECORDING MEDIUM OF IMPLEMENTING A DIRECTED SELF-ASSEMBLED SECURITY PATTERN
An anti-counterfeiting method, system, and non-transitory computer readable medium an anti-counterfeiting system, include a production circuit configured to...
2017/0249505 METHOD AND SYSTEM FOR CHARACTER INSERTION IN A CHARACTER STRING
The disclosure relates to a character input method and system, which may include a digital device including a touchscreen that has a recognition area and an...
2017/0249504 Autonomous Human-Centric Place Recognition
The novel technology described in this disclosure includes an example method comprising capturing sensor data using one or more sensors describing a particular...
2017/0249503 METHOD FOR PROCESSING IMAGE WITH DEPTH INFORMATION AND COMPUTER PROGRAM PRODUCT THEREOF
The present invention proposes a method for processing an image with depth information and a computer program product thereof, wherein a filtering template is...
2017/0249502 SYSTEMS AND METHODS FOR FACIAL PROPERTY IDENTIFICATION
Systems and methods are provided for facial property identification. For example, an image sample is acquired; a first effective area image of a face is...
2017/0249501 ADAPTIVE LIGHT SOURCE
A method includes capturing a first image of a scene, detecting a face in a section of the scene from the first image, and activating an infrared (IR) light...
2017/0249500 IDENTIFICATION AND DE-IDENTIFICATION WITHIN A VIDEO SEQUENCE
A method and system for de-identifying a video sequence are provided. The method may include the steps of capturing a video sequence, comprising a number of...
2017/0249499 METHOD OF DETECTING GAS-PRODUCING MICROBIAL COLONIES
A first method comprises using an imaging device to produce a plurality of images of a culture device, analyzing a first image to identify a microorganism...
2017/0249498 QUANTITATIVE STRUCTURAL ASSAY OF A NERVE GRAFT
Techniques are described for determining the quality of a nerve graft by assessing quantitative structural characteristics of the nerve graft. Aspects of the...
2017/0249497 Method and Device for Verifying Fingerprint
Methods and devices are provided for verifying a fingerprint in the field of computer technology. The method includes: N pressing operations successively...
2017/0249496 System and Method for Managing GeoDemographic Data
A device includes: an image data receiving component operable to receive multiband image data of a geographic region; a surface index generation component...
2017/0249495 METHODS, DEVICES, AND COMPUTER-READABLE MEDIUMS FOR VERIFYING A FINGERPRINT
A method, a device, and computer-readable medium are provided for verifying an identity of a user, which pertains to computer technology. In some aspects, the...
2017/0249494 Image Acquisition Apparatus, Terminal Device, Liquid Crystal Terminal Device and Image Acquisition Method
An image acquisition apparatus, a terminal device, a liquid crystal terminal device and an image acquisition method are provided according to the disclosure....
2017/0249493 Fingerprint Sensor Device and Method
A fingerprint sensor package and method are provided. The fingerprint sensor package comprises a fingerprint sensor along with a fingerprint sensor surface...
2017/0249492 TWO-DIMENSIONAL CODE SCANNING INTERACTION METHODS AND APPARATUSES
The present application provides two-dimensional code (2D-code) scanning interaction methods and apparatuses. An exemplary 2D-code scanning interaction method...
2017/0249491 METHODS AND ARRANGEMENTS FOR IDENTIFYING OBJECTS
In some arrangements, product packaging is digitally watermarked over most of its extent to facilitate high-throughput item identification at retail checkouts....
2017/0249490 MODULE OR ARRANGEMENT FOR, AND METHOD OF, READING A TARGET BY IMAGE CAPTURE WITH AN IMAGING READER HAVING...
An imaging sensor of an imaging reader senses return light from a target to be read by image capture along an imaging axis over a field of view that extends...
2017/0249489 EMISSION CONTROL SYSTEM USING BARCODE INFORMATION
Disclosed are an emission control system and mater and slave devices for the emission control system. The master device controlling one or more slave devices...
2017/0249488 HUMAN-CENTRIC ROBOT WITH NONCONTACT MEASUREMENT DEVICE
A system measuring an object with a robot is provided. The robot including a movable end effector, the robot including a plurality of transducers arranged to...
2017/0249487 ANTENNA CONTROL APPARATUS
An antenna control apparatus according to an embodiment includes a communication interface configured to receive identification information indicating whether...
2017/0249486 MAGNETIC CARD READER AND TRANSACTION TERMINAL DEVICE HAVING THE SAME
Magnetic readers that read magnetic data which is recorded on a magnetic card and a flexible cable that transfers each of the signals from the magnetic readers...
2017/0249485 CARD READER
A card reader may include a card insertion port; a card passage; and a disturbing magnetic field generator. The disturbing magnetic field generator may include...
2017/0249484 SECURITY DEVICE FOR DATA COMPONENT
A security device for preventing the use of a data sending/receiving component having a connector and positioned in a computer housing includes a locking...
2017/0249483 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND...
There is provided with an information processing apparatus. A memory stores a module, data, and a valid hash value that is a hash value generated for the data....
2017/0249482 INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM
There is provided an information processing apparatus. An acquisition unit acquires feature information of a latest block in a block chain when target data is...
2017/0249481 HIGHLY SECURE NETWORKED SYSTEM AND METHODS FOR STORAGE, PROCESSING, AND TRANSMISSION OF SENSITIVE PERSONAL...
A highly secure networked system and methods for storage, processing, and transmission of sensitive information are described. Sensitive, e.g. ...
2017/0249480 PRIVACY PROTECTION FOR THIRD PARTY DATA SHARING
A set of raw data relating to activity of one or more users in accordance with a communication network is obtained. The communication network is managed by a...
2017/0249479 AUTHOR ANONYMIZATION
Embodiments of the present invention disclose a method, computer program product, and system for text author anonymization, the method including intercepting a...
2017/0249478 DATA PRIVACY MANAGEMENT SYSTEM AND METHOD
Aspects of the technology described herein can provide data privacy management. An exemplary computing device may have a tracker to track various user data of...
2017/0249477 Securing Delegated Remote Management with Digital Signature
A system and method of executing a script includes receiving, by a service user account module, a user script from a first user account. The method includes...
2017/0249476 REMOTE ENTRY SYSTEM
A system is disclosed for providing secure access to a controlled item, the system comprising a database of biometric signatures, a transmitter subsystem...
2017/0249475 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR DISPLAYING ONE OR MORE DATA SETS TO A USER
In accordance with embodiments, there are provided mechanisms and methods for displaying one or more data sets to a user. These mechanisms and methods for...
2017/0249474 DOCKING STATION FOR PORTABLE DEVICES PROVIDING AUTHORIZED POWER TRANSFER AND FACILITY ACCESS
A docking station for docking portable electronic devices is disclosed. The docking station is configured to mechanically accept and operatively interface with...
2017/0249473 METHOD FOR MANAGING PERMISSION POLICY OF APPLICATION IN AN ELECTRONIC TERMINAL
A method for managing a permission policy of an application in an electronic terminal is provided. The method includes: obtaining an initial diagnostic script...
2017/0249472 IDPS ACCESS-CONTROLLED AND ENCRYPTED FILE SYSTEM DESIGN
A method and system provides access control encryption for a file system. A resource management module manages access to data on a storage container and hosts...
2017/0249470 METHOD AND SYSTEM FOR CORRUPTING UNWANTED DATA IN A COMMUNICATIONS STREAM
A system, method, and computer program for monitoring and corrupting a data stream, includes a data stream transmitting device having a barcode scanner that...
2017/0249469 ACCESSING FILE SYSTEMS IN A VIRTUAL ENVIRONMENT
An access control engine can enable a host operating system to propagate a private resource of an isolated virtual environment, such as a container, running on...
2017/0249468 METHOD AND SYSTEM FOR NAME ENCRYPTION AGREEMENT IN A CONTENT CENTRIC NETWORK
One embodiment provides a system that facilitates efficient name encryption in a CCN. During operation, the system determines, by a client computing device, an...
2017/0249467 END-TO-END ENCRYPTION AND BACKUP IN DATA PROTECTION ENVIRONMENTS
A computer receives a set of objects from a client, whereby at least one of the objects of the set are respectively associated and encrypted with a unique file...
2017/0249466 OPTIMIZED REDACTION SYSTEM
An embodiment of the invention may include a method, computer program product and system for redacting a document. The embodiment may include receiving an...
2017/0249465 HOST-DRIVEN APPLICATION MEMORY PROTECTION FOR VIRTUAL MACHINES
A memory protection system includes a memory, one or more physical processors, a hypervisor, and a virtual machine including a guest OS executing on the one or...
2017/0249464 METHOD FOR ENABLING SIMULTANEOUS CONTROL OF A PLURALITY OF TPMs AND RELATED COMPONENTS
This disclosure provides a method for enabling or supporting simultaneous control of a plurality of TPMs. The plurality of TPMs comprises a first TPM and a...
2017/0249463 VIRUS DETECTION BY EXECUTING ELECTRONIC MESSAGE CODE IN A VIRTUAL MACHINE
Virus detection by executing electronic message code in a virtual machine is disclosed. An example method includes detecting that an electronic message...
2017/0249462 RETENTION AND ACCESSIBILITY OF DATA CHARACTERIZING EVENTS ON AN ENDPOINT COMPUTER
An endpoint computer system can harvest data relating to a plurality of events occurring within an operating environment of the endpoint computer system and...
2017/0249461 RETENTION AND ACCESSIBILITY OF DATA CHARACTERIZING EVENTS ON AN ENDPOINT COMPUTER
An endpoint computer system can harvest data relating to a plurality of events occurring within an operating environment of the endpoint computer system and...
2017/0249460 PROVABLY SECURE VIRUS DETECTION
We present the first provably secure defense against software viruses. We hide a secret in the program code in a way that ensures that, as long as the system...
2017/0249459 SUB-EXECUTION ENVIRONMENT CONTROLLER
In one aspect there is provided a method. The method may include: determining that an executable implements a sub-execution environment, the sub-execution...
2017/0249458 APPLICATION MEMORY PROTECTION USING A HOST PAGE TABLE SWITCHING VIRTUAL MACHINE FUNCTION
A hypervisor generates first and second page views, where a guest physical address points to a first page of the first page view and a second page of the...
2017/0249457 SECURE RECEIVE PACKET PROCESSING FOR NETWORK FUNCTION VIRTUALIZATION APPLICATIONS
A transmit packet processing system includes a memory, one or more processors in communication with the memory, and an operating system. The one or more...
2017/0249456 APPLICATION PROGRAM INTEGRITY VERIFICATION METHOD AND NETWORK DEVICE
Embodiments of the present disclosure disclose an application program integrity verification method and a network device. The method includes: performing...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.