Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0314883 Automatic Detection on String and Column Delimiters in Tabular Data Files
Methods, systems, and computer program products for automatic detection of string and column delimiters in tabular data files are provided herein. A...
2018/0314882 SORTING AND DISPLAYING DIGITAL NOTES ON A DIGITAL WHITEBOARD
For sorting and displaying digital notes on a digital whiteboard, an apparatus is disclosed. A system, method, and program product also perform the functions...
2018/0314881 CLASSIFYING FACIAL EXPRESSIONS USING EYE-TRACKING CAMERAS
Images of a plurality of users are captured concurrently with the plurality of users evincing a plurality of expressions. The images are captured using one or...
2018/0314880 IMAGE BASED USER IDENTIFICATION ACROSS MULTIPLE ONLINE SYSTEMS
An online system matches a user across multiple online systems based on image data for the user (e.g., profile photo) regardless whether the image data is from...
2018/0314879 Determining Emotions Using Camera-Based Sensing
In one embodiment, a computer-readable non-transitory storage medium embodies software that is operable when executed to, in real time, capture, by a single...
2018/0314878 INTELLIGENT AUTO CROPPING OF DIGITAL IMAGES
Disclosed in some examples are methods, systems, computing devices, and machine readable mediums that provide for cropping systems that automatically crop...
2018/0314877 SYNCHRONIZATION OF IMAGE DATA FROM MULTIPLE THREE-DIMENSIONAL CAMERAS FOR IMAGE RECOGNITION
Methods, systems, and computer programs are presented for object recognition performed by electronic devices. One method includes an operation for capturing...
2018/0314876 METHODS AND DEVICES FOR LIVE CELL IMAGING ANALYSIS
Provided herein are methods for analysis of target cells on a population or individual basis, including before and after contact with a stimulus in order to...
2018/0314875 ELECTRONIC DEVICE, FINGERPRINT RECOGNITION CONTROL METHOD AND DEVICE
Embodiments of the present disclosure provide an electronic device, a fingerprint recognition control method and device. The electronic device includes a...
2018/0314874 Method For Displaying Fingerprint Identification Area And Mobile Terminal
A method and a mobile terminal for displaying a fingerprint identification area are provided. The method is applied to a mobile terminal which includes a...
2018/0314873 DISPLAY SCREEN, DISPLAY DEVICE AND MOBILE TERMINAL
A display screen is provided, including a display layer and a first light shielding layer. The display layer has a display surface, the first light shielding...
2018/0314872 FINGERPRINT PHOTOCURRENT DETECTION UNIT, FINGERPRINT IDENTIFIER, DRIVING METHOD AND DISPLAY DEVICE
The present disclosure provides a fingerprint photocurrent detection unit, a fingerprint identifier, a driving method and a display device. The fingerprint...
2018/0314871 ULTRASOUND FINGERPRINT SENSING AND SENSOR FABRICATION
Disclosed are systems, devices and methods for providing fingerprint sensors based on ultrasound imaging techniques in electronic devices and fabrication...
2018/0314870 MOBILE TERMINAL, METHOD AND DEVICE FOR DISPLAYING FINGERPRINT RECOGNITION REGION
A mobile terminal, a method and a device for displaying a fingerprint recognition region are provided. The method is applied to a mobile terminal including a...
2018/0314869 METHODS AND A SYSTEM FOR VERIFYING THE AUTHENTICITY OF A MARK
In one implementation, a processor: (1) receives an image of a candidate mark from an image acquisition device, (2) uses the image to measure one or more...
2018/0314868 SYSTEMS AND METHODS FOR ROBUST PROTECTION OF ITEM AUTHENTICATION, TRACKING AND TRACING AGAINST TAG DUPLICATION
Systems and methods for facilitating tag authenticity validation. The methods comprise: detecting a tag's arrival/presence at a waypoint along a supply chain...
2018/0314867 SYSTEM AND METHOD FOR PERFORMING PRODUCTION LINE PRODUCT IDENTIFICATION
In an illustrative embodiment, a system for identifying products on a production line includes image capturing devices that acquire images of containers moving...
2018/0314866 SYSTEM AND METHOD FOR PERFORMING PRODUCTION LINE PRODUCT IDENTIFICATION
In an illustrative embodiment, a system for identifying products on a production line includes image capturing devices that acquire images of containers moving...
2018/0314865 METHOD AND SYSTEM FOR SUPERVISED DISEMBARKING OF PASSENGERS FROM A BUS
System and method for collecting object identification data from a plurality of objects that interact with a vehicle during operation of the vehicle, where the...
2018/0314864 BASKET WITH READER DEVICE FOR RFID TAG AND ARTICLE MANAGEMENT SYSTEM
A basket with a reader device including a basket main body that receives an article including an RFID tag having a dipole antenna attached thereto, and a...
2018/0314863 SELF-CHECKOUT SYSTEM WITH SCAN GATE AND EXCEPTION HANDLING
The disclosure relates to a self-checkout system including a base and a scan gate extending over at least a portion of the base, the scan gate having a field...
2018/0314862 DETECTING COUNTERFEIT MAGNETIC STRIPE CARDS USING ENCODING JITTER
Systems and methods for detecting counterfeit magnetic stripes are provided. A method can include detecting magnetic flux transitions encoded on a magnetic...
2018/0314861 DEVICE CONTROL USING ENTITY IDENTIFIERS
Techniques for efficiently and automatically activating portable devices include a device nomenclature schema used to associate devices with particular...
2018/0314860 SYSTEM AND METHOD FOR SWITCHED-CAPACITOR BASED SIDE-CHANNEL COUNTERMEASURES
Methods and systems are provided for a charge withholding converter reshuffling technique that decorrelates input power of a multi-phase switched capacitor...
2018/0314859 Verification Paths of Leaves of a Tree
There is provided mechanisms for determining a verification path for each leaf of a tree. A method is performed by a tree manager processor. The method...
2018/0314858 BIOMETRIC AUTHENTICATION WITH BODY COMMUNICATION NETWORK
A method of authenticating a health measurement taken from a medical measurement device may include establishing a network connection between a computing...
2018/0314857 Information Processing Device and Malicious Message Detection Method
An information processing device that receives, from another information processing device, a communication message generated based on recency information and...
2018/0314856 METHOD AND APPARATUS FOR DETECTING LABEL DATA LEAKAGE CHANNEL
The present disclosure provides label data leakage channel detection methods and apparatuses. According to one exemplary label data leakage channel detection...
2018/0314855 MANAGEMENT OF END USER PRIVACY CONTROLS
The present disclosure relates to the management of end user privacy controls using a privacy broker system, method, computer program and electronic device for...
2018/0314854 EVENT PROCESSING SYSTEM
User events of a platform are processed to extract aggregate information about users of the platform at an event processing system. A query relating to the...
2018/0314853 IDENTIFYING PERSONALLY IDENTIFIABLE INFORMATION IN MACHINE-GENERATED DATA
Implementations include receiving a user provided example value of personally identifiable information (PII). Occurrences of the received example value are...
2018/0314852 DEVICES, METHODS AND COMPUTER READABLE MEDIUMS FOR SECURITY AND AUTHENTICATION
Disclosed are various computer implemented devices, methods and readable mediums for security and authentication. In one aspect there is provided a wearable...
2018/0314851 Reusable Disposable And Dialysis Apparatus Therefore
The invention pertains to a reusable disposable (1) for usage within a medical treatment process by a corresponding medical apparatus (A) and a corresponding...
2018/0314850 METHOD FOR SHOWING FACES IN DIGITAL IMAGES ONLY TO FRIENDS
A method, system, and computer product for protecting personal privacy of one or more persons in a photo are provided. The method comprises receiving a photo...
2018/0314849 APPARATUS AND METHOD FOR A DOCUMENT MANAGEMENT INFORMATION SYSTEM
A smartphone receives a notification from a first server over an Internet Protocol connection including a document description and displays the notification on...
2018/0314848 SECURE MANAGEMENT OF USER ADDRESSES IN NETWORK SERVICE
Methods, systems, and programs are presented for securing user-address information. A first memory is configured according to a first table that does not...
2018/0314847 Encrypted Search Cloud Service with Cryptographic Sharing
A method for sharing read access to a document stored on memory hardware. The method includes receiving a shared read access command from a sharor sharing read...
2018/0314846 SECURING VIRTUAL EXECUTION ENVIRONMENTS
Facilities are provided to secure guest runtime environments (GREs). Security policy specifications may be associated with GREs. A GRE's security policy may be...
2018/0314845 ENVIRONMENTAL SECURITY CONTROLS TO PREVENT UNAUTHORIZED ACCESS TO FILES, PROGRAMS, AND OBJECTS
Systems, methods, and computer program products to perform an operation comprising receiving, from an application executing on a system, a request to access a...
2018/0314844 BROWSER DRAG AND DROP FILE UPLOAD ENCRYPTION ENFORCEMENT
Some websites accessed via browser allow for file uploading via drag and drop functionality. In a drag and drop operation, a user selects a file on the...
2018/0314843 COMPREHENSIVE SYSTEM WIDE CROSS-REFERENCE MECHANISM USING RUNTIME DATA COLLECTION
Systems, methods, and computer program products to perform an operation comprising receiving, from an application executing on a system, a request to access a...
2018/0314842 COMPUTING SYSTEM WITH GENOMIC INFORMATION ACCESS MECHANISM AND METHOD OF OPERATION THEREOF
A method of operation of a computing system includes registering different instances of a genomic raw data for a user profile; generating a conversion genomic...
2018/0314841 SYSTEMS AND METHODS FOR PREVENTION OF UNAUTHORIZED ACCESS TO RESOURCES OF AN INFORMATION SYSTEM
An information security system prevents unauthorized access to resources of an information system. The information security system includes a fingerprint...
2018/0314840 SYNCHRONIZING WRITE OPERATIONS
A method includes determining, by a persistent memory lockstep unit of a hardware security module, that a first processor is attempting to change a state of...
2018/0314839 SYNCHRONIZING WRITE OPERATIONS
A method includes determining, by a persistent memory lockstep unit of a hardware security module, that a first processor is attempting to change a state of...
2018/0314838 ACCESS PATH REDIRECTION FOR ENCRYPTED FILES
Many users of information handling systems use applications to create, manage, and/or save files containing information. Encryption of the files secures the...
2018/0314837 SECURE FILE WRAPPER FOR TIFF IMAGES
Encrypted content may be stored in a file wrapper with unencrypted content that provides information regarding the encrypted content. The file wrapper may be...
2018/0314836 SECURE FILE WRAPPER FOR TIFF IMAGES
Encrypted content may be stored in a file wrapper with unencrypted content that provides information regarding the encrypted content. The file wrapper may be...
2018/0314835 Anomaly and Causation Detection in Computing Environments
Anomaly detection in computing environments is disclosed herein. An example method includes receiving an unstructured input stream of data instances from the...
2018/0314834 THREAT SCORE DETERMINATION
In one example in accordance with the present disclosure, a method for threat score determination includes detecting a change in malicious activity for a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.