At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Measurement data selection method for biometric device, light exit
position determination method for biometric...
In measurement data selection, when a vector composed of measurement data obtained for respective combinations of light emitting positions, light detection...
Passive light-based data communication
Techniques are disclosed for light-based communication using a passive light-reflective device having specially coded reflective or printed optics. The optics...
Indicia-reader having unitary-construction
A hand-held indicia-reading device includes a housing and a cable having a unitary-construction. The indicia-reader has a head portion with an indicia-reading...
A scanning system has a collimated light source and a movable reflective surface. The surface receives light from the light source, reflects the received light...
Image capturing device
An image capturing device includes an image forming device including a sensor defining an optical reception axis, at least one reading distance, and a region...
Asset verification and tagging
A method for managing mobile assets includes initially certifying a physical existence and location of a mobile asset. The certifying includes receiving...
Systems and methods for event monitoring using aerial drones
A radio frequency identification (RFID) network and methods for even monitoring in a closed environment includes distributing RFID readers across the...
A card reader to read information in an integrated circuit (IC) card includes a housing, a first antenna, a control circuit, and a switch unit. The first...
Powering RFID tags using multiple synthesized-beam RFID readers
Synthesized-beam RFID readers may be used to manage and provide information about RFID tag populations. In one embodiment, two or more synthesized-beam readers...
System and method for identification and authentication of precious metals
and small jewelry items using radio...
A system and method is provided for the identification and authentication of precious metals and small jewelry. The system can include an embedded RFID tag,...
Passive RFID tag coil alignment and communication
A passive tag embedded in a package includes multiple conductive coils. A first coil receives radio frequency (RF) energy used to power the tag. Additional...
Tag clusters for silent tags
Tags may be grouped into a tag cluster to be represented by a master tag. Tag transmission reports may be received from one or more tag readers that receive...
Method for preventing an unauthorized use of disposable bioprocess
This invention provides a system and apparatus that is able to authenticate and prevent illegal manufacturing and unauthorized operation of disposable...
Low-cost capacitive sensing decoder
A low-cost system comprising a pattern arranged to encode information and a decoder for decoding the information encoded in the pattern is described. In...
Card payment system
In one example embodiment, a card payment apparatus includes a member having a magnetic strip reader configured to read account information from a magnetic...
Data storage apparatus, coding unit, systems including the same, method of
coding and method of reading data
In one embodiment, the data storage apparatus includes a control unit configured to decode at least one input command and configured to generate at least one of...
Methods and systems for deleting requested information
A method of deleting log records may include identifying a plurality of log records generated during a time period, for each identified log record, determining...
Systems and methods for automatically handling multiple levels of
encryption and decryption
Systems and methods are provided for automatically handling multiple levels of encryption and decryption. An electronic file is received to add to encrypted...
Electronic document management and delivery
In one embodiment, system to manage and delivery electronic documents is disclosed.
Distributed encryption and access control scheme in a cloud environment
System, computer readable medium and method for decryption. The method may include receiving, by a third computerized system and from a fourth computerized...
Selective physical world correlation of virtual world interactions
Techniques described herein relate to facilitating interaction in the physical world, after initial interaction has occurred within the virtual world, while...
Method and system for child authentication
Methods and systems for child authentication are described. In one embodiment, a communication enablement request may be received to enable electronic...
Client-side encryption in a deduplication backup system
Client-side encryption in a deduplication backup system. In one example embodiment, a method includes a backup phase in which various steps are performed for...
Displaying private information on personal devices
A computing device is described that includes one or more processors and at least one module operable by the one or more processors to determine whether the...
Protecting data owned by an operating system in a multi-operating system
An approach is provided for protecting data owned by an operating system on a mobile computing device having multiple operating systems. A map specifying...
Vulnerability countermeasure device and vulnerability countermeasure
A vulnerability countermeasure device stores configuration information associating multiple computers connected via a network and software possessed by each...
Entity IP mapping
Systems and methods for mapping IP addresses to an entity include receiving at least one domain name associated with the entity. Embodiments may further include...
Methods and apparatus to protect memory regions during low-power states
A disclosed example method involves configuring a processor to, when transitioning the processor system to a low-power mode, use a key and a random or...
Ensuring integrity of a software package installer
A method comprises capturing a first state of a computer prior to installing a software package on the computer; using an installer to install the software...
Detecting malicious computer code in an executing program module
Prior to execution of computer program instructions, the computer identifies one or more addresses in memory corresponding to the locations of one or more of...
Detecting heap spraying on a computer
Detecting heap spraying on a computer by detecting a plurality of requests to allocate portions of heap memory, measuring the plurality of requests to determine...
Robust malware detector
A system, method and computer readable medium for detecting and diffusing malware on a computer. Malware is analyzed to generate signatures and determine a...
User controllable platform-level trigger to set policy for protecting
platform from malware
Embodiments of systems, apparatuses, and methods to protect data stored in a storage system of a device from malware alternation are described. In some...
Apparatus and method for masking a real user controlling synthetic
A machine has a processor and a memory storing instructions executed by the processor to issue a challenge in response to a first request, evaluate a response...
Selective password synchronization
A mechanism is provided for selective password synchronization. An indication is received that a password is to be changed for an account in a plurality of...
Information processing device, information processing method, and computer
There is provided an information processing device including a first program execution unit that loads, interprets, and executes code of a computer program...
Authenticated launch of virtual machines and nested virtual machine
An embodiment of the invention provides for an authenticated launch of VMs and nested VMMs. The embodiment may do so using an interface that invokes a VMM...
Apparatus and method of controlling permission to applications in a
An apparatus and method of controlling permission to an application in a portable terminal, the apparatus including a controller for, when requested for an...
ID usage tracker
A system and computer program product for using a multi-user operating system. A user attempts to access the multi-user operating system. The system prompts the...
Electronic device and method for unlocking screen of electronic device
An electronic device and a method for unlocking a screen of the electronic device are provided. The electronic device includes a screen and a storage unit. The...
Orientation aware authentication on mobile platforms
Systems and methods may provide for receiving an authentication input and determining an authentication orientation of a mobile platform during entry of the...
Methods, devices, and systems for unobtrusive mobile device user
The present invention discloses methods, devices, and systems for unobtrusively recognizing a user of a mobile device. Methods including the steps of:...
Device, method, and graphical user interface for accessing an application
in a locked device
A device with a touch sensitive display and a plurality of applications, including a camera application, while the device is in a locked, passcode-protected...
Screen unlocking method, device and terminal
A screen unlocking method, device and terminal, wherein the method includes: a first terminal sending a key information acquisition message to a second...
Automatic learning multi-modal fraud prevention (LMFP) system
A computerized learning multi-modal fraud prevention system and method for generating a data signature of a user, such as one engaged in electronic commerce, to...
Secure recording and sharing system of voice memo
According to an aspect of an embodiment, a system for secure recording and sharing of audio data includes a communication interface, a registration module, a...
CAPTCHA challenge incorporating obfuscated characters
A method for determining if a user of a computer system is a human. A processor receives an indication that a computer security program is needed and acquires...
Provisioning user permissions attribute-based access-control policies
An attribute-based access control policy (e.g., XACML policy) for a set of elements depends on attributes carried by elements in one of several predefined...
System and method for establishing and monetizing trusted identities in
cyberspace with personal data service...
A system and method for establishing and monetizing trusted identities in cyberspace relying upon user opt in. Users request to attain secure IDs for accessing...
Integration of verification tokens with portable computing devices
Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is...