Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,390,318 Position-setup for gesture-based game system
Technologies are generally described for position-setup for gesture-based game. In some examples, a method performed under control of a gesture-based game...
US-9,390,317 Lip activity detection
Provided is a method of detecting lip activity. The method determines magnitude of optical flow in lip region and at least one non-lip region of a detected...
US-9,390,316 Image selecting device, image selecting method, image pickup apparatus, and computer-readable medium
An image extracting unit and an album setting unit are provided. The image extracting unit sets a predetermined image of a plurality of images as a group...
US-9,390,315 Image match for featureless objects
Object identification through image matching can utilize ratio and other data to accurately identify objects having relatively few feature points otherwise...
US-9,390,314 Methods and apparatus for determining dimensions of an item using 3-dimensional triangulation
Methods and apparatus are provided for determining the dimensions of an unknown item using multiple images captured by different cameras. The dimensions include...
US-9,390,313 Image measurement apparatus and image measurment method measuring the cell neclei count
A partial image extracting unit extracts images of a predetermined size and constant magnification from a tissue region. A mask generating unit generates a mask...
US-9,390,312 Systems, methods, and devices for assessing microbiota of skin
Devices, systems, and methods for assessing microbiota of skin are described which include: a skin-covering material with an inner surface conforming in shape...
US-9,390,311 Fingerprint identification method
The present invention provides fingerprint-based verification system and fingerprint identification method. The fingerprint-based verification system verifies...
US-9,390,310 Striped pattern image examination support device, striped pattern image examination support method and program
Provided are a striped pattern image examination support device, method, and program. The device includes: image transformation element for transforming at...
US-9,390,309 Latent fingerprint detectors and fingerprint scanners therefrom
This document relates to systems and method for latent fingerprint detection using specular reflection (glare). An exemplary system may include a light source...
US-9,390,308 Fingerprint scanning method
A computer-implemented method entails capturing a digital fingerprint of a finger using a fingerprint-capturing device, collecting pressure measurements using...
US-9,390,307 Finger biometric sensing device including error compensation circuitry and related methods
A finger biometric sensing device may include an array of finger biometric sensing pixel electrodes and a gain stage coupled to the array of finger biometric...
US-9,390,306 Finger biometric sensor including circuitry for acquiring finger biometric data based upon finger stability and...
A finger biometric sensor may include an array of finger biometric sensing pixels and processing circuitry coupled to the array of finger biometric sensing...
US-9,390,305 Codeless QR code
A service provider receives, from a user, picture information captured by a user device from a picture mark associated with a product or service of a merchant....
US-9,390,304 Encoded information reading terminal with micro-projector
An encoded information reading (EIR) terminal can include a microprocessor, a memory, an EIR device including a two-dimensional imager, and a micro-projector...
US-9,390,303 Synchronization of radio frequency identification readers using infrared pulse
A system and method system for synchronizing Radio Frequency Identification (RFID) readers includes a plurality of RFID readers disposed within an environment....
US-9,390,302 Location measurments using a mesh of wireless tags
A method for determining a location of a group of wireless tags, the method may include receiving first information indicative of distances between each...
US-9,390,301 User grouping apparatus and methods based on collected wireless IDs in association with location and time
An RFID aggregate storage stores a radio-frequency ID aggregate structure. The RFID aggregate structure is an aggregated data structure of a plurality of RFIDs,...
US-9,390,300 Coexistence of RF barcodes and other NFC devices
An NFC-enabled device (12) comprising a host (22), an NFC interface (26) and an RF transceiver (24) configured to emit a first RF field (46) to power-up one or...
US-9,390,299 High data transfer smart card reader with heat sink
Various embodiments provide a high data transfer smart card reader. In a preferred embodiment, the high data transfer smart card reader includes smart card...
US-9,390,298 Application routing configuration for NFC controller supporting multiple NFCEEs
The present document relates to Near Field Communication (NFC). In particular, the present document relates to the routing of application related information in...
US-9,390,297 Wireless card reader with contactless and contact card interfaces
Methods, systems, and apparatus, for a payment card reader comprising: a frame, where the frame includes a top surface, a bottom surface, a first side surface,...
US-9,390,296 Computer recovery or return
A computer return apparatus includes a processor. The apparatus includes a memory connected to the processor. The apparatus includes a display. The apparatus...
US-9,390,295 Device with capacitive security shield
The invention provides a semiconductor device comprising with a capacitive security shield structure which uses a set of randomly distributed dielectric or...
US-9,390,294 Virtualized device control in computer systems
Virtual device control in a computer system is described. Examples include: obtaining a device configuration policy from firmware in the computer system, the...
US-9,390,293 Device, method, and system for secure mobile data storage
A device, method, and system for secure mobile data storage includes a mobile data storage device having a short-range communication circuit, a long-range...
US-9,390,292 Encrypted digital circuit description allowing circuit simulation
A system for creating protected functional descriptions of integrated circuits provides an encrypted functional description that allows the integrated circuit...
US-9,390,291 Secure key derivation and cryptography logic for integrated circuits
A processor of an aspect includes root key generation logic to generate a root key. The root key generation logic includes a source of static and entropic bits....
US-9,390,290 Applying group policies
Information corresponding to a set of signatures is maintained, and for each signature in the set, an associated group policy of a network is maintained. A...
US-9,390,289 Secure collection synchronization using matched network names
One embodiment provides a system that facilitates facilitate secure synchronization of manifests using exact network names. During operation, the system...
US-9,390,288 Method and system for validating a virtual asset
Virtual asset creation data used to create a virtual asset is generated through a virtual asset creation system that includes primary virtual asset data....
US-9,390,287 Secure data scanning method and system
A method of scanning secure data in a data store is performed in a manner that does not expose the scan data, the files being searched, or information about...
US-9,390,286 Enforcing restrictions related to a virtualized computer environment
An administrator may set restrictions related to the operation of a virtual machine (VM), and virtualization software enforces such restrictions. There may be...
US-9,390,285 Identifying inconsistent security policies in a computer cluster
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for identifying inconsistent security policies. One of the...
US-9,390,284 Method for secure and private computer file
A method to guard the integrity of information after transferred over Internet and stored on to other computing devices. The method takes a target computer file...
US-9,390,283 Controlling access in a dispersed storage network
A method begins by a set of storage units of a dispersed storage network (DSN) receiving a set of access requests from a requesting device. The method continues...
US-9,390,282 Outsourcing document-transformation tasks while protecting sensitive information
An outsourcing environment is described herein by which an outsourcing entity may delegate document-transformation tasks to at least one worker entity, while...
US-9,390,281 Protecting data in insecure cloud storage
The disclosed embodiments provide a system that processes data. The system includes a first client that encrypts a first set of data, uploads the encrypted...
US-9,390,280 System and method for obtaining keys to access protected information
A server uses an encryption key to decrypt authentication information thereby facilitating communication with network-accessible applications that may be...
US-9,390,279 Systems and methods for providing conditional access to transmitted information
Systems, methods and computer program products for controlling access to position information at a receiver based on various considerations, including a...
US-9,390,278 Systems and methods for code protection in non-volatile memory systems
Methods and systems are disclosed for code protection in non-volatile memory (NVM) systems. Information stored within NVM memory sectors, such as boot code or...
US-9,390,277 Method and device for data confidentiality protection based on embedded universal integrated circuit card
Embodiments of the present invention provide a method and device for data confidentiality protection based on an embedded universal integrated circuit card. An...
US-9,390,276 Flexible role based authorization model
Systems and methods described herein relate to role-based authorization systems which allow customization of role templates as well as the ability, using roles,...
US-9,390,275 System and method for controlling hard drive data change
A system for controlling hard drive data change is disclosed which comprises a hard drive having a first volume and a second volume, the first volume for...
US-9,390,274 Media data processing method and apparatus
Embodiments of the present invention provide a media data processing method and apparatus. The media data processing method includes: obtaining each media...
US-9,390,273 Device managing apparatus, device managing system, and recording medium storing a software management program
A device managing apparatus for managing software installed in at least one device includes a determination unit configured to determine whether a software item...
US-9,390,272 Systems and methods for monitoring and mitigating information leaks
Systems and methods are disclosed for determining whether a third party observer could determine that an organization has an intent with respect to subject...
US-9,390,271 Vectorial private equality testing
A system for equality testing, the system comprising a first client device including a first private data unit, a second client device including a second...
US-9,390,270 Security testing using semantic modeling
Optimized testing of vulnerabilities in an application implemented by a method includes generating a first probe directed to determine whether an application is...
US-9,390,269 Security testing using semantic modeling
Optimized testing of vulnerabilities in an application implemented by a method includes generating a first probe directed to determine whether an application is...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.