At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Object recognition method and object recognition apparatus using the same
An object recognition method and an object recognition apparatus using the same are provided. In one or more embodiments, a real-time image including a first...
Patient interface identification system
The present invention relates to a patient interface identification system for identifying a patient interface that is suited for a face (16) of a user (18),...
Facial landmark localization using coarse-to-fine cascaded neural networks
The present invention overcomes the limitations of the prior art by performing facial landmark localization in a coarse-to-fine manner with a cascade of neural...
Method and system using a data-driven model for monocular face tracking
A method and system using a data-driven model for monocular face tracking are disclosed, which provide a versatile system for tracking three-dimensional (3D)...
Display screen controlling apparatus in mobile terminal and method thereof
A method for controlling a display screen of a mobile terminal includes acquiring a first image and a second image distinguished from the first image, using a...
Learning deep face representation
Face representation is a crucial step of face recognition systems. An optimal face representation should be discriminative, robust, compact, and very easy to...
Compact face representation
A deep learning framework jointly optimizes the compactness and discriminative ability of face representations. The compact representation can be as compact as...
Real-time dynamic reference image generation for range imaging system
A dynamic reference range image generation method comprises providing a reference range image, to be dynamically updated, composed of pixels, each of which...
System and method for detecting an organic body for authentication
Methods, systems, and programming for user identification and authentication are presented. In one example, an apparatus for user authentication is disclosed....
Methods and systems for capturing biometric data
A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an...
Method and electronic device for generating fingerprint enrollment data
A method and electronic device for generating fingerprint enrollment data are provided. The method includes the steps of capturing first input data, wherein the...
Optical fingerprint recognition apparatus
In accordance with an embodiment, the prism is made slimly to correct the distortion of the fingerprint image such as trapezoidal distortion or the like....
Capacitive fingerprint sensor and fingerprint sensing method thereof
A capacitive fingerprint sensor is provided. The capacitive fingerprint sensor includes a sensing array, an insulating surface disposed on the sensing array,...
Fingerprint sensor and integratable electronic display
A fingerprint sensor which includes a conductive layer which is incorporatable within an electronic display is disclosed. The fingerprint sensor also includes a...
Method and apparatus for storing and retrieving data embedded into the
surface of a 3D printed object
A computer implemented method and apparatus for storing and retrieving data embedded into the surface of a 3D printed object is described. The method and...
Method and apparatus for identification
A method and system for reading an identifier from an object having a portion of a repeating image imparted thereon. The system preferably includes an imaging...
Imaging apparatus having lens element
There is provided in one embodiment an imaging apparatus having a lens assembly. The lens assembly can comprises a lens element having a first light...
User interface for an optical code scanner
An optical code scanner is presented that includes an improved user interface and an improved external computer interface. The user interface includes...
Automatic data collection apparatus and method
Machine-readable symbol readers and/or scan engines may subtractively impose an aiming pattern on an illumination field produced by a source of light or...
Safety system and method
A safety system for a boat includes a base unit securable to the boat and operably connected to one or more of the boat steering, engine and throttle controls....
System for aligning a handheld RFID reader
The present disclosure provides methods and apparatuses for providing a visible feedback based on an alignment or a link quality between an external reader and...
Communication method, device, and system
The present invention relates to a communication method, device, and system. The communication method include using low-frequency alternating magnetic field...
Multi-modal entity tracking and display
A multi-modal entity tracking and display system is disclosed. In one embodiment, a tracking infrastructure comprising at least one data receiver is configured...
Method for operating a communication system
A method for operating a communication system comprises a transponder having at least one antenna, in particular in the form of a portable data carrier, and a...
Method and apparatus pertaining to RFID tag-based user assertions
An apparatus includes a display and one or more user-assertable surfaces. When asserted by a user, such a surface selectively couples a corresponding near-field...
Socket for card
A socket coupled to an electronic device is provided. The socket includes a socket housing having a card containing space, a first tension rib, protruding in a...
Device and method for determining redundancies in near field communication
A device and method for determining redundancies in near field communication tag detection are provided. A device comprising: a sensor configured to receive NFC...
Method for classifying parking scenarios for a system for parking a motor
A method for classifying parking scenarios for an assistance system for parking a motor vehicle wherein a predetermined number of parking scenarios are defined,...
Portable computer and security operating method thereof
A portable computer and security operating method thereof are provided to secure the portable computer in a power-off mode. The portable mainly includes a...
Mechanisms for locking computing devices
Various systems and methods for locking computing devices are described herein. In an example, a portable device comprises an electro-mechanical lock; and a...
Management of log files subject to edit restrictions that can undergo
Systems and methods for applying edit restrictions, modifying a file subject to edit restrictions, and obtaining a modified file that is subject to edit...
Multi-user login for shared mobile devices
In particular embodiments, two or more users are provided with personalized experiences while using a shared mobile computing device. A login interface is...
Apparatus and method to secure an electronic storage using a secure
A secure integrated circuit (IC) to provide access to an electronic storage, the secure IC including a memory and a processor. The processor may generate a...
Owner controlled transmitted file protection and access control system and
A system that encrypts a file sent by an owner and embeds it with encrypted policy rules. The policy rules are one or more `access rules` and `use rules` that...
Method and devices for selective RAM scrambling
A method for selectively scrambling data within a memory associated with a computing device based on data tagging. The computing device may define security...
Apparatus and method for developing secure software
A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions convert...
Systems and methods for mitigating effects of an unresponsive secure
element during link establishment
A method of communicating with a secure element (SE) is described. The method includes transmitting successive RSET frames from a single wire protocol (SWP)...
Program analysis/verification service provision system, control method for
same, computer readable...
A program analysis/verification service provision system (1) includes: a tool registration/search section (313) for extracting, from a plurality of program...
System and method for using snapshots for rootkit detection
A system, method and computer program product for identifying malicious code running on a computer, including an operating system running on the computer with a...
Computer security systems and methods using virtualization exceptions
Described systems and methods enable a host system to efficiently perform computer security activities, when operating in a hardware virtualization ...
Mapping a user's specific password and username pair to a temporary user's
favorite password and username pair
A system for automatically completing fields in online forms, such as login forms and new user registration forms, which employs a Master Cookie File containing...
A computer-implemented method for preventing password leakage into a non-password field includes detecting that a user of an electronic device has entered a...
Method and system for maintaining login preference information of users in
a network-based transaction facility
The present invention relates to various aspects for maintaining and utilizing login preference information of users of a network-based transaction facility. In...
Converged logical and physical security
A security management system that includes a hierarchical security platform, converged IT and physical security management, unified credentialing, credential...
Method and apparatus for biometric-based security using capacitive
A biometric security method and apparatus for a capacitive sensor system is provided herein, where the method may include capturing a set of raw capacitive...
Method and system for providing authentication through aggregate analysis
of behavioral and time patterns
A method and a system for evaluating identification of a user based on behavioral patterns and time patterns, including an analysis component for analyzing...
Context analysis at an information handling system to manage
Context captured with sensors of an information handling system is applied to selectively lock access to currently unlocked information, with conditions for...
Server device and service provision method
A server device is provided, which includes a reception unit receiving device identification information of a client device and user identification information...
Content data management system and method
Embodiments of the present invention provide a simplified authentication transaction for reconnecting a storage device to a host apparatus that has completed...
Content routing with rights management
The transfer of protected content from a content source to a remote packet-based device is effected. According to an example embodiment of the present...