Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,405,966 Traffic control apparatus, method thereof, and program therefor
There is provided a traffic control apparatus including: an image input unit configured to input an image including a face of a user; a face detecting unit...
US-9,405,965 Vector-based face recognition algorithm and image search system
Systems and methods for performing face recognition and image searching are provided. A system for face recognition and image searching includes an ingestion...
US-9,405,964 Processes for generating content sharing recommendations based on image content analysis
Processes are disclosed for generating share recommendations for sharing content based at least in part on associated metadata of the content (e.g.,...
US-9,405,963 Facial image bucketing with expectation maximization and facial coordinates
Facial image bucketing is disclosed, whereby a query for facial image recognition compares the facial image against existing candidate images. Rather than...
US-9,405,962 Method for on-the-fly learning of facial artifacts for facial emotion recognition
A method for determining a facial emotion of a user in the presence of a facial artifact includes detecting Action Units (AUs) for a first set of frames with...
US-9,405,961 Information processing apparatus, distributing identicial image data in parallel for object detection and...
An image processing apparatus comprising a storage unit configured to store image data; a readout unit configured to read out the image data stored in the...
US-9,405,960 Face hallucination using convolutional neural networks
Face hallucination using a bi-channel deep convolutional neural network (BCNN), which can adaptively fuse two channels of information. In one example, the BCNN...
US-9,405,959 System and method for classification of objects from 3D reconstruction
System and method for detecting and classifying man-made objects on the seafloor using 3D reconstruction techniques. Enhanced sea floor object detection with...
US-9,405,958 Cell analysis method, cell analysis device, and cell analysis program
Provided is a cell analysis method in a cell analysis device D that uses an optical path length image of a cell colony formed of a large number of cells to...
US-9,405,957 Fingerprint preview quality and segmentation
A ridge flow based fingerprint image quality determination can be achieved independent of image resolution, can be processed in real-time and includes...
US-9,405,956 Image processing apparatus and method
A processor configured to execute a process includes receiving image information including biometric information, extracting, from the image information, a...
US-9,405,954 Imaging apparatus and medical equipment
A light receiving section includes light receiving elements. A light source section includes a light emitting section that illuminates the subject and...
US-9,405,953 System and method of using an electric field device
A biometric scanner having an electric field device and a method of using that scanner are disclosed. The electric field device (a) has no electric field...
US-9,405,952 Radio frequency identification reader system and control method thereof
An RFID reader system includes: a reader body; a reader module disposed in the reader body; and an antenna unit detachably installed onto the reader body. When...
US-9,405,951 Integrated illumination assembly for symbology reader
A light transmitter (e.g., pipe) is constructed from polycarbonate for increased shock resistance and can define a rectangular cross section. A chamfered end of...
US-9,405,950 External access to memory on an RFID tag
In embodiments of the present invention improved capabilities are described for an RFID tag comprising a radio frequency (RF) network node and a communication...
US-9,405,949 System for interrogating a remotely interrogatable passive sensor integrated into a metal cavity with reduced...
A system comprises a cavity being reflecting for RF waves and comprises at least one acoustic wave sensor exhibiting a resonance frequency band, coupled to a...
US-9,405,948 Method for monitoring the functioning of an RFID-based radio communication network in a spatially extensive area
A method for monitoring the functioning of an RFID-based radio communication network in a spatially extensive area, wherein a plurality of RFID tags carry out a...
US-9,405,947 Emulated radio frequency identification
A mobile communication device is equipped with hardware and/or software components to enable the device to output a data in a form of a radio frequency signal,...
US-9,405,946 Judgment apparatus, judgment system, and judgment method
A judgment apparatus includes a storage configured to store first reference data representing data that a detector should output in a first area when a...
US-9,405,945 Network-enabled RFID tag endorsement
A Radio Frequency Identification (RFID) reader may be configured to endorse an RFID tag. The reader receives an identifier from the tag and challenges the tag...
US-9,405,944 Mitigation of LF interference from adjacent vehicles also using LF approach detection system
A system may include at least one antenna and a controller in communication with the antenna. The controller may be configured to establish a pattern for...
US-9,405,943 Radio frequency identification readers, methods and computer program products for adjusting a query command...
RFID readers and methods for adjusting a query command slot-count parameter Q for use by radio frequency identification (RFID) tag reader in an RFID tag...
US-9,405,942 Application system having an active RFID tag, a coordinator, and a reader/writer transmitting an action...
The present invention provides an active radio frequency identification (RFID) tag and a system and method thereof. The system includes: a coordinator,...
US-9,405,941 Simultaneous programming of selected tags
An apparatus and method for simultaneous programming of data to individually addressed Tags. Tags contain a being addressed indicator that allows for processing...
US-9,405,940 Printing device and control method of printing a barcode with a combination of preset and added correction...
A printer and a control method of a printer can print barcodes appropriately according to a given print medium by means of a simple, easy operation. The printer...
US-9,405,939 Data processing on a non-volatile mass storage device
A non-volatile mass storage device is provided comprising memory circuitry accessible to a host data processing device via a communication link. The...
US-9,405,938 Information processing apparatus, method for releasing restriction on use of storage device, and storage medium
An information processing apparatus includes an authentication information storage unit that stores authentication information for releasing restriction on use...
US-9,405,937 Method and apparatus for securing a dynamic binary translation system
A processor and method are described for managing different privilege levels associated with different types of program code, including binary translation...
US-9,405,936 Code integrity protection by computing target addresses from checksums
A method of obscuring software code including a plurality of basic blocks, including: calculating, by a processor, a checksum value of the current basic block...
US-9,405,935 Secure image processing
Various embodiments herein each include at least one of systems, methods, devices, and software for secure image processing. In particular, the secure image...
US-9,405,934 Hiding sensitive data in plain text environment
Method and system for hiding sensitive data in a plain text environment. The method may include recognizing a starting key in a plain text environment, wherein...
US-9,405,933 Secure access to running client application features from a browser application
A secure access is provided to a plurality of software application features associated with a plurality of software applications running on a user's device,...
US-9,405,932 User centric data maintenance
One or more techniques and/or systems are provided for dynamically maintaining user centric data. For example, a data provider app may have knowledge about user...
US-9,405,931 Protected information stream allocation using a virtualized platform
A protected stream manager includes one or more subsystems to receive a content stream in a virtual environment, obfuscate the content stream, and prioritize...
US-9,405,930 User-controlled centralized privacy marketplace system
A system for managing personal information of a user includes: a personal information database including personal information records of the user including data...
US-9,405,929 Hierarchical permissions model within a document
Case management systems and techniques are disclosed. In various embodiments, a hierarchical document permission model is received, the model describing a...
US-9,405,928 Deriving encryption rules based on file content
Data storage systems are disclosed for automatically generating encryption rules based on a set of training files that are known to include sensitive...
US-9,405,927 Tri-module data protection system specification
The present invention provides a system, method and apparatus for protecting data: by separating limited data from the data storage on a primary host, and...
US-9,405,926 Systems and methods for jurisdiction independent data storage in a multi-vendor cloud environment
The present invention relates to a cloud based system for providing data security. The system comprises a processor which receives a data file from a user. The...
US-9,405,925 Content item encryption on mobile devices
Applications are stored on removable storage of a mobile device in an encrypted form to provide isolation and piracy protection. In one implementation, each...
US-9,405,924 Self-keyed protection of anticipatory content
Systems and methods are provided to facilitate anticipatory pushing of content to clients of a communications network in such a way that the content is unusable...
US-9,405,923 Establishing isolation between content hosting services executing on common support server
Embodiments relate to systems and methods for establishing isolation between content hosting services executing on a common support server. In aspects, a server...
US-9,405,922 Computer-implemented method for role discovery and simplification in access control systems
A method includes selecting a first biclique role in a plurality of roles and finding all roles in the plurality that have a set of vertices of a second type...
US-9,405,921 Computer-implemented method for role discovery in access control systems
One embodiment relates to a computer-implemented method for role discovery in access control systems. User accounts are selected according to a predetermined...
US-9,405,920 Data integrity verification
A system performs cryptographic operations utilizing information usable to verify validity of plaintext. To prevent providing information about a plaintext by...
US-9,405,919 Dynamic encryption keys for use with XTS encryption systems employing reduced-round ciphers
One feature pertains to encrypting data to improve data confidentiality. In one aspect, a modified form of XTS encryption is provided for use with reduced-round...
US-9,405,918 Viewer-based device control
A computing device can monitor the gaze direction of people around the device to determine whether any unintended viewers are viewing content displayed on the...
US-9,405,917 Mechanism for protecting integrated circuits from security attacks
A mechanism for protecting integrated circuits (IC) from security attacks includes an IC having components that may store one or more data items and may perform...
US-9,405,916 Automatic correction of security downgraders
Methods and systems for automatic correction of security downgraders. For one or more flows having one or more candidate downgraders, it is determined whether...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.