At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and apparatus for recognizing hand motion
A hand motion recognizing apparatus obtains an image with first resolution including a hand and an image with second resolution higher than the first resolution...
Z-axis determination in a 2D gesture system
Systems, apparatus and methods for determining a gesture are presented. According to some aspects, disclosed are systems, apparatus and methods for determining...
Warning a user about adverse behaviors of others within an environment
based on a 3D captured image stream
A tactile feedback output device receives one or more warning signals for controlling one or more types of tactile output by the one or more tactile feedback...
Posture estimation device, posture estimation method, and posture
A posture estimation device, which is able to estimate the posture of a humanoid articulated body with high precision, has: a head estimation unit (120) that...
Image classification and information retrieval over wireless digital
networks and the internet
A method and system for matching an unknown facial image of an individual with an image of a celebrity using facial recognition techniques and human perception...
Tracking apparatus and tracking method
A tracking apparatus includes an image data acquisition unit, a tracking process unit, a contrast information acquisition unit, a contrast information...
Partial face detector red-eye filter method and apparatus
A digital camera has an integral flash and stores and displays a digital image. Under certain conditions, a flash photograph taken with the camera may result in...
Continuous tissue analysis scoring scheme based on cell classifications
A method for a continuous scoring scheme used for the assessment of biomarker expressions in the analysis of tissue sections, and digital images thereof, is...
Use of error image for unmixing artifact removal in linear spectral
A method of removing a potential false positive result in a stained sample. The method includes the steps of: acquiring a spectral image set of a stained...
A database stores a number N of biometric data representatives which correspond to a set of characteristics of said biometric data. Acquired biometric data is...
Discriminant function specifying device, discriminant function specifying
method, and biometric identification...
A discriminant function specifying device includes a setting part for calculating a discriminant function by machine learning using a learning input parameter,...
Wearable electronic device having a fingerprint identification display
Particular embodiments described herein provide for a wearable electronic device, such as a bracelet, watch, wristband or armband that includes a circuit board...
Method and computer-readable recording medium for recognizing object using
A system recognizes an object employed by an electronic device, by capturing an image using a camera module and transmitting information recognized from the...
Relative positioning of a mobile computing device in a network
In an approach to determining a relative position for each computer of a group of computers within a wireless network to a computer within the wireless network,...
Barcode reader having multiple sets of imaging optics
The present disclosure provides a barcode reader including a second set of imaging optics having a larger effective depth of field than a first set of imaging...
Graphical code readers that are configured for glare reduction
A method for glare reduction may be implemented by a graphical code reader. The method may include illuminating a target area using a plurality of light...
Systems and methods for tracking subjects
A radio frequency identification (RFID) network and methods for tracking subjects in a closed environment includes distributing RFID readers across the...
Method and apparatus to visualize locations of radio frequency
identification (RFID) tagged items
Methods and apparatus to visualize locations of radio frequency identification (RFID) tagged items are described. One example method includes receiving a...
Physiological sensor system with automatic authentication and validation
by means of a radio frequency...
This invention relates to a physiological sensor which acquires pre-programmed data from an electrode or an electrode array using Radio Frequency Identification...
Method and system of managing the safety of a plurality of personal
protection equipment items
A system and method are provided for managing the safety of a plurality (10) of personal protection equipment items (11). The system and method assign unique...
RFID detection system
Systems and methods for use in detecting the presence of an RFID device are provided. One RFID detection system includes a detection circuit that includes an...
Protocol management method for a passive RF identification device which
can harvest power from different power...
The protocol management method concerns a RFID transponder which comprises first and second field detectors respectively for first and second interrogation...
Reduced travel magnetic strip reader mechanism
A reader for a card having an information strip, the reader comprising a first movable member, a read head capable of reading the information strip, the read...
Working method of a multi-slot card reader based on the standard CCID
A working method of a multi-slot card reader based on the standard CCID protocol comprises: powering up to perform initialization, and establishing a connection...
Continuously monitored core temperature sensor and method
A system that provides notice of a lost signal. A wireless device and a control device employ radio frequency identification (RFID) technology, which uses radio...
Detection of a transactional device
A terminal includes first and second communication modules for communicating with a personal device for performing transactions, called a transactional device....
Low noise and low power passive sampling network for a switched-capacitor
ADC with a slow reference generator
Certain aspects of the present disclosure provide various sampling networks for switched-capacitor integrators, which may be used in switched-capacitor...
System and method for encrypting secondary copies of data
A system and method for encrypting secondary copies of data is described. In some examples, the system encrypts a secondary copy of data after the secondary...
Passing hidden information using attack detectors
An electronic device (22) includes a communication interface (36) and a processor (30), which is configured to store and process secret information and to...
Cryptographic processing apparatus, cryptographic processing system, and
cryptographic processing method
A process mode of either of an encryption process and a decryption process is set for at least one of a plurality of pieces of key data, in association with the...
Apparatus and method to protect digital content
In an embodiment of the present invention, a processor includes content storage logic to parse digital content into portions and to cause each portion to be...
Enabling transfer of digital assets
Techniques for managing digital assets are described that enable a principal to designate a plurality of users that will gain access and ownership of the...
Method and system for activating a portable data carrier
The invention relates to a method for activating a portable data carrier (1) in which a first portable data carrier (1) is supplied in an inactive state to a...
Preventing modifications to code or data based on the states of a master
latch and one or more hardware latches...
A service provider can maintain one or more host computing devices that can be accessed as host computing device resources by customers. A hosting platform...
Embedding secret data in code
In a computer system operable at more than one privilege level, an application is securely customized to use secret data without disclosing the secret data to a...
System and method for access control using network verification
A system for controlling access includes a computing device, configured to: determine a first identifier associated with a first access point being used by the...
System and method for enforcing role membership removal requirements
System and method for enforcing role membership removal requirements are described. In one embodiment, the method includes, responsive to receipt of a removal...
Communication system and method
There is provided a system, including a network that is defined by its novel approach to privacy, security and freedom for its users, namely privacy by allowing...
Methods and apparatus to securely share data
Methods and apparatus to securely share data are disclosed. An example includes generating, at a first device of a first user of cloud services, an archive file...
Managing document revisions
Embodiments of the invention relates to tracking changes made to a document, and embedding the changes in the document while limiting access to the embedded...
Secure isolation of tenant resources in a multi-tenant storage system
using a security gateway
Machines, systems and methods for handling a client request in a hierarchical multi-tenant data storage system, the method comprising processing a request in...
System and method for creating and protecting secrets for a plurality of
A method for protecting a first secrets file. The method includes an n-bit generator generating a secrets file name for the secrets file and generating a decoy...
Automatically preventing unauthorized signatories from executing
electronic documents for organizations
In some embodiments, an electronic signature service automatically updates electronic documents to prevent execution by an unauthorized signatory. The...
Sealing secret data with a policy that includes a sensor-based constraint
Technologies pertaining to limiting access to secret data through utilization of sensor-based constraints are described herein. A sensor-based constraint is a...
System and method of assessing data protection status of data protection
There are provided a method, system and service for computerized managing a plurality of data protection (DP) resources. The method comprises: accommodating...
Apparatus and method for performing different cryptographic algorithms in
a communication system
A communication apparatus performs encryption on data transmitted from another communication apparatus by using first or second cryptographic algorithm, or...
Systems and methods for managing location data and providing a privacy
A computer-implemented method includes providing a user interface on an internet-protocol (IP) connected mobile device, the user interface configured to receive...
Confidential data access and storage
A system is described for managing storage and access of confidential data downloaded from a server (e.g., an enterprise data server) onto a mobile device. The...
Methods and systems for improved risk scoring of vulnerabilities
A security tool can identify vulnerabilities in a computing system and determine a risk level of the vulnerabilities based on base and optional CVSS vectors and...
Characterizing, detecting and healing vulnerabilities in computer code
An example process includes identifying, by one or more processing devices, a location in computer code that is subject to vulnerability, where the location...