Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,412,013 Method and apparatus for recognizing hand motion
A hand motion recognizing apparatus obtains an image with first resolution including a hand and an image with second resolution higher than the first resolution...
US-9,412,012 Z-axis determination in a 2D gesture system
Systems, apparatus and methods for determining a gesture are presented. According to some aspects, disclosed are systems, apparatus and methods for determining...
US-9,412,011 Warning a user about adverse behaviors of others within an environment based on a 3D captured image stream
A tactile feedback output device receives one or more warning signals for controlling one or more types of tactile output by the one or more tactile feedback...
US-9,412,010 Posture estimation device, posture estimation method, and posture estimation program
A posture estimation device, which is able to estimate the posture of a humanoid articulated body with high precision, has: a head estimation unit (120) that...
US-9,412,009 Image classification and information retrieval over wireless digital networks and the internet
A method and system for matching an unknown facial image of an individual with an image of a celebrity using facial recognition techniques and human perception...
US-9,412,008 Tracking apparatus and tracking method
A tracking apparatus includes an image data acquisition unit, a tracking process unit, a contrast information acquisition unit, a contrast information...
US-9,412,007 Partial face detector red-eye filter method and apparatus
A digital camera has an integral flash and stores and displays a digital image. Under certain conditions, a flash photograph taken with the camera may result in...
US-9,412,006 Continuous tissue analysis scoring scheme based on cell classifications
A method for a continuous scoring scheme used for the assessment of biomarker expressions in the analysis of tissue sections, and digital images thereof, is...
US-9,412,005 Use of error image for unmixing artifact removal in linear spectral unmixing
A method of removing a potential false positive result in a stained sample. The method includes the steps of: acquiring a spectral image set of a stained...
US-9,412,004 Biometric coding
A database stores a number N of biometric data representatives which correspond to a set of characteristics of said biometric data. Acquired biometric data is...
US-9,412,003 Discriminant function specifying device, discriminant function specifying method, and biometric identification...
A discriminant function specifying device includes a setting part for calculating a discriminant function by machine learning using a learning input parameter,...
US-9,412,002 Wearable electronic device having a fingerprint identification display
Particular embodiments described herein provide for a wearable electronic device, such as a bracelet, watch, wristband or armband that includes a circuit board...
US-9,412,001 Method and computer-readable recording medium for recognizing object using captured image
A system recognizes an object employed by an electronic device, by capturing an image using a camera module and transmitting information recognized from the...
US-9,412,000 Relative positioning of a mobile computing device in a network
In an approach to determining a relative position for each computer of a group of computers within a wireless network to a computer within the wireless network,...
US-9,411,999 Barcode reader having multiple sets of imaging optics
The present disclosure provides a barcode reader including a second set of imaging optics having a larger effective depth of field than a first set of imaging...
US-9,411,998 Graphical code readers that are configured for glare reduction
A method for glare reduction may be implemented by a graphical code reader. The method may include illuminating a target area using a plurality of light...
US-9,411,997 Systems and methods for tracking subjects
A radio frequency identification (RFID) network and methods for tracking subjects in a closed environment includes distributing RFID readers across the...
US-9,411,996 Method and apparatus to visualize locations of radio frequency identification (RFID) tagged items
Methods and apparatus to visualize locations of radio frequency identification (RFID) tagged items are described. One example method includes receiving a...
US-9,411,995 Physiological sensor system with automatic authentication and validation by means of a radio frequency...
This invention relates to a physiological sensor which acquires pre-programmed data from an electrode or an electrode array using Radio Frequency Identification...
US-9,411,994 Method and system of managing the safety of a plurality of personal protection equipment items
A system and method are provided for managing the safety of a plurality (10) of personal protection equipment items (11). The system and method assign unique...
US-9,411,993 RFID detection system
Systems and methods for use in detecting the presence of an RFID device are provided. One RFID detection system includes a detection circuit that includes an...
US-9,411,992 Protocol management method for a passive RF identification device which can harvest power from different power...
The protocol management method concerns a RFID transponder which comprises first and second field detectors respectively for first and second interrogation...
US-9,411,991 Reduced travel magnetic strip reader mechanism
A reader for a card having an information strip, the reader comprising a first movable member, a read head capable of reading the information strip, the read...
US-9,411,990 Working method of a multi-slot card reader based on the standard CCID protocol
A working method of a multi-slot card reader based on the standard CCID protocol comprises: powering up to perform initialization, and establishing a connection...
US-9,411,989 Continuously monitored core temperature sensor and method
A system that provides notice of a lost signal. A wireless device and a control device employ radio frequency identification (RFID) technology, which uses radio...
US-9,411,988 Detection of a transactional device
A terminal includes first and second communication modules for communicating with a personal device for performing transactions, called a transactional device....
US-9,411,987 Low noise and low power passive sampling network for a switched-capacitor ADC with a slow reference generator
Certain aspects of the present disclosure provide various sampling networks for switched-capacitor integrators, which may be used in switched-capacitor...
US-9,411,986 System and method for encrypting secondary copies of data
A system and method for encrypting secondary copies of data is described. In some examples, the system encrypts a secondary copy of data after the secondary...
US-9,411,985 Passing hidden information using attack detectors
An electronic device (22) includes a communication interface (36) and a processor (30), which is configured to store and process secret information and to...
US-9,411,984 Cryptographic processing apparatus, cryptographic processing system, and cryptographic processing method
A process mode of either of an encryption process and a decryption process is set for at least one of a plurality of pieces of key data, in association with the...
US-9,411,983 Apparatus and method to protect digital content
In an embodiment of the present invention, a processor includes content storage logic to parse digital content into portions and to cause each portion to be...
US-9,411,982 Enabling transfer of digital assets
Techniques for managing digital assets are described that enable a principal to designate a plurality of users that will gain access and ownership of the...
US-9,411,981 Method and system for activating a portable data carrier
The invention relates to a method for activating a portable data carrier (1) in which a first portable data carrier (1) is supplied in an inactive state to a...
US-9,411,980 Preventing modifications to code or data based on the states of a master latch and one or more hardware latches...
A service provider can maintain one or more host computing devices that can be accessed as host computing device resources by customers. A hosting platform...
US-9,411,979 Embedding secret data in code
In a computer system operable at more than one privilege level, an application is securely customized to use secret data without disclosing the secret data to a...
US-9,411,978 System and method for access control using network verification
A system for controlling access includes a computing device, configured to: determine a first identifier associated with a first access point being used by the...
US-9,411,977 System and method for enforcing role membership removal requirements
System and method for enforcing role membership removal requirements are described. In one embodiment, the method includes, responsive to receipt of a removal...
US-9,411,976 Communication system and method
There is provided a system, including a network that is defined by its novel approach to privacy, security and freedom for its users, namely privacy by allowing...
US-9,411,975 Methods and apparatus to securely share data
Methods and apparatus to securely share data are disclosed. An example includes generating, at a first device of a first user of cloud services, an archive file...
US-9,411,974 Managing document revisions
Embodiments of the invention relates to tracking changes made to a document, and embedding the changes in the document while limiting access to the embedded...
US-9,411,973 Secure isolation of tenant resources in a multi-tenant storage system using a security gateway
Machines, systems and methods for handling a client request in a hierarchical multi-tenant data storage system, the method comprising processing a request in...
US-9,411,972 System and method for creating and protecting secrets for a plurality of groups
A method for protecting a first secrets file. The method includes an n-bit generator generating a secrets file name for the secrets file and generating a decoy...
US-9,411,971 Automatically preventing unauthorized signatories from executing electronic documents for organizations
In some embodiments, an electronic signature service automatically updates electronic documents to prevent execution by an unauthorized signatory. The...
US-9,411,970 Sealing secret data with a policy that includes a sensor-based constraint
Technologies pertaining to limiting access to secret data through utilization of sensor-based constraints are described herein. A sensor-based constraint is a...
US-9,411,969 System and method of assessing data protection status of data protection resources
There are provided a method, system and service for computerized managing a plurality of data protection (DP) resources. The method comprises: accommodating...
US-9,411,968 Apparatus and method for performing different cryptographic algorithms in a communication system
A communication apparatus performs encryption on data transmitted from another communication apparatus by using first or second cryptographic algorithm, or...
US-9,411,967 Systems and methods for managing location data and providing a privacy framework
A computer-implemented method includes providing a user interface on an internet-protocol (IP) connected mobile device, the user interface configured to receive...
US-9,411,966 Confidential data access and storage
A system is described for managing storage and access of confidential data downloaded from a server (e.g., an enterprise data server) onto a mobile device. The...
US-9,411,965 Methods and systems for improved risk scoring of vulnerabilities
A security tool can identify vulnerabilities in a computing system and determine a risk level of the vulnerabilities based on base and optional CVSS vectors and...
US-9,411,964 Characterizing, detecting and healing vulnerabilities in computer code
An example process includes identifying, by one or more processing devices, a location in computer code that is subject to vulnerability, where the location...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.