At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Construction object detection
Aspects of the disclosure relate to identifying construction objects. As an example, an image captured by a camera associated with a vehicle as the vehicle is...
Method for determining the length of a queue
Method for determining the length of a queue of objects in a predefined region having at least one entrance and at least one exit, in the course of which errors...
Identifying scene boundaries using group sparsity analysis
A method for identifying a set of key video frames from a video sequence comprising extracting feature vectors for each video frame and applying a group...
Augmented reality information system
In various example embodiments, a system and method for providing information in an augmented reality display are provided. In example embodiments, a continuous...
Enhanced information for viewer-selected video object
The user of an Internet-enabled CE device such as a TV can select an object in a video presented on the display of the CE device by either touch sensitive...
Systems and methods for scale invariant 3D object detection leveraging
An example method includes receiving a plurality of templates of a plurality of objects, where a template comprises feature values sampled at corresponding...
Differing region detection system and differing region detection method
The present invention enables detection of a local differing region between images. Inter-image difference information indicating a difference in feature...
Moving object prediction device, hypothetical movable object prediction
device, program, moving object...
A position, behavior state and movement state of a moving object are detected, together with plural categories of track segment region and stationary object...
Gaze tracking and recognition with image location
An image of a person is captured. A left eye image is located in the image. A right eye image is located in the image. A first quantity of left eye white pixels...
Shoe image retrieval apparatus and method using matching pair
Provided are a shoe image retrieval apparatus and method using a matching pair, which can accurately retrieve image information corresponding to an inputted...
Device, system and method for identifying sections of documents
A method for identifying sections of contracts. This method works well with documents that originated from scanned images, i.e., documents that could possibly...
Monitoring system, monitoring method, monitoring program, and recording
medium in which monitoring program is...
A monitoring system for monitoring a target is described. The monitoring system extracts features of a person's face from an image obtained from the face of the...
System and method for eye alignment in video
A system for image manipulation enables an improved video conferencing experience. The system includes a camera; a display screen adjacent to the camera; a...
Object detection device and object detection method
To provide an object detection device and an object detection method in which incorrect grouping based on a range image can be prevented, processing is...
Object recognition for three-dimensional bodies
Various embodiments utilize two-dimensional ("2D") and three-dimensional ("3D") object features for purposes such as object recognition and/or image matching....
Tumor plus adjacent benign signature (TABS) for quantitative
Methods, apparatus, and other embodiments associated with predicting prostate cancer (CaP) progression using tumor cell morphology features and benign region...
Computerized methods for cell-based pattern recognition
Systems and methods relating to a cell-based pattern recognition tool for microscopy images from tissue sections are described, wherein cell features are...
Systems and methods for performing fingerprint based user authentication
using imagery captured using mobile...
Technologies are presented herein in support of a system and method for performing fingerprint recognition. Embodiments of the present invention concern a...
Optical prism module
The present invention relates to an optical prism module, comprising a collection surface arranged on the top of the optical prism module; a basal plane...
Ultrasonic fingerprint authentication based on beam forming
An ultrasonic finger print authentication system that generates a three-dimensional representation of a fingerprint. High frequency sound waves are used as a...
Vehicle information inspecting apparatus
A vehicle information inspecting apparatus installed on a vehicle body moving line for moving a vehicle body on which a vehicle identification number (VIN) is...
Chip on board based highly integrated imager
An apparatus for use in decoding a bar code symbol may include an image sensor integrated circuit having a plurality of pixels, timing and control circuitry for...
Indicia reading terminal with color frame processing
An indicia reading terminal can comprise an image sensor integrated circuit having a two-dimensional image sensor, a hand held housing encapsulating the...
Radio frequency identification system for use with an assembly line
A radio frequency identification system, and method of operation thereof, provides: a sensor for sensing the absence or presence of a radio frequency...
Low-energy radio frequency tag for performing a vehicle function
A low-energy transceiver tag is described, as well as methods of using the low-energy transceiver tag to enable secure communication with a vehicle. The...
Apparatus and method for identifying and localizing objects
An apparatus (10) for identifying and localizing objects (22) is provided having a position determination device (14) for determining object positions and...
RFID system and a method for manipulating passive RFID tags
A method, comprising: sending, by a radio frequency identification (RFID) reader, an identification request to an RFID tag; wherein the RFID tag is positioned...
Locating device for evaluating the distance between an RFID label and an
A locating device for determining a distance of an RFID tag with respect to an interface between two media comprising an inductive coupling antenna and a sensor...
RFID tag facility with access to a sensor
In embodiments of the present invention improved capabilities are described for a stand-alone RFID sensor apparatus comprising a passive radio frequency...
Point of sale inductive systems and methods
Systems and methods for the identification, powering and control of products and product packaging. The systems can include a point of sale display having a...
Card reader having discriminator contact
A card reader for a point-of-sale system that is configured to accept both magnetic strip-type and integrated circuit (IC) chip-type payment cards. The card...
Systems, apparatus, methods and computer-readable storage media for
facilitating integrated messaging, contacts...
Systems, apparatus and methods are provided. In some embodiments, a computer-implemented method is provided. The computer-implemented method can include...
Method and apparatus for securing computer mass storage data
In general, embodiments of the invention include methods and apparatuses for securely storing computer system data. Embodiments of the invention encrypt and...
Nonvolatile memory and electronic device
The embodiments of the present invention disclose a nonvolatile memory and an electronic device, where each time the nonvolatile memory is powered on, an...
Multiprocessor fabric having configurable communication that is
selectively disabled for secure processing
Disabling communication in a multiprocessor fabric. The multiprocessor fabric may include a plurality of processors and a plurality of communication elements...
Page substitution verification preparation
A system and method are disclosed for rendering published documents tamper evident. Embodiments render classes of documents tamper evident with cryptographic...
Secure data synchronization
Techniques for secure data synchronization are described. In one or more implementations, techniques may be employed to conserve high cost data storage by...
Privacy leakage protection
A client device securely transfers personal information to a third-party website. The client device stores personal information of a user and encrypts personal...
Systems and methods for providing file access in a hybrid cloud storage
A method for providing access to objects associated with a particular client in a cloud storage system is disclosed. The method includes the steps of...
Over network operation restriction enforcement
The enforcement of operation restriction on a file system entity over a network. The file system entity exists on a server (which could be a single machine, a...
Filesystem access for web applications and native code modules
One embodiment provides a system that facilitates the execution of a web application. During operation, the system allocates a storage space on one or more...
Personal electronic device and data theft prevention system and method
Data theft prevention technology for a personal electronic device is provided. When an internet-communication address of the personal electronic device is...
Data storage management
A method of data storage management. A server receives a data upload request from a remote client, the upload request including information identifying the data...
Systems and methods for secure and persistent retention of sensitive
An information processing system provisions a client account for a user to enable a client computer associated with the user to store information in an elastic...
Protecting operating system configuration values using a policy
identifying operating system configuration settings
In a pre-operating system environment on a device prior to loading and running an operating system on the device, a policy identifying configuration settings...
Method and system for defending security application in a user's computer
Protecting the integrity and the effectiveness of a security agent that is installed in a user's device while the user's device operates online or offline. The...
Account management services for load balancers
A configurable load balancer can be utilized in a multi-tenant environment, where the load balancer can incorporate, or utilize, an account management service...
Method and system for real time classification of events in computer
Method and system using a designated known secure computer for real time classification of change events in a computer integrity system are disclosed. In the...
Anti-rootkit systems and methods
According to one aspect, a dynamic binary instrumentation (DBI) framework is used to identify rootkits and disable their malicious functionality. A user-mode or...
Detection of malicious code insertion in trusted environments
Methods and computer program products which facilitate detection of malicious code insertion by an insider during the software development lifecycle are...