At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Person recognition apparatus and method thereof
According to one embodiment, an apparatus includes input unit, detecting unit, extraction unit, storage, selection unit, determination unit, output unit, and...
Cell monitoring device, cell monitoring method and program thereof
A cell monitoring device includes an outline detecting section that detects edge pixels from a cell image in a captured image of cells arranged in a single...
Method using a touchpad for controlling a computerized system with
epidermal print information
Methods of processing touchpad data are disclosed. The touchpad data indicates one or more areas of the touch pad contacted by a user, and indicates print...
Portable device including a fingerprint scanner and method of controlling
A portable device including a display unit, a control button and a controller. The display unit displays an execution screen of an application of the portable...
Guided fingerprint enrolment
In a fingerprint sensing system, a determination is made of a center of attention, COA, point. The COA point is a point on a finger of a user that is likely to...
Method and device for dual lens fingerprint identification
A dual lens fingerprint identification method comprises following steps. A first fingerprint image and a second fingerprint image of a finger in contact with a...
Finger biometric sensing device including drive signal nulling circuitry
and related methods
A finger biometric sensing device may include drive circuitry capable of generating a drive signal and an array of finger biometric sensing pixel electrodes...
Mutual-capacitance palm print identification method, mutual-capacitance
palm print identification device and...
Provided is a mutual-capacitance palm print identification method, a mutual-capacitance palm print identification device and a mutual-capacitance palm print...
Adaptive fingerprint-based navigation
A fingerprint-based navigation method using a finger navigation system comprising fingerprint sensing circuitry and navigation control circuitry. The method...
System and method to manipulate an image
A method of operating an image reader typically includes: searching a digital image for nominally straight edges; characterizing the nominally straight edges in...
System for and method of accurately determining true bearings of radio
frequency identification (RFID) tags...
A radio frequency (RF) identification (RFID) tag reading system and method accurately determine true bearings of RFID tags associated with items in a controlled...
Systems and methods for scanning a user environment and evaluating data of
According to various embodiments, a mobile device continuously and/or automatically scans a user environment for tags containing non-human-readable data. The...
Systems and methods to determine motion parameters using RFID tags
Systems and methods to determine motion parameters of physical objects using radio frequency identification (RFID) tags attached to the objects. In one...
Verifying panelist identity
A personal identification process executed by a processor includes receiving personal identification data; encoding, by the processor, the received personal...
Encoded information reading terminal including multiple encoded
information reading devices
An encoded information reading (EIR) terminal can comprise a microprocessor, a memory, a communication interface, and a plurality of EIR devices. Each EIR...
Communication device, communication system, image presentation method, and
A communication device including an image capturing device having a RF-ID unit for performing proximity wireless communication with a RF-ID reader/writer...
Device for aiding the location in real time of a self-powered mobile
A device aimed for locating in real time self-powered mobile elements by electromagnetic radiation, includes elements (505, 520) for receiving a radioelectric...
Restraining system including near field RFID detection
A restraining system comprises a restraining device including first and second interlockable parts that, when interlocked, restrain the system. The restraining...
Surface acoustic wave tag-based coherence multiplexing
A surface acoustic wave (SAW)-based coherence multiplexing system includes SAW tags each including a SAW transducer, a first SAW reflector positioned a first...
System having an improved user interface for reading code symbols
A system for reading code symbols includes a camera, a user interface system, and a processor communicatively coupled to the camera and the user interface...
Test automation for automated fare management systems
A test robot may receive a test scenario for testing a fare management system. The test robot may program a fare card to store card information based on the...
System and method for detecting barcode printing errors
Barcode verifiers automate the verification process by capturing an image of the printed barcode and analyzing the image according to an industry specification....
Generating an incremental information object
Systems and methods for generating an incremental information object (IIO) from an information object (IO). The method includes analyzing an IO to identify...
Augmented reality numberless transaction card
A method implemented on an augmented reality (AR) electronic device includes receiving a request to activate a transaction card account on a transaction card....
LCL high power combiner
A combiner includes N coaxial cables each configured to connect to a respective output of N radio frequency power amplifiers, where N is an integer greater than...
Method for displaying contents and electronic device thereof
An electronic device is provided. The electronic device includes an output module, a sensing module, and a processor. The output module is configured to output...
Systems, apparatus, methods and computer-readable storage media for
facilitating management of social media...
Systems, apparatus, methods and computer-readable storage media facilitating management of social media (SM) information are provided. In some embodiments, a...
System and method for managing and diagnosing a computing device equipped
with unified extensible firmware...
A computing device equipped with UEFI-compliant firmware is provided with added functionality via an extended firmware interface. The variable interface is...
Method and system for managing processing resources
The present disclosure improves upon existing systems and methods by providing a tool for managing processing resources. For instance, the presently described...
Signature device and signature method
A signature device including a storage unit configured to store moving image data, and a processor configured to extract original metadata from moving image...
Secure application debugging
A method, system, and/or computer program product enables secure debugging of a software application. A first computer receives a secure software application...
Context-based security screening for accessing data
A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with...
Inhibiting access to sensitive vehicle diagnostic data
A vehicle system and method of secure communication between a vehicle and an external device communicating with the vehicle in a diagnostics mode. The method...
Business partner data deletion for privacy
Various embodiments illustrated and described herein include at least one of systems, modules, processes, methods, and software that operate to keep customer,...
Network node security using short range communication
Systems (100) and methods for network node security configuration. The methods involve: performing operations by a mobile communication device (104) to obtain a...
Preserving privacy related to networked media consumption activities
Preserving privacy related to networked media consumption activity. Source privacy zones are defined and associated with privacy standards. Privacy standards...
Methods for centralized privacy-preserving collaborative threat mitigation
One embodiment of the present invention provides a system to facilitate collaboration for mitigating network threats. During operation, the system receives...
Reconciliation of access rights in a computing system
Systems and methods are provide for reconciling access rights of a computing system are described. Access right information that respectively corresponds to...
Configuring a sandbox environment for malware testing
A device may receive a file to be analyzed in a sandbox environment, and may determine configuration information for configuring the sandbox environment. The...
Content modification in served code
In some implementations, a computer system for obfuscating text in an electronic document can include an analysis module, a font data repository, a re-coding...
Event model for correlating system component states
A computing device described herein is configured to receive a notification of an event associated with a plurality of system components. In response, the...
Maintaining secure data isolated from non-secure access when switching
A data processing apparatus including circuitry for performing data processing, a plurality of registers; and a data store including regions having different...
Systems and methods for updating possession factor credentials
The disclosed computer-implemented method for updating possession factor credentials may include (1) detecting a request from a user of a service to designate a...
Digital identity management
One aspect relates to a process and associated device for managing digital ID lifecycles for application programs, and abstracting application programs for...
Electronic device and method for releasing lock using element combining
color and symbol
An electronic device and a method thereof for releasing lock using an element combining color and symbol are provided. In the method, at least two groups...
Controlled and client-side authentication module
A computerized method of accessing a secure resource using an application associated with a user's computing device is provided. The application is programmed,...
Locking and unlocking a mobile device using facial recognition
In an embodiment of the invention, an unlocked mobile device is configured to capture images, analyze the images to detect a user's face, and automatically lock...
Authentication device, authentication method and non-transitory
computer-readable recording medium
To prevent improper authentication, a authentication device includes a visual-line detecting unit configured to detect a visual line direction of a user, an...
Apparatus, system and method for authenticating a plurality of users for a
mobile device using biometric means
A mobile device comprising a touch screen display; at least one processor with computer executable instruction code executable by the at least one processor...
Device, system, and method of detecting multiple users accessing the same
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a possible attacker. The...