At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and apparatus for prioritizing image quality of a particular
subject within an image
A device capable of digital imaging detects multiple faces in image data received from an image sensor, performs pattern recognition to check if at least one of...
Method and arrangement for identifying a difference between a first 3D
model of an environment and a second 3D...
The invention relates to a method for identifying a difference between a first 3D model of an environment and a second 3D model of the environment. The first...
Image processing method and apparatus
The invention is an image processing method and an apparatus for automatic categorization of elements in an image of a body fluid sample, the apparatus...
Method and system for estimating fingerprint pose
A method and system for estimating a fingerprint pose are provided. The method includes following steps. A fingerprint image to be estimated is input, features...
On-the go touchless fingerprint scanner
On-the-go fingerprint scanners and methods of capturing fingerprints on-the-go are disclosed. In some aspects, the on-the-go fingerprint scanner can include a...
Electronic device with fingerprint sensing system and conducting housing
The present invention relates to an electronic device comprising a fingerprint sensing system including a plurality of sensing elements, each being configured...
Bar code reading terminal with video capturing mode
A bar code reading terminal can, in one embodiment, include a two-dimensional image sensor and an imaging assembly. The terminal can be configured, in response...
Decodable indicia reading terminal with optical filter
A decodable indicia reading terminal can comprise a housing including a housing window, a multiple pixel image sensor disposed within the housing, an imaging...
A scanner notification indicates an operational status of the scanner, such as a hand-held scanner used at a point-of-sale or as part of an inventory-tracking...
Laser scanning code symbol reading system employing programmable decode
A method and system for reading code symbols using a code symbol reading system having a programmable decode time-window filter mode of operation. During this...
Arrangement for and method of assessing efficiency of transactions
involving products associated with...
A reader electro-optically reads symbols associated with products to obtain read data, and a controller decodes the read data to obtain symbol data indicative...
Method and apparatus for recording status of shippable goods
An apparatus includes a packaging supporter including a base having a top surface, an imaging device that is oriented and adapted to capture an image of a...
RFID timing system and method with integrated event participant location
A system and method for determining and tracking a location of a participant traveling along a route wherein the participant being tracked with an RFID tag...
Method for reading data stored in an electronic device for a tyre
A method is provided for reading data relating to a tire, in which the data is stored in an electronic device integrated into the tire, and in which the tire is...
Positioning systems and methods
Manufacturing systems and methods are disclosed. In one example, a system includes a track to be positioned proximate a structure. The track has a length...
Implant telemetry with dynamic tuning
Systems and methods for maximizing the resonance frequency match between a reader and a controlled device interacting over a narrowband inductive link involve,...
Magnetic stripe reader with card swipe information feedback
A magnetic card reader module includes a magnetic sensor and an adjacent groove, a micro controller and an application. The magnetic sensor is configured to...
A card reader may include a card insertion port; a card conveying passage; and a card lock mechanism. The card lock mechanism may include a motor; a rotation...
Data input device, data input method and computer readable storage medium
A data input device includes a determination unit, a generation/selection unit and a storage control unit. The determination unit determines whether a...
Apparatus, system, and method for protecting electronic devices in a
Described herein are apparatus, system, and method for protecting electronic devices through the creation of a virtual perimeter among the electronic devices....
Data communication authentication system for vehicle gateway apparatus for
vehicle data communication system...
A vehicular data communication system includes an authentication device for authenticating an external tool connected to a bus, an authentication control device...
Supporting port security on power-over-Ethernet enabled ports
Embodiments of the present invention include systems and methods for controlling power delivery to a port in a power sourcing equipment. The power sourcing...
Split-key arrangement in a multi-device storage enclosure
Apparatus and method for data security in a multi-device data storage enclosure. In some embodiments, the storage enclosure has a housing with opposing first...
Content protection via online servers and code execution in a secure
A computer system comprising a processor and a memory for storing instructions, that when executed by the processor performs a copy protection method. The copy...
Memory controller with encryption and decryption engine
A method of operating a system on chip (SoC) includes converting plain data into cipher data by using an encryption key and transmitting the cipher data...
Allowing first module of computer code received from vendor to make use of
service provided by second module...
A system for integrating modules of computer code may include a sandbox validator for receiving a first module and verifying that the first module complies with...
A data anonymization system provides role-based anonymization for data requesters. The system applies a base anonymization function to subscriber data related...
Personal information protection for navigation systems
Arrangements related to the protection of personal information associated with a navigation system are described. The navigation system can be operatively...
System and method for secure reciprocal exchange of data
A social media computer system and method for transmission of data between a first mobile phone and a second mobile phone includes a database that is configured...
Retrieval of data across multiple partitions of a storage device using
A system and method for exchanging data among partitions of a storage device is disclosed. For example, data stored in a first partition is exchanged with an...
Multi-level security system for enabling secure file sharing across
multiple security levels and method thereof
A multi-level security system includes a storage medium partitionable into a plurality of partitions, a file system coupleable to the plurality of partitions,...
Efficient memory utilization in a dispersed storage system
A method for improving memory utilization in a dispersed storage network (DSN). After a data object is received for storage in the DSN, it is determined whether...
Fast access rights checking of configured structure data
Methods for product data management and corresponding systems and computer-readable mediums. A method includes receiving a hierarchical data structure that...
System and method for controlling access to electronic devices
A computer implemented method for controlling access to an electronic media source is disclosed. An access control system receives achievement goals and degree...
Methods and apparatus for anonymising user data by aggregation
In one aspect of a method of anonymizing user data by aggregation, at least one server-side device receives an anonymous aggregation command from a user client...
Data security system
Various exemplary embodiments relate to a method of identifying unauthorized access to a data file on an unauthorized machine. The method includes: modifying...
Single use recovery key
Aspects of the subject matter described herein relate to disclosing recovery keys. In aspects, when a recovery key is disclosed, data is updated to indicate...
Content provider with multi-device secure application integration
Methods and systems for providing access to content are disclosed. The method is performed at least in part at a client computer system having a processor and...
Pre-analyzing served content
A computer-implemented method includes identifying first code for a content that has not been analyzed for purposes of transforming the first code before...
Secure storage system
A storage system includes a plurality of drives that write and read data to and from removable storage media communicatively connected to a storage controller....
Intra-application permissions on an electronic device
Various embodiments are provided in which intra-application permissions may be granted on an electronic device. An application may access data from another...
Systems and methods for file access auditing
Systems and methods for providing an auditing file system for theft-prone devices are disclosed. The auditing file system supports fine-grained file auditing: a...
Method for secure and resilient distributed generation of elliptic curve
digital signature algorithm (ECDSA)...
Described is system for generation of elliptic curve digital signature algorithm (ECDSA) based digital signatures. A Secret-Share protocol is initialized...
Format preserving encryption methods for data strings with constraints
Format preserving encryption (FPE) cryptographic engines are provided for performing encryption and decryption on strings. A plaintext string may be converted...
Decryption and encryption of application data
Examples disclose providing a decryption, validation and encryption process. Specifically, disclosure includes decrypting a first encrypted application data to...
Method and apparatus for encrypting data messages after detecting infected
For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by...
Method and device for unlocking screen
A method for unlocking a screen of a device, including: detecting an inputting operation on the device for inputting an unlock password, the inputting operation...
Determining an attack surface of software
A method of determining an attack surface of software may include generating a platform for testing at least one deployment of software code, identifying...
Detection of malware using an instrumented virtual machine environment
Various techniques for detection of malware using an instrumented virtual machine environment are disclosed. In some embodiments, detection of malware using an...
System and method for blocking the transmission of sensitive data using
dynamic data tainting
Blocking transmission of tainted data using dynamic data tainting is described. For example, sensitive information is stored on a client device as tainted data....