Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,489,564 Method and apparatus for prioritizing image quality of a particular subject within an image
A device capable of digital imaging detects multiple faces in image data received from an image sensor, performs pattern recognition to check if at least one of...
US-9,489,563 Method and arrangement for identifying a difference between a first 3D model of an environment and a second 3D...
The invention relates to a method for identifying a difference between a first 3D model of an environment and a second 3D model of the environment. The first...
US-9,489,562 Image processing method and apparatus
The invention is an image processing method and an apparatus for automatic categorization of elements in an image of a body fluid sample, the apparatus...
US-9,489,561 Method and system for estimating fingerprint pose
A method and system for estimating a fingerprint pose are provided. The method includes following steps. A fingerprint image to be estimated is input, features...
US-9,489,560 On-the go touchless fingerprint scanner
On-the-go fingerprint scanners and methods of capturing fingerprints on-the-go are disclosed. In some aspects, the on-the-go fingerprint scanner can include a...
US-9,489,559 Electronic device with fingerprint sensing system and conducting housing
The present invention relates to an electronic device comprising a fingerprint sensing system including a plurality of sensing elements, each being configured...
US-9,489,558 Bar code reading terminal with video capturing mode
A bar code reading terminal can, in one embodiment, include a two-dimensional image sensor and an imaging assembly. The terminal can be configured, in response...
US-9,489,557 Decodable indicia reading terminal with optical filter
A decodable indicia reading terminal can comprise a housing including a housing window, a multiple pixel image sensor disposed within the housing, an imaging...
US-9,489,556 Scanner notifications
A scanner notification indicates an operational status of the scanner, such as a hand-held scanner used at a point-of-sale or as part of an inventory-tracking...
US-9,489,555 Laser scanning code symbol reading system employing programmable decode time-window filtering
A method and system for reading code symbols using a code symbol reading system having a programmable decode time-window filter mode of operation. During this...
US-9,489,554 Arrangement for and method of assessing efficiency of transactions involving products associated with...
A reader electro-optically reads symbols associated with products to obtain read data, and a controller decodes the read data to obtain symbol data indicative...
US-9,489,553 Method and apparatus for recording status of shippable goods
An apparatus includes a packaging supporter including a base having a top surface, an imaging device that is oriented and adapted to capture an image of a...
US-9,489,552 RFID timing system and method with integrated event participant location tracking
A system and method for determining and tracking a location of a participant traveling along a route wherein the participant being tracked with an RFID tag...
US-9,489,551 Method for reading data stored in an electronic device for a tyre
A method is provided for reading data relating to a tire, in which the data is stored in an electronic device integrated into the tire, and in which the tire is...
US-9,489,550 Positioning systems and methods
Manufacturing systems and methods are disclosed. In one example, a system includes a track to be positioned proximate a structure. The track has a length...
US-9,489,549 Implant telemetry with dynamic tuning
Systems and methods for maximizing the resonance frequency match between a reader and a controlled device interacting over a narrowband inductive link involve,...
US-9,489,548 Magnetic stripe reader with card swipe information feedback
A magnetic card reader module includes a magnetic sensor and an adjacent groove, a micro controller and an application. The magnetic sensor is configured to...
US-9,489,547 Card reader
A card reader may include a card insertion port; a card conveying passage; and a card lock mechanism. The card lock mechanism may include a motor; a rotation...
US-9,489,546 Data input device, data input method and computer readable storage medium
A data input device includes a determination unit, a generation/selection unit and a storage control unit. The determination unit determines whether a...
US-9,489,545 Apparatus, system, and method for protecting electronic devices in a virtual perimeter
Described herein are apparatus, system, and method for protecting electronic devices through the creation of a virtual perimeter among the electronic devices....
US-9,489,544 Data communication authentication system for vehicle gateway apparatus for vehicle data communication system...
A vehicular data communication system includes an authentication device for authenticating an external tool connected to a bus, an authentication control device...
US-9,489,543 Supporting port security on power-over-Ethernet enabled ports
Embodiments of the present invention include systems and methods for controlling power delivery to a port in a power sourcing equipment. The power sourcing...
US-9,489,542 Split-key arrangement in a multi-device storage enclosure
Apparatus and method for data security in a multi-device data storage enclosure. In some embodiments, the storage enclosure has a housing with opposing first...
US-9,489,541 Content protection via online servers and code execution in a secure operating system
A computer system comprising a processor and a memory for storing instructions, that when executed by the processor performs a copy protection method. The copy...
US-9,489,540 Memory controller with encryption and decryption engine
A method of operating a system on chip (SoC) includes converting plain data into cipher data by using an encryption key and transmitting the cipher data...
US-9,489,539 Allowing first module of computer code received from vendor to make use of service provided by second module...
A system for integrating modules of computer code may include a sandbox validator for receiving a first module and verifying that the first module complies with...
US-9,489,538 Role-based anonymization
A data anonymization system provides role-based anonymization for data requesters. The system applies a base anonymization function to subscriber data related...
US-9,489,537 Personal information protection for navigation systems
Arrangements related to the protection of personal information associated with a navigation system are described. The navigation system can be operatively...
US-9,489,536 System and method for secure reciprocal exchange of data
A social media computer system and method for transmission of data between a first mobile phone and a second mobile phone includes a database that is configured...
US-9,489,535 Retrieval of data across multiple partitions of a storage device using digital signatures
A system and method for exchanging data among partitions of a storage device is disclosed. For example, data stored in a first partition is exchanged with an...
US-9,489,534 Multi-level security system for enabling secure file sharing across multiple security levels and method thereof
A multi-level security system includes a storage medium partitionable into a plurality of partitions, a file system coupleable to the plurality of partitions,...
US-9,489,533 Efficient memory utilization in a dispersed storage system
A method for improving memory utilization in a dispersed storage network (DSN). After a data object is received for storage in the DSN, it is determined whether...
US-9,489,532 Fast access rights checking of configured structure data
Methods for product data management and corresponding systems and computer-readable mediums. A method includes receiving a hierarchical data structure that...
US-9,489,531 System and method for controlling access to electronic devices
A computer implemented method for controlling access to an electronic media source is disclosed. An access control system receives achievement goals and degree...
US-9,489,530 Methods and apparatus for anonymising user data by aggregation
In one aspect of a method of anonymizing user data by aggregation, at least one server-side device receives an anonymous aggregation command from a user client...
US-9,489,529 Data security system
Various exemplary embodiments relate to a method of identifying unauthorized access to a data file on an unauthorized machine. The method includes: modifying...
US-9,489,528 Single use recovery key
Aspects of the subject matter described herein relate to disclosing recovery keys. In aspects, when a recovery key is disclosed, data is updated to indicate...
US-9,489,527 Content provider with multi-device secure application integration
Methods and systems for providing access to content are disclosed. The method is performed at least in part at a client computer system having a processor and...
US-9,489,526 Pre-analyzing served content
A computer-implemented method includes identifying first code for a content that has not been analyzed for purposes of transforming the first code before...
US-9,489,525 Secure storage system
A storage system includes a plurality of drives that write and read data to and from removable storage media communicatively connected to a storage controller....
US-9,489,524 Intra-application permissions on an electronic device
Various embodiments are provided in which intra-application permissions may be granted on an electronic device. An application may access data from another...
US-9,489,523 Systems and methods for file access auditing
Systems and methods for providing an auditing file system for theft-prone devices are disclosed. The auditing file system supports fine-grained file auditing: a...
US-9,489,522 Method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ECDSA)...
Described is system for generation of elliptic curve digital signature algorithm (ECDSA) based digital signatures. A Secret-Share protocol is initialized...
US-9,489,521 Format preserving encryption methods for data strings with constraints
Format preserving encryption (FPE) cryptographic engines are provided for performing encryption and decryption on strings. A plaintext string may be converted...
US-9,489,520 Decryption and encryption of application data
Examples disclose providing a decryption, validation and encryption process. Specifically, disclosure includes decrypting a first encrypted application data to...
US-9,489,519 Method and apparatus for encrypting data messages after detecting infected VM
For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by...
US-9,489,518 Method and device for unlocking screen
A method for unlocking a screen of a device, including: detecting an inputting operation on the device for inputting an unlock password, the inputting operation...
US-9,489,517 Determining an attack surface of software
A method of determining an attack surface of software may include generating a platform for testing at least one deployment of software code, identifying...
US-9,489,516 Detection of malware using an instrumented virtual machine environment
Various techniques for detection of malware using an instrumented virtual machine environment are disclosed. In some embodiments, detection of malware using an...
US-9,489,515 System and method for blocking the transmission of sensitive data using dynamic data tainting
Blocking transmission of tainted data using dynamic data tainting is described. For example, sensitive information is stored on a client device as tainted data....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.