At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Identity verification using biometric data
A method for identity verification using biometric data is disclosed herein. The method comprises receiving, by a processor, an image of an identification...
Pose determination from a pattern of four LEDs
The present invention relates to the field of computation and covers methods to find one to one mapping between fiducial markers on a tracked object and...
System and method for facial recognition using images captured from a
target illuminated with infrared light
Various implementations of the invention perform facial recognition on a target image compared against a color image from an image gallery, where the target...
Organizing images by correlating faces
A computer-implemented method for organizing images including receiving an image that includes a representation of a human face; generating a correlation value...
A system for processing an image of a human face, the system including a data processing and analyzing utility including a high-pass filtering module outputting...
Providing drawing assistance using feature detection and semantic labeling
Methods for providing drawing assistance to a user sketching an image include geometrically correcting adjusting user strokes to improve their placement and...
Face recognition apparatus and method using plural face images
A face recognition apparatus and method using plural face images includes detecting a reference face image from an image input for registration in advance,...
Face detection apparatus, face detection method, and program
A face detection apparatus detecting a face from an image including the face of a target person in a region imaged by an imaging unit, includes: a model fitting...
Face detection device, imaging apparatus and face detection method
A face detection device for detecting the face of a person in an input image may include the following elements: a face detection circuit including a hardware...
Network-based pathology system with desktop slide scanner
A method for processing, saving and viewing a digital image of a microscope slide includes inserting a microscope slide into a digital slide scanner connected...
Image processing apparatus, biometric authentication apparatus, and image
An image processing apparatus includes a light source to irradiate light on an object, an imaging device to capture the object, a luminance computing unit to...
Ring-type mobile terminal
A ring-type terminal including a main body configured to be placed on and surround a user's finger and including an insertion region in which the finger is...
Stack barcode reader and stack barcode reading method
A stack barcode reader may include an imager configured to image the stack barcode; an image memory configured to store an image datum of the stack barcode; and...
Low profile illumination for direct part mark readers
An industrial reader is provided with an image formation system that is particularly adapted to read bar codes and two-dimensional symbols marked directly on...
Identifying one- or two-dimensional bar codes via weighted image data
A method for identifying a one- or two-dimensional barcode in input image data, the method comprising the steps of: obtaining first image data of a first image...
Two-dimensional representation of linear barcode derived from laser
barcode scanner scanline data
Disclosed is a linear barcode scanning system and associated methods for reading a linear barcode borne by an item during transport of the item along a...
Method for authenticating an RFID tag
A method for authenticating an RFID tag with the aid of an RFID reader via a radio interface, wherein a user-specific key is stored in the RFID reader and a...
System and method to detect an event associated with a person relative to
A system and method to detect an event associated with a first object relative to a second object and a support is provided. The system can include an antenna...
Integrated timing system and method having a highly portable RFID tag
reader with GPS location determination
A system and method for determining a time of an event participant passing a detection point having a participant identifier number by a proximity detector at a...
Use of a tag and reader antenna for a simulated theremin effect
The present disclosure provides methods and apparatuses for providing an audible feedback based on a proximity or a link quality between an external reader and...
Method for interaction of a data carrier with an end device
A method is provided for interaction of a portable data carrier with an end device. The data carrier comprises a transducer arrangement having at least one or a...
Information bearing medium and information processing system
An information processing system includes an information bearing medium and an information reading unit. The information bearing medium has a two-dimensional...
Arrangement for and method of assessing a cause of poor electro-optical
reading performance by displaying an...
A reader electro-optically reads symbols by image capture to obtain read data, and a controller processes symbol images of the symbols captured by the reader,...
Analog integrator system and method
Systems and methods are disclosed to integrate signals. Some embodiments include an integrator comprising an active input; a passive input; a first integrator...
Removable storage device data protection
Devices, methods and products are described that provide removable storage device data protection. One aspect provides a method comprising: ascertaining a...
Target of opportunity recognition during an encryption related process
A method, system, and computer program product are provided for utilizing target of opportunity to perform at least one special operation while a key session is...
Polymorphic virtual appliance rule set
A domain manager system as disclosed herein can control the selective activation of multiple independently-operable execution environments or domains on a...
Sharing user-generated notes
A method for sharing notes created in a multilayered document among users of a social network within a digital education platform is provided. In one...
Systems, methods, and computer program products for managing access
Systems, methods, and computer program products are provided for managing access control. A first set of access control rules is stored in a memory of mobile...
Methods and systems for managing access to data in an on-demand system
Data category visibility are defined at the permission set and profile levels so that users who may not be assigned a role can have the data filtered by data...
Secure cloud storage distribution and aggregation
Methods and systems for secure cloud storage are provided. According to one embodiment, a trusted gateway device establishes and maintains multiple...
Client computer for querying a database stored on a server via a network
The invention relates to a client computer for querying a database stored on a server via a network, the server-being coupled to the client computer via the...
Role based notifications in a modular learning system
A system and method is disclosed for providing role based notifications to users of the modular learning system (MLS). The modular learning system includes a...
Providing path-level access control for structured documents stored in a
An improved method and system for providing path-level access control to a structured document in a collection stored in a database, where the structured...
Integrated data deduplication and encryption
The subject disclosure is directed towards encryption and deduplication integration between computing devices and a network resource. Files are partitioned into...
Sharing digital libraries
In some implementations, a first user associated with a first user account may send a request to exchange digital libraries with a second user associated with a...
System and method for sharing of data securely between electronic devices
A system for securely sharing data and conducting transactions in an electronic environment. The system may include a personal information device having a...
Authenticating a replaceable printer component
A replaceable printer component includes a first memory device and a communication link. The first memory device is configured to store a first secret. The...
Method for routing a message
A method for routing at least one message, this method being implementation-dependent on a trusted operating system of an electronic device comprising an...
Systems and methods for applying parental-control approval decisions to
A computer-implemented method for applying parental-approval decisions to user-generated content. The method may include receiving, from a child, a request to...
Electronic signing methods, systems, and apparatus
Methods, apparatus, and systems for generating digital signatures are disclosed. An apparatus may present itself to a host computer as a mass storage device to...
Automatically generate attributes and access policies for securely
processing outsourced audit data using...
Methods, systems, and computer-readable storage media for secure storage of and selective access to encrypted audit data. Implementations include actions of...
Secure data transmission and verification with untrusted computing devices
Techniques from the proposed invention relate to providing enhanced security. For example, techniques described herein allow a computer system, such as a mobile...
Method and apparatus providing privacy benchmarking for mobile application
A method operates, during development of an application program intended to be run on a mobile user device, to perform a computer assisted analysis of the...
Software inspection system
A method for software inspection analyzes a body of computer code to assess whether the body of computer code contains malware. Various embodiments extract the...
Detecting return-oriented programming payloads by evaluating data for a
gadget address space address and...
Systems, methods, and media for detecting the presence of return-oriented programming (ROP) payloads are provided, comprising; identifying a potential gadget...
Method and system for monitoring calls to an application program interface
A method and device for monitoring calls to an application program interface (API) function includes monitoring for a memory permission violation of a computing...
Method and system for protection against information stealing software
A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is...
Graduated enforcement of restrictions according to an application's
Security software on a client observes a request for a resource from an application on the client and then determines the application's reputation. The...
Adaptive observation of behavioral features on a mobile device
Methods, devices and systems for detecting suspicious or performance-degrading mobile device behaviors intelligently, dynamically, and/or adaptively determine...