Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,519,832 Parking camera system and method of driving the same
A parking camera system and a method of driving the same includes a plurality of cameras equipped with a vehicle, an image synthesizer for synthesizing images...
US-9,519,831 Method and apparatus for detecting generalized passerby by utilizing features of a wheel and upper body
A method for detecting a generalized passerby includes: acquiring an input image; determining whether a preset common feature of a wheel exists in the input...
US-9,519,830 Ophthalmologic image processing method and storage medium storing program for executing the method
An ophthalmic image processing method includes: acquiring information about characteristics of an examinee's eye including corneal information about the corneal...
US-9,519,829 Image processing system, information processing apparatus, and recordable medium
An image processing system comprises a generating unit that reads documents and generates a read image including document images; an extracting unit that...
US-9,519,828 Isolate extraneous motions
A system may receive image data and capture motion with respect to a target in a physical space and recognize a gesture from the captured motion. It may be...
US-9,519,827 Personalized, automated receptionist
Methods, systems, and computer program products for creating a personalized, automated receptionist are provided herein. A method for providing an automated...
US-9,519,826 Automatic image product creation for user accounts comprising large number of images
A computer-implemented method of grouping faces in large user account for creating an image product includes adding the face images obtained from an image album...
US-9,519,825 Determining access permission
An access permission level for a first individual may be calculated by utilizing repositories of social network databases. The facial image of a first...
US-9,519,824 Method for enabling authentication or identification, and related verification system
The invention relates to a method for enabling the authentication or identification of a person (1) using a first electronic device (2) comprising an...
US-9,519,823 Biomarker method
In a technique for quantifying the spatial distribution of cells or sub-cellular structures, image data representing a spatial map of biomarkers is processed to...
US-9,519,822 Determination method, determination device, determination system, and computer program
A determination method for determining reliability of a selective binding amount of a substance to be examined obtained as detection intensity of a label when a...
US-9,519,821 Methods and systems for capturing biometric data
A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an...
US-9,519,820 Methods and systems for authenticating users
A method of authenticating users is provided that includes capturing biometric authentication data of a user and processing the captured biometric data into an...
US-9,519,819 Method and electronic device for noise mitigation
The present invention generally relates to a method for removing disturbances in an image captured by a fingerprint sensor, and specifically to reduction of...
US-9,519,818 Methods and systems for capturing biometric data
A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an...
US-9,519,817 Method for digitizing barcode image by using dynamic threshold
After capturing a barcode image, generate at least one sample line accordingly, acquire sample data of the at least one sample line, generate a first and a...
US-9,519,816 Method and apparatus for optimizing optical code scanning
An optical code scanner is presented that includes multiple scanning windows for reading an optical code where each scanning window can be optimized for reading...
US-9,519,815 Optical indicia reading terminal with color image sensor
An optical indicia reading terminal can comprise a microprocessor, a memory, and an image sensor integrated circuit for decoding decodable indicia. The image...
US-9,519,814 Portable data terminal
A portable data terminal that includes a housing and an environmentally responsive device for collecting data about the environment surrounding the housing. The...
US-9,519,813 Proper installation determination based on RFID
A radio frequency identification (RFID) transceiver may be associated with an identification proximity to identify an RFID tag associated with a component. A...
US-9,519,812 Managing a sphere of wireless tags
A method for managing a sphere of wireless tags, the method comprises programming, by a wireless reader, a group of wireless tags to belong to the sphere of...
US-9,519,811 System and method for reading RFID tags across a portal
Method and system for reading radio frequency identification (RFID) tags in a portal system comprises performing a first detection and a second detection of the...
US-9,519,810 Calibration and self-test in automated data reading systems
Calibrating extrinsic parameters of an imaging system in an automated data reading system includes obtaining, from the imaging system, image data representing...
US-9,519,809 Systems, methods, and apparatuses for associating flexible internet based information with physical objects
Systems, apparatuses and methods for associating flexible Internet based information with physical objects is described. An example system includes a database...
US-9,519,808 Method and apparatus for protecting data in a portable electronic device
Data in a portable electronic device is protected by using external and internal status detection means to determine if the device is misplaced, lost, or...
US-9,519,807 Hash generation circuitry and methods for multi-channel, multi-lane encryption and authentication
Encryption/authentication circuitry includes an authentication portion operating on a plurality of lanes of encrypted data spanning a number of channels, and...
US-9,519,806 Domain-specific hardwired web server machine
A domain-specific hardwired symbolic web server machine is described that processes information via the hardwired mapping of symbols from one or more domains...
US-9,519,805 Digest obfuscation for data cryptography
Execution of an obfuscation application may cause a computing device to translate bits of a hashed value according to a sparse bit selection pattern, the sparse...
US-9,519,804 Domain-specific hardwired symbolic machine that validates and maps a symbol
A domain-specific hardwired symbolic machine is disclosed that processes information via the flexible formation and hardwired mapping of symbols from one or...
US-9,519,803 Secure environment for graphics processing units
In accordance with some embodiments, a protected execution environment may be defined for a graphics processing unit. This framework not only protects the...
US-9,519,802 Systems and methods for document and data protection
The present disclosure includes a method comprising encrypting sensitive data, generating a token comprising a data identifier, tokenizing the encrypted...
US-9,519,801 Systems, methods, and apparatuses for implementing data masking via compression dictionaries
In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing data masking via compression dictionaries...
US-9,519,800 Device and method for online storage, transmission device and method, and receiving device and method
A device and a method for online storage, device and method for searching for similar content, a device and a method of transmission and a device and a method....
US-9,519,799 Dynamic determination of access rights
A method of dynamically determining the access rights of a client to a record comprises receiving an access request from the client with respect to the record,...
US-9,519,798 Zero-knowledge databases
Provided is a process of operating a zero-knowledge encrypted database, the process including: obtaining a request for data in a database stored by an untrusted...
US-9,519,797 Secure database searching
Methods and systems for securely storing data in a database are described herein. According to an aspect, a technique may include receiving data to be stored,...
US-9,519,796 Systems and methods for electronic ticket management
A computer system according to certain aspects uses past ticket usage data indicating a probability that a respective entity would personally use a ticket...
US-9,519,795 Interconnect partition binding API, allocation and management of application-specific partitions
One system includes one or more host computing systems, each host computing system including at least one execution core and a system memory. The system...
US-9,519,794 Desktop redaction and masking
Redacting material in a user interface is provided. A monitoring agent waits for a change in input or output of user content. A change comparator identifies the...
US-9,519,793 Secure document repository
Embodiments for secure data storage that include systems and methods that receive, from a second system maintained by a second entity, a data payload to be...
US-9,519,792 Copyright protection
A method and computing system for receiving a plurality of discrete audio signals from a plurality of participants of a synchronous communication session. The...
US-9,519,790 Evaluating customer security preferences
Methods and systems for evaluating customer security preferences are presented. In some embodiments, a computer system may receive, from a security dashboard...
US-9,519,789 Identifying security vulnerabilities related to inter-process communications
Identifying security vulnerabilities related to inter-process communications by identifying within the instructions of a computer software application an object...
US-9,519,788 Identifying security vulnerabilities related to inter-process communications
Identifying security vulnerabilities related to inter-process communications by identifying within the instructions of a computer software application an object...
US-9,519,787 Secure creation of encrypted virtual machines from encrypted templates
Booting a machine in a secure fashion in a potentially unsecure environment. The method includes a target machine beginning a boot process. The method further...
US-9,519,786 Firmware integrity ensurance and update
A client device includes a flash chip for storing firmware and a microcontroller for storing an image in read-only memory. The image corresponds to an accurate...
US-9,519,785 Basic input/output system (BIOS) security display
Methods and systems for generating and using a BIOS security display include determining whether a change in a BIOS user setting is associated with security of...
US-9,519,784 Managing basic input/output system (BIOS) access
Example embodiments disclosed herein relate to managing basic input/output system (BIOS) access. Example embodiments include communicating with a remote...
US-9,519,783 Evaluating customer security preferences
Methods and systems for evaluating customer security preferences are presented. In some embodiments, a computer system may receive, from a customer portal...
US-9,519,782 Detecting malicious network content
Systems and methods for detecting malicious content on portable data storage devices or remote network servers are provided. In an exemplary embodiment, a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.