At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method for detecting texts included in an image and apparatus using the
A method for detecting texts included in an image is disclosed. The method includes steps of: (a) detecting at least one text candidate in an inputted image by...
Enhanced interpretation of character arrangements
Technologies are described herein for interpreting character arrangements. An image including an arrangement of characters may be received or captured by a...
Automated handwriting input for entry fields
An embodiment provides a method, including: detecting, at a surface of a device accepting handwriting input, a location of the display surface associated with...
Image processing system, image processing apparatus, image processing
method, and program
There is provided an image processing apparatus including: a communication unit receiving first feature amounts, which include coordinates of feature points in...
Multi-view human detection using semi-exhaustive search
A human monitoring system includes a plurality of cameras and a visual processor. The plurality of cameras are disposed about a workspace area, where each...
Gesture recognition device, gesture recognition method, electronic
apparatus, control program, and recording medium
A gesture recognition device configured to recognize a gesture of a hand from a captured image of a user, having a fingertip candidate detector that detects a...
Calculation of minimum ground clearance using body worn sensors
Methods, systems, and apparatus for deriving a relationship between minimum ground clearance (MGC) and inertial sensor data. A regression model may be generated...
Image recognition apparatus, control method, and program of the same
An image recognition apparatus is arranged to extract feature information of an object area detected from among images, compare with feature information of...
Method, system and computer program for validating a facial image-bearing
A method, system and computer program product for validating a facial image-bearing identity document from the face pictured thereon, in which an image of a...
Differentiating real faces from representations
Facial recognition can be used to determine whether or not a user has access privileges to a device such as a smartphone. It may be possible to spoof an...
User authentication method and apparatus
A user authentication method includes extracting a facial landmark from each of a first input image and a second input image; generating a first sparse code of...
Face-detecting exhibition device for displaying information of object
An exhibition device includes a support stage, a display panel, a position sensor, a camera module, a memory, and a processor. The support stage includes a...
Systems and methods for detecting, identifying and tracking objects and
events over time
A system for detecting, identifying and tracking objects of interest over time is configured to derive object identification data from images captured from one...
Systems, devices, and methods for detection of malaria
Systems, devices, and methods are described for providing a monitor or treatment device configured to, for example, detect hemozoin, as well as to monitor or...
Fingerprint sensing device comprising three-dimensional pattern
There is provided a fingerprint sensing device comprising: a sensing chip comprising an array of sensing elements, the sensing elements being configured to be...
Test techniques for assessing ultrasonic fingerprint sensors
Techniques for testing ultrasonic fingerprint sensors include operating a fingerprint impress simulator that may cyclically press a contact pad of the simulator...
Electronic device with fingerprint indentify function
An electronic device comprises a display module for displaying images, an identify module and a substrate where the display module and the identify module...
Apparatus and method for recognizing fingerprint
Disclosed are an apparatus and a method for recognizing a fingerprint, and an electronic device using the same. The electronic device includes: a key button,...
Lighting apparatus, lighting system and method of registering lighting
Disclosed are a lighting apparatus, a lighting system and a method of registering a lighting apparatus to easily and conveniently register the lighting...
User-customizable data capture terminal for and method of imaging and
processing a plurality of target data on...
A data capture terminal for, and a method of, processing a plurality of data and a symbol arranged at spaced-apart locations on a target, such as a parcel...
Method and system for optimizing system settings of a laser scanner
A scanning device includes a laser source emitting a laser scanning beam, a movable scanning mirror reflecting the laser scanning beam towards an on object to...
Food storage container tag system and method
This disclosure relates to a system configured to electronically store dish information on tags coupled with storage containers. The system may include near...
Method for managing a mode of operation of a contactless tag and
A method is provided for managing the operating mode of an electronic tag, including at least one communication module for communicating with at least one...
Systems and methods for end-to-end secure link between a near-field
communication (NFC) chip and server
Systems and method of the present solution are directed to authenticating and updating a near-field-communication (NFC) chip over a network. According to one...
Apparatus for and method of minimizing specular reflections in imaging
field of view of workstation that reads...
A workstation electro-optically reads targets by image capture, and includes a housing, a generally planar window, an imaging module, and a generally planar...
Collaborating RFID devices
Cooperative RFID devices are provided that are aware of other RFID devices in their near vicinity (field range), and their operational pattern depends on...
Program execution device
A program execution device capable of protecting a program against unauthorized analysis and alteration is provided. The program execution device includes an...
Access and protection of I2C interfaces
A method, computer program product, and system to implement access control from a master device to a slave device over an inter-integrated circuit (I2C)...
Display apparatus and control method thereof
A display apparatus is provided that including a display configured to display content. The display apparatus also includes a main controller configured to...
Method for providing controlled access to a memory card and memory card
There is provided a method for providing access to data securely stored in memory card. An exemplary method comprises specifying first time information...
Method and apparatus for remotely provisioning software-based security
A virtual security coprocessor is created in a first processing system. The virtual security coprocessor is then transferred to a second processing system, for...
Multi-level independent security architecture
A system includes a plurality of data input ports, each port corresponding to one of a plurality of different levels of security classification; a security...
Computing a checksum for content in local storage
Systems and methods for computing a checksum are provided. In some aspects, an online application code module is written in a first programming language. The...
Inter-system data forensics
A computing platform may generate requests for log data stored on computing systems and may communicate the requests to the computing systems. The computing...
System that maintains objects created and modified within designated
directories on a per-client basis in a...
Systems that maintain objects created and modified within designated directories on a per-client basis in a network filesystem include a file server having a...
Apparatus and methods for obtaining a password hint
A method and apparatus for obtaining a password hint is disclosed. In some embodiments, the method includes: receiving a spatial pattern from a user; obtaining...
Method and apparatus for providing provably secure user input/output
A method, non-transitory computer readable medium and apparatus for securing user input and/or output on a mobile endpoint device. For example, the method...
System and methods for analyzing and modifying passwords
A system for analyzing and modifying passwords in a manner that provides a user with a strong and usable/memorable password. The user would propose a password...
Encrypting genomic data for storage and genomic computations
Genomic data encryption embodiments are presented which generally maintain the privacy of genomic data via an encryption scheme which allows computations to be...
Apparatus and method of portable terminal for application data protection
A method of operating a portable terminal for encrypting application data is provided. The method includes receiving data input to an application, encrypting...
Method for authenticating firmware volume and system therefor
A first firmware volume of a Unified Extensible Firmware Interface (UEFI) compliant information handling system is accessed. Authentication information is...
Forensic instance snapshotting
A system and method for capturing forensic snapshots of virtual machines prior to terminating the virtual machine, the system and method including obtaining a...
System and method for enforcing a policy for an authenticator device
A system and method including defining at least one device authentication policy; at a policy engine, initializing authentication policy processing for an...
Information processing apparatus, control method for information
processing apparatus, and storage medium
When user information to be registered for SNMP authentication is input, an information processing apparatus confirms whether or not user information for MFP...
Method and apparatus for processing document in touch-sensitive device
A method and apparatus are provided for processing a document in a touch-sensitive device by performing a document locking function in order not to expose a...
Using an audio channel for authenticating a device
Systems, methods, and other embodiments associated with using an audio link for authentication services are described. According to one embodiment, an apparatus...
Image output apparatus, image output system, and computer-readable
According to an embodiment of the present invention, an image output apparatus for outputting an output target image acquired from an external storage device...
Directional sensing mechanism and communications authentication
The present invention is directed toward an RFID device that includes a motion sensing mechanism. The motion sensing mechanism is adapted to sense motion of the...
System and method for centralizedly controlling server user rights
Methods and systems for centralizedly controlling server user rights are provided herein. In an exemplary method, a first verification server can receive an...
Piracy prevention in digital rights management systems
A method in a multimedia device (130) including obtaining protected content having a limited exercisable right associated therewith, obtaining an extension of...