Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,760,762 Facial structural shaping
An eyebrow shaping method includes providing an image of a face. Multiple guidelines are determined on the image and points and areas are located via the...
US-9,760,761 Image processing method and image processing apparatus
An amount of color correction of a facial region is modified based on changes caused in face average values by white balance correction. Also, the amount of...
US-9,760,760 Histology recognition to automatically score and quantify cancer grades and individual user digital whole...
Digital pathology is the concept of capturing digital images from glass microscope slides in order to record, visualize, analyze, manage, report, share and...
US-9,760,759 Information processing apparatus, information processing system, and information processing method
An information processing apparatus includes a storage unit and an output unit. The storage unit is capable of storing an image of a slide including both images...
US-9,760,758 Determining which hand is being used to operate a device using a fingerprint sensor
A method for using a fingerprint sensor on a mobile device to determine which hand is being used to operate the mobile device includes: acquiring, by a...
US-9,760,757 Systems and methods for authenticating a user of a biometric sensor
A novel system, device and method of validation is provided for sensing a biometric such as a fingerprint, where biometric data corresponding to the biometric...
US-9,760,756 Venue identification using sensor fingerprints
When a mobile device is known to be at a venue, readings from one or more sensors of the device are used to generate a sensor fingerprint of the venue and/or a...
US-9,760,755 Fingerprint matching methods and device
A fingerprint matching device and method are provided. The fingerprint matching method applied to a swipe sensor includes: obtaining first swiping dataset;...
US-9,760,754 Printed circuit board assembly forming enhanced fingerprint module
A Printed Circuit Board Assembly (PCBA) forming an enhanced fingerprint module is disclosed. The PCBA includes a Printed Circuit Board (PCB), an image sensing...
US-9,760,753 Finger guide device
A finger guide device that positions a finger (or minutiae containing digit) of a human subject on a fingerprint sensor in a manner optimal for the data capture...
US-9,760,752 Method and apparatus for ordering code candidates in image for decoding attempts
A method and apparatus for decoding codes applied to objects for use with a camera and a conveyor system wherein the camera includes an image sensor having a...
US-9,760,751 Method and system for identifying pieces of flight baggage
A method for identifying a piece of baggage. An electronic display is activated in order to set the display ready for receipt, the display being integrated in...
US-9,760,750 System for RFID-enabled information collection
A sensor and system provide for radio frequency identification (RFID)-enabled information collection. The sensor includes a ring-shaped element and an antenna....
US-9,760,749 Reduce inlay pitch singulation
A high speed tabletop and industrial printer is disclosed with integrated high speed RFID encoding and verification at the same time. The industrial printer...
US-9,760,748 Calibration circuit and method of use
A calibration circuit includes a single-wire memory and a transmission line. The single-wire memory includes a power/interrogation terminal and a ground...
US-9,760,747 Communication apparatus and method for controlling the same
There is provided a communication apparatus comprising an antenna. A communication unit is able to use external power that is generated by receiving a signal...
US-9,760,746 RFID reader/writer and diagnosis processing program
One aspect of the present invention provides an RFID reader/writer and a diagnosis processing program for outputting correct diagnostic information on...
US-9,760,745 Signal processing device, method of processing signal, and recording medium
A signal processing device includes: an extraction section configured to extract a signal having a predetermined component from an obtained signal; and a...
US-9,760,744 Physical interactive IDs (P2D)
Embodiments of the present invention may provide the capability to identify a specific object being interacted with that may be cheaply and easily included in...
US-9,760,743 Card reader having discriminator contact
A card reader for a point-of-sale system that is configured to accept both magnetic strip-type and integrated circuit (IC) chip-type payment cards. The card...
US-9,760,742 Dual purpose press-bar and heat sink for high data transfer integrated circuit card reader
Various embodiments provide a dual purpose press-bar and heat sink for an integrated circuit card (ICC) reader. The dual purpose press-bar and heat sink...
US-9,760,741 Card reader
Various embodiments related to a card reader are described. According to an embodiment, the card reader comprises: a card reader body part; a contact card...
US-9,760,740 Terminal case with integrated dual reader stack
Aspects of the technology provide a multi-purpose card reader configured for use with a mobile electronic device (e.g., a mobile host), such as a smart phone or...
US-9,760,739 Information processing device
A non-secure display area and a secure display area are set on a screen of a display section of a touch panel TP. A non-secure input area and a secure input...
US-9,760,738 Storing and transmitting sensitive data
A computer-implemented method for storing and transmitting sensitive data is disclosed including storing source data on a secure data storage of a secondary...
US-9,760,737 Techniques for integrated circuit data path confidentiality and extensions thereof
Techniques for protecting data in a processor are provided. An example method according to these techniques includes performing one or more operations on...
US-9,760,736 CPU obfuscation for cloud applications
A cloud deployment system is used for obfuscating CPU operation codes in a set of machines operating in a distributed computing environment. A reprogrammable...
US-9,760,735 Anonymous information exchange
A third party facilitates exchange of customer data between first and second entities while maintaining customer privacy. Personally identifiable information...
US-9,760,734 Catalog-based user authorization to access to multiple applications
Embodiments manage user authorization to access multiple grouped software applications, via a catalog mechanism. Functionality of related software is divided...
US-9,760,733 Providing unique views of data based on changes or rules
In one embodiment, a method comprises creating and storing, in a revisioning database, one or more data objects; wherein a first plurality of the data objects...
US-9,760,732 Verifying an attribute in records for procurement application
A method and system for verifying a target attribute of a company profile record. It is ascertained that a database stores the company profile record including...
US-9,760,731 Configurable cross-domain information assurance
Methods for configuring and utilizing a configurable data guard (CDG) implemented on a hardware-based programmable logic device are disclosed. The CDG may...
US-9,760,730 System and method to redirect and unlock software secure disk devices in a high latency environment
A software secure universal serial bus (USB) disk connected to a client may be redirected to a server. Requests to a virtual software secure USB disk may not be...
US-9,760,729 Method, secure device, system and computer program product for securely managing user access to a file system
A method, a secure device, a system and a computer program product for securely managing user access to a file system. The method includes providing a secure...
US-9,760,728 System and method for managing logical channels for accessing several virtual profiles in a secure element
The invention is a system comprising a host device and a secure element including a plurality of virtual profiles and an execution component configured to run...
US-9,760,727 Secure host interactions
A trusted device includes a secure interface and a host interface, the secure interface being isolated from the host interface by an isolated environment. A...
US-9,760,726 Method for remotely delivering a full subscription profile to a UICC over IP
The invention proposes a method consisting in: opening, at the request of the UICC, a data channel between the terminal and the server; performing a mutual...
US-9,760,725 Content transfer control
Some embodiments provide one or more of systems, methods, software, and data structures to control locations where files may be stored. Some such embodiments...
US-9,760,724 Image analysis and management
Systems, methods and apparatuses are described herein that allow an enterprise to analyze and manage work product images that are stored on a mobile device....
US-9,760,723 Techniques for in-app user data authorization
Techniques for in-app user data authorization are described. An apparatus may comprise a processor circuit, a permissions component, and a token component. The...
US-9,760,722 Method for reporting and addressing an unauthorized disclosure of classified information at an imaging device
A method of addressing an unauthorized disclosure of sensitive information at an imaging device, including receiving an indication of the unauthorized...
US-9,760,721 Secure transaction method from a non-secure terminal
The invention relates to a transaction method, the method including the steps of: providing a tenninal including a main processor, a graphic processor...
US-9,760,720 Securing temporary data on untrusted devices
One example method for securing data on untrusted devices includes the steps of intercepting a file command from a software application, the file command...
US-9,760,719 Electronic system with privacy mechanism and method of operation thereof
An electronic system includes: a control unit configured to: generate an encrypted information based on encrypting an information type, generate a mapping table...
US-9,760,718 Utility-aware anonymization of sequential and location datasets
A mechanism is provided for anonymizing sequential and location datasets. Responsive to receiving the sequential and location datasets from an enterprise, the...
US-9,760,717 Communication device, system, and control method
A communication device includes a memory and a processor coupled to the memory and configured to, when a first vibration is detected in the communication...
US-9,760,716 Process risk classification
In one implementation, a computer-implemented method includes receiving, at a process risk classifier running on a computer system, a request to determine a...
US-9,760,715 Computer protection against malware affection
A method is provided of protecting a computer against malware affection. The computer has a data storage and an operating system for managing the data storage....
US-9,760,714 Method, apparatus and system for processing computer virus
A method, an apparatus and a system for processing a computer virus. The method comprises: obtaining a correspondence between a file type of a first file...
US-9,760,713 System and method for content-independent determination of file-system-object risk of exposure
In one embodiment, a method is performed by a computer system comprising computer hardware. The method includes monitoring a file system for risk-assessment...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.