At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-9,785,819 |
Systems and methods for biometric image alignment Systems and methods for aligning images are disclosed. A method includes receiving an input image of a biometric object; identifying a plurality of sets of... |
US-9,785,818 |
Systems and methods for image alignment Systems and methods for image alignment are disclosed. A method includes: determining a first set of patches for a first image and a second set of patches for a... |
US-9,785,817 |
Region of interest location and selective image compression Systems and methods of operation for an image processor system to process images to locate two-dimensional regions which are likely to contain machine-readable... |
US-9,785,816 |
Barcode decoding method A barcode decoding method includes steps of analyzing a relative relationship between at least two characteristic points of a gray level distribution of a... |
US-9,785,815 |
Imaging terminal, imaging sensor to determine document orientation based
on bar code orientation and methods... Embodiments of an image reader and/or methods of operating an image reader can capture an image, identify a bar code or IBI form within the captured image, and,... |
US-9,785,814 |
Three dimensional aimer for barcode scanning A method of assisting in focusing a three dimensional camera system on an object within a field of view is disclosed. The process involves at the camera system,... |
US-9,785,813 |
Portable optical reader A portable optical reader is provided with: a reading part 41 optically reading a symbol as a reading object; a head part 3 storing the reading part 41 and... |
US-9,785,812 |
Enclosure for an optical device In accordance with an example embodiment, there is disclosed herein, an apparatus, comprising a bezel, a cover, and a thermally conductive, electrically... |
US-9,785,811 |
Image capture and processing system supporting a multi-tier modular
software architecture An image capture and processing system supports a multi-tier modular software, and plug-in extendable, architecture. The image capture and processing system can... |
US-9,785,810 |
Method and system for storing, retrieving, and managing data for tags This invention relates generally to a method and system for storing, retrieving, and managing data for tags that are associated in some manner to any type of... |
US-9,785,809 |
Electrical activity sensor device for detecting electrical activity and
electrical activity monitoring apparatus An electrical activity monitoring device based on a sensor device attachable to a power cable of an electrical device for monitoring the electrical status of... |
US-9,785,808 |
Control device, medical control system and method for transmitting a
command The embodiments relate to a control device for transmission of at least one command. The control device includes at least one RFID transponder unit for... |
US-9,785,807 |
Method and apparatus for sensing environment using a wireless passive
sensor A method and apparatus for detecting RF field strength. A field strength reference generator develops a field strength reference current as a function of a... |
US-9,785,806 |
Low-frequency receiving for radio frequency identification A radio frequency identification (RFID) tag includes a power source, a transmitter to transmit a unique identifier, and a receiver operatively coupled to the... |
US-9,785,805 |
Reel receiving device based on RFID A reel receiving device based on RFID is disclosed. A reel receiving device according to one embodiment of the present invention includes a reel receiving... |
US-9,785,804 |
Multi-protocol RFID system A multi-protocol RFID interrogating system employs a synchronization technique (step-lock) for a backscatter RFID system that allows simultaneous operation of... |
US-9,785,803 |
Method, apparatus and system for collecting tags using bit map in RFID
system Disclosed are a method, an apparatus, and a system for collecting tags which may reduce recognition time and energy consumption as compared with a tag... |
US-9,785,802 |
Method of determining an amount of alkaline agent to be injected within
the context of enhanced oil recovery Method of modelling the evolution of the pH value of a porous medium after injection of an alkaline agent solution into this medium. The alkaline agent is... |
US-9,785,801 |
Management of authenticated variables An embodiment includes an apparatus comprising: an out-of-band cryptoprocessor coupled to secure non-volatile storage; and at least one storage medium having... |
US-9,785,800 |
Non-tracked control transfers within control transfer enforcement A processor includes an execution unit and a processing logic operatively coupled to the execution unit, the processing logic to: enter a first execution state;... |
US-9,785,799 |
System and method for role based analysis and access control A system and method for program access control includes, for a typestate, providing typestate properties and assigning a role to the typestate in a program in... |
US-9,785,798 |
Privacy-protecting inter-user digital communication message search Digital communication messages processed by each specific one of a plurality of client computers are tracked and indexed. A query made by a first client... |
US-9,785,797 |
Decentralized token table generation New tokenization tables are derived at intervals in order to increase the security of tokenized data that is transferred between two endpoints. Generation of... |
US-9,785,796 |
Apparatus and method for automated privacy protection in distributed
images A method executed by a computer includes receiving an image from a client device. A facial recognition technique is executed against an individual face within... |
US-9,785,795 |
Identifying and securing sensitive data at its source A data management service identifies sensitive data stored on enterprise databases according to record classification rules that classify a data record as... |
US-9,785,794 |
Securing sensitive data on a mobile device Illustrative aspects described herein relate to data security and automatic deletion of data when specific criteria are met. Sensitive data may be protected... |
US-9,785,793 |
Systems and methods for sharing verified identity documents A method for sharing verified identity documents is disclosed. The method is performed at one or more electronic devices. The client device obtains identity... |
US-9,785,792 |
Systems and methods for processing requests for genetic data based on
client permission data Methods and systems disclosed herein relate generally to processing data requests from external assessment systems. More specifically, an interface is availed... |
US-9,785,791 |
Using a location authorization extension to provide access authorization
for a module to access a computing system Provided are a method, system, and computer program product for a local authorization extension to provide access authorization for a module to access a... |
US-9,785,790 |
Protecting computer security applications Protecting a computer security application by executing the computer security application on a computer in a first namespace associated with an operating system... |
US-9,785,789 |
Method and system for verification and authentication using optically
encoded QR codes An optical security method for object authentication using photon-counting encryption implemented with phase encoded QR codes. By combining the full phase... |
US-9,785,788 |
System and method for controlling access to aspects of an electronic
message campaign A system for controlling access within an enterprise to information associated with recipients of an electronic message campaign of the enterprise sent to a... |
US-9,785,787 |
Encrypting images on a client device for secure transmission and storage
on a storage device A device may identify an image to be encrypted, and may convert the image to a first string in a first format. The first string may represent the image. The... |
US-9,785,786 |
Privacy preserving data search Database entries can be protected by indexing the entries using a plurality of indexes, each associated with a level of access rights. A level of access rights... |
US-9,785,785 |
Systems and methods for secure data sharing Systems and methods are provided for creating and using a sharable file-level key to secure data files. The file-level key is generated based on a workgroup key... |
US-9,785,784 |
Security management unit, host controller interface including same, method
operating host controller interface,... A method of operating a host controller interface includes receiving a buffer descriptor including sector information from a main memory, fetching data by using... |
US-9,785,783 |
Executing privileged code in a process A system and method for executing privileged code in a process are described. The method includes establishing, by an authorized library, a privileged function.... |
US-9,785,782 |
Monitoring system and shared access permissions for a plurality of users In accordance with embodiments, there are provided mechanisms and methods for performing one or more actions based on determined access permissions for a... |
US-9,785,781 |
Method, apparatus, and computer-readable medium for data exchange Presented are a method, apparatus, and computer-readable medium for data exchange. The method includes specifying, by a user equipment (UE), a first data, and... |
US-9,785,780 |
Information processing apparatus and method, recording medium, and program Information processing apparatus and method, recording medium, and program are provided. An information processing apparatus includes the following elements. A... |
US-9,785,779 |
Pre-calculating and updating data loss prevention (DLP) policies prior to
distribution of sensitive information A method and apparatus submitting information to be protected before permitting an outbound data transfer with the information is described. A DLP agent,... |
US-9,785,778 |
Directed execution of dynamic programs in isolated environments A test object that includes at least one computer program that includes dynamic executable code is obtained. The at least one computer program is transformed... |
US-9,785,777 |
Static analysis based on abstract program representations An application analysis platform enables automatic generation of abstract program representations (APRs) that are amenable to static analyzes for finding... |
US-9,785,776 |
High risk program identification based on program behavior An execution of a data object is identified by a computing device. In response to identifying the execution of the data object, it is determined that the data... |
US-9,785,775 |
Malware management According to at least one embodiment, a computer-implemented method for managing malware for a computing device is described. In one embodiment, an attempt by a... |
US-9,785,774 |
Malware removal A method and apparatus for scanning for or removing malware from a computer device. Under normal circumstances, the computer device is controlled by a first... |
US-9,785,773 |
Malware data item analysis Embodiments of the present disclosure relate to a data analysis system that may automatically analyze a suspected malware file, or group of files. Automatic... |
US-9,785,772 |
Architecture for centralized management of browser add-ons across multiple
devices Features are disclosed for facilitating remote management of browser add-ons on multiple user computing devices from a centralized add-on management system. A... |
US-9,785,771 |
Preventing malicious attacks launched from or involving usb devices Approaches for protecting a computing device against malicious code using an attack vector involving a USB device. A computing device prevents a USB device from... |
US-9,785,770 |
Method, apparatus, and system for triggering virtual machine introspection The present invention discloses a method, an apparatus, and a system for triggering virtual machine introspection, so as to provide a timely and effective... |