Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,007,8788 Barrier and guardrail detection using a single camera
Driver assistance systems for detecting a structural barrier extending along a road. The driver assistance system may be mountable in a host vehicle. The camera...
US-1,007,8787 Crowd-based video identification and analytical recognition system
An analytical recognition system includes one or more video cameras configured to capture video and a video analytics module configured to perform real-time...
US-1,007,8786 Occupancy sensing apparatus network
An occupancy-sensing apparatus a device control assembly including a detector configured to generate an image wherein the device control assembly includes one...
US-1,007,8785 Video-based sound source separation
A sound source separation method comprising the steps of determining at least one location of at least one sound source based on video data, determining initial...
US-1,007,8784 Forestry information management systems and methods streamlined by automatic biometric data prioritization
Methods and systems are presented for obtaining photographic data recently taken via one or more airborne vehicles (drones, e.g.) and for prioritizing...
US-1,007,8783 Enhanced user authentication
A method and system for authenticating a user. A first digital representation of an iris of an eye of at least one authentic user is obtained. A second digital...
US-1,007,8782 Method for identifying and/or authenticating an individual by iris recognition
A method for identifying and/or authenticating an individual by a system including a storage device storing at least one binary code of a reference iris and a...
US-1,007,8781 Automatically organizing images
A method includes obtaining a plurality of images, including geolocation information and time information for each image. The method also includes identifying a...
US-1,007,8780 Gesture recognition mechanism
A method is described including storing reference vector data corresponding to user gestures at a plurality of neurons at pattern matching hardware, receiving...
US-1,007,8779 Gaze time indicator for a vehicle
A system for tracking a gaze of a driver of a vehicle includes a tracking device, a processor, a memory, and a display. The tracking device is configured to...
US-1,007,8778 Systems, methods, and apparatus for in vitro single-cell identification and recovery
Described herein are systems, methods, and apparatus for automatically identifying and recovering individual cells of interest from a sample of biological...
US-1,007,8777 Fingerprint recognition sensor and portable display device having the same
Disclosed are a fingerprint recognition sensor including: a light source positioned while being spaced apart on one surface of the substrate and irradiating...
US-1,007,8776 Noise reduced capacitive fingerprint sensor and capacitive sensing unit included therein
A capacitive fingerprint sensor which includes capacitive sensing units is disclosed. Each of the capacitive sensing unit includes a sensing electrode; a first...
US-1,007,8775 Double-sided fingerprint sensor
A sensor has parallel upper pickup lines in an upper conductive layer, parallel lower pickup lines in a lower conductive layer, parallel drive lines oriented...
US-1,007,8774 SIMD-based system for multiple decode of captured images
A decoding device may include a processor that may include a core component configured to: analyze watermark metadata to identify a watermark ROI from among...
US-1,007,8773 Machine readable code with portion analysis
Embodiments are directed to methods and systems to increase flow and throughput of particular data through the use of a machine readable code with portion...
US-1,007,8772 Scanning system for scanning objects in radioactive environment
A system for manufacturing radionuclide generators includes an enclosure defining a radioactive environment. The enclosure includes radiation shielding to...
US-1,007,8771 Encoding and decoding data in two-dimensional symbology
Examples of techniques for encoding data in a 2D symbology are disclosed. In one example implementation according to aspects of the present disclosure, a...
US-1,007,8770 Method and system for autonomous vehicles
A method and system for facilitating cost effective, reliable, system redundant, self-driving vehicles involves the employment of specialized lane marking...
US-1,007,8769 Method for controlling peripherals, associated peripheral driver(s) and computer program
Method for controlling peripheral(s) (13) in a system comprising a server (6), user terminals (2), a peripheral driver (11) connected to a peripheral device...
US-1,007,8768 Card or media combined readers featuring single target area
A card validator or, more generally, a combined reader includes a plurality of readers for validating a corresponding plurality of card and document types. The...
US-1,007,8767 Systems, methods and associated RFID antennas for processing a plurality of transponders
An RFID system for selectively communicating with a targeted transponder from among a group of multiple adjacent transponders is provided. The RFID system may...
US-1,007,8766 Labeling and authenticating using a microtag
An identifier made using a silicon film fragment. The silicon film has a varying optical index of refraction. The varying optical index of refraction reflects...
US-1,007,8765 Method and device for processing stolen terminal
The invention provides multiple methods and devices for processing a stolen terminal. Therein, a method for processing a stolen terminal comprises: receiving a...
US-1,007,8764 Tamper responsive sensor
There is provided a tamper responsive sensor comprising a carrier printed circuit board, carrier PCB, holding a mesh of one or more electrically conductive...
US-1,007,8763 Programmable unit for metadata processing
A system and method for metadata processing that can be used to encode an arbitrary number of security policies for code running on a stored-program processor....
US-1,007,8762 Systems and methods for digitally enforcing computer parental controls
The disclosed computer-implemented method for digitally enforcing computer parental controls may include (i) identifying a parental-control policy that controls...
US-1,007,8761 System and method for privacy-aware information extraction and validation
Disclosed herein is a system to validate information about a user, or users, derived from publicly-accessible data. The system comprises a validation system...
US-1,007,8760 Graph-based inference of confidential data insights
In an example, a weighted directed graph data structure is constructed from position information and position transition information, the weighted directed...
US-1,007,8759 System and method for data sharing via a data structure having different-scheme-derived portions
In certain embodiments, a data structure including first and second data structure portions may be obtained, where the first data structure portion is generated...
US-1,007,8758 Systems and methods for an incremental, reversible and decentralized biometric identity management system
This disclosure describes methods and systems for a biometric identity management system capable of being deployed incrementally one organization at a time, and...
US-1,007,8757 File sharing system and method
A file sharing system and method for sharing media files facilitates sharing of media without permitting the media to be downloaded, or stored on web servers....
US-1,007,8755 Private and public applications
Designating applications for public access or private access on a computing device is disclosed. An application on the computing device is designated for...
US-1,007,8754 Volume cryptographic key management
Techniques for providing cryptographic keys for encrypted system volumes on machine instances in virtualized and/or distributed systems are described herein. At...
US-1,007,8753 Advanced threat protection cross-product security controller
A system for securing electronic devices includes a processor, non-transitory machine readable storage medium communicatively coupled to the processor, and a...
US-1,007,8752 Continuous malicious software identification through responsive machine learning
A security system and method secures and responds to security threats in a computer having a CPU, a Kernel/OS, and software applications. A low-level data...
US-1,007,8751 Computer device and method for controlling untrusted access to a peripheral device
A computer device includes hardware with a connected peripheral device such as a camera or a microphone. An operating system is configured to operate the...
US-1,007,8750 Methods and systems for finding compromised social networking accounts
Social messages sent or posted by users of a social networking service are collected. Compromised social networking accounts are identified from the collected...
US-1,007,8749 Authentication and control of encryption keys
An apparatus, a method, and a system are presented in which the apparatus includes an interface control circuit that may be configured to receive a message...
US-1,007,8748 Unlock and recovery for encrypted devices
A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some...
US-1,007,8747 Resumption of logon across reboots
In one embodiment, a user device may reestablish access to a user resource while forgoing use of a user credential during a system reboot. The user device may...
US-1,007,8746 Detecting unauthorized devices
Methods and systems are disclosed that, in some aspects, provide for receiving a provisioning request from a requesting device, and identifying one or more...
US-1,007,8745 Image decoloring apparatus and method of controlling security in image decoloring apparatus
According to an embodiment, an image erasing apparatus includes an accessory information acquiring unit and an execution availability determining unit. The...
US-1,007,8744 Authentication-activated augmented reality display device
A portable device is provided. The portable device may include a display; an input device; a camera; a processor coupled to the display, the input device, and...
US-1,007,8743 Cross identification of users in cyber space and physical world
A method for using a user device. The method includes obtaining, during a fingerprint learning phase, a historical portion of user activity data associated with...
US-1,007,8742 Mobile communications device providing heuristic security authentication features and related methods
A mobile communications device includes a plurality of first input devices capable of passively collecting input data, a second input device(s) capable of...
US-1,007,8741 Two-way authentication in single password with agent
Systems and methods for enabling user authentication using a first computing device (e.g., a tablet computer) for providing user credentials including an...
US-1,007,8740 Method to fetch functionality across applications
A method and system for fetching functionalities across various user interfaces and providing, for execution, instructions to invoke a function that is not...
US-1,007,8739 Compelling data collection via resident media devices in controlled-environment facilities
A controlled environment facility resident may initiate submission of data to a controlled-environment facility management system using a resident media device,...
US-1,007,8738 Locked element for use in a graphical modeling environment
In a graphical modeling environment, a method of providing varying levels of protection relating to functionalities associated with at least some elements of a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.