Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,015,2630 Methods and systems of performing blob filtering in video analytics
Techniques and systems are provided for processing video data. For example, techniques and systems are provided for performing content-adaptive blob filtering....
US-1,015,2629 Methods of processing data from multiple image sources to provide normalized confidence levels for use in...
A method comprises receiving from a first data source first recognition results which are associated with the first data source, and receiving from a second...
US-1,015,2628 Devices, methods, and systems for occupancy detection
Devices, methods, and systems for occupancy detection are described herein. One device includes instructions to receive an image of a portion of a facility...
US-1,015,2627 Feature flow for video recognition
Various embodiments herein each include at least one of systems, methods, and software for feature flow for video recognition. Such embodiments generally...
US-1,015,2626 Fingerprint recognition sensor and terminal device
Disclosed is a fingerprint identification sensor, which comprises: a sensor unit, comprising a capacitor array formed by a plurality of capacitor induction...
US-1,015,2625 Method for providing control function using fingerprint sensor and electronic device thereof
An apparatus and a method for providing a control function using a fingerprint sensor in an electronic device are provided. The method includes collecting...
US-1,015,2624 Portable scanner with improved user feedback
A portable scanner with improved user feedback provides scan data to a networked computing node via a wireless interface and the Internet. The portable scanner...
US-1,015,2623 Host feedback of scan status
A multi-mode ring scanner (MMRS) has a ring unit for wearing on a finger. The MMRS optionally has a wrist unit coupled to the ring unit, such as via a cable....
US-1,015,2622 Visual feedback for code readers
A system and method for providing visual feedback to facilitate multi-code (e.g., barcode) reading (i.e., scanning) is presented. The visual feedback will...
US-1,015,2621 Identification of miniaturized electronic assembly using identification features on multiple components
A system and method for marking components of an assembly and/or portions of an assembly including at least one of the components with a plurality of markers,...
US-1,015,2620 Method and apparatus for tracking objects and people
An object locating, identifying, tracking, and surveillance system, denoted the Assets Locating, Tracking, and Surveillance System (ALTSS), is provided for...
US-1,015,2619 RFID receiver and method of extracting data bits encoded in a radio signal
An RFID receiver (1) comprises an antenna (11) configured to receive a radio signal (20) from an RFID transmitter (2) and to generate an electrical signal (110)...
US-1,015,2618 Reader, writer and method for programmable tags
A tag writer, reader and method are disclosed. The tag writer is operable to generate a security identifier during writing of data to the tag, the security...
US-1,015,2617 Methods, systems and apparatus to improve radio frequency identification (RFID) tag communication
Methods, systems, apparatus, and articles of manufacture are disclosed to improve radio frequency identification (RFID) tag communication. An example disclosed...
US-1,015,2616 Card with electrically conductive points that are readable
A card that includes an electrically non-conductive substrate and a plurality of conductive points disposed on a bottom surface of the non-conductive substrate....
US-1,015,2614 Systems and methods for electronic device point-of-sale activation
The present invention is directed to systems and methods of activating an electronic device at a point-of-sale (POS). The device may be identified by an indicia...
US-1,015,2613 Apparatus and method for physically unclonable function (PUF) for a memory array
Methods and apparatus for creating a physically unclonable function for SRAM are disclosed. An example method includes after applying a voltage to a memory...
US-1,015,2612 Cryptographic operations for secure page mapping in a virtual machine environment
Generally, this disclosure provides systems, devices, methods and computer readable media for secure memory page mapping in a virtual machine (VM) environment....
US-1,015,2611 Identifying and preventing leaks of sensitive information
Determining sensitive information and preventing the unauthorized or unintended dissemination of such information are disclosed. Terms are determined from...
US-1,015,2610 Sensitive data service access
A system for accessing data includes an interface and a processor. The interface is to receive a request to access data and requestor information. The processor...
US-1,015,2609 Personally identifiable information (PII) disclosure detection
Systems, methods, and apparatus of tracking user information dissemination are disclosed herein. In one or more embodiments, the disclosed method involves...
US-1,015,2608 Healthcare privacy violation detection and investigation system and method
A method for detecting privacy violations of patient personal healthcare information (PHI) can include receiving audit logs from all systems within a healthcare...
US-1,015,2607 Secure access to hierarchical documents in a sorted, distributed key/value data store
Policy-based, cell-level access control is provided in association with a sorted, distributed key-value data store. As data representing a hierarchical document...
US-1,015,2606 Enterprise level data element review systems and methodologies
An enterprise level data element review system including a data access event collection subsystem operative to collect data access event notifications relating...
US-1,015,2605 Systems and methods for front-end and back-end data security protocols
A security framework and methodology is provided which provides front-end security through authentication and authorization, and back-end security through a...
US-1,015,2604 Enforcing locational restrictions on stateless transactions
An Attestation Identity Key pair (AIK pair) is created from a hardware identifier of a hardware machine and a geographical location. the AIK pair includes a...
US-1,015,2603 Systems and methods for detecting sensitive information leakage while preserving privacy
Systems and methods for privacy-preserving data loss detection include performing a sweep of online information for a candidate data leakage to generate an...
US-1,015,2602 Protecting state information for virtual machines
A processing system includes a processor that implements registers to define a state of a virtual machine (VM) running on the processor. The processor detects...
US-1,015,2601 Reliably recovering stored data in a dispersed storage network
A method begins by storage units of a dispersed storage network (DSN) receiving a retrieval request for a data object, where each storage unit stores a unique...
US-1,015,2600 Methods and systems to measure a hypervisor after the hypervisor has already been measured and booted
An embodiment: (a) receives a request for a measurement of a hypervisor from at least one computing node that is external to the at least one machine; (b)...
US-1,015,2599 Security mechanisms for extreme deep sleep state
A processor includes logic to generate a wakeup code value for a deep sleep state in which the processor is powered down, store the wakeup code value to a first...
US-1,015,2598 Process categorization using crowdsourcing
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for categorizing a process using crowdsourcing are described....
US-1,015,2597 Deduplicating malware
Detecting duplicate malware samples is disclosed. A first guest clock is set to a first value in a first virtual machine instance. A first malware sample is...
US-1,015,2596 Detecting anomalous events through runtime verification of software execution using a behavioral model
Runtime verification of software execution events against a behavioral model. For each event, it is verified whether there is a short range correlation of a...
US-1,015,2595 Container and image scanning for a platform-as-a-service system
A method of container and image scanning includes storing at a central scan store of a multi-tenant system, an image scan result for a container image, the...
US-1,015,2594 Method and device for identifying virus APK
Disclosed are a method and a device for identifying a virus APK. The method comprises: presetting a virus database comprising virus characteristic codes;...
US-1,015,2593 Method and device for identifying pirated dongle
A method and a device for identifying pirated dongle are provided. The method includes: determining by an identification device whether any dongle is connected...
US-1,015,2592 Compiler assisted protection against arbitrary code execution
A method, computer program product, and computer system are provided. A processor receives an executable file for execution by an operating system, where the...
US-1,015,2591 Protecting against malware variants using reconstructed code of malware
A system for discovering programming variants. The system analyzes system calls from executing a program to generate programming code or executable for a...
US-1,015,2590 Implementing a WebSocket server to circumvent access controls, by a web browser, on a web application
Operations include executing a WebSocket server on a machine executing a web browser; establishing a connection between the WebSocket server and the web...
US-1,015,2589 Searching data using pre-prepared search data
Methods and devices for searching are described. In one aspect, the method includes: receiving a search query; identifying a search data file associated with a...
US-1,015,2588 Password check by decomposing password
A proposed password is decomposed into basic components to determine and score transitions between the basic components and create a password score that...
US-1,015,2587 Device pairing method
A device pairing method relates to steps of transmitting authentication information to a second device from a first device via a physical connecting line....
US-1,015,2586 Managing opt-in and opt-out for private data access
Concepts and technologies disclosed herein are for managing opt-in and opt-out for private data access. According to one aspect disclosed herein, a mobile...
US-1,015,2585 System and method of providing and validating enhanced CAPTCHAs
The invention relates to a system and method of automatically distinguishing between computers and human based on responses to enhanced Completely Automated...
US-1,015,2584 Using sensor data to authenticate a user for a computer device
It is presented a method for conditionally authenticating a user for access to a computer device, the method being performed in an access control device...
US-1,015,2583 Security information update system, information processing apparatus, and non-transitory computer-readable...
Each of the plurality of information processing apparatus includes an operation panel, a storage that stores security information, and a hardware processor. The...
US-1,015,2582 System and method for securing, and providing secured access to encrypted global identities embedded in a QR code
A computer implemented method for use of encrypted identity on a QR code encoded onto a permanent medium. The system includes mechanism to generate the...
US-1,015,2581 Methods and systems for data entry
User identities, password, etc. represent the barrier between a user's confidential data and any other third party seeking to access this data. As multiple...
US-1,015,2580 Interaction method and display device
The embodiments of the present invention provide an interaction method and a display device. The interaction method comprises: determining, by a display device,...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.