At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
2017/0206405 |
ONLINE DETECTION AND CLASSIFICATION OF DYNAMIC GESTURES WITH RECURRENT
CONVOLUTIONAL NEURAL NETWORKS A method, computer readable medium, and system are disclosed for detecting and classifying hand gestures. The method includes the steps of receiving an... |
2017/0206404 |
IMAGE AND FEATURE QUALITY FOR OCULAR-VASCULAR AND FACIAL RECOGNITION Biometric enrollment and verification techniques for ocular-vascular, periocular, and facial regions are described. Periocular image regions can be defined... |
2017/0206403 |
METHOD OF DISTRIBUTED FACE RECOGNITION AND SYSTEM THEREOF A method and system of recognizing a face image comprising a plurality of processing nodes. Nodes obtain parts of the face image and extract features of the... |
2017/0206402 |
BIOMETRICS AUTHENTICATION DEVICE AND BIOMETRICS AUTHENTICATION METHOD A biometrics authentication device is configured to include: a filter that extracts from an input image directional features that respectively correspond to... |
2017/0206401 |
EYE IMAGE COMBINATION Systems and methods for eye image set selection, eye image collection, and eye image combination are described. Embodiments of the systems and methods for eye... |
2017/0206400 |
IDENTITY VERIFICATION AND APPARATUS An identity verification method and an identity verification apparatus are provided. A face image sequence of a user is analyzed to determine whether a... |
2017/0206399 |
VEHICLE FINGERPRINT BOOKMARK Provided in the present disclosure is a fingerprint bookmark system which may be implemented in a vehicle with one or more configurable interior settings. The... |
2017/0206398 |
REMOTE CONTROL DEVICE AND OPERATING METHOD THEREOF An operating method of a remote control device according to an embodiment of the present invention includes searching at least one of the image display device... |
2017/0206397 |
METHOD FOR VALIDATING THE AUTHENTICITY OF AN ELEMENT OF THE HUMAN BODY The invention relates to a device and to a method for validating whether an object is an element (5) of the human body, comprising at least the following... |
2017/0206396 |
HIGH RESOLUTION THIN DEVICE FOR FINGERPRINT RECOGNITION The present invention discloses a high resolution thin device for fingerprint recognition, it includes a transparent plate, an imaging component, an optical... |
2017/0206395 |
FINGERPRINT IDENTIFICATION DEVICE A fingerprint identification device includes a backlight module and a sensing module. The sensing module is disposed on the backlight module. The sensing... |
2017/0206394 |
CAPACITIVE FINGERPRINT SENSING APPARATUS A capacitive fingerprint sensing apparatus includes sensing electrodes, a sensing driver and a processing module. Under a first self-capacitive sensing mode,... |
2017/0206393 |
INTELLIGENT TOUCH SENSING DEVICE An intelligent touch sensing device, including: a first electrode group having a first plurality of first electrodes; a second electrode group having a second... |
2017/0206392 |
Touch Screen, Control Method Thereof and Display Device The present invention provides a touch screen, a control method thereof and a display device. The touch screen comprises a touch area used for touch display. A... |
2017/0206391 |
BARCODE DECODING METHOD A barcode decoding method includes steps of capturing an image of a barcode; dividing the image into a plurality of blocks and dividing the blocks into a... |
2017/0206390 |
ENCODING AND DECODING DATA IN TWO-DIMENSIONAL SYMBOLOGY Examples of techniques for encoding data in a 2D symbology are disclosed. In one example implementation according to aspects of the present disclosure, a... |
2017/0206389 |
HANDHELD INDICIA READER HAVING LOCKING ENDCAP An indicia-reading device including an indicia-capturing subsystem for acquiring information about indicia within the indicia-capturing subsystem's field of... |
2017/0206388 |
ENCODED INFORMATION READING TERMINAL WITH REPLACEABLE IMAGING ASSEMBLY An encoded information reading (EIR) terminal can comprise a microprocessor communicatively coupled to a system bus, a memory, a communication interface, and a... |
2017/0206387 |
RADIO FREQUENCY IDENTIFICATION TAG IDENTIFICATION SYSTEM A conveyor system for processing items on which radio frequency identification tags are disposed has a conveyor that conveys items through a path of travel,... |
2017/0206386 |
SMART OBJECTS An object is disclosed, the object (100) comprising a body comprising an antenna; and an integrated circuit embedded in the body and electrically connected to... |
2017/0206385 |
MULTI-POSITION RFID SWITCH An RFID switch manually operable for transmitting status data includes a plurality of RFID tags that a user can selectively expose to or shield from activation... |
2017/0206384 |
DETECTION DEVICE The invention relates to a detection device comprising a portable recording unit (CAM) for detecting a surrounding operating area by means of a sensor, a... |
2017/0206383 |
ELECTRONIC DEVICE According to a first aspect of the present disclosure, an electronic device is provided which comprises: a substrate; an integrated circuit; a layer of glue... |
2017/0206382 |
CRYPTOGRAPHIC ASIC INCLUDING CIRCUITRY-ENCODED TRANSFORMATION FUNCTION A transform-enabled integrated circuit for use in cryptographic proof-of-work systems is provided. The transform-enabled integrated circuit includes a... |
2017/0206381 |
SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO SECURE DEBUGGING AND
PROFILING FEATURES OF A COMPUTER SYSTEM The present disclosure describes systems and methods for controlling access to secure debugging and profiling features of a computer system. Some illustrative... |
2017/0206380 |
Security Systems And Methods For Social Networking Data may be masked on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage that are... |
2017/0206379 |
USER-GENERATED CONTENT PERMISSIONS STATUS ANALYSIS SYSTEM AND METHOD A method for user-generated content privacy control, including: detecting a trigger event, identifying a post for permissions analysis, determining permissions... |
2017/0206378 |
SELECTIVELY WIPING A REMOTE DEVICE A system and method for selectively securing data from unauthorized access on a client device storing a plurality of data types with reference to an... |
2017/0206377 |
SYSTEM AND METHOD FOR CREATING A POLICY FOR MANAGING PERSONAL DATA ON A
MOBILE COMMUNICATIONS DEVICE A system and method to create a policy for managing personal data on a mobile communications device are disclosed. Personal data stored at one or more... |
2017/0206376 |
Systems and Methods for Managing Data Incidents According to some exemplary embodiments, the present technology is directed to methods for managing a data incident, including receiving, via a risk assessment... |
2017/0206375 |
PERSONAL CONTENT CONTROL ON MEDIA DEVICE USING MOBILE USER DEVICE A method for controlling personal content on a media device includes establishing, at the media device, a wireless connection with a mobile user device using a... |
2017/0206374 |
CONTEXTUAL IDENTIFICATION USING MOBILE DEVICES Systems and methods for displaying a digital identification (ID) document on a mobile device. A computer implemented method includes: receiving a request for a... |
2017/0206373 |
UNLOCKING A STORAGE DEVICE An electronic device has a lower power state in which power to a storage device is disabled. Predetermined information stored in a memory is useable to unlock... |
2017/0206372 |
DATA MANAGEMENT SYSTEM, DATA MANAGEMENT METHOD, AND RECORDING MEDIUM Provided is a data management system that is configured to divide a table in a database into one or more partitions based on data included in a particular... |
2017/0206371 |
APPARATUS AND METHOD FOR MANAGING DOCUMENT BASED ON KERNEL An apparatus and method for managing a document based on a kernel. The apparatus for managing a document based on a kernel includes a virtual file processing... |
2017/0206369 |
Bluetooth Key Apparatus A Bluetooth key apparatus is provided. The apparatus comprises a control unit; a Bluetooth locking device connected with the control unit; and a Bluetooth... |
2017/0206368 |
SYSTEM AND METHOD FOR SYNCHRONIZATION OF LARGE AMOUNTS OF DATA WHILE
MAINTAINING CONTROL OVER ACCESS RIGHTS TO... Disclosed are system and method for synchronization of large amounts of data while maintaining control over access rights to such data in electronic data... |
2017/0206367 |
TRANSPONDER MODULE AND ACCESS MODULE FOR ACTIVATING AND CONFIGURING SUCH
TRANSPONDER MODULE Methods are described for providing access to one or more transponder functions of sports timing transponder that is configured for transmitting a signal... |
2017/0206366 |
PAINTING CONTENT CLASSIFICATIONS ONTO DOCUMENT PORTIONS A facility for interacting with an electronic document is described. The facility causes to be displayed a visual representation of the document, and receives... |
2017/0206365 |
SYSTEMS AND/OR METHODS FOR ENABLING COOPERATIVELY-COMPLETED RULES-BASED
DATA ANALYTICS OF POTENTIALLY SENSITIVE... Certain example embodiments relate to systems and/or methods for providing enhanced control over potentially sensitive data sharable among and/or between... |
2017/0206364 |
DECRYPTING CONTENT PROTECTED WITH INITIALIZATION VECTOR MANIPULATION Disclosed are various embodiments for generating encrypted media content items as well as decrypting encrypted media content items. A content type is embedded... |
2017/0206363 |
SYSTEM AND METHOD FOR PROTECTING PLAIN TEXT SCRIPTING LANGUAGE PROGRAMS IN
A MAINFRAME REHOSTING PLATFORM In accordance with an embodiment, described herein is a system and method for protecting a scripting language application in a computing environment. An... |
2017/0206362 |
SPACE-EFFICIENT STORAGE OF ENCRYPTED DATA An encryption platform may identify language characters in database fields and determine which of multiple encoding schemes more efficiently encodes the... |
2017/0206361 |
APPLICATION RECOMMENDATION METHOD AND APPLICATION RECOMMENDATION APPARATUS An application recommendation method and a recommendation apparatus are disclosed. A method comprises: acquiring a popularity value and a security risk value... |
2017/0206360 |
COMPUTING OPTIMAL FIX LOCATIONS FOR SECURITY VULNERABILITIES IN
COMPUTER-READABLE CODE Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for determining optimal fix locations for security... |
2017/0206358 |
SYSTEM AND METHODS THEREOF FOR DETECTION OF PERSISTENT THREATS IN A
COMPUTERIZED ENVIRONMENT BACKGROUND A system is used for detection of advanced persistent and non-persistent threats in a computerized environment. The system is connected to a plurality of user... |
2017/0206357 |
MALICIOUS CODE PROTECTION FOR COMPUTER SYSTEMS BASED ON PROCESS
MODIFICATION Various approaches are described herein for, among other things, detecting and/or neutralizing attacks by malicious code. For example, instance(s) of a... |
2017/0206356 |
INFORMATION PROCESSING SYSTEM, CONTROLLING METHOD, AND CONTROLLING
COMPUTER PROGRAM A virtual machine includes a shadow memory, a shadow disk, and a virtual NIC. A virtual machine includes a guest OS. The shadow memory and the shadow disk each... |
2017/0206355 |
DYNAMICALLY-LOADED CODE ANALYSIS DEVICE, DYNAMICALLY-LOADED CODE ANALYSIS
METHOD, AND DYNAMICALLY-LOADED CODE... A dynamically-loaded code analysis device includes a memory unit, an extraction unit, and a specification unit. The memory unit memorizes dynamically-loaded... |
2017/0206354 |
DETECTING ANOMALOUS EVENTS THROUGH RUNTIME VERIFICATION OF SOFTWARE
EXECUTION USING A BEHAVIORAL MODEL Runtime verification of software execution events against a behavioral model. For each event, it is verified whether there is a short range correlation of a... |