Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,965,681 Eye imaging in head worn computing
Aspects of the present invention relate to methods and systems for imaging, recognizing, and tracking of a user's eye that is wearing a HWC. Aspects further...
US-9,965,680 Method and system for conveying data from monitored scene via surveillance cameras
A system and method for monitoring sensors via surveillance cameras is disclosed. In the system, surveillance cameras generating image data of scenes, where the...
US-9,965,679 Capturing specific information based on field information associated with a document class
A device may obtain a document, of a document type, from which specific information is to be captured. The specific information to be captured may depend on a...
US-9,965,678 Method for recognizing table and flowchart in document images
A table and flowchart detection method is disclosed. First, based on connected component analysis and the sizes of the connected components, a target connected...
US-9,965,677 Method and system for OCR-free vehicle identification number localization
Methods and systems for localizing numbers and characters in captured images. A side image of a vehicle captured by one or more cameras can be preprocessed to...
US-9,965,676 Method and system for identifying a plurality of reference points in a hand drawing track
A method for identifying reference points in a hand drawing track with a number (n) of dots includes marking a first one of the dots as a reference point; for...
US-9,965,675 Using virtual reality for behavioral analysis
Examples of the disclosure provide for calibrating a virtual reality environment based on data input in response to initial calibration prompts to provide a...
US-9,965,674 Ticket evading decision system with human face recognition and usage method thereof
The present invention discloses a ticket evading decision system with human face recognition and usage method thereof. The ticket evading decision system...
US-9,965,673 Method and apparatus for face detection in a frame sequence using sub-tasks and layers
Techniques are disclosed that involve face detection. For instance, face detection tasks may be decomposed into sets of one or more sub-tasks. In turn the...
US-9,965,672 Method of reducing visibility of pulsed illumination while acquiring high quality imagery
A method of providing active illumination during biometry that utilizes pulsed lighting synchronized to frame acquisition. Two distinct illumination modalities...
US-9,965,671 Material identifying system and related identifying method
A material identifying system includes an identifying panel, a voltage source and a determining circuit. The voltage source is arranged to transmit a voltage...
US-9,965,670 Method for controlling unlocking and terminal
A method for controlling unlocking includes the following operations. A reference feature point set of a finger of a user is acquired by scanning the finger...
US-9,965,669 Optical device
An optical device includes a first substrate, a second substrate, a first transmitting portion, N light-emitting portions, and a light-receiving portion. The...
US-9,965,668 Fingerprint image acquisition device
A fingerprint image acquisition device includes: a light source, a finger touching surface, a convex lens, an image sensor and a grating. The light source is a...
US-9,965,667 Fingerprint recogntion sensor and terminal device
Disclosed is a fingerprint identification sensor, which comprises: a sensor unit, comprising a capacitor array formed by a plurality of capacitor induction...
US-9,965,666 Fingerprint recognition method, fingerprint recognition device and electronic device
The present disclosure relates to a fingerprint recognition method, a fingerprint recognition device and an electronic device, wherein the fingerprint...
US-9,965,665 Fingerprint identification optical imaging package structure
A fingerprint identification optical imaging package structure is applied in the field of the fingerprint identification optical system. An isolating base is...
US-9,965,664 Mobile data collector with keyboard
A mobile data collector with a keyboard, used to be combined with a mobile electronic device, includes a protective cover, a data reader, and a keyboard module....
US-9,965,663 Fractal plasmonic surface reader antennas
Plasmonic-surface antenna systems are described in which resonators, or cells, are closely arranged but do not touch. At least a portion of a radiating surface...
US-9,965,662 Pattern recognition based motion detection for asset tracking system
An asset tracking system that optimizes the value per ping by tying the ping to a pattern of movements of the asset. The asset tracking device will send a ping...
US-9,965,661 Sensory totem badge capable of transmitting individualized information
A sensory totem badge capable of transmitting individualized information and includes: a totem badge body attached or sewed onto an object surface; an e-tag,...
US-9,965,660 Communication device, non-contact type card reader, and wireless system
A communication device having a function for supplying electric power to a communication partner may include a non-contact control section configured to...
US-9,965,659 System and method of notifying an owner of a blocking vehicle
This disclosure relates generally to the field of wireless communication technology and more particularly to a system and a method of notifying an owner of a...
US-9,965,658 Person-centric activation of radio frequency identification (RFID) tag
In embodiments of person-centric RFID tag activation, an RFID tag is configured so as to be active or inactive based on proximity to a person. An RFID tag...
US-9,965,657 Disposable patient tag
An apparatus, system and method to track location, the apparatus including: a substantially planar disposable housing comprising an electronics compartment; a...
US-9,965,656 Methods and apparatus for computer-aided tissue engineering for modeling, design and freeform fabrication of...
One aspect of the invention provides a method for multi-nozzle biopolymer deposition of heterogeneous materials to create or modify a composite biopolymer...
US-9,965,655 Port security device for computing devices and methods of operating such
A system includes a first computing device and a second computing device. The first computing device includes a port. The second computing device is configured...
US-9,965,654 Secure display element
Techniques for securely displaying sensitive information against attempts to capture such information via screenshots are introduced. Similar to the pieces of a...
US-9,965,653 Trusted computing
A trusted computing device (TCD) includes an isolated environment, host interface, secure interface, and program instructions. The environment includes an...
US-9,965,652 Detecting and thwarting backside attacks on secured systems
Security devices for protecting ICs from backside security attacks. A security device includes an N- well formed in a substrate, a P+ center disposed in the...
US-9,965,651 Using de-identified healthcare data to evaluate post-healthcare facility encounter treatment outcomes
A computer-implemented method includes producing medical information that characterizes a group of individuals from a set of private data representing pre or...
US-9,965,650 Computer system of computer servers and dedicated computer clients specially programmed to generate synthetic...
In some embodiments, the present invention provides for an exemplary computer system which includes at least: a graphical user interface client; a dedicated...
US-9,965,649 System and method for protecting internet user data privacy
In a query-response model system of network communication, to protect user data privacy, a plurality of Camouflage Queries are automatically generated to be...
US-9,965,648 Automatic masking of sensitive data
A masking system and method for automatically masking sensitive user information on a webpage is provided. The method includes the steps of identifying a...
US-9,965,647 Pre-cloud data protection
The present disclosure includes a method comprising encrypting sensitive data, generating a token comprising a data identifier, tokenizing the encrypted...
US-9,965,646 Sensitive data discrimination method and data loss prevention system using the sensitive data discrimination method
An exemplary embodiment of the present disclosure illustrates a sensitive data discrimination method executed in a data loss prevention system to determine...
US-9,965,645 Field level data protection for cloud services using asymmetric cryptography
Systems, apparatuses, and methods for providing data security for data that is stored in a cloud-level platform. In one embodiment, each session is associated...
US-9,965,644 Record level data security
A database security system protects a data table at both the column level and the individual data record level. Access to data records within the data table is...
US-9,965,643 System and method for preventing access to data on a compromised remote device
This invention discloses a system and method for selective erasure, encryption and or copying of data on a remote device if the remote device has been...
US-9,965,642 Power efficient storage management
One or more systems and/or techniques are provided for managing a partially encrypted file system, for storage hardware virtualization, and/or for storage...
US-9,965,641 Policy-based data-centric access control in a sorted, distributed key-value data store
A method, apparatus and computer program product for policy-based access control in association with a sorted, distributed key-value data store in which keys...
US-9,965,640 Real-time distribution of messages via a network with multi-region replication in a hosted service environment
A message distribution system replicates a collection of messages across multiple regional data centers. When any of the data centers receives a message for...
US-9,965,639 Source authentication of a software product
Embodiments of the present invention provide systems and methods for authenticating the source code of a software end product. The method includes generating a...
US-9,965,638 Rights application within document-based conferencing
Although current conferencing applications provide many abilities, some of these abilities are limited. Various embodiments described herein provide one or more...
US-9,965,637 Method and device for activating functions of a control device
A method for activating at least one function of a control device of a motor vehicle, which includes the steps: a) generating a random value in the control...
US-9,965,636 Security system and method for protecting a vehicle electronic system
Security system for protecting a vehicle electronic system by selectively intervening in the communications path in order to prevent the arrival of malicious...
US-9,965,635 Image tagging device
Provided is an image tagging device including: a first functional unit in which an image including an object that is a target of privacy protection is stored...
US-9,965,634 Space-efficient storage of encrypted data
An encryption platform may identify language characters in database fields and determine which of multiple encoding schemes more efficiently encodes the...
US-9,965,633 Using code similarities for improving auditing and fixing of SAST-discovered code vulnerabilities
Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for receiving results from security testing of source...
US-9,965,632 System and methods for secure firmware validation
An electronic device, such as a dynamic transaction card having an EMV chip, that acts as a TPM having a memory, an applet, and a cryptographic coprocessor...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.