Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,971,934 System and method for partially occluded object detection
A method for partially occluded object detection includes obtaining a response map for a detection window of an input image, the response map based on a trained...
US-9,971,933 Facial image screening method and face recognition system thereof
A facial image screening method is provided in the present disclosure. The facial image screening method includes the following steps: tracking a plurality of...
US-9,971,932 Cryptographic key visualization
This invention regards a method of key-fingerprint visualization that is unique, reproducible, and nearly impossible to forge which aims to improve the...
US-9,971,931 Systems and methods for segmentation and processing of tissue images and feature extraction from same for...
Apparatus, methods, and computer-readable media are provided for segmentation, processing (e.g., preprocessing and/or postprocessing), and/or feature extraction...
US-9,971,930 Test module for a fingerprint sensing device
There is provided a test module for testing a fingerprint sensing device comprising: an electrically conductive bottom element comprising an exterior surface...
US-9,971,929 Fingerprint classification system and method using regular expression machines
A fingerprint classification system and method for extracting the dominant singularity from a fingerprint image are described. The fingerprint classification...
US-9,971,928 Fingerprint verification system
Embodiments of apparatus, computer program product, and method for verifying fingerprint images are disclosed. In one embodiment, a method of verifying...
US-9,971,927 Fingerprint sensors
In one aspect, a method for registering a fingerprint profile on a mobile device includes detecting, at a fingerprint detection module having a rectangular...
US-9,971,926 Fingerprint sensor with controllable resolution
There is provided a capacitive fingerprint sensing device for sensing a fingerprint pattern of a finger, the capacitive fingerprint sensor comprising: a...
US-9,971,925 Method and fingerprint sensing system for acquiring a fingerprint image
The present invention generally relates to a method for acquiring a fingerprint image using a fingerprint sensing system. Advantages with the invention include...
US-9,971,924 Two-substrate fingerprint recognition device
A two-substrate fingerprint recognition device includes a first substrate and a second substrate. A plurality of electrodes, a plurality of connection pads and...
US-9,971,923 Fingerprint identification device and mobile terminal having same
The present disclosure discloses a fingerprint identification apparatus and a mobile terminal using the same. The fingerprint identification apparatus includes:...
US-9,971,922 Fingerprint detection device and mobile terminal
Disclosed are a fingerprint detection device and a mobile terminal. The fingerprint detection apparatus comprises a capacitive fingerprint sensor and a...
US-9,971,921 Fingerprint image sensor and method for optical wireless communications using the same
The present disclosure provides a fingerprint image sensor and a method for optical wireless communications using the same. The fingerprint image sensor...
US-9,971,920 Spoof detection for biometric authentication
This specification describes technologies relating to biometric authentication based on images of the eye. In general, one aspect of the subject matter...
US-9,971,919 Systems and method to adaptively optimize RFID-based point-of-sale performance
Systems and methods for adaptively optimizing RFID-based POS performance are described. In various aspects, one or more processors and one or more image sensors...
US-9,971,918 Systems and methods for RFID-based access management of electronic devices
Disclosed are systems and methods for preventing unauthorized persons from using an electronic device within a facility. In such an embodiment, the system may...
US-9,971,917 Thermal printer with a quick release cover
A high speed tabletop and industrial printer is disclosed with integrated high speed RFID encoding and verification at the same time. The industrial printer...
US-9,971,916 Transaction scheduling system for a wireless data communications network
System and method for scheduling and coordinating transmission signals in a wireless data communications network, comprising a master node and at least one tag...
US-9,971,915 Magnetic card reader
A magnetic stripe reader including a base element defining a first spring seat, a magnetic module support element arranged for limited pivotable motion relative...
US-9,971,914 Industrial simulation using redirected I/O module configurations
A simulation environment for running a process simulation used to validate an industrial control program. The simulation environment exposes the I/O module...
US-9,971,913 Adaptively combining waveforms
A circuit may be configured to adaptively combine two or more waveforms into a single waveform. The circuit can generate weighting factors based on received...
US-9,971,912 Method, apparatus, and system for manageability and secure routing and endpoint access
A solution is presented to securing endpoints without the need for a separate bus or communication path. The solution allows for controlling access to endpoints...
US-9,971,911 Method and device for providing a private page
Methods and devices for providing a private page are provided. A method includes operations of entering a security mode based on a user input; extracting the...
US-9,971,910 Multi-level security domain separation using soft-core processor embedded in an FPGA
A system and method for operating multiple security domains on one circuit card assembly, using a field-programmable gate array (FPGA) with an embedded security...
US-9,971,909 Method and apparatus for secure execution using a secure memory partition
A processor capable of secure execution. The processor contains an execution unit and secure partition logic that secures a partition in memory. The processor...
US-9,971,908 Method and apparatus for determining permission of application program
A method for determining a permission of an application program is presented. The method for determining a permission of an application program in the present...
US-9,971,907 Zero-knowledge databases
Provided is a process of operating a zero-knowledge encrypted database, the process including: obtaining a request for data in a database stored by an untrusted...
US-9,971,906 Apparatus and method for continuous data protection in a distributed computing network
A system for secure data storage and transmission is provided. The system comprises a first security module for protecting data in a first data at rest system...
US-9,971,905 Adaptive access control in relational database management systems
One embodiment is a system for implementing context-aware access control of data in a relational database system. The system includes a memory having computer...
US-9,971,904 Method and system for range search on encrypted data
A method for searching encrypted data includes identifying, with a client, a plurality of values within a predetermined search range in a search index stored...
US-9,971,903 Masking of different content types
Systems and methods for masking content of different types are described. The system may implement the method comprising receiving a request to mask input...
US-9,971,902 Terminal device, method for protecting terminal device, and terminal management server
A terminal device includes: a memory unit to store a lock program for locking the terminal device; a condition checking unit to determine whether the terminal...
US-9,971,901 Content management apparatus and content management method
A content management apparatus as an embodiment of the present invention associates content information on content with group information on a user...
US-9,971,900 Zero-copy data privacy and integrity
Implementations are provided herein for maintaining a set of cryptographic algorithms in the kernel. User space applications can call on the set of...
US-9,971,899 Secure, targeted, customizable data removal
A method for securely removing data from a storage system is disclosed. In one embodiment, such a method includes receiving, by a storage system, instructions...
US-9,971,898 Method and system for providing anonymized data from a database
The invention relates to a method for providing an anonymized value for a data element stored with an original value in a database of a database system, wherein...
US-9,971,897 Targeted security testing
Source code of a plurality of web pages including script code is statically analyzed. A page including a potential vulnerability is identified based on the...
US-9,971,896 Targeted security testing
Source code of a plurality of web pages including script code is statically analyzed. A page including a potential vulnerability is identified based on the...
US-9,971,895 Method and apparatus for supporting dynamic change of authentication means secure booting
A method for supporting change of the authentication means for secure booting with the change of the trust root (root of trust) of the readymade electronic...
US-9,971,894 Methods and systems for secure and reliable identity-based computing
The embodiments herein provide a secure computing resource set identification, evaluation, and management arrangement, employing in various embodiments some or...
US-9,971,893 Analysis of scripts
A method and associated system. A first computer executes at least two text blocks of code derived from a script of a web page in response to a request for the...
US-9,971,892 Method, apparatus and computer device for scanning information to be scanned
The present invention provides a method for scanning information to be scanned in a computer device, the information to be scanned needing multiple scans, and...
US-9,971,891 Methods, systems, and media for detecting covert malware
Methods, systems, and media for detecting covert malware are provided. In accordance with some embodiments, a method for detecting covert malware in a computing...
US-9,971,890 Securing thermal management parameters in firmware from cyber attack
Methods and systems may provide for identifying a thermal management setting in a computing system, and comparing the thermal management setting to valid...
US-9,971,889 Communication system and method for nodes associated with a vehicle
Devices and nodes associated with a vehicle may communicate using a higher-level, common messaging protocol over an ad-hoc network to publish and subscribe to...
US-9,971,888 OS security filter
A system and method for protecting against the unauthorized use of operating system level commands is disclosed. The system includes a computer module...
US-9,971,887 Cognitive password pattern checker to enforce stronger, unrepeatable passwords
A method for determining a password strength is provided. The method may include receiving a user-entered password. The method may also include identifying a...
US-9,971,886 Computer keyboard with secure authentication features
A keyboard is disclosed. The keyboard may comprise a biometric sensor configured for authenticating a user; a docking station configured for receiving a...
US-9,971,885 Determining user authentication requirements based on the current location of the user being within a...
Systems, apparatus, methods, and computer program products are provided for determining a user's authentication requirements/credentials for a specific network...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.