Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,023,5559 Dot detection, color classification of dots and counting of color classified dots
The present disclosures relates to a method of detecting, classifying, and counting dots in an image of a tissue specimen comprising detecting dots in an image...
US-1,023,5558 Fingerprint sensor-compatible overlay material
A fingerprint sensor-compatible overlay material which uses anisotropic conductive material to enable accurate imaging of a fingerprint through an overlay is...
US-1,023,5557 Method and apparatus for sensing fingerprint
Methods and apparatuses are provided for a fingerprint sensing apparatus. In one embodiment, a fingerprint sensing apparatus comprises a light source configured...
US-1,023,5556 Frustrated total internal reflection fingerprint detector
The device provides an optical coherence tomography system; a first bank of light emitting diodes emitting light centered about a first wavelength; a second...
US-1,023,5555 Optical fingerprint recognition sensor package
An optical fingerprint recognition sensor package, which comprises a carrier, at least one image sensor, at least one light emitting diode, a first molding...
US-1,023,5554 Organic light-emitting diode display substrate, display panel and semiconductor device containing the same, and...
The present disclosure provides an organic light-emitting diode (OLED) display substrate. The OLED display substrate includes a plurality of pixel regions for...
US-1,023,5553 Display device for fingerprint detection
A display device for fingerprint detection is disclosed. The display device includes a plurality of gate lines and a plurality of data lines, a first switching...
US-1,023,5552 Hybrid capacitive and ultrasonic sensing
Systems, methods and apparatus for configuring a fingerprint sensor to operate in a capacitive sensing mode and an ultrasonic sensing mode are disclosed. A...
US-1,023,5551 Biometric system with photoacoustic imaging
A biometric system may include an ultrasonic sensor array, a light source system and a control system. Some implementations may include an ultrasonic...
US-1,023,5550 Methods and systems for capturing biometric data
A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an...
US-1,023,5549 Jig and manufacturing method for fingerprint identification module
A jig for a fingerprint identification module includes a base, a top cover and a rotating shaft. The rotating shaft is connected with the base or the top cover....
US-1,023,5548 Method for setting fingerprint sensor interrupt threshold, apparatus, and terminal device
The present invention provides a method: obtaining background noise of a wakeup region on a fingerprint sensor in a terminal device, where the wakeup region is...
US-1,023,5547 Enhanced matrix symbol error correction method
A system and method for error correction for machine-readable symbols having data codewords, and having error correction (EC) codewords derived from the data...
US-1,023,5546 Systems and methods for detecting and decoding barcodes with bar dilation
Systems and methods for detecting and decoding 4-state barcodes with extreme bar dilation are disclosed. The method is implemented in a computing device and...
US-1,023,5545 Systems and methods for synchronizing a plurality of RFID interrogators in a theatre of operation
RFID tags are used for many purpose including tracking. RFID interrogators are used to retrieve information from tags. In many applications, a plurality of RFID...
US-1,023,5544 Inspection method and inspection device for RFID tag
An RFID tag inspection method includes the steps of transmitting a measurement signal from a reader/writer simultaneously to a plurality of RFID tags arrayed on...
US-1,023,5543 Booster antenna structure for a chip card
A booster antenna structure for a chip card. The booster antenna structure includes a first electrical circuit, which forms a first resonant circuit, a second...
US-1,023,5542 Jewelry including etched or printed information and method to optically or wirelessly access digital replica of...
A jewelry article, and systems and methods for accessing human readable information printed or etched on the jewelry article are disclosed. The printed or...
US-1,023,5541 System and method for confidential data management
The present invention discloses a system and method for confidential data management, which is adapted for managing confidential data saved at a private space...
US-1,023,5540 Apparatus and method for generating identification key
Provided is an apparatus for generating an identification key by a probabilistic determination of a short occurring between nodes constituting a circuit, by...
US-1,023,5539 Server device, recording medium, and concealed search system
A server device 201 comprises a communication part 231, a search history storage region 213, a data storage part 210, and a checking part 220. The communication...
US-1,023,5538 Method and server for providing notary service for file and verifying file recorded by notary service
A method is provided for providing a notary service for a file, the method including the steps in which: (a) when a notary service request for a specific file...
US-1,023,5537 Computer system of computer servers and dedicated computer clients specially programmed to generate synthetic...
In some embodiments, the present invention provides for an exemplary computer system which includes at least: a graphical user interface client; a dedicated...
US-1,023,5536 Relationship-based image modification
For relationship-based image modification, a processor determines a relationship level for a requester of an image of a plurality of images. The processor...
US-1,023,5535 Transmitting medical data records
The present embodiments relate to a method for transmitting medical data records. The method includes receiving a patient data record from an internal data...
US-1,023,5534 Data processing systems for prioritizing data subject access requests for fulfillment and related methods
In various embodiments, a data subject request fulfillment system may be adapted to prioritize the processing of data subject access requests based on metadata...
US-1,023,5533 Multi-user access controls in electronic simultaneously editable document editor
A system with an interactive user interface for a plurality of users to author an electronic document simultaneously is described. The system displays visual...
US-1,023,5532 Device access control
Examples are provided for device access control. In one example, a computing device to which access is controlled includes a display device for presenting a...
US-1,023,5531 Column protection
Methods, systems, and apparatus, including computer program products, are provided for configuring access controls to a database. In one aspect there is...
US-1,023,5530 Protecting sensitive information when replicating data to remote systems
Techniques are provided for replicating database contents to network-enabled remote systems, and limiting such replication with respect to sensitive database...
US-1,023,5529 Tracking of web-based document access requests
A document controller receives a document access request from an access device to access an electronic document associated with an access location attribute and...
US-1,023,5528 Automated determination of vulnerability importance
A mechanism is provided for automatically determining an importance of vulnerabilities identified in an application. An identified application is scanned for a...
US-1,023,5527 Vulnerability notification for live applications
Methods, systems, and computer-readable media for monitoring states of application packages deployed on a cloud-based application deployment platform. A...
US-1,023,5526 Secure resume from a low power state
Various embodiments are directed to a system for accessing a self-encrypting drive (SED) upon resuming from a sleep power mode (SPM) state. An SED may be...
US-1,023,5525 Application providing server, application setting terminal, application providing system, method of providing...
The present invention is to provide an application providing server, an application setting terminal, an application providing system, a method of providing an...
US-1,023,5524 Methods and apparatus for identifying and removing malicious applications
A system, method, and apparatus for identifying and removing malicious applications are disclosed. An example apparatus includes an executable application...
US-1,023,5523 Avionics protection apparatus and method
An apparatus for a network of electrical and/or electronic devices coupled to a data bus comprises a sensor coupled to the data bus and configured to capture...
US-1,023,5522 Definition structure of program for autonomously disabling invading virus, program equipped with structure,...
Even if a virus invades a program in operation according to the present invention, regardless of the timing and means of invasion and the number of attempts...
US-1,023,5521 Malware detection using clustering with malware source information
Techniques for malware detection using clustering with malware source information are disclosed. In some embodiments, malware detection using clustering with...
US-1,023,5520 System and method for analyzing patch file
A system and method for analyzing a patch file determine the similarity between a patch file of an application program and an existing file in terms of an...
US-1,023,5519 Methods and systems for identifying potential enterprise software threats based on visual and non-visual data
Visual and non-visual elements associated with the candidate files are analyzed to determine whether the candidate files are malware. A visual element (e.g.,...
US-1,023,5518 Application execution control utilizing ensemble machine learning for discernment
Described are techniques to enable computers to efficiently determine if they should run a program based on an immediate (i.e., real-time, etc.) analysis of the...
US-1,023,5517 Robust device authentication
An apparatus includes a finite state machine and a physical structure capable of providing a response to a challenge, the physical structure such that before...
US-1,023,5516 Method for authenticating a networked endpoint using a physical (power) challenge
Various systems and methods for using power challenges to authenticate network devices are disclosed herein. For example, one method involves initiating a power...
US-1,023,5515 Method and apparatus for on-demand isolated I/O channels for secure applications
A computing platform for on-demand I/O channels, which enable secure application to dynamically connect to diverse peripheral devices of untrusted commodity OSes.
US-1,023,5514 Game controller-based captcha
A CAPTCHA is presented on a display and a user of a hand-held controller such as a computer game controller is prompted to respond to the image. A correct...
US-1,023,5513 System and method for providing secure identification solutions
The present invention provides a method and system for verifying and tracking identification information. In an embodiment of the invention, a system for...
US-1,023,5512 Systems and methods for authentication via bluetooth device
A system and/or method is provided to implement authentication via Bluetooth devices. In particular, a user's Bluetooth device, such as a smart phone, may be...
US-1,023,5511 Authentication integrity protection
Systems, methods, and processor-readable media are disclosed to adaptively secure access operations with respect to electronic resources. A request from an...
US-1,023,5510 Wearable device and method of operating the same
A wearable device includes: a sensor configured to capture a vein image of a user; and a processor configured to control the sensor to capture the vein image of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.