Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0308743 ADAPTIVE TRACKING SYSTEM FOR SPATIAL INPUT DEVICES
An adaptive tracking system for spatial input devices provides real-time tracking of spatial input devices for human-computer interaction in a Spatial...
2017/0308742 FACIAL EXPRESSION RECOGNITION USING RELATIONS DETERMINED BY CLASS-TO-CLASS COMPARISONS
Facial expressions are recognized using relations determined by class-to-class comparisons. In one example, descriptors are determined for each of a plurality...
2017/0308741 COMPUTERIZED SYSTEM AND METHOD FOR CONTINUOUSLY AUTHENTICATING A USERS IDENTITY DURING AN ONLINE SESSION AND...
A method and system is disclosed for confirming the identity of students taking an exam online. A camera or similar device compares the image of a student to a...
2017/0308740 BIOMETRIC IDENTIFICATION SYSTEMS AND METHODS
An exemplary embodiment of the present invention provides a method of verifying an identity of a person-to-be-identified using biometric signature data. The...
2017/0308739 HUMAN FACE RECOGNITION METHOD AND RECOGNITION SYSTEM
The embodiment of the present invention provides a human face recognition method and recognition system. The method includes that: a human face recognition...
2017/0308738 FACE RECOGNITION METHOD, DEVICE AND COMPUTER READABLE STORAGE MEDIUM
A face recognition method, device and a computer-readable storage medium are provided. The face recognition method includes: capturing face images of a user at...
2017/0308737 METHOD AND DEVICE TO SPEED UP FACE RECOGNITION
Method to customize an application associated with a television experience based on the recognition of users located in front of a display and in the field of...
2017/0308736 THREE DIMENSIONAL OBJECT RECOGNITION
A methods and system for recognizing a three dimensional object on a base are disclosed. A three dimensional image of the object is received as a ...
2017/0308735 FINGER PRINT DETECTION APPARATUS AND DETECTION METHOD THEREOF
The finger print detection method includes: accessing a part of an input image to generate a checked image; setting a gray level range, wherein each of a gray...
2017/0308734 EYE CONTACT CORRECTION IN REAL TIME USING NEURAL NETWORK BASED MACHINE LEARNING
Techniques related to eye contact correction to provide a virtual user gaze aligned with a camera while the user views a display are discussed. Such techniques...
2017/0308733 DISPLAY DEVICE, REMOTE CONTROL DEVICE, DISPLAY SYSTEM AND PROGRAM PUSHING METHOD
A display device, a remote control device, a display system and a program pushing method are disclosed. The display device includes: a first obtaining module...
2017/0308732 FINGERPRINT RECOGNITION METHOD AND APPARATUS, AND MOBILE TERMINAL
The present disclosure discloses a fingerprint recognition method and apparatus, and a mobile terminal, which are related to the field of information...
2017/0308731 FINGERPRINT SENSORS FOR MOBILE DEVICES
Various embodiments concern fingerprint sensors for mobile devices. By modifying one or more layers of a display assembly, a fingerprint sensor can be...
2017/0308730 FINGERPRINT SENSING SYSTEM WITH SENSING REFERENCE POTENTIAL PROVIDING CIRCUITRY
A fingerprint sensing system comprising a device connection interface including a device reference potential input, a sensing arrangement, and sensing...
2017/0308729 FINGERPRINT SENSOR APPARATUS AND A METHOD FOR CONTROLLING THE FINGERPRINT SENSOR APPARATUS
A fingerprint sensor apparatus including a sampling unit, an analysing unit and a processor unit is provided. The sampling unit is configured to sense a...
2017/0308728 RFID Systems Using Distributed Exciter Network
RFID systems are disclosed that include at least one RFID receiver system and a distributed exciter architecture. Exciters can be connected via wired and/or...
2017/0308726 MAGNETIC IDENTIFICATION ASSEMBLY AND METHOD OF IDENTIFYING A COMPONENT
An embedded magnetic identification assembly includes a base component formed of a material. Also included is a plurality of elements formed in an array at a...
2017/0308725 Circuit Board Enclosure and Method for Communications Applications
A data card enclosure method and system comprising data card connectors and host interface connectors on a data card housed in the data card enclosure. The...
2017/0308724 Integrated Power Supply Scheme for Powering Memory Card Host Interface
This invention is an SOC with an integrated single rail power supply that interfaces with the host controller and dynamically changes the host interface supply...
2017/0308723 USB SECURITY DEVICE, APPARATUS, METHOD AND SYSTEM
A self-locking USB filter device is disclosed that comprises at least one permanently attachable self-locking USB plug having at least one locking tooth to...
2017/0308722 STORAGE APPARATUS HAVING NONVOLATILE MEMORY DEVICE, AND NONVOLATILE MEMORY DEVICE
A nonvolatile memory device includes: a nonvolatile memory including a plurality of physical blocks; and a memory controller configured to execute an internal...
2017/0308721 SETTING SECURITY FEATURES OF PROGRAMMABLE LOGIC DEVICES
Systems and methods are disclosed for allowing security features to be selectively enabled during device configuration. For example, a programmable integrated...
2017/0308720 METHOD OF ACCESSING FUNCTIONS OF AN EMBEDDED DEVICE
A method for accessing functions of an embedded device, for example a controller programmable from memory, wherein function blocks of the embedded device are...
2017/0308719 INHIBITING A PENETRATION ATTACK
A technique includes providing a security monitor to at least detect a penetration attack on a circuit assembly that contains the security monitor. The...
2017/0308718 NET2CORE A SERVER APPLICATION DESIGN FRAMEWORK THAT FACILITATES ACCESS TO INFORMATION, AND PROTECTS INFORMATION...
Net2Core is a Server Application Design Framework that provides inherent security for information due to its tri-partite structure. The Net2Core Server...
2017/0308717 METHODS AND SYSTEMS FOR ANONYMIZING GENOME SEGMENTS AND SEQUENCES AND ASSOCIATED INFORMATION
Various methods and systems for processing at least some of genome sequences and at least some of associated information, for an individual, may be described...
2017/0308716 CENTRALIZED IDENTIFICATION AND AUTHENTICATION SYSTEM AND METHOD
Systems and methods are provided for enabling online entities to determine whether a user is truly the person who he says using a two-factor authentication...
2017/0308715 CONTROLLING DATA USAGE USING STRUCTURED DATA GOVERNANCE METADATA
Systems and methods provide for data management and governance to enforce proper usage of data. Data is tagged with data governance metadata dictating usage of...
2017/0308714 DATA MANAGEMENT FOR COMBINED DATA USING STRUCTURED DATA GOVERNANCE METADATA
Systems and methods provide for data management and governance to enforce proper usage of combined data formed from different pieces of data. Data governance...
2017/0308713 Context-Driven On-Device Data Protection
An approach is provided that provides data protection in a mobile device. The approach monitors a set of sensor data at the mobile device to determine a...
2017/0308712 Automatic Audit Logging of Events in Software Applications Performing Regulatory Workloads
Automatically generating audit logs is provided. Audit log statement insertion points are identified in components of an application based on a static code...
2017/0308711 SYSTEM AND METHODS THEREOF FOR PREVENTING RANSOMWARE FROM ENCRYPTING DATA ELEMENTS STORED IN A MEMORY OF A...
A computerized method for preventing ransomware from encrypting data elements stored in a memory of a computer-based system, the method comprising identifying...
2017/0308710 DATA TRANSMISSION PROTECTION METHOD AND APPARATUS, STATION, AND ACCESS POINT
A data transmission protection method includes: receiving, by a station, resource allocation information sent by an access point; obtaining, according to a...
2017/0308709 METHOD AND APPARATUS FOR SECURE DATA TRANSFER
Methods and apparatus for secure transfer of electronic or optical data. In one exemplary aspect, a method is provided whereby data on a source computer is...
2017/0308708 DATA CHECKING APPARATUS AND METHOD USING SAME
A data checking device that is connected to a communication entity includes: a port unit configured to communicate with the communication entity; a key storage...
2017/0308707 Mechanism to Calculate Probability of a Cyber Security Incident
An Archetype Software Invention which calculates the probability of a cyber security incident for a given computer by correlating the distribution of computer...
2017/0308706 BOOT SECURITY
In one aspect, a method for securing a device includes receiving a first set of boot information of a device, receiving a first cryptographic proof of the...
2017/0308705 SYSTEM, DEVICE AND METHOD FOR ANTI-ROLLBACK PROTECTION OF OVER-THE-AIR UPDATED DEVICE IMAGES
Technologies for updating a processing device, where a first device image is stored in a first (non-volatile) memory. When a new second device image is...
2017/0308704 BOOT SECURITY
In one aspect, a method for securing a device includes receiving a first set of boot information from a first device, the first set of boot information...
2017/0308703 ELECTRONIC SYSTEM HAVING INTEGRITY VERIFICATION DEVICE
Provided are an electronic system, an integrity verification device, and a method of performing an integrity verification operation. The electronic system...
2017/0308702 METHOD FOR DYNAMICALLY CONTROLLING APPLICATION FUNCTION BASED ON ENVIRONMENT DETECTION
The invention discloses a method of dynamically controlling application function at the client, comprising: initiating an application program which merely...
2017/0308701 Methods and Systems for Intelligently Detecting Malware and Attacks on Client Computing Devices and Corporate...
A network and its devices may be protected from non-benign behavior, malware, and cyber attacks caused by downloading software by configuring a server...
2017/0308700 METHOD AND APPARATUS FOR RETROACTIVELY DETECTING MALICIOUS OR OTHERWISE UNDESIRABLE SOFTWARE AS WELL AS CLEAN...
Techniques are provided for the detection of malicious software (malware) on a general purpose computing device. A challenge in detecting malicious software is...
2017/0308699 SYSTEMS AND METHODS FOR DETECTING UNDESIRABLE NETWORK TRAFFIC CONTENT
A method of detecting a content desired to be detected includes receiving electronic data at a first host, determining a checksum value using the received...
2017/0308698 SCANNING CONTENT ITEMS BASED ON USER ACTIVITY
In some embodiments, a content management system can initiate a scan of a content item when the content management system detects that activity associated with...
2017/0308697 Systems and Methods for Compiler Guided Secure Resource Sharing
A data processing system is disclosed that includes an Input/output (I/O) interface to receive incoming data and an in-line accelerator coupled to the I/O...
2017/0308696 ALLOCATION OF SHARED SYSTEM RESOURCES
Techniques are described for allocating resources to a task from a shared hardware structure. A plurality of tasks may execute on a processor, wherein the...
2017/0308695 SMART RANDOM PASSWORD GENERATION
A method for generating a password for accessing a password-protected service is disclosed. A password requirements database and default password generation...
2017/0308694 Real-time biometric authentication through remote server
The present invention provides a system and method for real-time biometric authentication, wherein the system comprises a local device, a remote server, a...
2017/0308693 MULTI-FACTOR AUTHENTICATION SYSTEM AND METHOD
A system and method of multi-factor authentication are described. In some embodiments, a first device provides an initial authentication data to a second...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.