Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0171868 SYSTEMS AND METHODS FOR FACIAL REPRESENTATION
Systems, methods, and non-transitory computer readable media can align face images, classify face images, and verify face images by employing a deep neural...
2019/0171867 SYSTEMS AND METHODS FOR PROVIDING AUGMENTED REALITY OVERLAYS
Systems, methods, and non-transitory computer-readable media can identify one or more objects depicted in a camera view of a camera application displayed on a...
2019/0171866 APPARATUS AND METHOD FOR DATA PROCESSING
An apparatus and a method for data processing are provided. The apparatus for data processing includes a modeler configured to build an occlusion object model...
2019/0171865 DESIGN SUPPORT METHOD, SERVER, AND DESIGN SUPPORT SYSTEM
A design support system for permitting a design that easily meets desired conditions regarding an entire item group is provided. An automatic estimation system...
2019/0171864 INTER-OBJECT RELATION RECOGNITION APPARATUS, LEARNED MODEL, RECOGNITION METHOD AND NON-TRANSITORY COMPUTER...
An Inter-object relation recognition apparatus includes: a first learning device receiving an image, and outputting a first feature amount of the image; a...
2019/0171863 BIOMETRIC IMAGE PROCESSING APPARATUS, BIOMETRIC IMAGE PROCESSING METHOD, AND BIOMETRIC IMAGE PROCESSING PROGRAM
A biometric image processing apparatus includes a touch panel, an biometric sensor configured to capture an image of a living body, and a processor. The...
2019/0171862 METHOD OF EXTRACTING IMAGE OF PORT WHARF THROUGH MULTISPECTRAL INTERPRETATION
A method of extracting an image of a port wharf through multispectral interpretation includes: first, extracting a blurred coastline by assigning values to...
2019/0171861 Image Pixel, Image Acquisition Device, Fingerprint Acquisition Apparatus, and Display Apparatus
Disclosed are an imaging pixel, an image acquisition device, a fingerprint acquisition apparatus, and a display apparatus supporting an acquisition function....
2019/0171860 FINGERPRINT RECOGNITION UNIT CIRCUIT, CONTROL METHOD THEREFOR, AND FINGERPRINT RECOGNITION APPARATUS
A fingerprint recognition unit circuit is provided, including a read line, a signal scanning terminal, a first power supply terminal, a second power supply...
2019/0171859 FINGERPRINT DETECTION DEVICE AND DISPLAY DEVICE
A fingerprint detection device includes: a substrate having a first surface and a second surface on an opposite side of the first surface, the first surface...
2019/0171858 DARKFIELD TRACKING
In a method for darkfield tracking at a sensor, it is determined whether an object is interacting with the sensor. Provided an object is not interacting with...
2019/0171857 SEMICONDUCTOR DEVICE AND FINGERPRINT SENSOR DEVICE THEREOF
Embodiments of the disclosure relate to a semiconductor device. The semiconductor device includes a semiconductor substrate, a first metal wiring layer...
2019/0171856 GENERATING AND READING OPTICAL CODES WITH VARIABLE DENSITY TO ADAPT FOR VISUAL QUALITY AND RELIABILITY
The parameters of an optical code are optimized to achieve improved signal robustness, reliability, capacity and/or visual quality. An optimization program can...
2019/0171855 COMPACT CAMERA MODULE WITH MULTILEVEL ZOOM AND FOCUS DISTANCE UTILIZING A SWITCHABLE MIRROR
One embodiment of a system and method for imaging a scene from a barcode scanner device may include creating a first and second optical paths of the scene, and...
2019/0171854 HIGHLY EFFICIENT AND EYE-SAFE ILLUMINATION UNIT FOR A BARCODE READER
A system and method of imaging barcodes may include generating a first light beam from an illumination surface having first dimensions. The first light beam...
2019/0171853 LOCAL TONE MAPPING FOR SYMBOL READING
Embodiments related to local tone mapping for symbol reading. A local pixel neighborhood metric is determined for at least one raw pixel in a ...
2019/0171852 TRACKING OBJECTS IN A TWO DIMENSIONAL SPACE
A method for tracking objects in a two-dimensional space includes first tracking devices that are activated to read tagged objects within the reading ranges of...
2019/0171851 TAMPER-PROOF CARD READER WITH A DRILLING PROTECTION COVER
A card reader includes a contacting unit for exchanging data with a chip card and a plastic drilling protection cover which covers the contacting unit and has...
2019/0171850 APPARATUS AND METHOD FOR GENERATING IDENTIFICATION KEY
Provided is an apparatus for generating an identification key by a probabilistic determination of a short occurring between nodes constituting a circuit, by...
2019/0171849 Computer-Implemented Method And System Of Tamper-Evident Recording Of A Plurality Of Service Data Items
A computer-implemented method and a corresponding system of tamper-evident recording of a plurality of service data items are provided. Each service data item...
2019/0171848 DISTRIBUTED DATA MANAGEMENT AND VERIFICATION
In response to a request by a data furnisher system to add data to that organized by a system, a data coordinating system resolves the identity of...
2019/0171847 METHOD FOR STORING DATA BLOCKS FROM CLIENT DEVICES TO A CLOUD STORAGE SYSTEM
The invention relates to a method for storing data blocks from client devices to a cloud storage system, the method includes the steps of: d) storing an...
2019/0171846 SYSTEM AND METHOD FOR CODE-BASED PROTECTION OF SENSITIVE DATA
A system and method for monitoring and protecting sensitive data that includes identifying sensitive data and statically tracking sensitive data using data...
2019/0171845 SHARING USER INFORMATION WITH AND BETWEEN BOTS
Systems, methods, and computer-readable storage media are provided for sharing user-information with bots. An automated task to be performed on behalf of a...
2019/0171844 AUTOMATED DOCUMENT ACCESS REGULATION SYSTEM
Methods, systems, and apparatus for automatically assembling documents. The system includes a client device which communicates a document file. The system...
2019/0171843 APPLICATION-LEVEL IN-PLACE ENCRYPTION
A method includes obtaining first text information in a first format, converting the first text information to an offset value from a base time in a second...
2019/0171842 EXTENSIBILITY TOOLS FOR DEFINING CUSTOM RESTRICTION RULES IN ACCESS CONTROL
Techniques are described for providing extensibility tools to customers for defining custom restriction rules for enhanced access controls. In an example...
2019/0171841 METHOD AND SYSTEM FOR ENCRYPTING FILES AND STORING THE ENCRYPTED FILES IN A STORAGE FILE SYSTEM
A method, system and a computer program product for encrypting files and storing the encrypted files in a storage file system. A software encryption layer is...
2019/0171840 ACCESS CONTROLLED GRAPH QUERY SPANNING
Controlling access to nodes in a relational graph at query time by using an approximate membership query (AMQ) filter and ordered queries based on historic...
2019/0171839 Privacy Preserving Data Search
Database entries can be protected by indexing the entries using a plurality of indexes, each associated with a level of access rights. A level of access rights...
2019/0171838 FRAGMENTING DATA FOR THE PURPOSES OF PERSISTENT STORAGE ACROSS MULTIPLE IMMUTABLE DATA STRUCTURES
Provided is a process including: receiving one or more write requests; selecting a first subset of the values as corresponding to higher-security fields;...
2019/0171837 MULTI-USER ACCESS CONTROLS IN ELECTRONIC SIMULTANEOUSLY EDITABLE DOCUMENT EDITOR
A system with an interactive user interface for a plurality of users to author an electronic document simultaneously is described. The system displays visual...
2019/0171836 SECURITY KEY ENTRY USING ANCILLARY INPUT DEVICE
A physical, non-human readable representation of a digital key may be in a physical key article. The key article may enable a person to generate a signal...
2019/0171835 SECURE DISTRIBUTED BACKUP FOR PERSONAL DEVICE AND CLOUD DATA
Methods, apparatus, systems and articles of manufacture are disclosed for secure distributed backup for personal device and cloud data. An example method...
2019/0171834 SYSTEM AND METHOD FOR DATA MANIPULATION
A system of dynamic data redaction within a computing device comprises a computing device having at least one processor, storage media, and a visual interface,...
2019/0171833 PROTECTION OF DATA PRIVACY FOR COGNITIVE DEMAND FORECASTING
Machine logic (for example, software) for protecting sensitive and confidential user data and sending the protected user data to an authorized third party for...
2019/0171832 RULE BASED ACCESS TO VOLUNTARILY PROVIDED DATA HOUSED IN A PROTECTED REGION OF A DATA STORAGE DEVICE
Structured access to volunteered private data disclosed. Access can be based on security and privacy constraint information (SPCI) that can be selected by the...
2019/0171831 APPLICATION FREEZING MANAGEMENT METHOD, DEVICE AND TERMINAL
An application freezing management method, a device and a terminal are provided, and the method includes: acquiring at least one application freezing...
2019/0171830 SYSTEM AND METHOD FOR THE CREATION AND MANAGEMENT OF DECENTRALIZED AUTHORIZATIONS FOR CONNECTED OBJECTS
Computing systems and methods for the creation and management of authorizations of blockchain objects. Systems and methods managed by a controlled number of...
2019/0171829 SECURE DATA STORAGE AND ACCESS DURING TRANSITION OPERATIONS
A technique for secure data storage and access during transition operations includes retrieving an encrypted instance of a data object from a data store. The...
2019/0171828 Digital Data Processing System For Efficiently Storing, Moving, And/Or Processing Data Across A Plurality Of...
A method, apparatus, computer-readable medium, and/or system described herein may be used to efficiently store, move, and/or process data across a plurality of...
2019/0171827 DATA SECURITY USING HIGH SPEED SERIAL EQUALIZATION
A system includes a transmit equalizer to equalize a data stream using a set of transmit parameters to generate an input signal. The system further includes a...
2019/0171826 APPARATUS AND METHOD FOR BLOCKING RANSOME WARE USING ACCESS CONTROL TO THE CONTENTS FILE
The present application relates to the apparatus for blocking Ransome ware using access control to the contents file, it includes an access permission program...
2019/0171825 METHOD AND SYSTEM FOR DATA SECURITY, VALIDATION, VERIFICATION AND PROVENANCE WITHIN INDEPENDENT COMPUTER...
A system and method for reliably and securely recording and storing all attributes of data, such as for the identification and authorization of individual...
2019/0171824 VERIFYING PROPER OPERATION OF THE INSTRUCTION EXECUTION PROTECTION ARCHITECTURE
A computer-implemented method includes executing one or more tests on a computing device. The computing device has Instruction Execution Protection (IEP), and...
2019/0171823 KEY THREAT PREDICTION
In one example embodiment, a network-connected device provides or obtains one or more computer network communications protected by a key. The network-connected...
2019/0171822 SYSTEMS AND METHODS FOR AIDA CAMPAIGN CONTROLLER INTELLIGENT RECORDS
Systems and methods, disclosed herein, of a campaign controller that stores information to a database about execution of multiple simulated phishing campaigns...
2019/0171821 PROCESSING APPARATUS, AND SEMICONDUCTOR INTEGRATED CIRCUIT AND BOOT METHOD THEREFOR
A semiconductor integrated circuit generates second boot code by encrypting first boot code, and transmits, based on route information indicating a delivery...
2019/0171819 SECURE FIRMWARE PROVISIONING AND DEVICE BINDING MECHANISM
Electronic computing devices provide a method to update firmware. The method includes receiving a firmware image at an electronic device, the electronic device...
2019/0171817 PROACTIVE BROWSER CONTENT ANALYSIS
A protection module operates to analyze threats, at the protocol level (e.g., at the HTML level), by intercepting all requests that a browser engine resident...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.