Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,785,819 Systems and methods for biometric image alignment
Systems and methods for aligning images are disclosed. A method includes receiving an input image of a biometric object; identifying a plurality of sets of...
US-9,785,818 Systems and methods for image alignment
Systems and methods for image alignment are disclosed. A method includes: determining a first set of patches for a first image and a second set of patches for a...
US-9,785,817 Region of interest location and selective image compression
Systems and methods of operation for an image processor system to process images to locate two-dimensional regions which are likely to contain machine-readable...
US-9,785,816 Barcode decoding method
A barcode decoding method includes steps of analyzing a relative relationship between at least two characteristic points of a gray level distribution of a...
US-9,785,815 Imaging terminal, imaging sensor to determine document orientation based on bar code orientation and methods...
Embodiments of an image reader and/or methods of operating an image reader can capture an image, identify a bar code or IBI form within the captured image, and,...
US-9,785,814 Three dimensional aimer for barcode scanning
A method of assisting in focusing a three dimensional camera system on an object within a field of view is disclosed. The process involves at the camera system,...
US-9,785,813 Portable optical reader
A portable optical reader is provided with: a reading part 41 optically reading a symbol as a reading object; a head part 3 storing the reading part 41 and...
US-9,785,812 Enclosure for an optical device
In accordance with an example embodiment, there is disclosed herein, an apparatus, comprising a bezel, a cover, and a thermally conductive, electrically...
US-9,785,811 Image capture and processing system supporting a multi-tier modular software architecture
An image capture and processing system supports a multi-tier modular software, and plug-in extendable, architecture. The image capture and processing system can...
US-9,785,810 Method and system for storing, retrieving, and managing data for tags
This invention relates generally to a method and system for storing, retrieving, and managing data for tags that are associated in some manner to any type of...
US-9,785,809 Electrical activity sensor device for detecting electrical activity and electrical activity monitoring apparatus
An electrical activity monitoring device based on a sensor device attachable to a power cable of an electrical device for monitoring the electrical status of...
US-9,785,808 Control device, medical control system and method for transmitting a command
The embodiments relate to a control device for transmission of at least one command. The control device includes at least one RFID transponder unit for...
US-9,785,807 Method and apparatus for sensing environment using a wireless passive sensor
A method and apparatus for detecting RF field strength. A field strength reference generator develops a field strength reference current as a function of a...
US-9,785,806 Low-frequency receiving for radio frequency identification
A radio frequency identification (RFID) tag includes a power source, a transmitter to transmit a unique identifier, and a receiver operatively coupled to the...
US-9,785,805 Reel receiving device based on RFID
A reel receiving device based on RFID is disclosed. A reel receiving device according to one embodiment of the present invention includes a reel receiving...
US-9,785,804 Multi-protocol RFID system
A multi-protocol RFID interrogating system employs a synchronization technique (step-lock) for a backscatter RFID system that allows simultaneous operation of...
US-9,785,803 Method, apparatus and system for collecting tags using bit map in RFID system
Disclosed are a method, an apparatus, and a system for collecting tags which may reduce recognition time and energy consumption as compared with a tag...
US-9,785,802 Method of determining an amount of alkaline agent to be injected within the context of enhanced oil recovery
Method of modelling the evolution of the pH value of a porous medium after injection of an alkaline agent solution into this medium. The alkaline agent is...
US-9,785,801 Management of authenticated variables
An embodiment includes an apparatus comprising: an out-of-band cryptoprocessor coupled to secure non-volatile storage; and at least one storage medium having...
US-9,785,800 Non-tracked control transfers within control transfer enforcement
A processor includes an execution unit and a processing logic operatively coupled to the execution unit, the processing logic to: enter a first execution state;...
US-9,785,799 System and method for role based analysis and access control
A system and method for program access control includes, for a typestate, providing typestate properties and assigning a role to the typestate in a program in...
US-9,785,798 Privacy-protecting inter-user digital communication message search
Digital communication messages processed by each specific one of a plurality of client computers are tracked and indexed. A query made by a first client...
US-9,785,797 Decentralized token table generation
New tokenization tables are derived at intervals in order to increase the security of tokenized data that is transferred between two endpoints. Generation of...
US-9,785,796 Apparatus and method for automated privacy protection in distributed images
A method executed by a computer includes receiving an image from a client device. A facial recognition technique is executed against an individual face within...
US-9,785,795 Identifying and securing sensitive data at its source
A data management service identifies sensitive data stored on enterprise databases according to record classification rules that classify a data record as...
US-9,785,794 Securing sensitive data on a mobile device
Illustrative aspects described herein relate to data security and automatic deletion of data when specific criteria are met. Sensitive data may be protected...
US-9,785,793 Systems and methods for sharing verified identity documents
A method for sharing verified identity documents is disclosed. The method is performed at one or more electronic devices. The client device obtains identity...
US-9,785,792 Systems and methods for processing requests for genetic data based on client permission data
Methods and systems disclosed herein relate generally to processing data requests from external assessment systems. More specifically, an interface is availed...
US-9,785,791 Using a location authorization extension to provide access authorization for a module to access a computing system
Provided are a method, system, and computer program product for a local authorization extension to provide access authorization for a module to access a...
US-9,785,790 Protecting computer security applications
Protecting a computer security application by executing the computer security application on a computer in a first namespace associated with an operating system...
US-9,785,789 Method and system for verification and authentication using optically encoded QR codes
An optical security method for object authentication using photon-counting encryption implemented with phase encoded QR codes. By combining the full phase...
US-9,785,788 System and method for controlling access to aspects of an electronic message campaign
A system for controlling access within an enterprise to information associated with recipients of an electronic message campaign of the enterprise sent to a...
US-9,785,787 Encrypting images on a client device for secure transmission and storage on a storage device
A device may identify an image to be encrypted, and may convert the image to a first string in a first format. The first string may represent the image. The...
US-9,785,786 Privacy preserving data search
Database entries can be protected by indexing the entries using a plurality of indexes, each associated with a level of access rights. A level of access rights...
US-9,785,785 Systems and methods for secure data sharing
Systems and methods are provided for creating and using a sharable file-level key to secure data files. The file-level key is generated based on a workgroup key...
US-9,785,784 Security management unit, host controller interface including same, method operating host controller interface,...
A method of operating a host controller interface includes receiving a buffer descriptor including sector information from a main memory, fetching data by using...
US-9,785,783 Executing privileged code in a process
A system and method for executing privileged code in a process are described. The method includes establishing, by an authorized library, a privileged function....
US-9,785,782 Monitoring system and shared access permissions for a plurality of users
In accordance with embodiments, there are provided mechanisms and methods for performing one or more actions based on determined access permissions for a...
US-9,785,781 Method, apparatus, and computer-readable medium for data exchange
Presented are a method, apparatus, and computer-readable medium for data exchange. The method includes specifying, by a user equipment (UE), a first data, and...
US-9,785,780 Information processing apparatus and method, recording medium, and program
Information processing apparatus and method, recording medium, and program are provided. An information processing apparatus includes the following elements. A...
US-9,785,779 Pre-calculating and updating data loss prevention (DLP) policies prior to distribution of sensitive information
A method and apparatus submitting information to be protected before permitting an outbound data transfer with the information is described. A DLP agent,...
US-9,785,778 Directed execution of dynamic programs in isolated environments
A test object that includes at least one computer program that includes dynamic executable code is obtained. The at least one computer program is transformed...
US-9,785,777 Static analysis based on abstract program representations
An application analysis platform enables automatic generation of abstract program representations (APRs) that are amenable to static analyzes for finding...
US-9,785,776 High risk program identification based on program behavior
An execution of a data object is identified by a computing device. In response to identifying the execution of the data object, it is determined that the data...
US-9,785,775 Malware management
According to at least one embodiment, a computer-implemented method for managing malware for a computing device is described. In one embodiment, an attempt by a...
US-9,785,774 Malware removal
A method and apparatus for scanning for or removing malware from a computer device. Under normal circumstances, the computer device is controlled by a first...
US-9,785,773 Malware data item analysis
Embodiments of the present disclosure relate to a data analysis system that may automatically analyze a suspected malware file, or group of files. Automatic...
US-9,785,772 Architecture for centralized management of browser add-ons across multiple devices
Features are disclosed for facilitating remote management of browser add-ons on multiple user computing devices from a centralized add-on management system. A...
US-9,785,771 Preventing malicious attacks launched from or involving usb devices
Approaches for protecting a computing device against malicious code using an attack vector involving a USB device. A computing device prevents a USB device from...
US-9,785,770 Method, apparatus, and system for triggering virtual machine introspection
The present invention discloses a method, an apparatus, and a system for triggering virtual machine introspection, so as to provide a timely and effective...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.