Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,798,920 Image processing apparatus, image processing method, and image communication system
In an image processing apparatus, an image pickup unit takes images of an object including the face of a person wearing the glasses by which to observe a...
US-9,798,919 Method and apparatus for estimating image motion using disparity information of a multi-view image
A method and apparatus for processing a multi-view image is provided. The method includes: extracting disparity information between an image of a first point of...
US-9,798,918 Method and system for analyzing biological specimens by spectral imaging
The methods, devices, and systems may allow a practitioner to obtain information regarding a biological sample, including analytical data, a medical diagnosis,...
US-9,798,917 Biometric sensing
An novel sensor is provided having a plurality of substantially parallel drive lines configured to transmit a signal into a surface of a proximally located...
US-9,798,916 Symbolic print to electronic media bridge
A symbolic print-to-electronic media bridge system facilitates information flow across a computer network. Such a system can include a printed publication...
US-9,798,915 Grocery inventory tracking assembly
A grocery inventory tracking assembly includes a scanning unit has a scanner and an electronic memory. The scanner is electrically coupled to the electronic...
US-9,798,914 System for and method of efficiently processing targets to be electro-optically read by image capture
A source image having a bit depth greater than eight is captured from a moving target. The source image is processed to obtain a plurality of target images each...
US-9,798,913 ID reading device
A device includes a recording medium housed in each of cells; an optically readable ID display part provided on a surface of the recording medium; an accessor...
US-9,798,912 Imaging module and reader for, and method of, reading targets by image capture with a substantially constant...
Targets are read by image capture with a substantially constant resolution over an extended range of working distances. Return light returning from a far-out...
US-9,798,911 Imaging module and reader for, and method of, reading a target by image capture through a window in direct,...
A light-transmissive window is positioned in direct, sealing contact with a chassis of an imaging module for reading a target by image capture. The chassis has...
US-9,798,910 Mobile hand held machine vision method and apparatus using data from multiple images to perform processes
A method and apparatus for performing a process associated with an item to be imaged is disclosed. The process requires data associated with a plurality of...
US-9,798,909 Integrated circuit to convert no-wire signals to one-wire signals
A radio frequency identification (RFID) integrated circuit includes a transceiver and a processing device. The transceiver may to transmit a first continuous...
US-9,798,908 Object detection system, object detection method, and non-transitory computer-readable medium storing object...
An object detection system includes a reader waveguide (101) formed as an open transmission line, an RFID tag (102) placed above the reader waveguide (101), a...
US-9,798,907 Register for counting and tracking items in a bag
A register for counting and tracking items in a bag comprises a manifest and an RFID reader. The RFID reader is used to query a plurality of RFID tags attached...
US-9,798,906 Transaction terminal device
A transaction terminal device is provided. The device includes a magnetic head module that supports a magnetic head which reads a magnetic card. A plurality of...
US-9,798,905 Information bearing medium and information processing system
An information processing system includes an information bearing medium and an information reading unit. The information bearing medium has a two-dimensional...
US-9,798,904 IC card reader and operating method thereof
An IC card reader may comprise a first interface unit that communicates with an IC chip of an IC card by using a first communication mode, a second interface...
US-9,798,903 Labeling and authenticating using a microtag
An identifier made using a silicon film. The silicon film has a varying optical index of refraction. The varying optical index of refraction reflects one or...
US-9,798,902 Self-powered anti-tamper sensors
An anti-tampering system and method typically featuring a printed circuit board with anti-tamper protection circuitry powered by a power source. Switching...
US-9,798,901 Device having a security module
A device securely accesses data in a memory via an addressing unit which provides a memory interface for interfacing to a memory, a core interface for...
US-9,798,900 Flexible counter system for memory protection
The present disclosure is directed to a flexible counter system for memory protection. In general, a counter system for supporting memory protection operations...
US-9,798,899 Replaceable or removable physical interface input/output module
A system includes a removable or replaceable I/O interface (e.g., a panel and associated electronics card). In one embodiment, a security device includes an...
US-9,798,898 Microprocessor with secure execution mode and store key instructions
A microprocessor conditionally grants a request to switch from a normal execution mode in which encrypted instructions cannot be executed, into a secure...
US-9,798,897 Encoder and method for encoding thereof
A method of encoding and an encoder are provided. The method includes generating first one-hot bits for most significant bits (MSBs) and second one-hot bits for...
US-9,798,896 Managing unwanted tracking on a device
Methods, devices, systems, and non-transitory process-readable storage media manage unwanted tracking by evaluating conditions encountered by a browser...
US-9,798,895 Platform identity architecture with a temporary pseudonymous identity
In an example, a client-server platform identity architecture is disclosed. The platform identity architecture may be used to enable a venue operator to provide...
US-9,798,894 Secure computer display using inverse computational light field displays
A system and method to secure information displayed on the screen of a computing device is provided in which an image to be displayed is algorithmically...
US-9,798,893 Secure format-preserving encryption of data fields
In one embodiment, a computer-implemented method includes extracting first key derivation data from a first row of data to be stored in a database, where the...
US-9,798,892 Prioritized link establishment for data transfer using task scheduling
A system and method for scheduling data transfers between systems. One or more data requesting systems may request access to particular data. The request for...
US-9,798,891 Methods and systems for service level objective API for storage management
Methods and systems for a networked storage environment are provided. For example, one method includes generating by a processor in response to a request, a...
US-9,798,890 Abstractions and automation for enhanced sharing and collaboration
The present invention provides methods for using abstractions of people, including dynamic and static groups of people, to enhance the efficiency of the...
US-9,798,889 Spreadsheet shared region and cell permissions
A system for spreadsheet region and cell sharing permissions includes an interface and a processor. An interface is to receive a request to display a subset of...
US-9,798,888 Data management
An example method for managing data in accordance with aspects of the present disclosure includes receiving from a user in the computer network environment a...
US-9,798,887 Computing device to securely activate or revoke a key
Disclosed is an apparatus and method to securely activate or revoke a key. For example, the apparatus may comprise: a storage device to store a plurality of...
US-9,798,886 Bio-medical sensing platform
Methods, devices, systems, and computer program products for implementing a bio-medical sensing platform are provided herein. A method includes receiving one or...
US-9,798,885 Security policy generation based on snapshots of similar virtual machines
Determining which snapshot deltas tend to occur in: (i) healthy virtual machines (VMs) that have been subject to an attack yet remained healthy, and/or (ii)...
US-9,798,884 Systems and methods for identifying insider threats in code
In a system for detecting composite vulnerabilities associated with a process or a context, individual defects/vulnerabilities in a software system/application...
US-9,798,883 System, method, and computer program product for detecting and assessing security risks in a network
The present disclosure is directed to a system, method, and computer program for detecting and assessing security risks in an enterprise's computer network. A...
US-9,798,882 Real-time model of states of monitored devices
A model representing system components and events of a plurality of monitored devices as data objects is described herein. The model resides on a security...
US-9,798,881 Dynamic feature enhancement in client server applications and high volume server deployment with dynamic app...
Generally, this disclosure provides methods and systems for dynamic feature enhancement in client server applications and for high volume server deployment with...
US-9,798,880 Fuse-enabled secure bios mechanism with override feature
An apparatus for protecting BIOS, including a BIOS ROM, a detector, a generator, JTAG control, a machine specific register, and a controller. The BIOS ROM...
US-9,798,879 Apparatus, system, and method for protecting against keylogging malware
An apparatus, system, and method is disclosed for protecting against key logger malware. The protection includes protection form grabbing keylogger malware. In...
US-9,798,878 Systems and methods for detecting text display manipulation attacks
The disclosed computer-implemented method for detecting text display manipulation attacks may include (1) extracting a file name from a file that is under...
US-9,798,877 Security risk-based resource allocation
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for allocating resources to processes based on security risk....
US-9,798,876 Systems and methods for creating security profiles
A computer-implemented method for creating security profiles may include (1) identifying, within a computing environment, a new actor as a target for creating a...
US-9,798,862 Apparatus for dispensing medicine, vitamins and/or samples
An apparatus for distributing medicines, vitamins and/or samples, including an organizer and dispensing units for medicines, vitamins and/or samples. The...
US-9,798,849 Methods of detecting stresses, methods of training compact models, methods of relaxing stresses, and computing...
A method of detecting stress of an integrated circuit including first and second patterns formed from different materials may comprise: determining one or more...
US-9,798,800 Providing question and answers with deferred type evaluation using text with limited structure
A system, method and computer program product for conducting questions and answers with deferred type evaluation based on any corpus of data. The method...
US-9,798,792 Replication for on-line hot-standby database
A method, and corresponding computer program product and computer system, for replicating a database image in a distributed database environment comprises:...
US-9,798,785 Apparatus and method for searching for address book information
Provided is an apparatus and method for searching for address book information. To this end, the present invention, upon receiving a search request message for...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.