Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,852,328 Emotion recognition in video conferencing
Methods and systems for videoconferencing include recognition of emotions related to one videoconference participant such as a customer. This ultimately enables...
US-9,852,327 Head-pose invariant recognition of facial attributes
A system facilitates automatic recognition of facial expressions or other facial attributes. The system includes a data access module and an expression engine....
US-9,852,326 Facial expression capture for character animation
Techniques for facial expression capture for character animation are described. In one or more implementations, facial key points are identified in a series of...
US-9,852,325 Apparatus, image processing method and storage medium storing program
Images of a layout target for a template are acquired. The plurality of acquired images are edited using editing processing corresponding to a category...
US-9,852,324 Infrared image based facial analysis
Apparatuses, systems and methods associated with infrared image based facial analysis are disclosed herein. In embodiments, an apparatus may include one or more...
US-9,852,323 Facial image display apparatus, facial image display method, and facial image display program
The present invention provides a facial image display apparatus that can display moving images concentrated on the face when images of people's faces are...
US-9,852,322 Finger biometric sensing device including series coupled error compensation and drive signal nulling circuitry...
A finger biometric sensing device may include drive circuitry for generating a drive signal and an array of finger biometric sensing pixel electrodes...
US-9,852,321 Image capturing device
An image capturing device includes an image forming device including a sensor defining an optical reception axis, at least one reading distance, and a region...
US-9,852,320 System for tracking items stored in a safe
A radio-frequency identification ("RFID") system for tracking items stored in a safe. The RFID safe system may include at least a safe and an RFID system. An...
US-9,852,319 Inventory-cycle-based RFID tag location
Techniques are provided to estimate the location of an RFID tag using tag read information, such as a tag read count or a tag read rate, and an opportunity...
US-9,852,318 Spatially selective UHF near field microstrip coupler device and RFID systems using device
A system having a UHF RFID transceiver is adapted to communicate exclusively with a single electro-magnetically coupled transponder located in a predetermined...
US-9,852,317 Printable, writeable article for tracking counterfeit and diverted products
An article includes a writeable memory printed on a substrate, a characteristic of the article usable to derive a seed value, and a value stored in the memory,...
US-9,852,316 System and method for bulk RFID tag encoding
A method for bulk encoding of RFID tags. The method may include printing a plurality of unencoded RFID labels, coupling each of the plurality of unencoded RFID...
US-9,852,315 Systems and methods for detecting and mitigating programmable logic device tampering
Systems and methods are disclosed for preventing tampering of a programmable integrated circuit device. Generally, programmable devices, such as FPGAs, have two...
US-9,852,314 Mobile device access control with two-layered display
An approach is provided for controlling access to contents displayed on a mobile device. Based on a security rule, the contents are divided into first and...
US-9,852,313 Functional node for an information transmission network and corresponding network
A functional node for an information transmission network and corresponding network are disclosed. In one aspect, the functional node includes at least one...
US-9,852,312 Generic encryption system for nonsecure datapaths
A secure generic encryption system for nonsecure datapaths comprises a format-specific adaptation layer/data path for receiving and processing nonsecure content...
US-9,852,311 System and method to anonymize data transmitted to a destination computing device
A method and system for anonymizing data to be transmitted to a destination computing device is disclosed. Anonymization strategy for data anonymization is...
US-9,852,310 Sharing digital libraries
In some implementations, a first user associated with a first user account may send a request to exchange digital libraries with a second user associated with a...
US-9,852,309 System and method for securing personal data elements
A system and method may obtain a connection profile, the connection profile including at least one rule related to at least one PII data element; associate the...
US-9,852,308 Apparatuses, systems, methods, and computer readable media for providing secure file-deletion functionality
A secure file-deletion function providing apparatus includes a request input unit configured to receive a file deletion request to delete a file stored in an...
US-9,852,307 Method of access to a local service of a device communicating via a terminal
A method of access to a local service of a device communicating via a terminal, the method comprising steps of: access to the service via an access terminal by...
US-9,852,306 Conjunctive search in encrypted data
A method comprises receiving a first cryptographic token for one search term and a second cryptographic token is generated using the one search term and at...
US-9,852,305 Method for provably secure erasure of data
A method for provably secure erasure of data, performed in a memory available to one or more computing devices, includes generating prover state information...
US-9,852,304 Document control based on copyright permission when printing compilation of works
A method for controlling copyright permissions when assembling multiple copyrighted works into a compiled file. The copyright permission level of each file is...
US-9,852,303 Protecting sensitive data in software products and in generating core dumps
Sensitive data is protected in a software product. A source file of the software product is compiled to generate an object file, in which the source file...
US-9,852,302 System and method for chatting with machines
A human-machine chatting system facilitates real-time two-way communications between a user and a machine. During operation, the system monitors performance of...
US-9,852,301 Creating secure channels between a protected execution environment and fixed-function endpoints
Embodiments of an invention for establishing secure channels between a protected execution environment and fixed-function endpoints are disclosed. In one...
US-9,852,300 Secure audit logging
The invention includes systems and methods to asymmetrically encrypt audit logs, store a limited period of the encrypted audit logs, periodically send the...
US-9,852,299 Protection scheme for remotely-stored data
The present disclosure is directed to a protection scheme for remotely-stored data. A system may comprise, for example, at least one device including at least...
US-9,852,298 Configuring a system
In response to starting a system including a first non-volatile memory containing system boot code, and a second non-volatile memory, provisioning of the second...
US-9,852,296 Rollback feature
A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area...
US-9,852,295 Computer security systems and methods using asynchronous introspection exceptions
Described systems and methods enable an efficient analysis of security-relevant events, especially in hardware virtualization platforms. In some embodiments, a...
US-9,852,294 Systems and methods for detecting suspicious applications based on how entry-point functions are triggered
The disclosed computer-implemented method for detecting suspicious applications based on how entry-point functions are triggered may include (1) identifying an...
US-9,852,293 Antivirus scan during a data scrub operation
For an antivirus scan during a data scrub operation, an antivirus scan is concurrently performed as an overlap with the data scrub operation, wherein the data...
US-9,852,292 Use of an application controller to monitor and control software file and application environments
In embodiments of the present invention, a framework for an extensible, file-based security system is described for determining an appropriate application,...
US-9,852,291 Computer system and signature verification server
Disclosed are a computer system, a signature verification server, a method of supporting signature verification by a computer system, and a method of verifying...
US-9,852,290 Systems and methods of analyzing a software component
A particular method includes generating, at a device, a first digital identifier of a first software component. The method also includes performing a comparison...
US-9,852,289 Systems and methods for protecting files from malicious encryption attempts
A computer-implemented method for protecting files from malicious encryption attempts may include (1) detecting an attempt to alter a file, (2) identifying at...
US-9,852,288 Securing data on a computing system
The present subject matter relates to securing data on a computing system. In an example, a request to execute an application instance of the application is...
US-9,852,287 Cognitive password pattern checker to enforce stronger, unrepeatable passwords
A method for determining a password strength is provided. The method may include receiving a user-entered password. The method may also include identifying a...
US-9,852,286 Automated password generation and change
An identity management system detects the occurrence of a trigger event, such as a time period expiration, or an action on the identity management system. The...
US-9,852,285 Digital identity
The disclosure relates to a digital identity system for creating a computer stored digital identity. The system includes a network interface configured to send...
US-9,852,284 Storage isolation using I/O authentication
Techniques are described for logically isolating data I/O requests from different operating systems (OSes) for a same multi-tenant storage system (MTSS)....
US-9,852,283 Confirming the identity of integrator applications
An application service system receives, from a merchant service system, an application program code comprising identifying information. The identifying...
US-9,852,282 Protecting data in memory of a consumable product
A non-transitory memory storing a digital signature of a consumable product where the digital signature indicates that an identifier and host device setting...
US-9,852,281 Authentication system, authentication device, and authentication method
According to an embodiment, an authentication system includes a physical device, a calculator, and an authenticator. The physical device includes a data source...
US-9,852,280 Authentication for access to a device that has a primary display portion and a secondary display portion
An authentication scheme in which an instance of a designated element is shifted to proximity with a designated target to gain access a device may be enhanced...
US-9,852,279 Device and method of setting or removing security on content
A device for removing security on content using biometric information includes a memory configured to store content on which security has been set based on...
US-9,852,278 Method and apparatus for controlling lock/unlock state of terminal through voice recognition
A method for controlling a terminal through a voice input is provided. The method includes receiving a voice input when the terminal is in a state in which the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.