At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-9,858,663 |
Method and system for tomosynthesis imaging An image generation method is described, comprising obtaining a plurality of 2D images through an object to be imaged, obtaining a 3D image data set of the... |
US-9,858,662 |
Image processing device, computer storage medium, and method for detecting
and displaying nucleated target cells A device comprises: a nucleus-candidate-region extracting section that extracts, from a captured image obtained by image-capturing a sample piece including a... |
US-9,858,654 |
Image manipulation A method of manipulating a two-dimensional digital input image using an image operator that represents a change in a lighting characteristic calculated based on... |
US-9,858,642 |
Geometric model for visually debugging massive spatial datasets Techniques herein are for generating geometric models. A method involves receiving a raw data set. Generation parameters include an abstraction function, a raw... |
US-9,858,639 |
Imaging surface modeling for camera modeling and virtual view synthesis A method of displaying a captured image on a display device. A real image is captured by an image capture device. The image capture device uses a field-of-view... |
US-9,858,637 |
Systems and methods for reducing motion-to-photon latency and memory
bandwidth in a virtual reality system Systems, methods, and computer programs are disclosed for reducing motion-to-photon latency and memory bandwidth in a virtual reality display system. An... |
US-9,858,626 |
Social sharing of security information in a group Techniques for social sharing security information between client entities forming a group are described herein. The group of client entities is formed as a... |
US-9,858,624 |
Methods and apparatus for providing data normalization, scalability and
maintainability Methods and apparatus for normalizing data, such as e.g., charts of accounts, across a plurality of entities are provided. In one embodiment, a centralized web... |
US-9,858,621 |
Autonomous vehicle technology effectiveness determination for insurance
pricing Methods and systems for determining the effectiveness of one or more autonomous (and/or semi-autonomous) operation features of a vehicle are provided. According... |
US-9,858,620 |
Repositioning a value axis Various embodiments of a trading screen allow a market value indicator to go out of view without necessarily triggering a command to reposition a value axis.... |
US-9,858,619 |
System and method for aggregating market data of financial interests Embodiments described herein relate to systems, methods, and computer readable instructions for processing data in financial interests, using automated... |
US-9,858,610 |
Product recommendation based on geographic location and user activities Example systems and methods for recommendation based on geographic location and user activities are described. In one implementation, a method may receive... |
US-9,858,599 |
Communication system A communication system includes a call answering center; a first mobile phone that registers a call answering setting in the call answering center; a second... |
US-9,858,588 |
Methods and systems for displaying attribution credit data based on
parameters Methods and systems for providing for display attribution data associated with one or more events are disclosed. Processor identifies channels from paths... |
US-9,858,579 |
Plan tuning engine A computer implemented method for providing optimized planning is provided. Collected data is analyzed. A plan for a first period of time is created based on... |
US-9,858,577 |
Content item delivery for payment Various embodiments of the present technology involve the delivery of digital content via a synchronized content management system (CMS) in return for a... |
US-9,858,574 |
Verification methods for fraud prevention in money transfer receive
transactions A computer system is operated to prevent fraud in a money transfer receive transaction. A send transaction request is received from a sender for a money... |
US-9,858,569 |
Systems and methods in support of authentication of an item Systems and methods for providing authentication of items such as goods, as they are passed through commerce and change ownership. As described herein, the... |
US-9,858,551 |
Ranking analysis results based on user perceived problems in a database
system Methods and systems for ranking analysis results based on user perceived problems of a database system are described. During operation, an embodiment may... |
US-9,858,547 |
Overstock inventory management at retail sales facilities In some embodiments, methods and systems of sorting products at a retail sales facility include receiving identifying information associated with a product at... |
US-9,858,542 |
Real-time prediction and correction of scheduled service bunching A method includes: a computer receiving historical data from at least one service vehicle; the computer receiving network definitions for the least one service... |
US-9,858,533 |
Data analysis computer system and method for conversion of predictive
models to equivalent ones The present invention addresses two ubiquitous and pressing problems of modern data analytics technology. Many modern pattern recognition technologies produce... |
US-9,858,531 |
Fault tolerant scalable modular quantum computer architecture with an
enhanced control of multi-mode couplings... A modular quantum computer architecture is developed with a hierarchy of interactions that can scale to very large numbers of qubits. Local entangling quantum... |
US-9,858,530 |
Generating novel work products using computational creativity Software that uses machine logic to generate novel work products by combining known work product constituents to create constituent combinations, by performing... |
US-9,858,527 |
Algorithmic method for modeling human decision-making Exemplary practice of this invention implements a computer to model human decision-making within a comprehensive human-perception construct dichotomized as... |
US-9,858,525 |
System for training networks for semantic segmentation Disclosed herein are technologies directed to training a neural network to perform semantic segmentation. A system receives a training image, and using the... |
US-9,858,520 |
Controllable marking The description relates to controllable device marking. One example can be manifest as a device that has a housing and a marking apparatus integrated into the... |
US-9,858,516 |
Secure printing Systems and methods for securely printing an electronic document. The electronic document is received as a print job at a secure print service system from a... |
US-9,858,507 |
Printing control device and printing control method A printing control device performs control to convert an input image with reference to a color conversion table that specifies a correspondence relationship... |
US-9,858,506 |
Methods and systems for processing of images of mathematical expressions The current document is directed to methods and systems that convert document images containing mathematical expression into corresponding electronic documents.... |
US-9,858,504 |
Method of selecting important digital images A method for selecting important digital images in a collection of digital images, comprising: analyzing the digital images in the collection of digital images... |
US-9,858,502 |
Classification of multispectral or hyperspectral satellite imagery using
clustering of sparse approximations on... An approach for land cover classification, seasonal and yearly change detection and monitoring, and identification of changes in man-made features may use a... |
US-9,858,501 |
Reliability acquiring apparatus, reliability acquiring method, and
reliability acquiring program A reliability acquiring apparatus includes a section that stores information on a classifier that outputs part likelihood concerning a predetermined part of a... |
US-9,858,499 |
Image processor, non-transitory computer readable medium and object
matching device A rotation unit of an image processor rotates at least any one of a securing unit for securing an object, an illumination unit for illuminating the object... |
US-9,858,494 |
Systems and methods for analyzing rendered content Systems, methods, and non-transitory computer-readable media can obtain data corresponding to a first content item. The first content item can be rendered for... |
US-9,858,486 |
Device and method for detecting circumventing behavior and device and
method for processing cause of circumvention A device (100) for detecting circumventing behavior includes an estimation unit (101) that estimates a degree of crowd congestion in relation to each of a... |
US-9,858,471 |
Identification apparatus and authentication system An identification apparatus has an extraction unit comprising: an extraction unit; an acquisition unit; and an identification unit. The extraction unit... |
US-9,858,470 |
Method for performing a face tracking function and an electric device
having the same A method for performing a method for performing a performing a face tracking function in an electric device is provided. The electric device has a touch panel,... |
US-9,858,465 |
Electronic device comprising minimum sensing area and fingerprint
information processing method thereof According to one embodiment, provided is a method by which an electronic device comprising a minimum fingerprint sensing area processes fingerprint information,... |
US-9,858,461 |
Barcode-reading system This patent specification describes a barcode-reading enhancement accessory for a mobile device having a barcode-reading capability. The accessory may include... |
US-9,858,459 |
Barcode-reading system This patent specification describes a barcode-reading enhancement accessory for a mobile device having a barcode-reading capability. The accessory may include... |
US-9,858,458 |
Device detecting spatial variation of complex permittivity and system
detecting presence/absence of article Provided are a device detecting the spatial variation of the complex permittivity and an article presence/absence detection system which are capable of... |
US-9,858,439 |
Data processing systems for identifying whether cookies contain personally
identifying information A system for identifying and determining whether a particular cookie may include personal data, in various embodiments, is configured to analyze collected... |
US-9,858,424 |
System and method for protecting systems from active content The disclosed embodiments include a method of disarming active content in a received input file in a computer system having a processor. The method includes... |
US-9,858,423 |
Application modification based on a security vulnerability In some examples, a method includes inserting monitoring instructions to be executed with a set of conditional operations and data type operations in an... |
US-9,858,422 |
Securely booting a computer from a user trusted device System and computer program product for allowing a computer to boot from a user trusted device. The computer comprises a long-term data storage device storing... |
US-9,858,411 |
Execution profiling mechanism A method comprises filtering branch trap events at a branch event filter, monitoring a branch event filter to capture indirect branch trap events that cause a... |
US-9,858,410 |
Techniques for automated application analysis Techniques for automated application analysis are disclosed. In one embodiment, the techniques may be realized as a method comprising detecting a code creation... |
US-9,858,408 |
Digital identity system The disclosure relates to a digital identity system including an enrolment module executing on a processor configured to receive a data item from an enrolling... |
US-9,858,407 |
Secure automatic authorized access to any application through a third
party A method and process for users to have secure access to multiple mobile, embedded or web based applications, is provided whereby each requires different... |