Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,875,397 Method of extracting feature of input image based on example pyramid, and facial recognition apparatus
At least one example embodiment discloses a method of extracting a feature of an input image. The method includes constructing an example pyramid including at...
US-9,875,396 Spoofing detection in image biometrics
System and techniques for spoofing detection in image biometrics are described herein. A sequence of images may be obtained from a camera; a first plurality of...
US-9,875,395 Method and system for tagging an individual in a digital image
A system and method for tagging an image of an individual in a plurality of photos is disclosed herein. A feature vector of an individual is used to analyze a...
US-9,875,394 Skin analysis method, skin analysis device, and method for controlling skin analysis device
A control method for controlling a skin analysis device is a control method for controlling a skin analysis device including a camera for obtaining a face image...
US-9,875,393 Information processing apparatus, information processing method, and program
An information processing apparatus, method, and non-transitory computer-readable storage medium are disclosed. The information processing apparatus may include...
US-9,875,392 System and method for face capture and matching
According to an example, a face capture and matching system may include a memory storing machine readable instructions to receive captured images of an area...
US-9,875,391 System and a method for image recognition
The invention discloses an image recognition system, comprising: a robot having an image collection module configured to drive an image collection module to...
US-9,875,390 Method and apparatus for recognizing object
A method of recognizing an object includes controlling an event-based vision sensor to perform sampling in a first mode and to output first event signals based...
US-9,875,388 Fingerprint sensor device and method
A fingerprint sensor package and method are provided. The fingerprint sensor package comprises a fingerprint sensor along with a fingerprint sensor surface...
US-9,875,387 Fingerprint sensor and packaging method thereof
A fingerprint sensor is provided. The fingerprint sensor includes a multi-layer printed circuit board (PCB), a fingerprint sensing die and a molding compound....
US-9,875,386 System and method for randomized point set geometry verification for image identification
Object recognition can be improved by verifying a geometric consistency between matching interesting points pairs of two images, as objects with the images are...
US-9,875,385 Method and system for sharing of product receipts
A method for transmitting line item data from an electronic receipt comprising storing a plurality of receipt data entries affiliated with a consumer account...
US-9,875,384 Method for reading an identification code on a glass sheet
A method for reading symbols forming a code, the symbols each being marked on one face of a number of glass sheets in proximity to the same edge face of the...
US-9,875,383 Barcode device
A barcode device including a barcode scanner to scan barcode labels and provide raw barcode data signals, a processor to receive and process the raw barcode...
US-9,875,382 RFID tracking fastener
In some embodiments, a tracking fastener may include a plastic tracking fastener. The plastic tracking fastener may include a plastic tracking staple or a...
US-9,875,381 Communication method and communication system
A command sequence is restarted from the middle even when supply of power supply voltage to an internal circuit in a wireless tag is temporarily stopped (a...
US-9,875,380 Non-contact data carriers including an anti-collision scheme
Data carriers for inventorying by means of a communication station, whereby the communication station and each data carrier are brought into communicative...
US-9,875,379 System and method for providing user-accessible card slot
Systems and methods for reducing problems and disadvantages associated with providing a user-accessible card slot are provided. A removable card carrier a...
US-9,875,378 Physically unclonable function assisted memory encryption device techniques
Techniques for encrypting the data in the memory of a computing device are provided. An example method for protecting data in a memory according to the...
US-9,875,377 Encryption device of a substitution-box type, and corresponding encryption method and computer program product
A device of the Substitution-Box (S-Box) type, which is suitable for operating in a symmetric-key encryption apparatus, in particular an AES (Advanced...
US-9,875,376 Sensitive data aliasing
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed...
US-9,875,375 Method for performing similar-information search while keeping content confidential by encryption
A similar-information search method includes receiving, with a data computation device, an encrypted feature quantity and an encrypted similarity value from a...
US-9,875,374 System and method for collecting, storing, and securing data
A computer system for collecting, securing, storing, retrieving, and disposing data includes an input that receives data from one or more data capture devices,...
US-9,875,373 Prioritization of users during disaster recovery
Two or more users of a system are determined. The system includes at least one resource. Contextual information for a user of the two or more users is...
US-9,875,372 Redacting restricted content in files
Restricted content of a data file is identified. The restricted content is removed from the data file, and a redacted version of the data file is generated. The...
US-9,875,371 System and method related to DRM
A system for controlling access to copyrighted data comprises, at least: a plurality of users having computers, each computer being assigned a unique identity...
US-9,875,370 Database server and client for query processing on encrypted data
Methods, systems, apparatuses, and computer program products are provided for secure handling of queries by a data server (DS) and a database application (DA)....
US-9,875,369 Automatic protection of partial document content
Protecting a fragment of a document includes automatically detecting the fragment without user intervention based on the content of the fragment and/or the...
US-9,875,368 Remote authorization of usage of protected data in trusted execution environments
A trusted execution environment (TEE) of a computing device may receive an operation request requiring use of a protected data accessible only to the TEE....
US-9,875,367 Customer load of field programmable gate arrays
Customer content is securely loaded on a field programmable gate array (FPGA) located on a secure cryptography card. The customer content is loaded such that it...
US-9,875,366 Microprocessor system with secured runtime environment
Microprocessor system that is implemented or can be implemented in a mobile terminal and comprises: a normal operating system designed to generate and maintain...
US-9,875,365 Providing authenticated communications to a replaceable printer component
A replaceable printer component includes a first memory device and a communication link. The first memory device stores a first secret. The communication link...
US-9,875,364 Multi-focused fine-grained security framework
An approach is provided in which a knowledge manager generates a knowledge structure that includes security annotation tokens and term tokens. Each of the...
US-9,875,363 Use of generic (browser) encryption API to do key exchange (for media files and player)
Embodiments are directed towards decrypting encrypted content. A key for decrypting the encrypted content may be provided to a web application executing within...
US-9,875,362 Hash value generation apparatus
For enabling improvement in throughput for generating a hash value, a hash value generation apparatus comprises: a .theta. operation unit configured to execute...
US-9,875,361 Method and server for providing a social network service
A method for providing a social network service includes: (a) setting an access threshold value for a content belonging to a content owner and a weight value...
US-9,875,360 Simulation and virtual reality based cyber behavioral systems
A cybersecurity system for managing cyber behavior associated with cyber actors such that the cyber behavior can be computed and predicted and cyber...
US-9,875,359 Security management for rack server system
Various embodiments of the present technology provide methods for activating a security module of a rack system prior to the loading of an operating system. The...
US-9,875,358 Preventing code modification after boot
The subject disclosure is directed towards protecting code in memory from being modified after boot, such as code used in a dedicated microprocessor or...
US-9,875,357 Methods and systems for detecting fake user interactions with a mobile device for improved malware protection
A computing device processor may be configured with processor-executable instructions to implement methods of detecting and responding to fake user interaction...
US-9,875,356 System for preventing malicious intrusion based on smart device and method thereof
The present invention provides a system and a method of preventing intrusion of a malicious code based on a smart device. The system for preventing intrusion of...
US-9,875,355 DNS query analysis for detection of malicious software
A method and system are disclosed for detecting malicious software on host server computers or instances running on the host server computers. A pattern of...
US-9,875,354 Apparatus and method for enhancing security of data on a host computing device and a peripheral device
A method of enhancing security of at least one of a host computing device and a peripheral device coupled to the host computing device through a communication...
US-9,875,353 Log information generation apparatus and recording medium, and log information extraction apparatus and...
A log information generation apparatus includes: a process information generation unit which generates first identification information for temporally and...
US-9,875,352 Oral authentication management
A user manages security of one or more user devices by manipulating one or more sensors located in the user's mouth in a predetermined pattern corresponding to...
US-9,875,351 Methods, apparatuses, and computer program products for hiding access to information in an image
Methods, apparatuses, and computer program products are herein provided for hiding access to information in an image. A method may include receiving user input...
US-9,875,350 Multi-vocal password verifying method and device
A multi-vocal password verifying method includes the steps of: (1) displaying at least one set of candidate information units, the information units of the...
US-9,875,349 Locking and unlocking a mobile device using facial recognition
In an embodiment of the invention, an unlocked mobile device is configured to capture images, analyze the images to detect a user's face, and automatically lock...
US-9,875,348 E-learning utilizing remote proctoring and analytical metrics captured during training and testing
A device configured to utilize training techniques and to gather information while training and administering certification examinations. Certification...
US-9,875,347 System and method for performing authentication using data analytics
A system, apparatus, method, and machine readable medium are described for performing authentication using data analytics such as machine learning. For example,...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.