Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,003,2072 Text recognition and localization with deep learning
Approaches provide for identifying text represented in image data as well as determining a location or region of the image data that includes the text...
US-1,003,2071 Candidate handwriting words using optical character recognition and spell check
One embodiment provides a method, including: receiving, in an overlay handwriting application, one or more handwriting strokes; processing the one or more...
US-1,003,2070 Method for identifying an individual by walking style
Described herein is an apparatus and method for gait recognition. The apparatus includes circuitry that is configured to receive a gait sequence including a...
US-1,003,2069 Exercise analysis apparatus, exercise analysis method, exercise analysis program, and exercise analysis system
An exercise analysis apparatus includes a feature point detection unit that detects a feature point in a user's running by using a detection result from an...
US-1,003,2068 Method of making a digital camera image of a first scene with a superimposed second scene
A method of making an image in a digital camera comprises capturing a digital image of a scene into which the camera user is to be inserted, and superimposing a...
US-1,003,2067 System and method for a unified architecture multi-task deep learning machine for object recognition
A system to recognize objects in an image includes an object detection network outputs a first hierarchical-calculated feature for a detected object. A face...
US-1,003,2066 Secure communication systems and methods
Systems and methods for determining whether a communication session is authorized are provided. In some aspects, a method includes initiating a communication...
US-1,003,2065 Dynamic handwriting verification, handwriting-based user authentication, handwriting data generation, and...
Handwriting verification methods and related computer systems, and handwriting-based user authentication methods and related computer systems are disclosed. A...
US-1,003,2064 Visualization and measurement of cell compartments
The disclosure features methods and systems that include a detector configured to obtain multiple images of a sample stained with first and second stains, where...
US-1,003,2063 System and method for generating a representation of variations in elevation of friction ridges in a friction...
A representation of variations in elevation of friction ridges in a friction ridge pattern of a subject may be generated. A sequence of images captured over a...
US-1,003,2062 Method and apparatus for recognizing fingerprint
A fingerprint recognition method includes receiving an input partial image corresponding to a partial image of a fingerprint of a first user; partitioning the...
US-1,003,2061 Intelligent touch sensing device
An intelligent touch sensing device, including: a first electrode group having a first plurality of first electrodes; a second electrode group having a second...
US-1,003,2060 Reporting imaged portions of a patient's body part
Described embodiments include a system, method, and computer program product. In a described system, a receiver circuit receives at least two reference images...
US-1,003,2059 Image analyzing apparatus that identifies barcode image in target image
In an image analyzing apparatus, identifying a barcode image includes: determining a bar candidate area representing a candidate for a bar having a first width...
US-1,003,2058 Decoding barcodes
Systems and methods are provided for decoding barcodes. A scan signal is acquired along a scan through a barcode. A first character unit grid for a unit width...
US-1,003,2057 Creation and management of dynamic quick response (QR) codes
In response to detecting a configured quick response (QR) code change event in a retail environment, a changed dynamic QR code is displayed that includes an...
US-1,003,2056 Method of using camera sensor interface to transfer multiple channels of scan data using an image format
A computer system for decoding a signal of decodable indicia is disclosed. The computer system includes a laser scanner configured that outputs a signal of...
US-1,003,2055 Optical information reader
An information code reader is provided to read an information code, such as a QR code (registered trademark). In this reader, a marker light irradiating unit is...
US-1,003,2054 Rotatable assembly and scanning device including the same
A rotatable assembly includes a rotatable collar, a rotatable stopper and a fixed stopper. The rotatable collar has a first slide groove. The rotatable stopper...
US-1,003,2053 Tag based location
For tag based location, a camera captures an image. A display presents the image. A processor identifies a given equipment tag within the image. The processor...
US-1,003,2052 Piezoelectric package-integrated delay lines for radio frequency identification tags
Embodiments of the invention include delay line circuitry that is integrated with an organic substrate. Organic dielectric material and a plurality of...
US-1,003,2051 Locating an object based on charging/response time
An approach is provided in which an RFID reader receives a response signal from an RFID tag affixed to an object. The RFID reader determines a tag charging time...
US-1,003,2050 Electronic device, system and method for NFC
An electronic device for near field communication (NFC) device includes a front end unit configured to communicate with an external reader/writer device, the...
US-1,003,2049 Magnetic cards and devices for motorized readers
One or more detection activities of a card may allow calculation of rolling speed in motorized readers. Accordingly, the detection activity may result in a data...
US-1,003,2048 Method and system for compiling a multi-source database of composite investor-specific data records with no...
A system and method are disclosed for compiling a database of investor-related data by gathering and linking customer-specific data records from multiple...
US-1,003,2047 User search based on private information
In one embodiment, a method includes receiving, from a first user, a query specifying one or more criteria; accessing a data store comprising information...
US-1,003,2046 Protecting confidential information
An approach using a computer, receives from a first computer, text generated by a user and identifies in the text generated by the user, confidential...
US-1,003,2045 Dynamic runtime field-level access control using a hierarchical permission context structure
This disclosure provides for a system, method, and machine-readable medium for performing dynamic runtime field-level access control using a hierarchical...
US-1,003,2044 Multi-party authentication and authorization
Disclosed are various examples for multi-party authentication and authentication. In one example, a user who forgets a password can gain access to secured data...
US-1,003,2043 Masking sensitive data in mobile applications
In an approach to masking data in a software application associated with a mobile computing device, one or more computer processors receive a request to display...
US-1,003,2042 Digital identification enrollment
In some implementations, a computer-implemented method and system for enrolling customers into a digital identification program may include obtaining, from a...
US-1,003,2041 Storage volume protection using restricted resource classes
Techniques for restricting access to a storage volume attached to a data processing system are described. In one embodiment, a storage management and access...
US-1,003,2040 Safe web browsing using content packs with featured entry points
Content packs are provided for identifying a plurality of authorized web-based resources, wherein a web browser is configured to prevent access to web-based...
US-1,003,2039 Role access to information assets based on risk model
The program controls access to data objects stored on a tangible device of a computer system within an enterprise. A user request to access a data object...
US-1,003,2038 File system support for rolling keys
This application relates to a key rolling process for a file system of a computing device. The key rolling process allows for files to be transparently...
US-1,003,2037 Establishing application trust levels using taint propagation as a service
An application of a mobile device may be granted access to sensitive or private information. The mobile device may be configured to monitor the application's...
US-1,003,2036 Systems and methods of multidimensional encrypted data transfer
Example embodiments of the systems and methods of multidimensional encrypted data transfer disclosed herein also introduce novel and unobvious methods to store...
US-1,003,2035 Parallel and hierarchical password protection on specific document sections
The present disclosure involves systems and computer implemented methods for protecting portions of electronic documents. An example method includes receiving a...
US-1,003,2034 MPEG transport frame synchronization
Techniques are described for communicating encoded data using start code emulation prevention. The described techniques include obtaining at least one partially...
US-1,003,2033 Systems and methods for protecting backed-up data from ransomware attacks
The disclosed computer-implemented method for protecting backed-up data from ransomware attacks may include (1) determining that a backup system periodically...
US-1,003,2032 Software container registry inspection
A request to a scan a software image for specified criteria is received, the software image comprising layers stored in a first data store. Metadata in a second...
US-1,003,2031 Detecting unknown software vulnerabilities and system compromises
Disclosed are various embodiments for detecting unknown software vulnerabilities and system compromises. In a first implementation, a monitoring service records...
US-1,003,2030 Trusted kernel starting method and apparatus
A trusted kernel starting method and apparatus are provided. The method includes: starting a security boot module boot loader; invoking the boot loader to...
US-1,003,2029 Verifying integrity of backup file in a multiple operating system environment
Provided is a technique to enhance security of a computer in a multi-OS operating environment. A memory image of a primary OS is in an active state, and a...
US-1,003,2028 Method for processing UEFI protocols and system therefor
A Unified Extensible Firmware Interface protocol installer utilizes and modifies a list of global unique identifiers corresponding to Unified Extensible...
US-1,003,2027 Information processing apparatus and program for executing an electronic data in an execution environment
It is difficult to prevent virus infection, information leakage or the like for example when a user carelessly manipulates a file. An electronic file...
US-1,003,2026 Static and dynamic security analysis of apps for mobile devices
Techniques for performing static and dynamic analysis on a mobile device application are disclosed. Static analysis is performed on a mobile device application...
US-1,003,2025 Behavior-based ransomware detection
An anti-malware application detects, stops, and quarantines ransomware. The anti-malware application monitors threads executing on a computing device and...
US-1,003,2024 System and method for virtual partition monitoring
A method is provided in one example embodiment that includes receiving in an external handler an event notification associated with an event in a virtual...
US-1,003,2023 Systems and methods for selectively applying malware signatures
A computer-implemented method for selectively applying malware signatures may include (1) receiving a time-sensitive malware signature at a receiving time to...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.