Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,003,7456 Automated methods and systems for identifying and assigning attributes to human-face-containing subimages of...
The present document is directed to methods and systems that identify and characterize subimages in images that each includes an image of a human face. In...
US-1,003,7455 Face detection device, imaging apparatus, and face detection method
A face detection device for detecting the face of a person in an input image includes the a face detection circuit, a signal processing circuit, and a...
US-1,003,7454 Method and device for forming a fingerprint representation
The present invention generally relates to a method for forming a candidate fingerprint representation of a fingerprint of a finger of a user of an electronic...
US-1,003,7453 Capacitive fingerprint sensing module
A capacitive fingerprint sensing module includes a flexible printed circuit board, a lower conductive adhesive layer, an upper conductive adhesive layer, and a...
US-1,003,7452 Fingerprint sensor array and display device having the same
Provided are a fingerprint sensor and a display device including the same. A fingerprint sensor array includes: a plurality of first electrodes arranged in a...
US-1,003,7451 Methods, computer program products, and systems for providing automated video tracking via radio frequency...
Methods, computer program products and systems for providing video tracking. The method includes receiving a first signal from a radio frequency identification...
US-1,003,7450 Information code image display system, information code image display terminal, information code image display...
An information code image display system includes an area specifying part, an image generation part, and a display controller. The area specifying part...
US-1,003,7449 Inventory tracking using RFID
A storage unit includes a support bar for hanging items and an RFID antenna provided within a predefined distance of the support bar. When the items hanging...
US-1,003,7448 Conditional retrieval
In one aspect of the present disclosure, a method is disclosed. The method involves: a reader detecting an eye-mountable device within a wireless communication...
US-1,003,7447 Method and apparatus for sensing environment using a wireless passive sensor
A method begins with a first reader sending a first radio frequency (RF) signal prior to exposing a vehicle to moisture testing. The method continues with a...
US-1,003,7446 Electrical interface module
The object of the invention is an electrical interface module. The electrical interface module has a memory device for storing data and an integrated NFC...
US-1,003,7445 Systems and methods for managing coverage area of wireless communication devices
Embodiments of the present invention include a wireless access point that acquires and processes radio frequency identification (RFID) information. The wireless...
US-1,003,7444 Weak RFID tag signal recovery from collisions
RFID readers may be configured to recover multiple, collided RFID tag signals. An RFID reader may receive a collided reply waveform including at least first and...
US-1,003,7443 Industrial simulation using redirected I/O module configurations
A simulation environment is provided for running a process simulation used to validate an industrial control program. The simulation environment exposes the I/O...
US-1,003,7442 Anti-copy electronic device
An anti-copy electronic device contains: a wireless signal controller having a sensor, and the wireless signal controller and the sensor are accommodated in a...
US-1,003,7441 Bus protection with improved key entropy
An apparatus includes a processor and a bus encryption unit. The processor is configured to communicate information over a secured data bus, and to communicate...
US-1,003,7440 Generating a unique encryption key
Utilizing a non-repeating identifier to encrypt data, including: receiving a request to write data to a storage device; selecting a segment-offset pair where...
US-1,003,7439 Secure master and secure guest endpoint security firewall
This invention is a security firewall having a security hierarchy including: secure master (SM); secure guest (SG); and non-secure (NS). There is one secure...
US-1,003,7438 Setting security features of programmable logic devices
Systems and methods are disclosed for allowing security features to be selectively enabled during device configuration. For example, a programmable integrated...
US-1,003,7437 Identifying cohorts with anomalous confidential data submissions using matrix factorization and completion...
In an example, for each value of a plurality of values of a first attribute of members of a social networking service who have submitted confidential data, an...
US-1,003,7436 Device using secure storage and retrieval of data
An appliance is capable of storing and processing data related to details surrounding its ownership, behavior, and history within itself in a secure and...
US-1,003,7435 Providing secure indexes for searching encrypted data
Providing an encrypted search index for performing searches on encrypted documents, the method comprising: (i) providing a set of documents, the documents...
US-1,003,7434 Systems and methods for facilitating access to private files using a cloud storage system
A method for providing access to objects associated with a particular client in a cloud storage system is disclosed. The method includes the steps of...
US-1,003,7433 Secure text retrieval
Methods and systems described herein may perform a word-level encryption and a sentence-level encryption of one or more documents. The word-level encryption and...
US-1,003,7432 Implementing file security settings based on context
One embodiment provides a method including: obtaining, using a processor, at least one file; accessing, using a processor, context data associated with the at...
US-1,003,7431 Software-as-a-service reference process extension verification framework
The disclosure describes methods, software, and systems, including a method for providing extension points for core process models. Extension points are...
US-1,003,7430 System and method for controlling the on and off state of features of business logic at runtime
Methods and systems are provided for controlling the execution of business logic that allows features to be turned on or off at run time for each particular...
US-1,003,7429 Copy protection for secured files
Embodiments of the present disclosure relate to copy protection. A request to copy a file from a requestor with one or more privileges sufficient to access the...
US-1,003,7428 Data security using request-supplied keys
Requests are submitted to a request processing entity where the requests include a cryptographic key to be used in fulfilling the request. The request...
US-1,003,7427 Boot blocking of virtual storage appliance
A method of controlling startup of a virtual storage appliance includes obtaining resource information about virtual resources (e.g., hardware resources)...
US-1,003,7426 Method of loading files into random access memory in an electronic device and associated electronic device
In an electronic device designed to function in a trusted execution environment (TEE), because of the execution of a trusted operating system by a processor of...
US-1,003,7425 Detecting suspicious file prospecting activity from patterns of user activity
Suspicious file prospecting activity is detected based on patterns of file system access. A user's file system access is monitored over a specific time period....
US-1,003,7424 Isolated virtual environments for untrusted applications
A pool of virtual environments, such as virtual machine instances and containers, can be maintained by an intermediary service, where the virtual environments...
US-1,003,7423 Methods and systems for controlling permission requests for applications on a computing device
Examples described may relate to methods and systems for controlling permission requests for applications running on a computing device to access resources...
US-1,003,7422 Systems and methods for integrating with a native component using a network interface
Embodiments as disclosed herein may provide systems and methods for component integration and security. In particular, in one embodiment, a native component...
US-1,003,7421 Device, system, and method of three-dimensional spatial user authentication
Devices, systems, and methods of user authentication. A system includes a spatial challenge unit to distinguish between a human user and a non-human user. The...
US-1,003,7420 Cardless transactions
A system for conducting transactions without a debit card or credit card may receive a request to complete a transaction including authentication data...
US-1,003,7419 System, method, and apparatus for personal identification
A method and system determines a probability that a mobile device is in use by a first user. Sensors of a mobile device are used to detect and quantify human...
US-1,003,7418 Pre-boot authentication credential sharing system
A pre-boot authentication (PBA) credential sharing system includes a secure subsystem including an off-host processing system and a secure storage. A credential...
US-1,003,7417 Transformation of network activity data for user identification
Techniques of identifying users involve automatically determining whether new user activity data received by a server is associated with a user known to the...
US-1,003,7416 Method and apparatus for licensing web assets
A computer implemented method and apparatus for licensing web assets. The method comprises loading a web asset for use by one or more software applications when...
US-1,003,7415 Information processing system that authenticates license of application program installed in information...
An information processing system includes: one or more information processing apparatuses; and a management server, in which the management server includes a...
US-1,003,7414 Enhanced user control for content protection solutions
This disclosure relates to enhanced user control for content protection solutions. An options component determines or infers a set of digital rights management...
US-1,003,7413 System and method of applying multiple adaptive privacy control layers to encoded media file types
Disclosed are systems to apply customized permission settings to protect particular regions of a document, and, in particular, documents that are of a lossy'...
US-1,003,7412 Patient health state compound score distribution and/or representative compound score based thereon
A method includes generating at least first and second histograms respectively for at least first and second sets of vital sign measurements using at least...
US-1,003,7411 Intelligent alert suppression
Methods, systems, and computer-readable media are provided for intelligent suppression of alerts. Alerts may be evaluated prior to presentation to determine...
US-1,003,7410 Cloud-based clinical information systems and methods of use
An example method includes receiving patient information in a cloud-based clinical information system from a first healthcare entity registered with the...
US-1,003,7409 Automated method and system for reducing the improper disclosure of documents
An automated system to reduce improper disclosure of documents containing image information for a patient. The system includes an OCR processing tool that...
US-1,003,7408 Apparatus for preventing unauthorized access to computer files and for securing medical records
Apparatus for identifying the writer or receiver of a document, where identifying information for each of a plurality of registered human individuals is stored...
US-1,003,7407 Structured finding objects for integration of third party applications in the image interpretation workflow
A radiology workstation (16) includes a display device (25) and at least one user input device (20, 22, 24). A server computer (10) is programmed to operate...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.