Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,004,9261 Method for identifying age based on facial feature
A method for identify age based on facial features, includes: getting a face image and capturing a face area from the face image; setting a plurality of facial...
US-1,004,9260 Computer systems and computer-implemented methods specialized in processing electronic image data
Embodiments directed towards systems and methods for tracking a human face present within a video stream are described herein. In some embodiments, the...
US-1,004,9259 Fingerprint module, method for fabricating the same, and mobile terminal
Disclosed are a fingerprint module, a method for fabricating the same, and a mobile terminal. The fingerprint module has a fingerprint chip and a circuit board....
US-1,004,9258 Method of preprocessing image including biological information
A method of preprocessing an image including biological information is disclosed, in which an image preprocessor may set an edge line in an input image...
US-1,004,9257 Fingerprint identification module
A fingerprint identification module includes a cover plate, a fingerprint identification sensor, at least one light source, a plurality of fibers, and a display...
US-1,004,9256 Fingerprint sensing module
A fingerprint sensing module adapted to sense fingerprint of user's finger is provided. The fingerprint sensing module includes a sensing device, an optical...
US-1,004,9255 Finger biometric sensing device including series coupled error compensation and drive signal nulling circuitry...
A finger biometric sensing device may include drive circuitry for generating a drive signal and an array of finger biometric sensing pixel electrodes...
US-1,004,9254 Signal strength enhancement in a biometric sensor array
A biometric imager may comprise a plurality of sensor element traces formed in or on a sensor substrate which may comprise at least a portion of a display...
US-1,004,9253 Sensor pixel circuitry for fingerprint identification
In one aspect, a fingerprint sensor device for fingerprint detection includes an array of sensor pixels to capacitively couple with a touched portion of a...
US-1,004,9252 Chip package and fabrication method thereof
A chip package includes a substrate, a capacitive sensing layer and a computing chip. The substrate has a first surface and a second surface opposite to the...
US-1,004,9251 Electronic device including pushbutton switch between finger biometric sensor and device housing and related...
An electronic device may include a device housing having a topside and an underside. The electronic device may also include a mounting frame movable above the...
US-1,004,9250 Document decoding system and method for improved decoding performance of indicia reading terminal
Embodiments of the present invention comprise an indicia reading terminal including operatively configured to interact with a storage module to store data,...
US-1,004,9249 Indicia reader safety
Indicia readers may be configured with two illumination light sources: a primary light source for illuminating primary indicia (e.g., a barcode) and a secondary...
US-1,004,9248 Positive pressure enclosure for particulate exclusion on reflecting surfaces
An enclosure for a mirror may include a first passage, a second passage, and a third passage. The mirror may be positioned within the enclosure at an angle that...
US-1,004,9247 Optimization of image frame management in a sweep-style optical code data reader
Disclosed are techniques to enhance an in-counter sweep-style data reader, having frame buffer memory and an imager defining a read zone, so as to improve a...
US-1,004,9246 Mini-barcode reading module with flash memory management
A miniature barcode reading module for an electronic device minimizes the size of the memory of the processor die allowing the module to be used in small form...
US-1,004,9245 Laser scanning code symbol reading system providing control over length of laser scan line projected onto a...
Method of and system for reading bar code symbols using a hand-supportable laser scanning bar code symbol reading system supporting an improved level control...
US-1,004,9244 Motion-controlled arrangement for, and method of, locating targets with improved performance in a venue
Multiple sensing network units are deployed overhead in a venue. Each unit supports a motion detecting system for detecting a level of motion in a zone of the...
US-1,004,9243 Event RFID timing system and method having integrated participant event location tracking
A system and method for determining and tracking a location of a participant traveling along a route wherein the participant being tracked with an RFID tag...
US-1,004,9242 Information processing method and non-transitory recording medium
An information processing method causes a processor in a terminal to: display, on the display of the terminal, a first screen representing a pre-preparation...
US-1,004,9241 System for identifying a location of a mobile tag reader
A radio frequency identification (RFID) reader identifies in which room among several rooms the RFID reader is more likely to be located. The RFID reader...
US-1,004,9240 Asset tracking system for rack-based enclosures
A method of establishing a location beacon includes establishing a bi-directional wireless radiofrequency connection between a directed light beacon device and...
US-1,004,9238 Encoded information reading terminal with item locate functionality
An encoded information reading terminal can comprise a microprocessor, a memory communicatively coupled to the microprocessor, a communication interface, and an...
US-1,004,9237 Radio-frequency identification transponder and method for sending a radio-frequency identification message
Embodiments provide a method for sending a message from an RFID transponder to a reader during a transmission frame using active load modulation, the method...
US-1,004,9236 Identification of items within delivery containers
A food item container that contains a food item may include one or more sensors that collect sensor data indicating a characteristic (e.g., temperature,...
US-1,004,9235 Creating mechanical stamps to produce machine-readable optical labels
A tool for creating mechanical stamps that produce machine-readable optical labels. The tool selects an initial element of a list of two-dimensional labels. The...
US-1,004,9234 Secure access management of devices
Systems and methods may provide implementing one or more device locking procedures to block access to a device. In one example, the method may include receiving...
US-1,004,9233 Information processing apparatus, security management method and information processing system that switches...
When security software is activated, it is determined whether the mode is a safe mode or a normal mode. And the security software switches a monitor in...
US-1,004,9232 Rewrite detection system, rewrite detection device and information processing device
A rewrite detection system, a rewrite detection device and an information processing device can detect unauthorized rewrite to a program or data stored in a...
US-1,004,9231 Method and system for obfuscating the properties of a web browser
A method for obfuscating the properties of a web browser includes identifying an active web browser and generating random assortments of properties compatible...
US-1,004,9230 System and methods for exchanging identity information among independent enterprises which may include person...
A system and method for exchanging identity information and for correlating protected data across independent data systems connected through a network is...
US-1,004,9229 Systems and methods for the management of huddle board participants
Systems and methods for managing a list of huddle board participants are disclosed. The huddle collaboration system includes a huddle management system having...
US-1,004,9228 File encryption support for FAT file systems
Native file encryption support is integrated into an existing file system that does not provide such support, such as the FAT family of file systems, while...
US-1,004,9227 Data field masking and logging system and method
A computer-implemented method for controlling the expression of a block of data from a sensitive data storage device, the method including the steps of...
US-1,004,9226 Facilitating access to restricted functionality
Techniques are described for facilitating access of computing system users to restricted functionality, such as internal functionality of a business or other...
US-1,004,9225 Data access control systems and methods
Various hardware and software configurations are described herein which provide improved security and control over protected data. In some embodiments, a...
US-1,004,9224 Shared secret vault for applications with single sign on
Some aspects of the disclosure generally relate to providing single sign on features in mobile applications in a secure environment using a shared vault. An...
US-1,004,9223 Analyzing address book upload requests
Techniques for processing address book upload requests are provided. A user of a social network service uploads a list of email addresses. The social network...
US-1,004,9222 Establishing application trust levels using taint propagation
An application of a mobile device may be granted access to sensitive or private information. The mobile device may be configured to monitor the application's...
US-1,004,9221 Management of application access
Concepts and technologies are disclosed herein for management of application access. A security management application can be configured to set access controls...
US-1,004,9220 Automatic transformation of security event detection rules
A computer-implemented method for transformation of security information and event management (SIEM) rules and deploying the SIEM rules in a network of event...
US-1,004,9219 Process risk classification
In one implementation, a computer-implemented method includes receiving, at a process risk classifier running on a computer system, a request to determine a...
US-1,004,9218 Rollback resistant security
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for rollback resistant security are disclosed. In one aspect,...
US-1,004,9217 Event-based apparatus and method for securing bios in a trusted computing system during execution
An apparatus is provided for protecting a basic input/output system (BIOS) in a computing system. The apparatus includes a BIOS read only memory (ROM), an event...
US-1,004,9216 Media protection policy enforcement for multiple-operating-system environments
Technologies for media protection policy enforcement include a computing device having multiple operating systems and a data storage device partitioned into a...
US-1,004,9215 Apparatus and method for preventing access by malware to locally backed up data
A method for providing malware protection in connection with processing circuitry including hardware resources and software resources managed by a primary...
US-1,004,9214 Systems and methods for detecting malicious processes on computing devices
The disclosed computer-implemented method for detecting malicious processes on computing devices may include (i) identifying a portion of data on a computing...
US-1,004,9213 Fog-based distributed malware defense
In one embodiment, a device in a network joins a fog-based malware defense cluster comprising one or more peer devices. The device and each peer device in the...
US-1,004,9212 Protection against return oriented programming attacks
In one embodiment, a processor includes at least one execution unit. The processor also includes a Return Oriented Programming (ROP) logic coupled to the at...
US-1,004,9211 Hardware-accelerated prevention of code reuse attacks
Described systems and methods allow protecting a host computer system from malicious software, such as return-oriented programming (ROP) and jump-oriented...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.