1
Xiaoxun Zhu, Ynjiun Paul Wang: Auto-exposure method using continuous video frames under controlled illumination. Metrologic Instruments, Additon Higgins & Pendleton P A, March 24, 2015: US08985456 (122 worldwide citation)

A strobe illumination control process for use in a digital image capture and processing system includes illuminating an object in the field of view with different pulses of illumination over a pair of consecutive video image frames, detecting digital images of the illuminated object over these conse ...


2
Alain Gillet, Serge Thuries: Two-dimensional imager with solid-state auto-focus. Intermec IP, Additon Higgins & Pendleton P A, March 24, 2015: US08988590 (122 worldwide citation)

An imaging system having a solid-state auto focusing system advantageously images broadband light reflected from an object to be imaged using a lens objective having chromatic aberration, which focuses different colors of light at different focal planes. Using the color information in the focal plan ...


3
Robert M Soule III, Guy H Berthiaume, Aldo Mario Caballero, Brian V Conti, Jeffrey Dean Harper, Larry K Hooks, Adam Edward Meggitt, James T Sauerwein, Daniel D Yeakley: Reprogramming system and method for devices including programming symbol. Hand Held Products, Additon Higgins & Pendleton P A, March 24, 2015: US08985457 (121 worldwide citation)

A system and method is provided wherein a device can be reprogrammed utilizing one or more programming symbols. A device subject to reprogramming can be a portable device. In one embodiment a device subject to reprogramming can be a portable symbol reading device capable of reading programming symbo ...


4
Geoffrey Gelay, Robert Michael Hussey, Bhishma Thakkar: Mobile device having an improved user interface for reading code symbols. Hand Held Products, Additon Higgins & Pendleton P A, March 24, 2015: US08985461 (120 worldwide citation)

A mobile device includes a camera, a user interface system, and a processor communicatively coupled to the camera and the user interface system. The user interface system includes a visual display. The processor is configured for (i) capturing an image including a code symbol, (ii) displaying the im ...


5
Paul Edward Showering: Mobile computing device with improved image preview functionality. Honeywell International, Additon Higgins & Pendleton P A, March 24, 2015: US08988578 (120 worldwide citation)

A mobile computing device can comprise a microprocessor, a display, at least one motion sensor, and an imaging device including a two-dimensional image sensor and an imaging lens configured to focus an image of a target object on the image sensor. The mobile computing device can be configured to per ...


6
Sean Philip Kearney, Patrick Anthony Giordano, Charles Joseph Cunningham, Desmond Bond, Thomas Amundsen: Decodable indicia reading terminal with combined illumination. Metrologic Instruments, Additon Higgins & Pendleton P A, March 24, 2015: US08985459 (120 worldwide citation)

A decodable indicia reading terminal can comprise a laser-based scanner, an imager-based scanner, a central processing unit (CPU), and an illumination assembly. The laser-based scanner can include a laser source, a photo-detector, and an analog-to-digital (A/D) converter. The laser source can be con ...


7
Ole Petter Skaaksrud, Terence Hollahan, Steven Benton: Association management in a wireless node network. FedEx Corporate Services, Withers & Keys, March 24, 2015: US08989053 (103 worldwide citation)

Methods and systems for association management within a wireless node network of nodes and a server are described. A method may identify a first node as a potential for associating with a second node based, for example, upon status information about the nodes. An association request is transmitted b ...


8
Su Ryong Jeong, Jeong Ho Park, Tae Young Kim: Method and apparatus for uplink power control in wireless communication system. Samsung Electronics, Jefferson IP Law, March 24, 2015: US08989788 (82 worldwide citation)

A method and an apparatus for uplink power control in a wireless communication system are provided. More specially, a method is provided in which a first base station in a wireless communication system periodically measures interference for a cell of a second base station neighboring the first base ...


9
Abhishek Singh, Jayaraman Manni: Systems and methods for automatically detecting backdoors. FireEye, Blakely Sokoloff Taylor & Zafman, March 24, 2015: US08990944 (69 worldwide citation)

Techniques for detecting malicious attacks may monitor activities during execution of content (e.g., network downloads and email) to identify an instruction backdoor on a computer. An instruction backdoor is malware that opens a port for listening for instructions from a remote server. Such instruct ...


10
Stuart Gresley Staniford, Ashar Aziz: Systems and methods for scheduling analysis of network content for malware. FireEye, Blakely Sokoloff Taylor & Zafman, March 24, 2015: US08990939 (66 worldwide citation)

A system is described for scheduling the processing of items of suspicious network content to determine whether these items contain malicious network content. The system features a memory and an analyzer that may comprise a processor-based digital device in which at least one virtual machine (VM) an ...



Click the thumbnails below to visualize the patent trend.