Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0105468 SERVICE CAPABILITIES IN HETEROGENEOUS NETWORK
In some implementations, a telecommunications network can include a core network device. The core network device can receive from a session-originating device...
2016/0105467 Systems and Methods of Making a Call
Systems and methods of making calls are provided. A particular method includes receiving input indicating a destination address at a mobile communication...
2016/0105466 Personal Network Access Control System and Method
A server is provided that includes a processor such that for a Session Initiation Protocol (SIP) request containing a Uniform Resource Identifier (URI)...
2016/0105465 COMMUNICATION WITH ACCESSORIES
A plurality of connections may be established between an accessory interface and a plurality of accessories. A connection between the accessory interface and a...
2016/0105464 CRISSCROSS CANCELLATION PROTOCOL
Technologies, systems, and methods for ordered message delivery that avoid message races or crisscrosses between communicating nodes. For example, if Node A...
2016/0105463 MANAGED REAL-TIME COMMUNICATIONS BETWEEN USER DEVICES
Managed real-time communications between user devices may be provided. Upon receiving a request to instantiate a communication connection from an application,...
2016/0105462 Systems and Methods for Rule-Based Anomaly Detection on IP Network Flow
A system to detect anomalies in internet protocol (IP) flows uses a set of machine-learning (ML) rules that can be applied in real time at the IP flow level. A...
2016/0105461 INFORMATION PROCESSING APPARATUS AND CONTROL METHOD FOR INFORMATION PROCESSING APPARATUS
In an information processing apparatus that communicates with a printing control apparatus, whether the printing control apparatus is connected is determined...
2016/0105460 SYSTEM AND METHOD FOR PROVIDING USER WITH SERVICES
Improper communication using modified software is inhibited without checking game data itself. A system according to one embodiment realizes provision of an...
2016/0105459 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SHARING CONTENT VIA LINKS
In accordance with embodiments, there are provided mechanisms and methods for sharing content via links. These mechanisms and methods for sharing content via...
2016/0105458 DETECTING AND BREAKING CAPTCHA AUTOMATION SCRIPTS AND PREVENTING IMAGE SCRAPING
A security device may receive a request from a client device and intended for a server device. The security device may identify the request as being associated...
2016/0105457 Risk Identification
Systems, methods and apparatuses for analyzing a string of terms (e.g., a search query, text of an email, and the like) are provided. In some examples, a...
2016/0105456 VIRTUAL MACHINE COMPLIANCE CHECKING IN CLOUD ENVIRONMENTS
One or more examples provide a method of transferring a virtual machine between a virtualized computing system and a cloud computing system that includes:...
2016/0105455 EXPOSURE OF AN APPARATUS TO A TECHNICAL HAZARD
Embodiments of the invention are directed to systems, methods and computer program products for determining exposure of an apparatus to a technical hazard and...
2016/0105454 DIFFERENTIAL DEPENDENCY TRACKING FOR ATTACK FORENSICS
Methods and systems for intrusion attack recovery include monitoring two or more hosts in a network to generate audit logs of system events. One or more...
2016/0105453 NETWORK ATTACK DETECTION METHOD
It is described a network attack detection method. A topology analysis on network is conducted to obtain a probing path set containing at least one probing...
2016/0105452 Filtering Network Traffic Using Protected Filtering Mechanisms
Concepts and technologies are disclosed herein for filtering network traffic using protected filtering mechanisms. An indication that traffic is to be filtered...
2016/0105451 INFORMATION PROCESSING APPARATUS, SECURITY MANAGEMENT METHOD AND INFORMATION PROCESSING SYSTEM
When security software is activated, it is determined whether the mode is a safe mode or a normal mode. And the security software switches a monitor in...
2016/0105450 PREVENTING EXECUTION OF TASK SCHEDULED MALWARE
A method for preventing malware attacks includes the steps of detecting an attempt on an electronic device to access a task scheduler, determining an entity...
2016/0105449 RELIABLE USER-DEVICE CONTENT AND MEDIA DELIVERY APPARATUSES, METHODS AND SYSTEMS
The RELIABLE USER-DEVICE CONTENT AND MEDIA DELIVERY APPARATUSES, METHODS AND SYSTEMS ("SEME") can allow for the delivery of electronic content in malware and...
2016/0105448 Method, Apparatus, and Computer Program Product for Privacy Management
An apparatus for privacy management may include a processor. The processor may be configured to access one or more privacy options. In this regard, each...
2016/0105447 TIME-BASED CONFIGURATION PROFILE TOGGLING
Time-based configuration profile toggling of a client device can be provided. A computing device in data communication with a client device over a network can...
2016/0105446 APPLYING FORWARDING POLICY TO AN APPLICATION SESSION
A method for applying a security policy to an application session, includes recognizing the application session between a network and an application via a...
2016/0105445 COMMUNICATIONS SYSTEM, MANAGEMENT SERVER, AND COMMUNICATIONS METHOD
A communications system includes communications terminals connected to a management server. The management server includes a terminal manager managing data...
2016/0105444 ENFORCING ALIGNMENT OF APPROVED CHANGES AND DEPLOYED CHANGES IN THE SOFTWARE CHANGE LIFE-CYCLE
On a host, host content change requests are intercepted in real-time. In a tracking mode, the change requests are logged and allowed to take effect on the...
2016/0105443 RESOURCE ACCESS
An example method for accessing a target resource in accordance with aspects of the present disclosure includes retrieving a configuration from a local profile...
2016/0105442 SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR SHARING FILES BASED ON USER PROFILE VISIBILITY
In accordance with embodiments, there are provided mechanisms and methods for sharing files based on user profile visibility. These mechanisms and methods for...
2016/0105441 Providing Restricted Access to Given Devices by Constructing Abstract Devices
Methods, systems, and computer program products for providing restricted access to given devices by constructing abstract devices are provided herein. A method...
2016/0105440 METHOD AND SYSTEM FOR DATA SESSION ESTABLISHMENT
A method and system for data session establishment from a mobile device in a multiple networks scenario, the method including, checking whether an identifier...
2016/0105439 Anti-Hacking System for Quantum Communication
A method and apparatus for reducing unauthorized access of an information stream. The information stream is received at a node along a path to a destination...
2016/0105438 SYSTEM, METHOD, AND APPARATUS FOR AUTHENTICATION
An authentication apparatus updates a first execution information entry corresponding to a first identification information entry of an authentication target...
2016/0105437 DEVICE AND AUTHENTICATION SYSTEM
A device includes a storage unit that stores generated challenges which are challenges previously generated, a determination unit that determines whether a...
2016/0105436 SECURITY VERIFICATION METHOD, APPARATUS AND TERMINAL
Disclosed are a security verification method, apparatus, and terminal. The method includes: acquiring a first verification code and prompting the first...
2016/0105435 SYSTEMS AND METHODS TO AUTHENTICATE IDENTITY FOR SELECTIVE ACCESS TO INFORMATION RELATING TO PROPERTY
Credential and/or location data included in data received by a networked system from a device that communicated the data to the networked system may be...
2016/0105434 SECURE TWO-WAY AUTHENTICATION USING ENCODED MOBILE IMAGE
A digital authentication method, system, and related devices/media, the authentication method comprising displaying a web page comprising one or more website...
2016/0105433 INFORMATION PROCESSING DEVICE, WIRELESS COMMUNICATION SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM
[Object] To propose an information processing device, wireless communication system, information processing method, and storage medium which can mutually...
2016/0105432 SYSTEM AND METHOD TO PROVIDE INTERACTIVE, USER-CUSTOMIZED CONTENT TO TOUCH-FREE TERMINALS
A method of displaying content to a user within a managed space comprised of one or more touch-free interactive kiosks includes collecting user data about the...
2016/0105431 METHOD OF PROVIDING SNS-GROUP INVITING SERVICE AND SNS SERVER THEREFOR
A method for registering a device to a server is provided. The method includes connecting a first device to a second device, the first device having been...
2016/0105430 SYSTEMS AND METHODS FOR DISTRIBUTED TRUST COMPUTING AND KEY MANAGEMENT
Devices, systems, and methods for conducting trusted computing tasks on a distributed computer system are described. In some embodiments, a client device...
2016/0105429 CONTROLLED USE OF A HARDWARE SECURITY MODULE
Methods are provided for using a hardware module connectable to multiple computer systems, where the multiple computer systems are connectable to a server...
2016/0105428 AUTHENTICATION FOR OVER THE TOP BROADCAST STREAMING USING AUTOMATED CONTENT RECOGNITION
An authenticator in a second user device captures a media sample comprising at least one of an audio portion, a video portion or an image portion. The media...
2016/0105427 Attesting Authenticity of Infrastructure Modules
A user device is provided that includes an authentication application that runs on the user device. A calibration device is also provided that includes...
2016/0105426 SYSTEM AND METHOD FOR ONE TIME PASSWORD-BASED AUTHENTICATION
Disclosed are a system and a method for one-time password (OTP)-based authentication. The system for OTP-based authentication includes a transceiver module...
2016/0105425 BIDIRECTIONAL AUTHENTICATION
Systems, methods, and other embodiments associated with bidirectional authentication are described herein. According to one embodiment, a method includes a...
2016/0105424 NETWORK-ASSISTED FABRIC PAIRING
Systems and methods for joining a device to a fabric using an assisting device include an indication to add a joining device to a fabric. If the joining device...
2016/0105423 CERTIFICATES FOR LOW-POWER OR LOW-MEMORY DEVICES
Methods and systems for generating or validating compact certificates include receiving a first format of the certificate. Moreover, obtain a signature for the...
2016/0105422 LATE BINDING AUTHENTICATION
A late-binding token (LBT) is securely generated and provided to a device application. When the LBT is presented and validated, a resource associated with the...
2016/0105421 SYSTEM AND METHOD INVOKING SECURITY AND PROFILE UTILITIES FOR GLOBAL ACCOUNT REGISTRATION
Systems and methods are disclosed herein for managing electronic access from remote devices to a plurality of back-end computer platforms. The system includes...
2016/0105420 Identity and Access Management
An access management account that includes an access identifier may be used to control access to telecommunications services or applications. An access...
2016/0105419 METHOD FOR LOGGING OF A REMOTE CONTROL SESSION
A method for logging of a remote control session, for use in a remote control system comprising a session initiator operable to initiate a remote control...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.