Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0112435 SYSTEMS AND METHODS FOR FILE LOADING
The application describes systems and methods for preventing the distribution of large volumes of electronic data by loading selected sensitive files with pad...
2016/0112434 TERMINAL FOR INTERNET OF THINGS AND OPERATION METHOD OF THE SAME
An example terminal includes a communication circuitry configured to communicate with a server; and a data processor configured to request the server to...
2016/0112433 TERMINAL FOR INTERNET OF THINGS AND OPERATION METHOD OF THE SAME
An example terminal includes a communication circuitry configured to communicate with a server; and a data processor configured to request the server to...
2016/0112432 IMPOSTER ACCOUNT DETECTION AND REMEDIATION IN A SOCIAL NETWORKING SYSTEM
When a request to connect a requesting user to a target user is received by the social networking system, information associated with the requesting user and...
2016/0112431 METHOD AND APPARATUS FOR PRIVACY POLICY MANAGEMENT
Various methods are provided for determining run-time characteristics of an application at the time of installation and/or modification. Based on the...
2016/0112430 Enhanced Security for Electronic Communications
Techniques are described for providing enhanced security for electronic communications, such as by including in a message sent between two services a digital...
2016/0112429 ROLE BASED ACCESS CONTROL FOR CONNECTED CONSUMER DEVICES
A processing device authenticates a computing device of a user to a user account. The processing device determines a role associated with the user account, and...
2016/0112428 CONTENT ACCESS CONTROL IN A SOCIAL NETWORK
Disclosed are systems and methods associated with a social network application. A plurality of posts associated with a client system user is displayed. First...
2016/0112427 COMMUNICATION MODEL BASED ON USER ROLE
A non-transitory computer readable medium includes instructions which, when executed by one or more hardware processors, causes performance of operations. The...
2016/0112426 PRE-AUTHORIZING A CLIENT APPLICATION TO ACCESS A USER ACCOUNT ON A CONTENT MANAGEMENT SYSTEM
A content management system can tag a client installer with an information tag linking the client installer to a user account. The client installer can be...
2016/0112425 SYSTEMS AND METHODS FOR PROVIDING DYNAMICALLY SELECTED MEDIA CONTENT ITEMS
Systems, methods, and non-transitory computer-readable media can identify a set of media content items associated with a first user of a social networking...
2016/0112424 COMMUNICATIONS SYSTEM FOR RESIDENTS OF SECURE FACILITY
A system and a method are provide for two-way communications, automated request handling, and push notifications, via SMS, MMS, IM, email, and other electronic...
2016/0112423 SYSTEMS, METHODS AND APPARATUSES FOR BROKERING DATA BETWEEN WIRELESS DEVICES, SERVERS AND DATA RENDERING DEVICES
Provided are methods, systems, and apparatuses for data brokering between hand held wireless devices (WDs) and data rendering devices (DRDs). DRDs in the form...
2016/0112422 INFORMATION PROCESSING SYSTEM AND DEVICE CONTROL METHOD
An information processing system includes a terminal device connected to a first network; and an information processing device connected to a second network...
2016/0112421 METHOD AND APPARATUS FOR SELECTIVE ACTIVATION OF UNIVERSAL SERIAL BUS (USB) PORTS
A method, non-transitory computer readable medium, and apparatus for selectively activating a universal serial bus (USB) port are disclosed. For example, the...
2016/0112420 RUNTIME API FRAMEWORK FOR CLIENT-SERVER COMMUNICATION
In particular embodiments, a method includes receiving, by a computing device including an import/export framework, encoded client data. The client data may be...
2016/0112419 Account Login Method, Device, and System
An account login method detects whether an account login request carries an indicator for keeping a logged-in state to determine whether a user decides to keep...
2016/0112418 SYSTEMS AND METHODS FOR INTERACTION AMONG TERMINAL DEVICES AND SERVERS
System and method are disclosed for providing authentication of a terminal device. One embodiment includes a method implemented by a first terminal device. The...
2016/0112417 TERMINAL FOR STRONG AUTHENTICATION OF A USER
A method for negotiating reciprocal access to secured data in a computing terminal comprising authenticating, by an application in the computing terminal, the...
2016/0112416 VERIFYING A USER BASED ON DIGITAL FINGERPRINT SIGNALS DERIVED FROM OUT-OF-BAND DATA
In general, embodiments of the present invention provide systems, methods and computer readable media for providing a user verification service based on...
2016/0112415 METHOD OF PROVIDING INFORMATION SECURITY AND ELECTRONIC DEVICE THEREOF
A method of operating an electronic device and an electronic device are provided. The method includes generating biometric information using at least one...
2016/0112414 NETWORK AUTHENTICATION METHOD AND SYSTEM BASED ON EYE TRACKING PROCEDURE
A network authentication method and a system based on an eye tracking procedure are provided. An image capturing unit of a user terminal captures a face image...
2016/0112413 Method for controlling security of cloud storage
A method for controlling security of cloud storage is developed to solve the problem in the prior art that the private key has a low security since the...
2016/0112412 TOKEN BASED ONE-TIME PASSWORD SECURITY
A one-time password (OTP) based security scheme is described, where a provider pre-generates a number of verification codes (e.g., OTP codes) which will be...
2016/0112411 ONE TIME CREDENTIALS FOR SECURE AUTOMATED BLUETOOTH PAIRING
Various communication devices may benefit from one time credentials applied in secure automated pairing to improve the security of pairing. For example,...
2016/0112410 SECURE OVER-THE-AIR PROVISIONING SOLUTION FOR HANDHELD AND DESKTOP DEVICES AND SERVICES
In one embodiment, a device and a services provisioning system establish an over-the-air connection with each other, and perform device posture validation to...
2016/0112409 SPATIAL AND TEMPORAL VERIFICATION OF USERS AND/OR USER DEVICES
Approaches for facilitating spatial and temporal verification of users and/or user devices are disclosed. In some implementations, a user device may be...
2016/0112408 SCALABLE GROUPS OF AUTHENTICATED ENTITIES
Example embodiments provide various techniques for securing communications within a group of entities. In one example method, a request from an entity to join...
2016/0112407 USING AN ENHANCED DATA AGENT TO RESTORE BACKED UP DATA ACROSS AUTONOMOUS STORAGE MANAGEMENT SYSTEMS
An exemplary system preserves the autonomy of two or more distinct storage management systems all the while enabling backed up data to be restored from a first...
2016/0112406 AUTHENTICATION AND AUTHORIZATION IN AN INDUSTRIAL CONTROL SYSTEM USING A SINGLE DIGITAL CERTIFICATE
Systems and methods for performing access control in an industrial control system are described. A first component of an industrial control system may be...
2016/0112405 System, Network Terminal, Browser And Method For Displaying The Relevant Information Of Accessed Website
A method, browser, network device and system for presenting relevant information of accessed website are disclosed in the present disclosure. The method...
2016/0112404 Systems and Methods for Synchronized Sign-on Methods for Non-programmatic Integration systems
Systems and methods for automatically signing a user on to an integration application when a user signs on to another application and signing a user off when...
2016/0112403 METHOD AND APPARATUS FOR BULK AUTHENTICATION AND LOAD BALANCING OF NETWORKED APPLIANCES
A new approach is proposed that contemplates systems and methods to support bulk authentication of an appliance associated with a user to all cloud-based...
2016/0112402 Single Sign-on via Application or Browser
Single sign-on techniques via an application or browser are described. In one or more implementations, a single instance of entry of authentication information...
2016/0112401 SYSTEMS AND METHODS FOR DETERMINING A STRENGTH OF A CREATED CREDENTIAL
Devices, systems, and methods for determining a strength of a created credential are provided. The device includes one or more processors configured to...
2016/0112400 SIMPLIFIED CONFIGURATION OF A NETWORK DEVICE
Methods, systems, and computer readable media can be operable to pair a client device with a CPE device. The methods, systems and computer readable media...
2016/0112399 INFORMATION PROCESSING DEVICE
A login controller has a function of allowing a user to log in to an information processing apparatus. A sign-in controller has a function of allowing the user...
2016/0112398 ALLOWING A USER TO EASILY COLLABORATE WITH USERS FROM OUTSIDE ORGANIZATIONS WHERE THE USER HAS VISITOR STATUS...
A method, system and computer program product for allowing a user to easily collaborate with users from different organizations. In response to authenticating...
2016/0112397 ANOMALY DETECTION FOR ACCESS CONTROL EVENTS
Methods for managing access to protected resources within a computing environment and detecting anomalies related to access control events are described. An...
2016/0112396 Password Manipulation for Secure Account Creation and Verification Through Third-Party Servers
A method and system for deterring attacks at potential breach points between servers and an account and login server for creating and subsequent verification...
2016/0112395 INFORMATION PROCESSING DEVICE, INFORMATION MANAGEMENT METHOD, AND INFORMATION PROCESSING SYSTEM
An information processing device that is connected to another information processing device includes a memory storing a program, a first authentication...
2016/0112394 SYSTEMS AND METHODS FOR IMPLEMENTING A PERSONALIZED PROVIDER RECOMMENDATION ENGINE
Techniques for making personalized provider recommendations in related categories include identifying a first entity category from a plurality of entity...
2016/0112393 CAPTCHA SYSTEMS AND METHODS
Systems and methods for verifying human users through cognitive processes that computers cannot imitate are described herein. Human cognitive language...
2016/0112392 METHOD AND APPARATUS FOR SHARING OF CONTENT
A device comprising: a display; a communication interface; and at least one processor configured to: receive from an external device, via the communication...
2016/0112391 Collection and Storage of a Personalized, Searchable, Unstructured Corpora
An approach is provided for utilizing unstructured corpora in a Question and Answer (QA) system. A question is received at the QA system. A private corpora is...
2016/0112390 Method, Apparatus, and System for Establishing a Virtual Tether between a Mobile Device and a Semiconductor...
A method for establishing a virtual tether between a mobile device and a semiconductor processing tool, the method including: obtaining, by a mobile device, a...
2016/0112389 SECURE TRANSFER OF USER AUTHENTICATION CREDENTIALS BETWEEN DEVICES
An embodiment for the secure transfer of authentication credentials between devices is disclosed. An embodiment for the restoration of authentication...
2016/0112388 GENERATION OF SHORT KEY FOR COMMUNICATIONS
Systems and methods for generation and use of short keys are disclosed. The systems and methods include the generation of a short kev based on the location of...
2016/0112387 SECURE DATA DESTRUCTION IN A DISTRIBUTED ENVIRONMENT USING KEY PROTECTION MECHANISMS
Organizations maintain and generate large amounts of sensitive information using computer hardware resources and services of a service provider. Furthermore,...
2016/0112386 Device and Method for Secure Connection
An electronic device is provided. The electronic device includes a first short-range communication module configured to execute short-range communication with...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.