Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0142408 SECURE IDENTITY PROPAGATION IN A CLOUD-BASED COMPUTING ENVIRONMENT
The present disclosure describes methods, systems, and computer program products for providing secure identity propagation in a cloud-based computing...
2016/0142407 METHOD AND APPARATUS FOR DISPLAYING USER INTERFACE IN ELECTRONIC DEVICE
A method for obtaining biometric information associated with a user of the electronic device from the electronic device is provided. The method includes...
2016/0142406 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
An information processing apparatus includes an authenticating section, a detecting section, and a processor. The authenticating section authenticates a user....
2016/0142405 AUTHENTICATING A DEVICE BASED ON AVAILABILITY OF OTHER AUTHENTICATION METHODS
An approach for authenticating a device is provided. The approach includes a computer implemented method for receiving a first stage biometric variable...
2016/0142404 IDENTITY ASSERTION BASED ON BIOMETRIC INFORMATION
A method and apparatus for providing a lifetime extension to an identity assertion is provided herein. During operation a user will authenticate to an identity...
2016/0142403 TERMINAL DEVICE AND METHOD FOR PROTECTING TERMINAL DEVICE, AND TERMINAL MANAGEMENT SERVER
A terminal device includes: a condition checking unit to monitor an operation state of the terminal device by executing a terminal managing program, and...
2016/0142402 METHOD AND APPARATUS FOR REGISTERING A DEVICE FOR USE
A server and method for supporting device registration by the server are provided. The present disclosure relates to a sensor network, Machine Type...
2016/0142401 GENERALIZED CERTIFICATE USE IN POLICY-BASED SECURE MESSAGING ENVIRONMENTS
Within a secure messaging environment, a determination is made that a request to send a message has been generated by a message sender. A message protection...
2016/0142400 SYSTEMS AND METHODS FOR SYSTEM LOGIN AND SINGLE SIGN-ON
Systems and methods for system login and single sign-on are described. A first application of a first system receives a request to access a protected...
2016/0142399 IDENTITY INFRASTRUCTURE AS A SERVICE
A method and system of an identity service to provide a single point of access for a plurality of applications for an authentication of a user identity. An...
2016/0142398 Method of network identity authentication by using an identification code of a communication device and a...
A method of network identity authentication uses an identification code of a communication device and a network operating password. The network operating...
2016/0142397 System for Providing an Indication of the Validity of the Identity of an Individual
Aspects of this disclosure relate to an identity level generating computer which may include a processor and memory storing computer executable instructions...
2016/0142396 End-to-End Trusted Communications Infrastructure
A method establishing a trusted end-to-end communication link is disclosed. The method comprises executing a communication application in a trusted security...
2016/0142395 Ad Hoc Communications
Ad hoc communications are established between unknown contacts. For example, in today's mobile communications environment, there are many instances in which a...
2016/0142394 STRONG AUTHENTICATION VIA DISTRIBUTED STATIONS
In various embodiments, authentication stations are distributed within a facility, particularly in spaces where mobile devices are predominantly used--e.g., a...
2016/0142393 Terminal Authentication Apparatus and Method
A terminal authentication apparatus and method. The method includes sending, by an authenticator, a media access control (MAC) address of a terminal to an...
2016/0142392 IDENTITY MANAGEMENT SYSTEM
There is described a system for authenticating a client device in a network having a plurality of IDM components. One or more of the IDM components subscribes...
2016/0142391 ELECTRONIC DEVICE, SERVER, ELECTRONIC DEVICE CONTROLLING METHOD, INFORMATION PROCESSING METHOD AND RECORDING MEDIUM
An information processing device includes an interface configured to receive authentication information from an electronic device. The device also includes...
2016/0142390 THIRD-PARTY DOCUMENTED TRUST LINKAGES FOR EMAIL STREAMS
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for establishing third-party documented trust linkages. In...
2016/0142389 Short-Range Device Interactions for Facilitating Partial Uses of Clustered Access Rights
Systems and methods are provided for communication networks and network operations for processing partial uses of clustered access rights. The communication...
2016/0142388 SECURE, UNTETHERED PROVISIONING AND TROUBLESHOOTING OF WIRELESS NETWORK DEVICES
A wireless network device only installs configuration information that is wirelessly received from a provisioning device if the wireless network device...
2016/0142387 STORAGE FOR ENCRYPTED DATA WITH ENHANCED SECURITY
Technologies described herein provide enhanced security for encrypted data. In some configurations, encrypted data may be generated at a client computing...
2016/0142386 APPARATUS AND METHOD FOR A MULTI-ENTITY SECURE SOFTWARE TRANSFER
A method and a system embodying the method for a multi-entity secure software transfer, comprising, configuring a communication interface controller at each...
2016/0142385 OFF-HOST AUTHENTICATION SYSTEM
An off-host authentication system includes a network. An off-host processing system is coupled to the network and sends an encrypted authentication item...
2016/0142384 TUNNEL INTERFACE FOR SECURING TRAFFIC OVER A NETWORK
Methods and systems for a flexible, scalable hardware and software platform that allows a managed security service provider to easily provide security services...
2016/0142383 INFORMATION PROCESSING APPARATUS, CONTROL METHOD, AND PROGRAM
An information processing apparatus includes first processing means for performing a setting for performing encrypted communication on the information...
2016/0142382 Systems, Methods, and Media for a Cloud Based Social Media Network
System and methods for providing private social networks, which are cloud-based in some instances, are provided herein. A method includes receiving a selection...
2016/0142381 DIGITAL RIGHTS MANAGEMENT FOR EMAILS AND ATTACHMENTS
A digital rights management (DRM) method for protecting emails can apply different protection policies to different components of an email such as the message...
2016/0142380 SYSTEMS AND METHODS FOR MAINTAINING USER PRIVACY AND SECURITY OVER A COMPUTER NETWORK AND/OR WITHIN A RELATED...
Systems and methods are provided to maintain the privacy of a user's actions and/or experiences on a computer network. The user's privacy is maintained by...
2016/0142379 ASSOCIATING ANONYMOUS INFORMATION TO PERSONALLY IDENTIFIABLE INFORMATION IN A NON-IDENTIFIABLE MANNER
The present disclosure provides a detailed description of techniques used in methods, systems, and computer program products for associating anonymous...
2016/0142378 REACHING ANONYMIZATION SERVICE LEVELS THROUGH ADDED TRANSACTIONS
Methods, apparatuses, systems, and computer-readable media for an anonymization service level improvement system ("ALI") are described. One or more...
2016/0142377 COMMUNICATION APPARATUS, CONTROL METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM
A communication apparatus which performs communication in a wireless LAN by operating as a base station or a terminal station of the wireless LAN determines,...
2016/0142376 STREAMING MEDIA FOR PORTABLE DEVICES
A system and method for allowing hand-held/wireless device devices to (1) provide audio/video conferencing; (2) access AV content through streaming and cloud...
2016/0142375 TECHNIQUES TO AUTHENTICATE A CLIENT TO A PROXY THROUGH A DOMAIN NAME SERVER INTERMEDIARY
Techniques to authenticate a client to a proxy through a domain name server intermediary are described. In one embodiment, for example, a client apparatus may...
2016/0142374 PRIVATE AND SECURE COMMUNICATION SYSTEMS AND METHODS
Private and secure communication systems and methods implemented by a server in a local network behind a local router/firewall include authenticating a client...
2016/0142373 Control of Out-of-Band Multipath Connections
An intermediate device (such as a firewall) is disposed between first and second devices (such as a client and a server device, respectively). Communications...
2016/0142372 Preventing Browser-originating Attacks
A method and device for preventing a browser-originating attack in a local area network. A security device in the local area network intercepts a message from...
2016/0142371 TRANSMISSION SYSTEM AND METHOD FOR NETWORK ADDRESS TRANSLATION TRAVERSAL
A transmission system and a transmission method for network address translation traversal are provided. The transmission system includes a private network...
2016/0142370 SYSTEM AND METHOD FOR AUTOMATICALLY ADDRESSING DEVICES IN A MULTI-DROP MASTER/SLAVE NETWORK
A system for assigning communications addresses within a network is provided. The system comprises a memory and at least one processor coupled to the memory....
2016/0142369 SERVICE ADDRESSING IN DISTRIBUTED ENVIRONMENT
An example service addressing method in a distributed environment includes: generating a service querying request, the service querying request including a...
2016/0142368 Routing to Multiple Diameter Peers with the Same Identity
Various exemplary embodiments relate to a method performed by a Diameter Routing Agent (DRA) for processing a Diameter message, the method including: providing...
2016/0142367 MANAGING CONTENT DELIVERY NETWORK SERVICE PROVIDERS
A system, method, and computer readable medium for managing CDN service providers are provided. A network storage provider storing one or more resources on...
2016/0142366 METHOD AND SYSTEM FOR AUTOMATIC PROVISIONING OF ENTERPRISE PRIVATE NETWORK OVER 3G/4G MOBILE WIRELESS NETWORKS...
An intelligent mechanism to map the public user identity into the private user identity inside the mobile network is defined. The identity mapping logic...
2016/0142365 ADDRESS RESOLUTION REWRITING
A network controller may rewrite an address resolution request and an address resolution response. The address resolution request may be rewritten by changing...
2016/0142364 Secure Electronic Mail System
An e-mail system is disclosed that overcomes many deficiencies of, but is backward compatible with, existing e-mail systems. Embodiments of the system may...
2016/0142363 METHOD AND ELECTRONIC DEVICE FOR PROCESSING INTENT
A method of operating an electronic device includes segmenting a second message in a first message, allocating the segmented second message to at least two...
2016/0142362 CUSTOM ENCODED MESSAGES AMONGST A CUSTOMIZED SOCIAL GROUP
A system and method for sending custom encoded messages amongst a customized social group. A selection of intended recipients within a subgroup from a list of...
2016/0142361 IMAGE WITH AUDIO CONVERSATION SYSTEM AND METHOD UTILIZING SOCIAL MEDIA COMMUNICATIONS
A system and method are presented that use an existing social networking message system to allow interactive audio commentary concerning a visual image. Audio...
2016/0142360 ELECTRONIC MAIL DELIVERY APPARATUS, ELECTRONIC MAIL DELIVERY METHOD, AND PROGRAM STORAGE MEDIUM
Various embodiments prevent erroneous transmission of electronic mails and therefore forestall information leakage in an electronic mail delivery apparatus....
2016/0142359 ITEM IMPORTANCE INDICATION
A method of operating a computerized device to indicate importance of messages to a user includes calculating importance scores for the messages based on...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.