Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0212125 Authenticating Customers and Managing Authenticated Sessions
Methods, systems, and computer-readable media for authenticating customers of an organization and managing authenticated sessions of various customers are...
2016/0212124 TERMINAL DETERMINATION DEVICE AND METHOD
A terminal determination device includes a processor that executes a procedure. The procedure includes acquiring operation information indicating history of...
2016/0212123 SYSTEM AND METHOD FOR PROVIDING A CERTIFICATE BY WAY OF A BROWSER EXTENSION
Provided is a system and method for providing a certificate by way of a Browser Extension. More specifically, provided is a Server System having at least one...
2016/0212122 SYSTEMS AND METHODS FOR INTEGRATING WITH A NATIVE COMPONENT USING A NETWORK INTERFACE
Embodiments as disclosed herein may provide systems and methods for component integration and security presented herein. In particular, in one embodiment, a...
2016/0212121 METHODS AND SYSTEMS FOR A SUBSCRIPTION DATA SHARING SERVICE
An illustrative method according to a set of instructions stored on the memory of a computing device includes receiving, by a processor of the computing...
2016/0212120 TRANSACTION QUERY ENGINE
Example implementations described herein are directed to a transaction query engine involving a token that is generated by the server and sent to the...
2016/0212119 AUTHENTICATION INFORMATION ENCRYPTION SERVER APPARATUSES, COMPUTER READABLE MEDIUMS AND METHODS
There is provided an authentication server apparatus connected with a terminal device through a network including a storage device configured to store pattern...
2016/0212118 System and Method for Visualizing Data Sharing Arrangements for an Organization
In various embodiments, the present disclosure relates to a method of graphically displaying, by a central server of a peer-to-peer folder sharing system, on a...
2016/0212117 Systems, Methods, and Computer Program Products for Securely Managing Data on A Secure Element
Systems, methods, and computer program products are provided for managing applets. A first request to personalize the first applet is received over a...
2016/0212116 Open Access Network Secure Authentication Systems and Methods
Authentication of devices to receive services provided by service providers over communications networks such as open access networks, wherein the provider of...
2016/0212115 System and Method for Providing Confidence Scores in a Persistent Framework
An information handling system includes a plurality of input devices and an authentication engine. Each input device receives credential information and...
2016/0212114 IMAGE FORMING APPARATUS, INFORMATION PROCESSING SYSTEM, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM
An image forming apparatus includes: a communicating unit which communicates with a portable terminal device and an external device; a storage control unit...
2016/0212113 TECHNIQUES FOR FACILITATING SECURE, CREDENTIAL-FREE USER ACCESS TO RESOURCES
Techniques are disclose herein for facilitating secure user access to resources without user-provided credentials. More specifically, the techniques described...
2016/0212112 MESSAGE COMMUNICATION SYSTEM AND OPERATION METHOD THEREOF
An operation method of a message communication system includes the following steps. At least one linking server generates a first login request. A management...
2016/0212111 ENDPOINT SECURITY SCREENING
In order to prevent unauthorized access to information, a system may analyze and may selectively store the information provided based on requests from users...
2016/0212110 USER AUTHENTICATION RELYING ON RECURRING PUBLIC EVENTS FOR SHARED SECRETS
An access manager manages access to a resource. At a first time, the access manager designates a variable attribute associated with a recurring public event as...
2016/0212109 MANAGING DISTRIBUTION AND RETRIEVAL OF SECURITY KEY FRAGMENTS AMONG PROXY STORAGE DEVICES
A method performed by a processor of a computer, includes obtaining a security key associated with data, dividing the security key into key fragments, and...
2016/0212108 SYSTEMS, METHODS AND DEVICES FOR DIRECT COMMUNICATION
Device to device (D2D) communication can be performed with packet data convergence protocol (PDCP) based encapsulation without internet protocol (IP)...
2016/0212107 TAPE DRIVE ENCRYPTION IN THE DATA PATH
Implementations described and claimed herein provide encryption in the data path. In one implementation, login parameters from a primary data center are...
2016/0212106 SECURE VIRTUALIZED MOBILE CELLULAR DEVICE
Secure virtualizing of a mobile cellular device uses a cellular communication network having base transceiver station edge node servers. A virtualized-instance...
2016/0212105 COLLISION AVOIDANCE IN A DISTRIBUTED TOKENIZATION ENVIRONMENT
A client receives sensitive data to be tokenized. The client queries a token table with a portion of the sensitive data to determine if the token table...
2016/0212104 Preventing Misuse of Code Signing Certificates
A method of authenticating or controlling a software application on an end user device. The method includes, at the end user device, downloading software...
2016/0212103 CONFIGURING, CONTROLLING AND MONITORING COMPUTERS USING MOBILE DEVICES
A portable computing device captures imagery from a screen of a second computer, decodes information steganographically-encoded in the screen display, and uses...
2016/0212102 METHOD AND DEVICE FOR DISTRIBUTING TRAFFIC BY USING PLURALITY OF NETWORK INTERFACES IN WIRELESS COMMUNICATION...
A method and a device for distributing traffic by a terminal in a wireless communication system are provided. The method includes generating a first secure...
2016/0212101 PROTECTING CONTENT INTEGRITY
A request for a resource of web content is received. It is determined whether the request identifies the resource using a transformed identifier that has been...
2016/0212100 TRANSPARENT PROXY SYSTEM WITH AUTOMATED SUPPLEMENTAL AUTHENTICATION FOR PROTECTED ACCESS RESOURCES
Techniques are disclosed herein for facilitating dynamic risk assessment and automated triggering of supplemental authentication for protected access...
2016/0212099 PRIVATE CLOUD CONTROL
Management of IoT devices through a private cloud. An IoT device is coupled to a gateway. A request from the IoT device to connect to a private cloud, wherein...
2016/0212098 LOAD BALANCING INTERNET PROTOCOL SECURITY TUNNELS
A load balancer is provided that can direct Internet Protocol Security (IPsec) traffic received from a single IPsec tunnel initiator to one of a plurality of...
2016/0212097 Secure In-Band Signaling Method for Mobility Management Crossing Firewalls
An in-band signaling method that enables secure updates of a care-of-IP address for a mobile host that roams between access networks. In the illustrative...
2016/0212096 FTP APPLICATION LAYER PACKET FILTERING METHOD, DEVICE AND COMPUTER STORAGE MEDIUM
Disclosed is a method for Application Specific Packet Filter (ASPF) of a File Transfer Protocol (FTP), including the following steps: when a Transmission...
2016/0212095 METHOD AND SYSTEM FOR ACCESSING RESOURCE AND SYSTEM APPLYING THE SAME
A method and system for accessing resource and system applying the same are disclosed. One aspect provides a method of allocating a universal resource...
2016/0212094 DYNAMIC LINK AGGREGATION
At least two Ethernet sub-interfaces are established on a first Ethernet interface and a second Ethernet interface of a first device, and each Ethernet...
2016/0212093 SYSTEM AND METHOD FOR SMTP AND ALTERNATIVE EMAIL PROTOCOL INTEROPERABILITY
A system and method for migrating from the legacy SMTP protocol to an alternative email protocol, such as Bitmessage protocol, for sending email messages...
2016/0212092 RESPONSE DEVICE, INFORMATION PROCESSING DEVICE, RESPONSE METHOD, INFORMATION PROCESSING METHOD, AND...
A response device includes a memory, a reception unit, and a response unit. The memory stores a logical address and a physical address in a communication...
2016/0212091 MANAGING MESSAGING SESSIONS AMONG MULTIPLE PARTICIPANTS
A method of managing a multi participant messaging session among session participants. The method comprises detecting electronic mails and instant messaging...
2016/0212090 SYSTEM AND METHOD FOR TRACKING CONVERSATIONS
A system and method for tracking conversations is disclosed. The method includes receiving an alert, the alert comprising operation information of a machine,...
2016/0212089 METHODS AND SYSTEMS FOR MANAGING A MULTI PARTICIPANT EVENT
A method for managing communication among a plurality of social network members. The method comprises defining a multi participant task, setting at least one...
2016/0212088 PROMPTING USER ACTION IN CONJUNCTION WITH TAGGED CONTENT ON A SOCIAL NETWORKING SYSTEM
A social networking system user is prompted to take an action or is provided with additional information associated with a location where the user has...
2016/0212087 MESSAGE SYSTEM
The present invention relates to a new message system, including various methods, systems, processes, applications, and products relating to same. In one...
2016/0212086 MESSAGE PROCESSING, FORWARDING AND FILTERING BASED ON ATTRIBUTE VALUES
Message processing, forwarding and filtering are able to be implemented based on attribute-values extracted from a message. By utilizing attributes within the...
2016/0212085 SOCIAL MEDIA MESSAGE DELIVERY BASED ON USER LOCATION
An approach for delaying social media messages is provided herein. A first computing device receives user preferences. The first computing device detects a...
2016/0212084 System and methods for using message thread-recurrent data to implement internal organizational processes
A method, system, computer program product, and related business methods are described in the context of a web-based business information system having an...
2016/0212083 CONNECTION SHARING ACROSS ENTITIES IN A DISTRIBUTED MESSAGING SYSTEM
A method of creating a link of a connection to a messaging system includes receiving a protocol command message directed to a message entity of the messaging...
2016/0212082 SYSTEM AND METHOD FOR SECURING ELECTRONIC MESSAGES
A secure communication system (100), a method to make same, and method to use that provides security and privacy of electronic communication. The secure...
2016/0212081 PROCESSING CONNECTION REQUEST IN ONLINE SERVICE
Disclosed is a system and method for processing a connection request in an online service by a server corresponding to the online service. A connection request...
2016/0212080 SYSTEM, METHOD AND COMPUTER READABLE MEDIUM FOR PROCESSING UNSOLICITED ELECTRONIC MAIL
An internet service provider (ISP) is configured to analyze a subscriber's sent e-mail packets to determine a subscriber identity associated with the e-mail...
2016/0212079 MESSAGE CHALLENGE RESPONSE
A system and method are disclosed for registering a email sender for the purpose of sending an email message to an email receiver including receiving a...
2016/0212078 Method And System For Managing Mass Delivery Of Audio Messages
In some embodiments, systems and methods disclosed herein facilitate mass delivery of audio messages to communication devices operated by recipients. Such a...
2016/0212077 METHODS AND SYSTEMS FOR PROCESSING INFORMATION IN A NETWORK
Methods and systems for presenting information on a computing device in a network are disclosed. The method includes registering the computing device with the...
2016/0212076 System, Method, and Apparatus for Providing Prayers over a Network
Provided is a computer-implemented method, system, and apparatus for displaying at least one prayer on at least one client device including at least one...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.