Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0248767 METHOD AND SYSTEM FOR SECURE COMMUNICATIONS
An operator of a first device is verified using biometric data detected by the first device. Responsive to successfully completing the verification, the first...
2016/0248766 CONTENT CONTROL AT GATEWAY BASED ON AUDIENCE
A gateway device may control access to content based, at least in part, on an audience that will consume the content. In relation to a request for content to...
2016/0248765 DOCUMENT DISTRIBUTION AND INTERACTION
A document originator establishes rules for authenticating an electronic signature. Such rules may require that any user who wishes to assent to the document...
2016/0248764 SYSTEMS AND METHODS FOR CREDENTIAL MANAGEMENT BETWEEN ELECTRONIC DEVICES
Embodiments are provided for managing user credentials that enable access to secure websites. According to certain aspects, a browser device connects (230) to...
2016/0248763 CAPTCHA CHALLENGE INCORPORATING OBFUSCATED CHARACTERS
A method for determining if a user of a computer system is a human. A processor receives an indication that a computer security program is needed and acquires...
2016/0248762 WIRELESS COMMUNICATION SYSTEM, AND ONE-TIME PASSWORD GENERATING AND AUTHENTICATING METHOD
A wireless communication system includes a mobile terminal that performs a one-time password generating function, a fixed terminal capable of activating a...
2016/0248761 TOKEN-BASED SECURITY FOR REMOTE RESOURCES
Systems and methods of token-based protection for remote resources are disclosed. For example, a method may include receiving, at a second computing device, a...
2016/0248760 System and Method to Enable PKI- and PMI- Based Distributed Locking of Content and Distributed Unlocking of...
A central server configured with an Attribute Authority ("AA") acting as a Trusted Third Party mediating service provider and using X.509-compatible PKI and...
2016/0248759 AUTHENTICATION SYSTEM, METHOD AND STORAGE MEDIUM
An authentication system according to an embodiment is provided with a service providing apparatus, an IDaaS corporation apparatus, and an authentication...
2016/0248758 SINGLE SIGN-ON BETWEEN MULTIPLE DATA CENTERS
Techniques are disclosed for a single sign-on (SSO) enterprise system with multiple data centers that can use a lightweight cookie on a user's client device....
2016/0248757 METHOD AND APPARATUS FOR MULTI-DOMAIN AUTHENTICATION
A method and apparatus for multi-domain authentication is described. In one example, credentials are received for a user accessing a first domain. User access...
2016/0248756 AGGREGATOR TECHNOLOGY WITHOUT USERNAMES AND PASSWORDS
Techniques are described in which to access a user's web applications, the user registers and signs on to an aggregator system using any supported login...
2016/0248755 DATA COMMUNICATION IN A CLUSTERED DATA PROCESSING ENVIRONMENT
Data can be communicated across a clustered data processing environment. A server can receive a request and a token from a web user interface component and...
2016/0248754 PASSWORD CONSTRAINT ENFORCEMENT USED IN EXTERNAL SITE AUTHENTICATION
Techniques for password constraint enforcement used in external site authentication are disclosed. In some embodiments, password constraint enforcement used in...
2016/0248753 METHOD AND APPARATUS FOR CLIENT TO CONTENT APPLIANCE (CA) SYNCHRONIZATION
A new approach is proposed that contemplates systems and methods to support file synchronization between a local host and a cloud storage via one or more local...
2016/0248752 MULTI FACTOR USER AUTHENTICATION ON MULTIPLE DEVICES
Systems and methods of the present invention provide for a first and second client computer configured to receive and transmit an authentication credential and...
2016/0248751 CM REGISTRATION METHOD AND APPARATUS
The present invention provides a cable modem (CM) registration method and apparatus, where the method includes: after obtaining a media access control (MAC)...
2016/0248750 METHOD OF USING SERVER, SERVER RESERVATION CONTROL APPARATUS AND PROGRAM STORAGE MEDIUM
In a content supply system, in order to use a streaming server to perform a live distribution, a user PC used makes a reservation for a time zone, etc. to a...
2016/0248749 SYSTEMS AND METHODS FOR PATH MAXIMUM TRANSMISSION UNIT DISCOVERY
An information handling system is provided. The information handling system includes a plurality of network devices. One of the plurality of network devices is...
2016/0248748 METHOD AND APPARATUS FOR MAKING A DECISION ON A CARD
Method and devices for making access decisions in a secure access network are provided. The access decisions are made by one or more portable credentials using...
2016/0248747 METHOD, TERMINAL AND SYSTEM FOR ASSOCIATING USER RESOURCE INFORMATION
A method for associating user resource information includes: acquiring user resource information, associated with a first user identifier of a user, in a first...
2016/0248746 AUTOMATING INTERNET OF THINGS SECURITY PROVISIONING
In one embodiment, a security provisioning service automatically establishes trust in a device. Upon receiving a provisioning request, a security provisioning...
2016/0248745 Stateless Server-Based Encryption Associated with a Distribution List
An example method of decrypting electronic messages includes receiving, by an authentication module of a decryptor device, authentication requests from a...
2016/0248744 System and Method for Sharing Access to a Service Within a Home Network
A home network router and method of operation are provided for seamlessly sharing access to a network service by multiple devices in a home network by...
2016/0248743 CODE ANALYSIS FOR PROVIDING DATA PRIVACY IN ETL SYSTEMS
In an approach for providing data privacy in information integration systems, a method performed during compilation of an information integration job receives...
2016/0248742 SYSTEM AND METHOD FOR IMPLEMENTING A HOSTED AUTHENTICATION SERVICE
A system, apparatus, method, and machine readable medium are described for a hosted authentication service. For example, one embodiment of a system comprises:...
2016/0248741 INFORMATION PROCESSING APPARATUS AND METHOD, RECORDING MEDIUM AND PROGRAM
The present invention relates to an information processing apparatus allowing proper communication with a communication partner in accordance with a...
2016/0248740 CONNECTION KEY DISTRIBUTION
A system and method for securely providing a mobile device with a cryptographic key in a vehicle. The method includes generating a cryptographic key pair that...
2016/0248739 SYSTEM AND METHOD FOR RULE MATCHING IN A PROCESSOR
In one embodiment, a system includes a format block configured to receive a key, at least one rule, and rule formatting information. The rule can have one or...
2016/0248738 METHOD AND SYSTEM FOR FACILITATING NETWORK JOINING
A method for facilitating network joining is disclosed, wherein, while a communication session is active between a network gateway and an NFC device comprised...
2016/0248737 METHODS AND SYSTEMS FOR FILTERING ENCRYPTED TRAFFIC
Application programming interface (API) hooks are injected into an application program executing at a client during run-time. Responsive to these hooks, data...
2016/0248736 Encapsulation of Secure Encrypted Data in a Deployable, Secure Communication System Allowing Benign, Secure...
Sensitive, Type 1 KIV-encrypted data is encapsulated into IP packets in a remotely deployed, secure communication system. The IP packets are addressed to a...
2016/0248735 METHOD AND APPARATUS FOR VERIFIABLE GENERATION OF PUBLIC KEYS
The invention provides a method of verifiable generation of public keys. According to the method, a self-signed signature is first generated and then used as...
2016/0248734 Multi-Wrapped Virtual Private Network
The invention includes a system for transmitting multi-wrapped VPN enabled-data across a communication network from a device to another destination device...
2016/0248733 Private Application Platform
Methods and systems disclosed provide for creating private networks for secured communication between devices. The devices can communicate with each other over...
2016/0248732 MANGEMENT OF NETWORK ADDRESS POOLS
Systems and methods for storing and managing pools of network addresses. An example method may comprise: identifying, in a data structure representing a pool...
2016/0248731 INTERNET CONNECTED HOUSEHOLD IDENTIFICATION FOR ONLINE MEASUREMENT & DYNAMIC CONTENT DELIVERY
A method, apparatus, system, and computer readable storage medium provide the ability to identify an internet connected household (ICH). An Internet Protocol...
2016/0248730 CLIENT AWARE DHCP LEASE MANAGMENT
Managing DHCP address leases based on client properties. A DHCP server may allocate a short DHCP lease to a client device based on client properties. These...
2016/0248729 A MOVABLE GATEWAY, A DHCP SERVER AND RESPECTIVE METHODS PERFORMED THEREBY FOR ENABLING THE GATEWAY TO MOVE FROM...
A gateway, a method performed by the gateway for connecting to an access point of a communication network, a DHCP server and a method performed by the DHCP...
2016/0248728 CONFIGURATION SERVICES
Measures, including methods, systems and non-transitory computer-readable storage mediums, for providing a Domain Name Service (DNS) configuration service for...
2016/0248727 DELIVERY CONTROL DEVICE, DATA DELIVERY SYSTEM, DELIVERY CONTROL METHOD, AND NON-TRANSITORY COMPUTER READABLE...
Provided is a delivery control device, a data delivery system, and a delivery control method that enable a simultaneous data delivery to a number of reception...
2016/0248726 SCOPED NETWORK ADDRESS POOL MANGEMENT
Systems and methods for storing and managing pools of network addresses. An example method may comprise: receiving, by a processing device, a request for a...
2016/0248725 PERSONALIZED COMMUNICATIONS
In some embodiments, security and/or automation systems, collectively referred to as automation systems, may facilitate communications between a remote user...
2016/0248724 Social Message Monitoring Method and Apparatus
A social message monitoring method is implemented by receiving, from a social network server, a social message, and obtaining a theme probability vector of the...
2016/0248723 SOCIAL NETWORKING RESPONSE MANAGEMENT SYSTEM
A system and method for managing electronic social networking includes defining content from a first user for communication to other users on an electronic...
2016/0248722 ESTIMATION OF INFORMATION DIFFUSION ROUTE ON COMPUTER MEDIATED COMMUNICATION NETWORK
A method for estimation of information diffusion route on computer mediated communication network. The method includes: generating, by a computing device, a...
2016/0248721 BLINDER AVOIDANCE IN SOCIAL NETWORK INTERACTIONS
A method, system and computer program product for blinder avoidance in social networking interactions includes executing a social networking data processing...
2016/0248720 SOCIAL MEDIA THREAT MONITOR
Technologies are generally described for systems, devices and methods effective to generate a report related to an entity. An identifier may be received from a...
2016/0248719 DYNAMIC ANALYTICS CONTROLLED INFORMATION DISSEMINATION IN SOCIAL MEDIA
A method, system, and computer program product for selectively disseminating content in social media are provided in the illustrative embodiments. Prior to a...
2016/0248718 METHOD AND SYSTEM FOR FACILITATING PUBLICATION OF A MEDIA FILE AT A SCHEDULED TIME
Methods, systems, and techniques for facilitating publication of a media file at a scheduled time. A media aggregation client sends media and a scheduling...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.