Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0261597 RESPONSIVE ACTIONS AND STRATEGIES IN ONLINE REPUTATION MANAGEMENT WITH REPUTATION SHAPING
Responsive actions and strategies in online reputation management with reputation shaping are provided. A service, such as a reputation management service,...
2016/0261596 WI-FI INTEGRATION FOR NON-SIM DEVICES
The embodiments herein relate to a method performed by an AAA server (113) for enabling a non-SIM device (101b) to access a first network (100a) via a second...
2016/0261594 COMMUNICATING NOTIFICATIONS FROM A THIRD PARTY SYSTEM TO ONLINE SYSTEM USERS VIA THE ONLINE SYSTEM
To allow a third party system to more particularly identify sets of users for distributing content, an online system receives data from a third party system...
2016/0261593 SYSTEMS AND METHODS FOR DECENTRALIZED USER AUTHENTICATION
Systems and methods for decentralized user authentication for digital services, for example, in connection with user authentication for online services, are...
2016/0261592 METHOD AND DEVICE FOR THE SECURE AUTHENTICATION AND EXECUTION OF PROGRAMS
A device and a method for encrypting a virtual machine by on-the-fly encryption and decryption of the memory is described. The device comprises hardware and...
2016/0261591 RFID AUTHENTICATION ARCHITECTURE AND METHODS FOR RFID AUTHENTICATION
A method fir mutual authentication in an RFID system comprising an RFID reader and an RFID tag, the method comprising requesting an identification from the...
2016/0261590 METHOD AND SYSTEM OF SHELVING DIGITAL CONTENT ITEMS FOR MULTI-USER SHARED E-BOOK ACCESSING
A method and system of system and method for operating a computing device for multi-user accessing of a shared e-book for reading within an e-library...
2016/0261589 METHOD AND SYSTEM FOR SHELVING DIGITAL CONTENT ITEMS FOR RESTRICTED ACCESS WITHIN AN E-LIBRARY COLLECTION
A method and system of shelving digital content items, including e-books, for restricted access within an e-library collection. The method is executed in a...
2016/0261588 SECURE NFC TOKEN SUPPORTING ESCALATING AUTHENTICATION OF NFC EXCHANGES
A secure NFC Smart Card supporting the enablement of escalating authentication is described. The system includes a secure NFC Smart Card comprising two coupled...
2016/0261587 SYSTEM AND METHOD FOR PROVIDING A CERTIFICATE FOR NETWORK ACCESS
Provided is a system and method for providing a certificate, and more specifically a certificate for network access upon a second system. The method includes,...
2016/0261586 Identity Authentication Method And Device And Storage Medium
An identity authentication method and device and a storage medium are disclosed, and the method includes: receiving a CAPTCHA code acquiring request from a...
2016/0261585 AUTHENTICATION INFORMATION MANAGEMENT SYSTEM, AUTHENTICATION INFORMATION MANAGEMENT APPARATUS, RECORDING...
An authentication information management system includes an information processing terminal that transmits check target authentication information and an...
2016/0261584 AUTONOMOUS CONFIGURATION OF EMAIL CLIENTS DURING EMAIL SERVER MIGRATION
Systems and methods are provided for automatically configuring an email client during a migration process. An client-side assistant can be deployed to an...
2016/0261583 METHOD AND APPARATUS FOR USER IDENTITY AUTHENTICATION
A method for user identity authentication is provided. The method includes receiving an authentication image selected by a user, and acquiring, based on the...
2016/0261582 SYSTEM FOR SECURE LOGIN, AND METHOD AND APPARATUS FOR SAME
A system for secure login, and a method and an apparatus for the same are disclosed. The system for secure login comprises: an authentication unit; a first...
2016/0261581 USER AUTHENTICATION
In one implementation, instructions stored on a non-transitory computer-readable medium are executable by a processing resource to cause a computing device to...
2016/0261580 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING PROGRAM
An object is to maintain an input load of authentication information properly while assuring safety. An information processing apparatus obtains authentication...
2016/0261579 METHOD AND SYSTEM FOR EXTENDING NETWORK RESOURCES CAMPUS-WIDE BASED ON USER ROLE AND LOCATION
A method, system, and computer readable medium is disclosed which utilizes the LISP control plane to increase communications and access to enterprise resources...
2016/0261578 Method and System for a Computer-Based, Secured Communication between Data Processing Units
In a method and a system for a computer-based and secured communication between data processing units a sender selects an alphanumeric and/or image data set,...
2016/0261577 ANALYSIS WITH EMBEDDED ELECTRONIC SPREADSHEETS
A computer system includes a processor and a data store coupled to the processor. A user interface module is configured to provide a user interface of a first...
2016/0261576 METHOD, AN APPARATUS, A COMPUTER PROGRAM PRODUCT AND A SERVER FOR SECURE ACCESS TO AN INFORMATION MANAGEMENT SYSTEM
The invention relates to a method and an apparatus, wherein the method comprises generating a request to access an information management system; including a...
2016/0261575 EXECUTING AN OPERATION OVER FILE REPOSITORIES LOCATED IN DIFFERENT AUTHENTICATION DOMAINS USING A...
An initial server, located in an initial authentication domain, receives a requested operation from a RESTful client system, and generates a redirections list...
2016/0261574 LOCAL AREA NETWORK
A method and system for distributed security for a plurality of devices in a communication network, each of the devices being responsible for generating,...
2016/0261573 Enrollment in a Device-to-Device Network
An electronic device in a device-to-device network of a user of the electronic device communicates with a group of one or more other instances of the...
2016/0261572 SECURE NODE ADMISSION IN A COMMUNICATION NETWORK
System and methods are provided for admission in a network comprising at least one node providing network controller (NC) functionality. A first node in the...
2016/0261571 PROTECTING DATA OWNED BY AN OPERATING SYSTEM IN A MULTI-OPERATING SYSTEM MOBILE ENVIRONMENT
An approach is provided for protecting data owned by an operating system on a mobile computing device having multiple operating systems. A map specifying...
2016/0261570 METHOD AND APPARATUS FOR SECURE NETWORK ENCLAVES
Methods and apparatus are disclosed to provide for security within a network enclave. In one embodiment authentication logic initiates authentication with a...
2016/0261569 Device-to-Device Network Location Updates
An electronic device in a device-to-device network of a user of the electronic device communicates with a group of one or more other instances of the...
2016/0261568 Secure Distributed Device-to-Device Network
An electronic device in a device-to-device network of a user of the electronic device communicates with a group of one or more other instances of the...
2016/0261567 COMPUTER IMPLEMENTED SYSTEM AND METHOD FOR AHEAD-OF-TIME DELIVERY OF ELECTRONIC CONTENT
A computer implemented system, method and a computer program product for ahead of time delivery of electronic content, have been provided. A file policy...
2016/0261566 REPLACING KEYS IN A COMPUTER SYSTEM
A first private key used by a device is replaced by a second private key, the first private key having an associated public key. The second private key is...
2016/0261565 APPARATUS AND METHOD FOR PROVIDING A PUBLIC KEY FOR AUTHENTICATING AN INTEGRATED CIRCUIT
Disclosed is a method for providing a public key for authenticating an integrated circuit. In the method, the integrated circuit obtains a hardware key and an...
2016/0261564 CLOUD-BASED VIRTUAL PRIVATE ACCESS SYSTEMS AND METHODS
A virtual private access method implemented by a cloud system, includes receiving a request to access resources from a user device, wherein the resources are...
2016/0261563 CREDENTIALS MANAGEMENT IN LARGE SCALE VIRTUAL PRIVATE NETWORK DEPLOYMENT
Techniques for credentials management in large scale virtual private network (VPN) deployment are disclosed. In some embodiments, credentials management in...
2016/0261562 METHOD FOR PROVIDING AUTHORITATIVE APPLICATION-BASED ROUTING AND AN IMPROVED APPLICATION FIREWALL
A method for providing authoritative application-based routing and an improved application firewall, as well as a method for application classification, is...
2016/0261561 ONE-WAY GATEWAY, AND VEHICLE NETWORK SYSTEM AND METHOD FOR PROTECTING NETWORK WITHIN VEHICLE USING ONE-WAY GATEWAY
A one-way gateway and a vehicle network system and method for protecting networks within a vehicle using the one-way gateway. The one-way gateway includes a...
2016/0261560 Protection Method and Computer System thereof for Firewall Apparatus Disposed to Application Layer
A protection method, which releases an attack of a malware to a firewall apparatus disposed at an application layer, includes processing a microbatching...
2016/0261559 EFFICIENT TUNNELED STREAMS FOR REAL-TIME COMMUNICATIONS
A system tunnels real-time communications ("RTC"). The system creates a connection between a tunneling client and a signaling server. The connection includes a...
2016/0261558 COMPRESSED HEADERS FOR ENCAPSULATED REAL-TIME COMMUNICATIONS
A system performs tunneling for real time communication ("RTC") between a source endpoint and a destination endpoint. The system receives, by a server, a...
2016/0261557 PEER TUNNELING FOR REAL-TIME COMMUNICATIONS
A system performs peer tunneling for real time communication ("RTC"). The system receives, by a tunneling server, a peer service request message from a first...
2016/0261556 METHOD FOR ACCESS NETWORK VIRTUALIZATION AND PROXY NODE
An embodiment of the present invention discloses a method for access network virtualization and a proxy node, relates to a technical field of communication,...
2016/0261555 System and Method for Communication Amongst Entities By Way of Public Identifiers
Systems and methods disclosed herein facilitate communication in a communication network amongst entities by way of publicly-available identifiers. In an...
2016/0261554 VOIP ROUTING BASED ON RTP SERVER-TO-SERVER ROUTING
A system and method of providing VoIP services by using multiple Real-time Transport Protocol servers (RTP) servers for transmitting VoIP data between user...
2016/0261553 Method and Device for Sending Message
Provided are a method and device for sending message. The method includes that: a mapping table is established; a message is received from a receiver; the...
2016/0261552 INFORMATION PROCESS DEVICE, INFORMATION PROCESS METHOD AND PROGRAM FOR EXECUTING INFORMATION PROCESS DEVICE
In order to attain the above object, an information process device of the present invention detects a connection of an electric appliance 100 to a network,...
2016/0261551 ENHANCED ACKNOWLEDGMENT FOR MESSAGES
Technologies are described herein for altering message properties within a message to indicate acknowledgement. In particular, types of acknowledgment may...
2016/0261550 TRACKING ELECTRONIC MAIL MESSAGES IN A SEPARATE COMPUTING SYSTEM
Content items found in a designated folder within an e-mail system are obtained by a separate computing system. The content items are converted into entities...
2016/0261549 METHOD AND SYSTEM FOR PROVIDING MESSAGE RECALL FUNCTIONALITY
The present disclosure provides a method and system for enabling the recall of messages. As an example, the method comprises receiving a message, where the...
2016/0261548 METHOD OF AGGREGATING BUSINESS AND SOCIAL NETWORKS
A method and system for facilitating relationships across multiple networks is described. The meta-network includes relationship information describing users,...
2016/0261547 ORGANIZING MESSAGES IN A MESSAGING SYSTEM USING SOCIAL NETWORK INFORMATION
A messaging system receives a message that is intended for a recipient, who is a user of a social networking system. An object associated with the message is...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.