Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0285859 METHOD AND DEVICE FOR ACCESSING WEBPAGE
Disclosed are method and device for accessing webpage, applicable to smart television. After a user signs on to the smart television, if it is the first time...
2016/0285858 TECHNOLOGIES FOR AUTHENTICATION AND SINGLE-SIGN-ON USING DEVICE SECURITY ASSERTIONS
Technologies for remote device authentication include a client computing device, an identity provider, and an application server in communication over a...
2016/0285857 SYSTEM AND METHODS FOR SECURE ENTRY OF A PERSONAL IDENTIFICATION NUMBER (PIN)
Systems and methods for credential character selection are provided. The system includes one or more sensors configured to detect a character selection and...
2016/0285856 AUTHENTICATION MANAGER
Disclosed are various embodiments for an authentication manager. In one embodiment, the authentication manager performs an identity verification on a network...
2016/0285855 SYSTEM AND METHOD FOR UTILIZING BEHAVIORAL CHARACTERISTICS IN AUTHENTICATION AND FRAUD PREVENTION
A behavioral characteristics authentication system and method ("BCA system") that facilitates authentication of the identity of a user, registrant, or...
2016/0285854 ANDROID-BASED MOBILE EQUIPMENT SECURITY PROTECTION METHOD, AND DEVICE
The present invention discloses a method and device for the security protection of Android-based mobile equipment, the method comprising: parsing a short...
2016/0285853 P2P CONNECTING AND ESTABLISHING METHOD AND COMMUNICATION SYSTEM USING THE SAME
A establishing method for a P2P connection includes: receiving a connection request with a remote device from a client device, detecting a validation token in...
2016/0285852 Remote Network Access Via Virtual Machine
A virtual machine project manager creates a generic, i.e., not user-specific, virtual machine image file. Copies of this image file may be distributed to one...
2016/0285851 SYSTEMS AND METHODS FOR AUTHENTICATING A USER AND DEVICE
Systems and methods for authenticating a user request for authentication are provided. An authentication device that may be part of such a system includes a...
2016/0285850 Security Authentication Method and Bidirectional Forwarding Detection BFD Device
A security authentication method includes: receiving, by a control plane of a BFD device, a first BFD packet that is sent by a control plane of a peer BFD...
2016/0285849 System and Method for Identity Management for Mobile Devices
Systems and methods for managing a user identity on a mobile device are provided. The system comprises the mobile device comprising a user agent and a client...
2016/0285848 AUTHENTICATION SYSTEM, RECORDING MEDIUM HAVING RECORDED THEREIN COMPUTER PROGRAM CONTROLLING AUTHENTICATION...
An authentication system includes: a reading unit that (i) reads ID information as a response to a first read command being a command to which only a first...
2016/0285847 SYSTEM AND METHOD FOR AUTOMATIC SERVICE DISCOVERY AND PROTECTION
A system for automatically discovering services operating on a network including a service discovery database configured to store expected service behavioral...
2016/0285846 NETWORK AUTHENTICATION SYSTEM, NETWORK AUTHENTICATION METHOD AND NETWORK AUTHENTICATION SERVER
A network authentication system includes a client terminal, an authentication server authenticating connection of the client terminal with an external network,...
2016/0285845 METHOD FOR SETTING UP, VIA AN INTERMEDIATE ENTITY, A SECURE SESSION BETWEEN A FIRST AND A SECOND ENTITY, AND...
The invention relates to a method for setting up a secure session between a first entity and a second entity. In an embodiment, the first entity is a user...
2016/0285844 METHOD AND DEVICE FOR FORMING A SECURE WIRELESS NETWORK WITH LIMITED RESOURCES
A method and a device for forming a secure wireless network for nodes with limited resources, between which no previous trust relationship exists is provided....
2016/0285843 SYSTEM AND METHOD FOR SCOPING A USER IDENTITY ASSERTION TO COLLABORATIVE DEVICES
A system and method for enabling a primary and a secondary communication device to share a user identity assertion is presented. The user identity assertion...
2016/0285842 CURATOR-FACILITATED MESSAGE GENERATION AND PRESENTATION EXPERIENCES FOR PERSONAL COMPUTING DEVICES
A mechanism is described for dynamically facilitating curator-controlled message delivery experiences at computing devices according to one embodiment. A...
2016/0285841 ACCESSING A SECURE NETWORK USING A STREAMING DEVICE
Web pages, such as a captive portal web page, may be rendered on an electronic display such as a display of a television that is removably coupled to a content...
2016/0285840 GOAL-DRIVEN PROVISIONING IN IOT SYSTEMS
Techniques are disclosed for provisioning Internet of Things (IoT) devices in accordance with a state machine model. More particularly, collections of IoT...
2016/0285839 INFORMATION PROCESSING APPARATUS, COMMUNICATION SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM
There is provided an information processing apparatus, its information processing method, and a program causing a computer to execute the method, the...
2016/0285838 COMPUTERIZED METHOD AND SYSTEM FOR MANAGING SECURE CONTENT SHARING IN A NETWORKED SECURE COLLABORATIVE EXCHANGE...
In embodiments of the present invention, improved capabilities are described for securely sharing computer data content between business entities as managed...
2016/0285837 METHOD AND APPARATUS FOR DETECTING AND DEALING WITH A LOST ELECTRONICS DEVICE
Techniques for detecting and dealing with a lost electronics device are disclosed. In one design, the device may autonomously determine whether it is lost. The...
2016/0285836 Privacy Preserving Registry Browsing
A method. system. and computer-readable memory containing instructions include requesting a tokenizing authority to provide a tokenized string that represents...
2016/0285835 ACCESS FILES
Data security access and management may require a server dedicated to monitoring document access requests and enforcing rules and policies to limit access to...
2016/0285834 TECHNIQUES FOR ENCRYPTING FIELDS OF A FRAME HEADER FOR WI-FI PRIVACY
Methods, systems, apparatuses, and devices are described for wireless station privacy using encryption to protect destination and source addresses of data...
2016/0285833 RUNTIME INSTANTIATION OF BROADCAST ENCRYPTION SCHEMES
Embodiments of the present invention relate to runtime instantiation of broadcast encryption schemes. In one embodiment, a method of and computer program...
2016/0285832 SECURE CONSUMPTION OF PLATFORM SERVICES BY APPLICATIONS
A proxy server is instantiated on an application virtual machine of a cloud platform. The application virtual machine hosts an application that consumes...
2016/0285831 ESTABLISHING SECURE REMOTE ACCESS TO PRIVATE COMPUTER NETWORKS
Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service...
2016/0285830 COOPERATED APPROACH TO NETWORK PACKET FILTERING
An apparatus, system, method, and machine-readable medium are disclosed. In one embodiment the apparatus is a network interface controller that includes one...
2016/0285829 SECURITY FRAMEWORK FOR TRANSMITTING COMMUNICATION MESSAGES BETWEEN A SUBSTATION LAN AND PACKET-SWITCHED WAN
The invention relates to the field of a security framework for transmitting communication messages between a Substation LAN and packet-switched WAN, in...
2016/0285828 VIRTUAL FIREWALL LOAD BALANCER
According to one exemplary embodiment, a method for load balancing between a virtual component within a virtual environment and a Host Intrusion Prevention...
2016/0285827 SYSTEM AND METHOD FOR FACILITATING DATA LEAKAGE AND/OR PROPAGATION TRACKING
Systems and methods for facilitating data leakage and/or propagation tracking are provided. In some embodiments, a set of hashes associated with files of a...
2016/0285826 CREATING NETWORK ISOLATION BETWEEN VIRTUAL MACHINES
A method, system, and program product for creating network isolation between virtual machines is provided, including receiving, by a security virtual machine...
2016/0285825 VIRTUAL FIREWALL LOAD BALANCER
According to one exemplary embodiment, a method for load balancing between a virtual component within a virtual environment and a Host Intrusion Prevention...
2016/0285824 FIREWALL MULTI-LEVEL SECURITY DYNAMIC HOST-BASED SANDBOX GENERATION FOR EMBEDDED URL LINKS
A firewall may identify a uniform resource locator (URL) being transmitted to a user device, the URL link pointing to a host system. The firewall can then...
2016/0285823 DYNAMIC ENCRYPTION FOR TUNNELED REAL-TIME COMMUNICATIONS
A system performs tunneling for real-time communications ("RTC"). The system establishes an unencrypted tunnel between a tunneling server and a user equipment...
2016/0285822 DETECTING AND PREVENTING SESSION HIJACKING
A security device may receive a response associated with a request. The response may include original session information. The request may be associated with a...
2016/0285821 METHOD AND APPARATUS FOR INTERNET ACCESS OPTIMIZATION
Embodiments of the present disclosure disclose an apparatus and a method for web access optimization. A hostname in a web page is replaced with an IP address...
2016/0285820 METHOD FOR PROCESSING ADDRESS RESOLUTION PROTOCOL MESSAGE, SWITCH, AND CONTROLLER
The present invention discloses a method for processing an address resolution protocol message, a switch, and a controller. The method includes: receiving, by...
2016/0285819 SHARING AND CONTROLLING ELECTRONIC DEVICES LOCATED AT REMOTE LOCATIONS USING XMPP SERVER
Disclosed is Extensible Messaging and Presence Protocol (XMPP) server for sharing and controlling electronic devices located at remote locations. XMPP server...
2016/0285818 SHARED FOLDER BACKED INTEGRATED WORKSPACES
Disclosed are systems, methods, and non-transitory computer-readable storage media for shared folder backed integrated workspaces. In some implementations, a...
2016/0285817 COMMENTING IN SHARED FOLDER BACKED INTEGRATED WORKSPACES
Disclosed are systems, methods, and non-transitory computer-readable storage media for shared folder backed integrated workspaces. In some implementations, a...
2016/0285816 TECHNIQUES FOR AUTOMATED DETERMINATION OF FORM RESPONSES
Techniques for automated determination of form responses are described. In one embodiment, a commerce intermediary server may be operative to receive a...
2016/0285815 SELECTING SUBSETS OF PARTICIPANTS IN ELECTRONIC MESSAGE THREADS
Embodiments of the present invention provide methods, computer program products, and systems for selecting subsets of participants in electronic message...
2016/0285814 DYNAMIC ADAPTION OF ELECTRONIC ROUTING SLIPS FOR FINANCIAL MESSAGING
Embodiments of the present invention disclose a method, computer program product, and system for generating a routing slip for a message. A computer system...
2016/0285813 DELIVERING A PUBLICATION TO A SUBSCRIBER
A method for delivering a publication to a subscriber includes obtaining, from a content source, a group of currently available subscribed content pieces for a...
2016/0285812 METHOD OF ISSUING MESSAGES OF A MESSAGE QUEUE AND A MESSAGE ISSUING DEVICE
Disclosed is a method of issuing messages in a message queue. The method comprises: (a) receiving a request of entering a message into the message queue,...
2016/0285811 SERVER AND METHOD FOR PROCESSING EMAIL MESSAGES
A mail processing server includes a storage unit and a computation unit. The storage unit stores operation log data recording operations that a plurality of...
2016/0285810 ANALYZING EMAIL THREADS
An emotion function chain may be generated from an email thread and displayed to a user in one or more windows on a computer display of a computer system. An...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.