Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0301698 IN-VEHICLE AUTHORIZATION FOR AUTONOMOUS VEHICLES
Technologies for authorizing a passenger of an autonomous vehicle include determining a passenger authorization policy based on a request for a taxi service...
2016/0301697 HANDLING POTENTIAL SERVICE LOAD INTERRUPTIONS BY PRESENTING ACTION ITEMS FOR SERVICE REQUESTER TO COMPLETE TO...
A method, system and computer program product for handling potential service load interruptions. The utilization of resources, such as servers in a service...
2016/0301696 METHOD AND DEVICE FOR PROTECTING ACCESS TO A MESSAGE
A device for reading a message includes a reader to read biometric data of a holder of the medium and a scanner to capture, on a medium, an encoded message...
2016/0301695 Machine-to-Machine and Machine to Cloud End-to-End Authentication and Security
A networked system for authenticating devices that comprise constrained devices connected in a network either directly to cloud based and/or dedicated servers...
2016/0301694 SYNCHRONIZING CREDENTIAL HASHES BETWEEN DIRECTORY SERVICES
The subject disclosure is directed towards securely synchronizing passwords that are changed at a source location (e.g., an on-premises directory service) to a...
2016/0301693 SYSTEM AND METHOD FOR IDENTIFYING AND PROTECTING SENSITIVE DATA USING CLIENT FILE DIGITAL FINGERPRINT
Disclosed are a system and method for identifying and protecting sensitive data contained in a network client's file comprising obtaining a plurality of...
2016/0301692 INFORMATION PROCESSING APPARATUS
A picked up image displaying unit displays a picked up image on a display unit. A face authentication unit detects a face image of a registered user existing...
2016/0301691 LAYERING IN USER AUTHENTICATION
An asset is disclosed having a processing device and hardware with which to capture a biometric. The asset, with optional input from a remote server, may...
2016/0301690 ACCESS CONTROL FOR A HARD ASSET
A system and method for granting access to the hard asset. The method can include capturing biometric information associated with a first soft asset. The...
2016/0301689 DIGITAL IDENTITY ENROLLMENT SYSTEM
Digital identity enrollment systems are described herein. One device includes a memory, and a processor configured to execute executable instructions stored in...
2016/0301688 AUTHENTICATING TO A NETWORK VIA A DEVICE-SPECIFIC ONE TIME PASSWORD
Generally, this disclosure describes a method and system for authenticating to a network via a device-specific one-time password. A method in an embodiment may...
2016/0301687 WORKING METHOD OF DYNAMIC TOKEN
Disclosed is a working method of a dynamic token. The present invention relates to the field of communications. The method comprises: when a token is awakened,...
2016/0301686 SYSTEM AND METHOD FOR SINGLE SIGN-ON FOR THICK-CLIENT APPLICATIONS
The embodiments herein provide a system and method to enable a single sign-on into a plurality of thick-client applications through an external application....
2016/0301685 SYSTEM AND METHOD FOR WEB SINGLE SIGN-ON THROUGH A BROWSER EXTENSION
The embodiments herein disclose a system and method for enabling single sign-on for a user on a plurality of web applications through a browser extension. The...
2016/0301684 Single Sign-On without a Broker Application
Facilitating single sign-on on a device having sandboxed applications. A method includes identifying a plurality of associated applications. Criteria are...
2016/0301683 BROWSER INTEGRATION WITH CRYPTOGRAM
This disclosure includes utilizing a token cryptogram with a browser to facilitate a transaction. A webpage of a website is configured to accept a token...
2016/0301682 DISTRIBUTED PASSCODE VERIFICATION SYSTEM
A distributed passcode verification system includes devices that each have a secret and that are each able to perform a limited number of verifications using...
2016/0301681 AUTHENTICATION APPARATUS, AUTHENTICATION METHOD, AND AUTHENTICATION SYSTEM
Provided is an authentication apparatus easily realizing a one-time password system ensuring the security of a password without new equipment. The apparatus...
2016/0301680 MANAGED DOMAINS FOR REMOTE CONTENT AND CONFIGURATION CONTROL ON MOBILE INFORMATION DEVICES
A technique is disclosed for remotely managing isolated domains on mobile devices. A request is received from the mobile device to instantiate a managed...
2016/0301679 CUSTOMIZED USER VALIDATION
Mechanisms and techniques for customized user validation. A login attempt is received from a remote electronic device with one or more computing devices that...
2016/0301678 METHODS, SYSTEMS, AND MEDIA FOR PROVIDING ACCESS CONTROL FOR A COMPUTING DEVICE
Methods, systems, and media for providing access control for a computing device are provided. In some implementations, methods for providing access control for...
2016/0301677 DOWNLOADABLE SECURITY AND PROTECTION METHODS AND APPARATUS
Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional...
2016/0301676 SYSTEMS AND METHODS FOR CONTAINERIZED DATA SECURITY
Provided herein are systems and methods useful in facilitating containerized data security. The system may include a data store, a computer processing unit, a...
2016/0301675 SYSTEM FOR AUTHENTICATING MULTIPLE USERS
Disclosed is a method of registering users in a software system for participation in a multi-user activity. The method involves receiving authentication...
2016/0301674 IDENTITY CONFIRMATION METHOD AND IDENTITY CONFIRMATION SYSTEM USING LIFE LOG
Provided are an identity confirmation method and an identity confirmation system in which it is not necessary to keep a password in memory and in which a...
2016/0301673 Method for Realizing Secure Communications among Machine Type Communication Devices and Network Entity
A method for realizing secure communication between machine type communication devices and a network entity, the method includes: creating, by a network...
2016/0301672 METHOD AND SYSTEM FOR AUTHENTICATION OVER A PUBLIC NETWORK USING MULTIPLE OUT-OF-BAND COMMUNICATIONS CHANNELS...
A method includes sending an open request to a directory server for a first key, the first key being a trusted key wrapped in a public key. The open request...
2016/0301671 SYSTEM-ON-CHIP DATA SECURITY APPLIANCE AND METHODS OF OPERATING THE SAME
System-on-chip data security appliance ("SoC-DSA") and methods of operating the same. In one embodiment, the SoC-DSA includes data security mechanisms enclosed...
2016/0301670 System and Method for Signaling Segment Encryption and Key Derivation for Adaptive Streaming
An apparatus for decoding a media stream includes a memory module, a processor module coupled to the memory module, wherein the memory module contains...
2016/0301669 METHOD AND SYSTEM FOR ENCRYPTING/DECRYPTING PAYLOAD CONTENT OF AN OTN FRAME
The present disclosure relates to a system and method of encrypting and decrypting Optical Transport Network (OTN) payload content. A transmitter of the system...
2016/0301668 BORDER GATEWAY PROTOCOL (BGP) COMMUNICATIONS OVER TRUSTED NETWORK FUNCTION VIRTUALIZATION (NFV) HARDWARE
A data communication system uses Border Gateway Protocol (BGP) and Network Function Virtualization (NFV). A first BGP Virtual Machine (VM) in a first NFV...
2016/0301667 SYSTEM FOR DIVIDING NETWORK USING VIRTUAL PRIVATE NETWORK AND METHOD THEREFOR
The present invention relates to a technology for enabling each user's PC to transmit a packet separately through an internal network or external network by...
2016/0301666 Providing Virtualized Private Network Tunnels
Various aspects of the disclosure relate to providing a per-application policy-controlled virtual private network (VPN) tunnel. In some embodiments, tickets...
2016/0301665 FIREWALL WITH TWO-PHASE FILTERING
Two-phase filtering for a firewall is disclosed. In the first, general phase, a request is filtered to verify one or more of: that the request is pursuant to a...
2016/0301664 METHOD AND SERVER FOR SECURING COMMUNICATION NUMBER
An interaction method includes receiving an order request sent by a first communication terminal, and acquiring a first communication number according to the...
2016/0301663 COMMUNICATION METHOD AND SERVER
A communication method includes receiving a query request sent by a basic communication server, the query request including at least one of a current calling...
2016/0301662 SYSTEMS AND METHODS FOR TELEPHONE NUMBER PROVISIONING AND TELEPHONY MANAGEMENT
Systems, methods, and computer-readable media are provided for telephone number provisioning. A user interface configured to provide access to telephony...
2016/0301661 CLOUD BASED CUSTOMER PREMISES EQUIPMENT
Network (cloud) based customer premises equipment may receive, over a broadband access circuit, layer 2 traffic from an access device at a customer premises;...
2016/0301660 COMMUNICATION SYSTEM, TERMINAL APPARATUS AND SERVER
A communication system allows terminals PC1 and PC2 located behind NAT routers to communicate with each other by using source address, source port number,...
2016/0301659 METHOD FOR ADDRESSING MESSAGES IN A COMPUTER NETWORK
In a method for addressing messages in a computer network in which two different types of address are used, wherein at least one first network element (4, 5,...
2016/0301658 METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR EFFICIENT SUBNET IDENTIFICATION
An apparatus, computer-readable medium, and computer-implemented method for efficiently identifying a subnet including sorting a plurality of Internet Protocol...
2016/0301657 PROVISION OF PUBLIC SERVICE IDENTITIES
A mechanism to handle Public Service Identities identifying services in a network when a given Public Service Identity (PSI) belongs to a range of Public...
2016/0301656 REMOTE PURGE OF DNS CACHE
Various techniques for purging resource records stored in a cache of domain name system servers are disclosed herein. In one embodiment, a method includes...
2016/0301655 ADDRESS RESOLUTION PROTOCOL SUPPRESSION USING A FLOW-BASED FORWARDING ELEMENT
A method of suppressing ARP packets in a logical network comprising a set of data compute nodes (DCNs). The DCNs are hosted on a set of physical hosts. Each...
2016/0301654 E-MAIL INTEGRATED INSTANT MESSAGING
A system and method supporting instant messaging which removes many of the problems and barriers to the use of instant messaging through the use of universally...
2016/0301653 METHODS AND APPARATUS FOR PROVIDING EXPANDED TELECOMMUNICATIONS SERVICE
The present invention provides flexible call processing. For example, a call processor system can receive an inbound call intended for a called party and place...
2016/0301652 ELECTRONIC MESSAGE ORGANIZATION VIA SOCIAL GROUPS
A mechanism for automatically organizing electronic messages is described herein. Social groups of a particular user that may be representative of topics,...
2016/0301651 SOCIAL CONVERSATION MANAGEMENT
A method for managing conversations in social media and networks may include selecting, by a processor, a message posted to a social medium for management and...
2016/0301650 METHODS, SYSTEMS, AND MEDIA FOR PRESENTING COMMENTS BASED ON CORRELATION WITH CONTENT
Methods, systems, and media for presenting comments based on correlation with content are provided. In some implementations, a method for presenting ranked...
2016/0301649 PREDICTIVE FORWARDING OF NOTIFICATION DATA
A computing system is described that receives notification data associated with a user, and responsive to determining that the user is interacting with a first...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.