Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0308889 METHODS AND SYSTEMS FOR SELF-DETECTION OF POST-PRODUCTION EXTERNAL HARDWARE ATTACHMENTS
Systems and methods described herein may detect hardware modifications. A test loop may terminate at a transmit pin and a receiver pin of a processor footprint...
2016/0308888 SYSTEMS AND METHODS FOR DETECTING AND ADDRESSING REMOTE ACCESS MALWARE
Systems and methods to detect remote access malware activities, via: detecting, in a computing device, first input events in an operating system of the...
2016/0308887 IN-VEHICLE NETWORK INTRUSION DETECTION SYSTEM AND METHOD FOR CONTROLLING THE SAME
A method for detecting intrusion into an in-vehicle network using an intrusion detection system (IDS) of a vehicle includes: receiving messages of the...
2016/0308886 PREVENTING NETWORK ATTACKS ON BASEBOARD MANAGEMENT CONTROLLERS
A method for preventing network attacks on baseboard management controllers. The method includes receiving, by the network controller, a packet from a computer...
2016/0308885 SYSTEMS AND METHODS FOR INTERNET TRAFFIC ANALYSIS
Generally discussed herein are systems, apparatuses, and methods for internet traffic analysis. In one or more embodiments, a system can include a web proxy...
2016/0308884 DETECTING ANOMALOUS BEHAVIOR VIA USER AUTHENTICATION GRAPHS
Significant and aggregate user authentication activity may be analyzed across a population of users and computers in one or more networks to differentiate...
2016/0308883 COLLECTION FOLDER FOR COLLECTING FILE SUBMISSIONS AND SCANNING FOR PLAGIARISM
A content management system for collecting files from one or more submitters in a collection folder. A collector, who generates the collection folder, can...
2016/0308882 MANAGEMENT OF TRANSACTIONS IN A DISTRIBUTED TRANSACTION SYSTEM
Briefly, embodiments disclosed herein relate to managing transactions in a distributed content transaction system.
2016/0308881 COLLECTION FOLDER FOR COLLECTING FILE SUBMISSIONS IN RESPONSE TO A PUBLIC FILE REQUEST
A content management system for collecting files from one or more submitters in a collection folder. A collector, who generates the collection folder, can...
2016/0308880 SOCIAL GRAPHS USING SHARED PERSONAL DATA
Social graphs using shared personal data are described, including techniques for capturing data from a social data source (e.g., a social network service or...
2016/0308879 Application-Based Service Providing Method, Apparatus, and System
The present disclosure discloses an application-based service providing method, apparatus, and system. The method includes: acquiring an application identifier...
2016/0308878 EXCEPTION PROMPTING METHOD, APPARATUS, AND SYSTEM USING THE SAME
An exception prompting method at a communication platform having one or more processors and memory storing programs executed by the one or more processors is...
2016/0308877 SHARED ITEM ACCOUNT SELECTION
Techniques for sharing of items from online storage (e.g., cloud storage) are described herein. In at least some embodiments, sharing links can be configured...
2016/0308876 METHOD AND APPARATUS FOR CREDENTIAL HANDLING
An approach is described for securely and automatically handling credentials when used for accessing endpoints, and/or applications and resources on the...
2016/0308875 INTERNET SECURITY AND MANAGEMENT DEVICE
Systems and methods to secure and manage home or other networks. A security management device is connected to the home network that learns about the people and...
2016/0308874 COMPUTER SYSTEM FOR NETWORK NODE REVIEW FOR ACTIONABLE ITEM
The system may search network nodes for collections of actionable items which users may desire to add to their personal list. The system may operate as an...
2016/0308873 MULTI-OBJECT CONCURRENT CONTROL SYSTEM AND METHOD FOR CONCURRENT CONTROLLING MULTI-OBJECT
A multi-object concurrent control method includes performing a user authentication received from a client apparatus and user apparatuses; in response to the...
2016/0308872 IMAGE-BASED GROUP PROFILES
An image of users of an application may be received from a computing device on a home network. The image may comprise representations of a group of users....
2016/0308871 NETWORK ELEMENT DATA ACCESS METHOD AND APPARATUS, AND NETWORK MANAGEMENT SYSTEM
This invention provides a network element data access processing method and a network management system. In the network management system, a virtual network...
2016/0308870 NETWORK ACCESS METHOD AND APPARATUS
Embodiments of the present invention disclose a network access method including: after a terminal device is connected to a first network, acquiring, by the...
2016/0308869 Method and Device for Controlling Access
The present disclosure relates to a method and a device for controlling access to the Internet. The method includes: determining whether a smart device is able...
2016/0308868 System and Method for Secure Proxy-Based Authentication
A system and method for secure authentication facilitates improving the security of authentication between a client and a target by using an innovative...
2016/0308867 METHOD AND SYSTEM FOR SECURE REMOTE ACCESS AND CONTROL USING SHARED RESOURCES
An approach is provided for a secure remote access and control in a shared resource model. The approach involves initiating a logically separate instance of a...
2016/0308866 METHOD AND APPARATUS FOR CONTROLLING COMMUNICATION BETWEEN COMMUNICATION DEVICES
A wireless network includes a base transceiver station configured to transmit signals over a wireless connection to a plurality of communication devices and...
2016/0308865 DETECTING DEVICE MOVEMENT THROUGH ELECTRONIC FINGERPRINT ANALYSIS
Methods, systems, and computer readable media can be operable to facilitate the monitoring and detection of a device relocation. A location fingerprint may be...
2016/0308864 ACCESS TERMINAL
A network access device may obtain user fingerprint information of a terminal. The network access device may transmit the user fingerprint information of the...
2016/0308863 WIRELESS INFORMATION PASSING AND AUTHENTICATION
A secure server detects a login from a user originating from a first device. A second user-registered device is sent a message. The second device: translates...
2016/0308862 ANONYMOUS AUTHENTICATION AND REMOTE WIRELESS TOKEN ACCESS
Provided is a method for operating an authentication server for authenticating a user who is communicating with an enterprise via a network. The method include...
2016/0308861 SIMPLIFIED IOT SERVICES FOR CLOUD ENVIRONMENTS
Methods and systems provide management, monitoring, and onboarding of a device, a service, and/or an application in the context of the Internet of Things...
2016/0308860 METHOD FOR CERTIFYING THE IDENTITY OF A USER USING AN IDENTIFICATION SERVER
A method, program and server are provided for certifying an identity of a second user using an identification server. The method includes: receiving, by the...
2016/0308859 MULTI-FACTOR AND MULTI-MODE BIOMETRIC PHYSICAL ACCESS CONTROL DEVICE
Provided are a device, system, and method for multi-factor multi-biometric access control that authenticate a user based on at least one of what the user...
2016/0308858 AUTHENTICATION OF A CLIENT DEVICE BASED ON ENTROPY FROM A SERVER OR OTHER DEVICE
Methods and systems for authenticating a client device using entropy provided by a server and/or a device paired with the client device are described herein....
2016/0308857 TOKEN DEVICE RE-SYNCHRONIZATION THROUGH A NETWORK SOLUTION
A system is illustrated as including a One-Time Password (OTP) device operatively coupled to a computer system to receive data, and a server operatively...
2016/0308856 TWO FACTOR AUTHENTICATION USING A ONE-TIME PASSWORD
Methods and systems for online authentication eliminate the common username plus password combination, using instead a novel two-factor authentication that...
2016/0308855 Systems and Methods for Electronically Sharing Private Documents Using Pointers
A system for electronically sharing private documents using document pointers is disclosed. The system includes a processor and memory. A pointer database...
2016/0308854 SYSTEM AND METHODS FOR ASSIGNATION AND USE OF MEDIA CONTENT SUBSCRIPTION SERVICE PRIVILEGES
This invention describes a system and methods for media content subscription service distribution; typical services include cable television, premium content...
2016/0308853 COLLABORATIVE SIGN-ON
An authentication approval request can be received by a first system from a second system. The first system can determine whether the user is required to be...
2016/0308852 SYSTEM AND METHOD FOR ESTABLISHING AND MONETIZING TRUSTED IDENTITIES IN CYBERSPACE WITH PERSONAL DATA SERVICE...
A system and method for establishing and monetizing trusted identities in cyberspace relying upon user opt in. Users request to attain secure IDs for accessing...
2016/0308851 Cloud Service Validation
In one embodiment, a method includes sending, to a user device, a token, wherein the token includes a token identifier and a signature based on a key and data...
2016/0308850 SWITCHING BETWEEN NETWORKS
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for switching between parallel networks. One of the methods...
2016/0308849 System and Method for Out-of-Ban Application Authentication
Application-to-Application authentication features using a second communication channel for out-of-band authentication separate from a communication channel of...
2016/0308848 SYSTEMS AND METHODS FOR DETERMINING AN AUTHENTICATION ATTEMPT THRESHOLD
Systems and methods are provided for determining an authentication attempt threshold. Authentication systems often have predetermined authentication attempt...
2016/0308847 PRESENTATIONS BASED ON AGGREGATED CONTENT
Implementations of the present disclosure are generally directed to accessing and aggregating digital content from a plurality of data sources, and generating...
2016/0308846 INFORMATION PROCESSING SYSTEM CAPABLE OF PERFORMING COMMUNICATION AT HIGH SECURITY LEVEL, METHOD OF CONTROLLING...
An information processing system that is capable of performing communication at a high security level even when no encryption key having a predetermined or...
2016/0308845 METHOD OF OPERATING A COMPUTING DEVICE, COMPUTING DEVICE AND COMPUTER PROGRAM
A computing device has a first application and a second application. The first application generates a data access application key for use by the second...
2016/0308844 SYSTEM AND METHOD FOR AUTHENTICATING USERS
A security application for a computing device, e.g., a mobile phone, allows generation of a secret according to a unique user input (e.g., user credentials)....
2016/0308843 METHOD AND APPARATUS FOR DATA CONNECTIVITY SHARING
A node enables sharing data connectivity between a consumer device and a broker device, and receives from a first packet routing node a request for a consumer...
2016/0308842 METHOD AND APPARATUS FOR MANAGING DATA, AND DATA MANAGEMENT SYSTEM USING THE SAME
A method for managing data, comprising: receiving data about information collected by a sensor, in which at least a part of the data is encrypted; and...
2016/0308841 REMOTELY ACCESSING DATA ON A SECURED SERVER
An assistant computing device communicates with a remote computing device, and a requesting computing device. The remote computing device in communication with...
2016/0308840 System and Method of Efficiently Generating and Transmitting Encrypted Documents
The present specification discloses an improved method of encrypting a file and distributing the encrypted file over a network from a user computer to a remote...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.