Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0330198 Biometric Authentication
A biometric authentication system is disclosed that provides a trusted third party biometric authentication capability for independent confirmation of identity...
2016/0330197 NETWORK AUTHENTICATION OF A GEO-FENCED VOLUME
Provided is a method for managing a software defined network using a software control layer to regulate a geo-fenced volume. The software control layer can use...
2016/0330196 METHOD FOR ACCESSING A SERVICE AND A CORRESPONDING SERVER
To a method for accessing a service, at least one first user device executes a first application that communicates with a second user device application. The...
2016/0330195 SYSTEM AND METHOD FOR SECURING OFFLINE USAGE OF A CERTIFICATE BY OTP SYSTEM
The present invention relates to a system and method for securing offline usage of a certificate by authenticating a user by a One Time Password (OTP) system...
2016/0330194 METHOD FOR EXCLUDING A PARTICIPANT FROM A GROUP HAVING AUTHORIZED COMMUNICATION
A method for excluding a participant from a group of multiple participants, in which certificates are used for an authorized communication of the participants...
2016/0330193 Using Trusted Platform Module To Build Real Time Indicators of Attack Information
Managed devices containing a Trusted Platform Module (TPM) to provide a trusted environment generate a device certificate at initialization of the TPM and send...
2016/0330192 INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS AND FIRMWARE PROGRAM
An information processing apparatus includes circuitry that retains firmware and performs processing based on the firmware, receives a command from an external...
2016/0330191 Electronic Appliance, Network Unit of Electronic Appliances, Network of Electronic Appliances, and Chip...
An aim of the present disclosure is to provide the technology for preventing the peripheral devices from being taken over, so as to suppress the remote-attack...
2016/0330190 USER SECURITY AUTHENTICATION SYSTEM IN INTERNET AND METHOD THEREOF
The present invention relates to a user security authentication system in an Internet environment and a method therefor, which generate encrypted member...
2016/0330189 INCREASED COMMUNICATION SECURITY
An apparatus may include a communication interface and a security component. The communication interface may be configured to receive a Constrained Application...
2016/0330188 SECURING COMMUNICATIONS WITH ENHANCED MEDIA PLATFORMS
Various methods and systems for securing communications with enhanced media platforms, are provided. In particular, an enhanced media platform is authenticated...
2016/0330187 SYSTEMS AND METHODS FOR SECURE OPERATION OF AN INDUSTRIAL CONTROLLER
A method of securing an industrial control system includes operating the industrial control system in an open mode, wherein communications between a plurality...
2016/0330186 WIRELESS SENSOR FIELD ENUMERATION
A system for authenticating data acquired by multiple sensors prior to storing the data in a database is described. The system also authenticates users...
2016/0330185 Generating an NSEC Record
A DNS server receives, from a client device, a DNS query for a resource record type at a domain name. The DNS server determines that the resource record type...
2016/0330184 SYSTEM AND METHOD OF PROVIDING PERSONAL CONTENT
Provided is a personal content providing system for providing customized content according to a personalization context. The personal content providing system...
2016/0330183 CONDITIONAL LOGIN PROMOTION
The present disclosure relates to a system and method for providing conditional login promotion. An example system includes at least one processor and at least...
2016/0330182 METHOD OF SHARING KEY BETWEEN DEVICES USING PHYSICAL ACCESS RESTRICTION
A method of operating a hub used in an internet of things (IoT) network system which includes a first controller and an IoT device is provided. The method...
2016/0330181 SECURING DATA IN A DISPERSED STORAGE NETWORK
A method for execution by a dispersed storage and task (DST) processing unit includes transforming a counter seed into a set of counter values; obtaining an...
2016/0330180 ZERO-KNOWLEDGE DATABASES
Provided is a process of operating a zero-knowledge encrypted database, the process including: obtaining a request for data in a database stored by an...
2016/0330179 SYSTEM AND METHOD FOR KEY EXCHANGE BASED ON AUTHENTICATION INFORMATION
Disclosed are a system and method for key exchange based on user authentication information. The system for key exchange based on user authentication...
2016/0330178 Device Identification Scoring
Device identification scoring systems and methods may be provided that can increase the reliability and security of communications between devices and service...
2016/0330177 Password Encryption for Hybrid Cloud Services
Methods, systems, computer-readable media, and apparatuses may provide password encryption for hybrid cloud services. A workspace cloud connector internally...
2016/0330176 SEMANTICALLY AWARE NETWORK SERVICES AND METHOD
A method and apparatus where network-layer devices use host-provided, detailed, per-packet, semantic information (DPPS information), which describes the...
2016/0330175 SECURE ELEMENT ACTIVITIES
Activities involving a secure element (SE) in a mobile device include a background operation. When the SE initiates the background operation, it informs the...
2016/0330174 Transparent DNSSEC-signing proxy
A first DNS server receives, from a client device, a DNS query for a domain name and transmits, to a second DNS server, the DNS query for the domain name The...
2016/0330173 Automatic Placeholder Finder-Filler
Methods and processes are disclosed for iOS based systems and mobile devices that permit a user to securely inject passwords and related information into...
2016/0330172 SECURE PROXY TO PROTECT PRIVATE DATA
Technologies are provided in embodiments to protect private data. Embodiments are configured to intercept a network flow en route from a server to a client...
2016/0330171 Firewall Security for Computers with Internet Access and Method
A firewall security platform is provided for enhancing security of a network. The firewall security platform includes at least one interface to communicate the...
2016/0330170 REGISTRATION AND USE OF PATTERNS DEFINED BY EXPRESSIONS AS DOMAIN NAMES
A domain name registration service permits registrants to register names that are defined by a regular expression that may include one or more wildcard values...
2016/0330169 BASE STATION FOR IP COMMUNICATIONS WITH MOBILE TERMINAL, AND METHOD FOR ACQUIRING IP OF BASE STATION
A base station and a method of acquiring an IP of a base station by a mobile terminal. According to one exemplary embodiment, a base station includes: an...
2016/0330168 Communication Device and Method for Providing a Name Service Within an Industrial Automation System
A method for providing a name service within an industrial automation system, wherein communication devices of the industrial automation system each check via...
2016/0330167 Arp Implementation Method, Switch Device, and Control Device
An ARP implementation method, a switch device, and a control device are disclosed. The method includes: receiving, by a switch device, an ARP packet; sending,...
2016/0330166 Address Acquiring Method and Network Virtualization Edge Device
An address acquiring method includes receiving an address resolution request packet sent by a source host, where the address resolution request packet includes...
2016/0330165 METHOD FOR ALLOCATING INTERNET PROTOCOL ADDRESSES TO CLIENTS OF A NETWORK AND CORRESPONDING APPARATUS
An access device and an extender access device, forming a network for network client devices. A single IP address attribution server in the network attributes...
2016/0330164 System and Method of Federating a Cloud-Based Communications Service with a Unified Communications System
A system and method of federating a cloud-based communications service with a unified communications system is disclosed. According to one embodiment, a system...
2016/0330163 METHOD AND SERVER ENABLING A FIRST USER TO AUTOMATICALLY DISCOVER THE SOCIAL NETWORK IDENTIFIERS OF A SECOND...
An embodiment of the method enabling a first user (A) to automatically discover the social network identifiers of a second user (B) and the respective statuses...
2016/0330162 MANAGING FOR-SALE GROUP POSTINGS
The present disclosure is directed toward systems and method for managing social networking system for-sale groups. For example, systems and method described...
2016/0330161 METHODS AND SYSTEMS OF APPLICATION MESSAGE ADDRESSING
In one aspect, a computerized method for implementing an application messaging service includes the step of providing a messaging application that enables a...
2016/0330160 METHOD AND SYSTEM FOR PROVIDING NOTIFICATIONS FOR GROUP MESSAGES
A method and system for providing notifications to users for group messages transmitted over a social networking platform are disclosed. A server with one or...
2016/0330159 CONNECTION ARCHITECTURE FOR A MOBILE NETWORK
A mobile device for accessing content stored on a remote server over a mobile network includes a processor configured to direct the mobile device to send a...
2016/0330158 Messaging Sharing System and Method of Use
An apparatus, comprising at least one memory including a computer program code. at least one processor. Wherein the at least one memory and the computer...
2016/0330157 METHOD AND APPARATUS FOR PROVIDING USER INTENTION EXPRESSION SERVICE IN COMMUNICATION SYSTEM
The present invention relates to a method and an apparatus for proving a user expression service in a communication system. The method in a server may comprise...
2016/0330156 CLOUD BASED CHAT GOVERNANCE SYSTEM BASED ON BEHAVIORAL PATTERNS AND SITUATIONAL-AWARENESS
A computer-implemented method for intelligent chat governance, is provided. The computer-implemented method includes analyzing an incoming message based on...
2016/0330155 MODIFYING RICH MEDIA COMPONENTS FOR AN INTERACTIVE EMAIL
An interactive email experience is customized to the recipient's interests by modifying rich media components provided by the email based on the recipient's...
2016/0330154 MESSAGING SYSTEM AND METHOD
A method of cross-platform messaging including receiving, by a messaging system, at least one initial message having a message format, an initial message...
2016/0330153 AUTOMATIC TRANSFORMATION OF MESSAGES BETWEEN SERVICE VERSIONS
A method and system are provided for automatic transformation of messages between service versions. The method includes collecting message data of messages...
2016/0330152 SMART POSITIONING OF CHAT HEADS
In particular embodiments, a client computing device of a user provides for presentation a user interface that includes one or more components. The client...
2016/0330151 METHOD AND SYSTEM FOR MANAGING AN INFORMATIONAL SITE USING A SOCIAL NETWORKING APPLICATION
A computer server supporting a social networking application that has multiple users, each user having a unique social networking application account...
2016/0330150 MESSAGE SERVICE PROVIDING METHOD FOR MESSAGE SERVICE LINKED TO SEARCH SERVICE AND MESSAGE SERVER AND USER...
A message service providing method for a message service linked to a search service and a message server and a user terminal for performing the method are...
2016/0330149 METHOD FOR PROVIDING POINT OF CONVERGENCE IN REAL TIME
The present invention relates to a method for participants or group of participants that facilitates scheduling and arriving at a pre-determined point of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.