Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0366159 TRAFFIC FEATURE INFORMATION EXTRACTION METHOD, TRAFFIC FEATURE INFORMATION EXTRACTION DEVICE, AND TRAFFIC...
A traffic feature information extraction method including a regular expression process, a clustering process, and a feature information extraction process. The...
2016/0366158 Method and Apparatus for File Identification
The present application discloses a method and an apparatus for file identification. The method for file identification comprises: determining a virus family...
2016/0366157 SYSTEM, APPARATUS AND METHOD FOR TRANSFERRING OWNERSHIP OF A DEVICE FROM MANUFACTURER TO USER USING AN EMBEDDED...
In one embodiment, a method includes receiving, in an on-boarding system for a first network, a request to transfer ownership of a first device having a...
2016/0366156 Protection of communication on a vehicular network via a remote security service
Methods and systems for protecting components of a linked vehicle from cyber-attack are disclosed. These methods and systems comprise elements of hardware and...
2016/0366155 MALICIOUS ENCRYPTED NETWORK TRAFFIC IDENTIFICATION
A malicious encrypted traffic detector connected to a computer network, the detector comprising: a Shannon entropy estimator; an entropy comparator; a store...
2016/0366154 DOMAIN CLASSIFICATION USING DOMAIN CO-OCCURRENCE INFORMATION
Domain classification based on domain co-occurrence information derived from client request behavior is provided. The network requests of clients are analyzed...
2016/0366153 MANAGED DISSEMINATION OF LOCATION DATA
A location provider manages dissemination of location data of a user to one or more third-party services, so that the user can take advantage of services...
2016/0366152 SYSTEMS AND METHODS OF USING GEOLOCATION VERIFICATION
Systems and methods for displaying one or more submissions are described. One such exemplar method includes: (i) accepting, from a client device associated...
2016/0366151 AUTHENTICATION SERVER SYSTEM, METHOD, AND STORAGE MEDIUM
An authentication server system issues a first-type token for verification of whether a user operating a terminal is a valid user and a second-type token for...
2016/0366150 Group User Experience
Disclosed is a method, system and computer programs to provide emergent behavior in a network of connected mobile user devices. The method includes advertising...
2016/0366149 INTELLIGENT MANAGEMENT OF APPLICATION CONNECTIVITY
Network connectivity is selectively established by monitoring, on a client, communications activity incident to accessing a network, the communications...
2016/0366148 UNIVERSAL REMOTE APPLIANCE LIFECYCLE MANAGEMENT
A mobile device, which has internet connectivity and several input/output devices, includes a mobile universal remote controller (MURC) and an appliance...
2016/0366147 SYSTEM AND METHOD OF SUPERVISORY CONTROL
A method of supervisory control is provided according to aspects of the technology. The method includes setting, at a remote device, at least a first usage...
2016/0366146 SYSTEM ACCOUNT ACCESS MANAGER
In one aspect, a computerized system of an access-manager server for managing account access includes a computer store containing data, wherein the data...
2016/0366145 LINKING IDENTITIES IN A NETWORK ENTITY
A network entity that allows collaboration among end users of a collaborative application by using different identifiers. The network entity receives an...
2016/0366144 System Security Using Multi-user Control
An authorization method comprising receiving command signals from a plurality of controlling accounts, determining whether the number of received command...
2016/0366143 SYSTEM AND METHOD FOR VIRTUAL IMAGE SECURITY IN A CLOUD ENVIRONMENT
Systems and methods enabling secure virtual image access in a virtual or cloud computing environment. The systems and methods include assigning a status to...
2016/0366142 DATA SOCKET DESCRIPTOR ATTRIBUTES FOR APPLICATION DISCOVERY IN DATA CENTERS
In one embodiment, a system includes a processing circuit and logic integrated with and/or executable by the processing circuit. The logic is configured to...
2016/0366141 System, Apparatus and Method for Auto-Optimization of Access Control Policy and Key Management in A Network...
In one embodiment, a method includes: presenting, in a user interface of an authoring tool, a plurality of levels of abstraction for a network having a...
2016/0366140 DYNAMIC EXTENSIBLE APPLICATION SERVER MANAGEMENT
A real-time plugin command-driven administrative control interface is provided that implements direct real-time command-driven control of operational...
2016/0366139 Secure Zone for Secure Purchases
An apparatus according to the present disclosure may comprise a secure zone configured to execute a task having a subtask. The task and subtask may have...
2016/0366138 NETWORK PERSONAL DIGITAL VIDEO RECORDER SYSTEM (NPDVR)
The Shared Internet Storage Resource provides Internet-based file storage, retrieval, access, control, and manipulation for a user. Additionally, an...
2016/0366137 INSTALLATION OF A SECURE-ELEMENT-RELATED SERVICE APPLICATION IN A SECURE ELEMENT IN A COMMUNICATION DEVICE,...
A method for installation of a secure-element-related service application in a secure element of a user equipment (UE) associated with a subscriber of a...
2016/0366136 SYSTEM, APPARATUS AND METHOD FOR STATEFUL APPLICATION OF CONTROL DATA IN A DEVICE
In one embodiment, a system includes a processor having a first logic to execute in a trusted execution environment, and a storage to store a plurality of...
2016/0366135 CONFIGURATION MANAGEMENT FOR VIRTUAL MACHINE ENVIRONMENT
A computer-implemented method for controlling a connection between a virtual machine and a physical device comprises receiving a connection request for...
2016/0366134 USAGE TRACKING FOR SOFTWARE AS A SERVICE (SAAS) APPLICATIONS
Various of the disclosed embodiments concern computer systems, methods, and programs for brokering logins to software as a service (SaaS) applications and...
2016/0366133 METHOD AND SYSTEM FOR STATE MACHINE SECURITY DEVICE
A security device may be utilized to provide security measures to an electronic device that may incorporate the security device or be coupled to it. The...
2016/0366132 METHOD FOR CONTROLLING ACCESS TO DATA RELATING TO AN ELECTRICAL INSTALLATION, ASSOCIATED COMPUTER PROGRAMME AND...
A controlling access to data exchanged between a management unit of a respective electrical installation and a relay platform, each management unit has a first...
2016/0366131 SECURE DEVICE COMMUNICATION
A system and associated method for securing communication between a first device and a second device are provided. The system includes a first device...
2016/0366130 APPARATUS AND METHOD FOR PROVIDING SECURITY SERVICE BASED ON VIRTUALIZATION
An apparatus for providing security services based on virtualization, the apparatus including: a host virtual machine in which a host operating system that...
2016/0366129 LIVENESS DETECTION METHOD AND DEVICE, AND IDENTITY AUTHENTICATION METHOD AND DEVICE
Liveness detection and an identity authentication is included in the disclosure. A user's biological characteristic information is collected and displayed at...
2016/0366128 BIOMETRIC SIGNATURE AUTHENTICATION AND CENTRALIZED STORAGE SYSTEM
A biometric authentication system may include a centralized database including stored biometric signature information for authenticating a user of one or more...
2016/0366127 NETWORK NODE, DEVICE AND METHODS FOR PROVIDING AN AUTHENTICATION MODULE
The invention relates to a method, for providing an Authentication Module (AM) to a device. The method comprises computing an authentication parameter to be...
2016/0366126 SCREEN-ANALYSIS BASED DEVICE SECURITY
Systems and methods are provided for a content-based security for computing devices. An example method includes identifying content rendered by a mobile...
2016/0366125 SERVICE PROVIDING METHOD, AND SERVICE PROVIDING DEVICE
A service providing method, the method comprises transmitting, by a first information processing device, a certification token including a first role...
2016/0366124 CONFIGURATION AND AUTHENTICATION OF WIRELESS DEVICES
An apparatus and method for registering and configuring a wireless device for use within a wireless local area network (WLAN) are disclosed. In at least one...
2016/0366123 DEVICE NAMING IN AN INTERNET OF THINGS
In an example, there is disclosed a computing apparatus, having: a network interface; and one or more logic elements providing a name management engine,...
2016/0366122 SINGLE SIGN-ON FOR UNMANAGED MOBILE DEVICES
Disclosed are various examples for providing a single sign-on experience for mobile devices that may or may not be managed. A service provider receives an...
2016/0366121 SINGLE SIGN-ON FOR MANAGED MOBILE DEVICES
Disclosed are various examples for providing a single sign-on experience for managed mobile devices. A management application executed in a computing device...
2016/0366120 SINGLE SIGN-ON FOR MANAGED MOBILE DEVICES
Disclosed are various examples for single-sign on by way of managed mobile devices. For example, an identity provider service can receive a request for an...
2016/0366119 SINGLE SIGN-ON FOR UNMANAGED MOBILE DEVICES
Disclosed are various examples for providing a single sign-on experience for mobile applications that may or may not be managed. A first application executed...
2016/0366118 Token-based Authentication and Authorization Information Signaling and Exchange for Adaptive Streaming
A method implemented by a network element (NE) configured as a streaming client, the method comprising obtaining, via a processor of the NE, a first...
2016/0366117 ENCRYPTED PURGING OF DATA FROM CONTENT NODE STORAGE
Described herein are methods, systems, and software for encrypting and erasing data objects in a content node. In one example, a method of operating a content...
2016/0366116 DRM PROTECTED VIDEO STREAMING ON GAME CONSOLE WITH SECRET-LESS APPLICATION
Techniques are disclosed for secure playback of protected multimedia content on a game console using a secret-less application. An SSO model can be used for...
2016/0366115 CALL ENCRYPTION SYSTEMS AND METHODS
Techniques described herein may be used to encrypt a telephone call between users. User devices (e.g., smart phones) may be connected to encryption relay...
2016/0366114 INTER-BUS COMMUNICATION INTERFACE DEVICE
Described herein is a security network controller having a main bus to which is coupled a central processing unit, a cryptographic processing circuit, a...
2016/0366113 WILDCARD SEARCH IN ENCRYPTED TEXT
A wildcard searchable encryption method enables wildcard search of encrypted text in a cloud-stored encrypted document. In some embodiments, the wildcard...
2016/0366112 MANAGED OPEN SOURCE MEDICAL DEVICES
This document discusses designing and managing medical devices that are equipped with software, including a variety of ways of managing the public interest in...
2016/0366111 System, Apparatus and Method for Managing Lifecycle of Secure Publish-Subscribe System
In one embodiment, a method includes: request enrollment of the device with an identity provider, the enrollment including at least one role for the device for...
2016/0366110 SECURED CELL PHONE COMMUNICATION SYSTEM
The present invention is regarding a cellphone communication security system comprising a first cellphone; a second cellphone; a network system; a software...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.