Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0093917 CENTRALIZED MANAGEMENT AND ENFORCEMENT OF ONLINE BEHAVIORAL TRACKING POLICIES
Systems and methods for manipulating online behavioral tracking policies are provided. According to one embodiment, a hypertext transfer protocol (HTTP)...
2017/0093916 POLICY ENFORCEMENT SYSTEM
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for storing, by a policy enforcement system, a plurality of...
2017/0093913 POLICY MANAGEMENT FOR DATA MIGRATION
A customer of a resource provider environment can apply policies at the data object level that will live with a data object during its lifecycle, even as the...
2017/0093908 CONTROLLER AREA NETWORK (CAN) DEVICE AND METHOD FOR CONTROLLING CAN TRAFFIC
Embodiments of a device and method are disclosed. In an embodiment, a method for controlling CAN traffic is disclosed. The method for controlling CAN traffic...
2017/0093901 SECURITY RISK MANAGEMENT
Among other things, traces are received of activities of an online user who is associated with an entity. By analysis of the traces a security state of the...
2017/0093893 SYSTEM AND METHOD FOR BLOCKING EXECUTION OF SCRIPTS
Disclosed are exemplary aspects of systems and methods for blocking execution of scripts. An exemplary method comprises: intercepting a request for a script...
2017/0093892 SYSTEM AND METHOD FOR GENERATING SETS OF ANTIVIRUS RECORDS FOR DETECTION OF MALWARE ON USER DEVICES
Disclosed are systems and method for generating a set of antivirus records to be used for detection of malicious files on a user's devices. An exemplary method...
2017/0093887 NETWORK COMMAND EVALUATION AND RESPONSE SYSTEM
A system includes a first computing device to (a) determine a first command conforming to an industrial control protocol and transmitted to a second computing...
2017/0093884 PROVIDING SECURE DATA TRANSFER BETWEEN NETWORKS
A data frame transmitted over a serial link between a destination network and a source network is received by a computer-implemented system in the destination...
2017/0093883 METHOD AND APPARATUS FOR SUPPORTING SUB NETWORKS IN A MOCA NETWORK
Systems and methods for communicating content between nodes of a network, wherein particular nodes of the network are members of a sub network. Flows can be...
2017/0093880 METHOD FOR SECURE CONFIGURATION AND USE OF A SYSTEM FOR MONITORING AND/OR CONTROLLING MODULES
A method and device for secure configuration and use of a system of modules for monitoring and/or controlling pieces of domestic, industrial or office...
2017/0093875 SYSTEM AND METHOD FOR AUTHORIZING A SUBSCRIBER DEVICE
Systems, methods, apparatus and other mechanisms of authorizing a device to receive subscriber services via a network by comprising identifying a customer...
2017/0093872 AUTOMATICALLY PROVISIONING NEW ACCOUNTS ON MANAGED TARGETS BY PATTERN RECOGNITION OF EXISTING ACCOUNT ATTRIBUTES
An identity management system is augmented to provide for automated provisioning of user accounts in an IAM system. A user account is autoprovisioned based on...
2017/0093870 EMAIL EFFECTIVITY FACILTY IN A NETWORKED SECURE COLLABORATIVE EXCHANGE ENVIRONMENT
In embodiments of the present invention improved capabilities are described for managing access to a secure exchange environment managed by an intermediate...
2017/0093868 DEVICE AUTHENTICATION TO CAPILLARY GATEWAY
It is disclosed a method and a capillary gateway, CGW, (50, 60, 204, 304) capable to determine whether to allow a first machine-to-machine, M2M, device network...
2017/0093867 ACCESS CONTROL SYSTEM FOR ENTERPRISE CLOUD STORAGE
Systems and corresponding computer-implemented methods for context-based rule evaluation in an electronic data storage system are described. A request to...
2017/0093865 Server Transmitting Device Information Assigned to Service Identification Information
A server receives access request from an information processing apparatus. The access request includes address information of a source web page. The access...
2017/0093861 INTERNET OF THINGS DEVICE HIERARCHIES
In embodiments, Internet of Things (IoT) devices may be organized according to an IoT device hierarchy, which may include parent and/or child associations...
2017/0093858 DELIVERING ANONYMOUS COMMUNICATION BETWEEN CUSTOMERS AT CUSTOMER CARE SITE
A customer care site includes a content item posted by a first user. The content item is associated with a first contact link for requesting communication with...
2017/0093857 MANAGEMENT SYSTEM, COMMUNICATION SYSTEM, AND TRANSMISSION CONTROL METHOD
A management system, a communication system, and a transmission control method. The management system includes a receiver to receive information of a...
2017/0093846 MULTI-DEVICE AUTHENTICATION
A system and method uses multiple devices in concert as security for accessing an account. The system and method may use one or more security measures based on...
2017/0093840 SECURE FILE TRANSFER WITH SECURE SSH KEY AUTHENTICATION
An application having an application architecture including an application programming interface (API) client capable of automatically retrieving a passphrase...
2017/0093836 CREDENTIAL MANAGEMENT SYSTEM
A server may communicate with a mobile device and/or a reader device via an Internet connection. The server may be configured to generate a credential and...
2017/0093834 ENHANCED EVPN MAC ROUTE ADVERTISEMENT HAVING MAC (L2) LEVEL AUTHENTICATION, SECURITY AND POLICY CONTROL
Techniques are described that enable MAC (L2) address authentication within an L2 switching network, such as a metro transport network. Moreover, when used in...
2017/0093833 SYSTEM, METHOD, AND PROGRAM FOR SHARING SCREEN
The present invention is to maintain security, enable an easy network configuration and authentication, and enhance the user-friendliness in screen sharing. In...
2017/0093831 AUTHORIZING USER ACCESS TO RESOURCE BY DETERMINING WHETHER OTHER, AUTHORIZED USERS HAVE INDICATED THAT THE USER...
A user who is currently unauthorized to access a resource sends a request to access the resource. It is determined whether a number of authorized users of the...
2017/0093829 CUMULATIVE AUTHENTICATION FOR STEP-UP INCREASED AUTHENTICATION FACTORS
Techniques are disclosed for providing an authentication service that performs authentication of users on behalf of a relying party. The authentication service...
2017/0093827 DYNAMIC WEB SERVICES SERVER
A method is provided for a multi-tenant system to accept web service calls from third party systems over a computer network. The method includes centrally...
2017/0093824 VIRTUAL ENCRYPTION PATCHING USING MULTIPLE TRANSPORT LAYER SECURITY IMPLEMENTATIONS
Techniques related to virtual encryption patching are described. A security gateway includes multiple Transport Layer Security Implementations (TLSI) that can...
2017/0093810 SYSTEM AND METHOD FOR TRANSMITTING DATA RELATING TO AN OBJECT
A system for the transmission of data relating to an object includes a local computing unit assigned to the object, said local computing unit including data...
2017/0093807 METHOD AND APPARATUS FOR ENCRYPTION OF COMMUNICATIONS OVER A NETWORK
Aspects of the subject disclosure may include, for example, determining whether communications are encrypted, determining a communication type for the...
2017/0093798 NETWORK-ATTACHED STORAGE GATEWAY VALIDATION
An indication to validate operation of a network-attached storage gateway is received. The network-attached storage gateway communicatively couples a client...
2017/0093796 INLINE INSPECTION OF SECURITY PROTOCOLS
Systems and methods for inline security protocol inspection are provided. According to one embodiment, a security device receives an encrypted packet from a...
2017/0093794 MAC (L2) LEVEL AUTHENTICATION, SECURITY AND POLICY CONTROL
Techniques are described that enable MAC (L2) address authentication within an L2 switching network, such as a metro transport network. Moreover, when used in...
2017/0093792 SYSTEM AND METHOD FOR STATELESS DISTRIBUTION OF BIDIRECTIONAL FLOWS WITH NETWORK ADDRESS TRANSLATION
A system and method for stateless distribution of bidirectional flows with network address translation (NAT). The method comprises: determining an original...
2017/0093785 INFORMATION PROCESSING DEVICE, METHOD, AND PROGRAM
The present disclosure relates to information processing device, method, and program for improving the power of expression in communication. Both of a first...
2017/0093784 AUTHENTICATING NOTIFICATIONS ON ONLINE SOCIAL NETWORKS
In one embodiment, a method includes providing an application programming interface (API) to an application running on a client system. The API is provided...
2017/0093782 ELECTRONIC-MESSAGING SYSTEM INTERCEPTOR FORWARDING CLIENT NOTIFICATIONS
An interceptor, e.g., associated with an electronic messaging (EM) service, transmits a first request to the EM service. The interceptor receives from the EM...
2017/0093768 ELECTRONIC MAIL ATTACHMENT HOLD AND DISPATCH FOR SECURITY MONITORING
Systems, apparatus, and computer program products provide for electronic mail (email) attachment hold and dispatch for security monitoring of email...
2017/0093764 LOSSY TEXT SOURCE CODING BY WORD LENGTH
According to one embodiment, a method for lossy data compression is provided. The method may include receiving a data message from a sender. The method may...
2017/0093763 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, PROGRAM, RECORDING MEDIUM, AND INFORMATION...
Provided is an information processing apparatus including an image acquisition unit for acquiring an image that includes a target a user is paying attention...
2017/0093758 IP ALIASES IN LOGICAL NETWORKS WITH HARDWARE SWITCHES
Some embodiments provide a novel method of configuring a managed hardware forwarding element (MHFE) that implements a logical forwarding element (LFE) of a...
2017/0093749 CONTROLLING OF COMMUNICATION NETWORK COMPRISING VIRTUALIZED NETWORK FUNCTIONS
A method comprising determining that at least one virtualized communication function or application providing services related to a communication network is...
2017/0093746 INPUT/OUTPUT FENCING OPTIMIZATION
Various systems, methods, and processes to optimize input/output (I/O) fencing operations in systems that implement coordination points are presented. A matrix...
2017/0093744 APPARATUS, SYSTEM, AND METHOD FOR ORDERING AND PROVISIONING VARIABLE BANDWIDTH CAPACITY ON A NETWORK
Systems and methods for automatic purchasing, reserving and/or provisioning of a wavelength bandwidth block are disclosed. A user may access a web page, such...
2017/0093737 DOMAIN NAME SYSTEM RESPONSE SPOOFING AT CUSTOMER PREMISE EQUIPMENT DEVICE
Methods, systems, and computer readable media can be operable to facilitate the spoofing of domain name system requests by a customer premise equipment (CPE)...
2017/0093733 AUDIO DATA PROCESSING
An apparatus and method are provided. A first buffer is configured to store a first packet stream, the first buffer comprising a first read pointer pointing to...
2017/0093732 Packet Mis-Ordering Prevention in Source Routing Hitless Reroute Using Inter-Packet Delay and Precompensation
A method implemented by a network element (NE), comprising forwarding one or more initial packets in a packet flow from a source to a destination along an...
2017/0093731 TECHNOLOGIES FOR NETWORK ROUND-TRIP TIME ESTIMATION
Technologies for estimating network round-trip times include a sender computing node in network communication with a set of neighboring computing nodes. The...
2017/0093730 FLOW CONTROL SYSTEM AND METHOD
A method, computer program product, and computing system for monitoring a plurality of dataflows within a wired communication trunk for the occurrence of one...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.