Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0163635 AUTHORIZATION SERVER, AUTHENTICATION COOPERATION SYSTEM, AND STORAGE MEDIUM STORING PROGRAM
An authorization token verification request including the authorization token is received from an application server having received a processing request along...
2017/0163634 SYSTEM AND METHOD FOR COMMUNICATION TO ENTERPRISE ENVIRONMENT USERS OF A MOBILE APPLICATION BY THE MOBILE...
A method for communicating with enterprise users of an enterprise mobile application on a mobile communication device includes providing the enterprise mobile...
2017/0163633 Exchange of Control Information between Secure Socket Layer Gateways
Provided are a method and a system for exchanging control information between secure socket layer (SSL) gateways. The method may commence with intercepting, by...
2017/0163632 Control Of Access To Contents Which Can Be Retrieved Via A Data Network
A method is provided for controlling access to content accessible via a data network, by transmitting an IP address in response to a name resolution request...
2017/0163631 SECURITY CERTIFICATION AND APPLICATION CATEGORIZATION FOR MOBILE DEVICE MANAGEMENT
Implementations for managing mobile devices associated with enterprise operations include actions of receiving a request to access information regarding at...
2017/0163630 COMPUTER READABLE STORAGE MEDIA FOR LEGACY INTEGRATION AND METHODS AND SYSTEMS FOR UTILIZING SAME
Systems and methods for integrative legacy context management are disclosed herein. An example computer hardware system may include at least one processing...
2017/0163629 SECURE TOKEN DISTRIBUTION
A method for utilizing a registration authority to facilitate a certificate signing request is disclosed. In at least one embodiment, a registration authority...
2017/0163628 USER LOGIN METHODS, DEVICES, AND SYSTEMS
A user login method for use in a terminal is provided. The method includes: receiving an automatic login request; acquiring a terminal identifier of the...
2017/0163626 METHOD AND DEVICE FOR NETWORK ACCESS OF A SMART TERMINAL DEVICE
A method and device for network access of a smart terminal device. The smart terminal device generates a network access request message and broadcasts the...
2017/0163625 USING TIMING OF CHARACTER INPUT TO VERIFY PASSWORD
A multi-dimensional approach can be used to verify a password. In addition to requiring the input of the correct password, the timing at which the characters...
2017/0163624 METHOD AND ARRANGEMENTS FOR INTERMEDIARY NODE DISCOVERY DURING HANDSHAKE
A method executed by an Intermediary Node arranged between a Client and a Server for participating in the setting up of a connection between the Client and a...
2017/0163623 MULTI-USER AUTHENTICATION
In an approach to multi-user authentication, one or more computer processors receive a first user login. The one or more computer processors determine whether...
2017/0163622 AUTHENTICATION APPARATUS, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD AND STORAGE MEDIUM
The first authentication unit of an authentication apparatus decides whether first authentication data exists in a received message, and performs, if it is...
2017/0163621 WIRELESS COMMUNICATION APPARATUS, AUTHENTICATION APPARATUS, WIRELESS COMMUNICATION METHOD AND AUTHENTICATION METHOD
According to one embodiment, when a control unit is notified of information in at least one second signal received by one of first and second wireless...
2017/0163620 METHODS AND APPARATUS TO ENHANCE SECURITY OF AUTHENTICATION
A system is disclosed that includes a processor including watermark logic to output a first watermark to an output device that outputs a first watermark...
2017/0163619 APPARATUS AND METHOD FOR USING A SECURITY APPLIANCE WITH IEC 61131-3
A security appliance to perform a method that includes receiving a first set of data from a first device using a first secure protocol of a first network, the...
2017/0163618 API AUTHENTICATION
Techniques are disclosed relating to signing and authentication of network messages such as API calls. A server system and a client system may collaboratively...
2017/0163617 UNIQUE CODE FOR TOKEN VERIFICATION
A method for tokenizing credentials is disclosed. In addition to a token, a verification value can be provided for each interaction. The verification value can...
2017/0163616 SYSTEM, APPARATUS AND METHOD FOR PROVIDING PRIVACY PRESERVING INTERACTION WITH A COMPUTING SYSTEM
In one embodiment, a system including one or more hardware processors is: to receive a user request to access a website; sign a nonce with at least some of the...
2017/0163615 SYSTEMS AND METHODS FOR USER ACCOUNT RECOVERY
Systems, methods, and non-transitory computer-readable media can determine a request to recover access to an account of a first user, the request being...
2017/0163614 Method, a Device, a Dedicated Device and a System for Encrypting Communication
The application relates to a method for encrypting communication in a communication network, a communication device, a dedicated device and a system for...
2017/0163613 PROTECTING SENSITIVE INFORMATION USING A TRUSTED DEVICE
The invention relates to the information processing field, and discloses a method for protecting sensitive information, comprising: encrypting sensitive...
2017/0163612 COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, AND COMMUNICATION METHOD
A wireless communication circuit includes a receiver to receive at least one of a beacon frame and a probe response frame from a first wireless communication...
2017/0163611 EXTERNAL INDEXING AND SEARCH FOR A SECURE CLOUD COLLABORATION SYSTEM
An end-to-end secure cloud-hosted collaboration service is provided with a hybrid cloud/on-premise index and search capability. This approach includes...
2017/0163610 METHODS, APPARATUSES, AND SYSTEMS FOR ACQUIRING LOCAL INFORMATION
The present application discloses methods, apparatuses, and systems for acquiring local information to solve the problems of browser instability and difficulty...
2017/0163609 ENCRYPTED AUDIO STREAMS TRANSCEIVING PORTABLE DEVICE AND ASSOCIATED METHOD
An encrypted multimedia streams transceiving method between a first and second user, includes using a device for transceiving multimedia streams connected to a...
2017/0163608 SECURE OFFLINE DATA OFFLOAD IN A SENSOR NETWORK
Methods and systems for secure data offload in a sensor network. The method comprises offloading data indicative of sensor measurements from a wireless sensing...
2017/0163607 Establishing a Communication Event Using Secure Signalling
A communication event is established between an initiating device and a responding device under the control of a remote communications controller. In a...
2017/0163606 FIREWALL POLICY MANAGEMENT
Methods and systems are provided for creation and implementation of firewall policies. According to one embodiment, a firewall maintains a log of observed...
2017/0163605 Systems and Methods for Harmful File Rating and Screening in Online File Transfers
Systems and methods of screening files during online file transfers at a computing device are disclosed. The computing device identifies a torrent identifier...
2017/0163604 METHOD AND APPARATUS TO PERFORM MULTIPLE PACKET PAYLOADS ANALYSIS
A method and apparatus for identifying data patterns of a file are described herein. In one embodiment, an exemplary process includes, but is not limited to,...
2017/0163603 DISCOVERING AND SELECTING CANDIDATES FOR SINKHOLING OF NETWORK DOMAINS
Techniques for discovering and selecting candidates for sinkholing of network domains are provided. In some embodiments, a process for discovering and...
2017/0163602 Policy-Based Load Distribution Between Host-Based Packet Processing Units
A mechanism is provided in a network security subsystem in a virtual machine monitor for policy based load distribution among a plurality of packet processing...
2017/0163601 MOBILE HOTSPOT MANAGED BY ACCESS CONTROLLER
Systems and methods are described for a mobile hotspot that can be managed by an access controller. According to an embodiment, a WAN connection is established...
2017/0163600 PRIVATE APPLICATION PLATFORM
Methods and systems disclosed provide for creating private networks for secured communication between devices. The devices can communicate with each other over...
2017/0163599 GROUPING TUNNEL ENDPOINTS OF A BRIDGE CLUSTER
Some embodiments provide a method for a first managed forwarding element (MFE). The method receives a packet from a data compute node that connects to the MFE....
2017/0163598 LEARNING OF TUNNEL ENDPOINT SELECTIONS
Some embodiments provide a method for a managed forwarding element (MFE). At the MFE, the method receives a first packet from a particular tunnel endpoint. The...
2017/0163597 IP ADDRESS OF WIRELESS CLIENT DEVICE
In some examples, a message is received from a wireless client device. The message includes an IP address of the wireless client device. It is determined...
2017/0163596 Methods, Systems, and Products for Monitoring Domain Name Servers
Methods, systems, and products infer performance of a domain name system. Queries to, and responses from, the domain name system are logged and categorized....
2017/0163595 DECLUTTERING GENERAL COMMUNICATION MESSAGE FOR SPECIFIC AUDIENCE
A communication system obtains a message intended for one or more recipients. The message contains one or more content elements. The communication system...
2017/0163594 SYSTEMS AND METHODS FOR RELAYING MESSAGES IN A COMMUNICATIONS SYSTEM BASED ON USER INTERACTIONS
The various embodiments described herein include methods, devices, and systems for relaying messages in a communications system. In one aspect, a method is...
2017/0163593 SYSTEMS AND METHODS FOR RELAYING MESSAGES IN A COMMUNICATIONS SYSTEM
The various embodiments described herein include methods, devices, and systems for relaying messages in a communications system. In one aspect, a method is...
2017/0163592 INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD AND TERMINAL DEVICE
There is provided an information processing device including a score calculation unit that calculates, for one or more events for which a plan is set by one or...
2017/0163591 LIVE EVENTS ATTENDANCE SMART TRANSPORTATION AND PLANNING
Live events attendance smart transportation and planning. A social media profile and a social media friends list corresponding to the user is retrieved by the...
2017/0163590 MESSAGE DATA TRANSFER
In one embodiment, a method includes receiving a request to send data to a user. The data exceeds a message size limit of a delivery channel associated with...
2017/0163589 SHARING OF ACTIVITY METADATA VIA MESSAGING SYSTEMS
Systems and methods are provided for sharing activity information of devices engaged in a messaging session. In operation, the devices provide activity and...
2017/0163588 Detecting And Indicating Partial Read Status of Emails Based on Email Contents
According to one embodiment of the present invention, a system for marking an email as partially read includes at least one processor. The at least one...
2017/0163587 Onboarding of a Service Based on Client Feedback of Task Completion
Described herein are techniques and systems for onboarding a service from client-managed computing infrastructure to network computing infrastructure. As part...
2017/0163586 MESSAGE DELIVERY SYSTEM
An embodiment of the invention may include a method, computer program product and computer system for disseminating messages to a user. The embodiment may...
2017/0163585 E-Mail Proxy
In one embodiment, a method for processing an e-mail message addressed to an e-mail client is disclosed. The method comprises receiving at a mail server an...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.