Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0237743 Managing Private and Public Service Set Utilization
Methods, systems, and computer readable media may be operable to facilitate the management of connections between one or more client devices and an access...
2017/0237742 Methods, Devices and Management Terminals For Establishing a Secure Session With a Service
This disclosure provides a method, performed in a resource-constrained device 60, for establishing a secure session with a service 800 delivered by a server...
2017/0237741 DYNAMIC RECORD IDENTIFICATION AND ANALYSIS COMPUTER SYSTEM WITH EVENT MONITORING COMPONENTS
Aspects of the disclosure relate to deploying and utilizing a dynamic record identification and analysis computer system with event monitoring components. In...
2017/0237740 DISTRIBUTED AUTHENTICATION
A method can include receiving a request from a requestor to a given resource, which requestor is registered to access a set of one or more resources. The...
2017/0237739 Authentication System and Method
An authentication system for authenticating the identity of a requester of access by an unauthorized service client to a secured resource. The system has a...
2017/0237738 METHOD AND APPARATUS FOR TRACKING DATA ACCESS ROUTE
According to an embodiment of the present disclosure, a method for tracking a data access route comprising duplicating, by a data access route management...
2017/0237737 Determine Approximate Current Time on a Client Using Secure Protocol Metadata
Establishing secure connections from a computing device to secure servers when the computing device starts with an incorrect system clock time that would...
2017/0237736 PRIVATE INFORMATION MANAGEMENT SYSTEM AND METHODS
In some embodiments, a method is provided for storing data in a storage device associated with a first electronic device. The first electronic device can...
2017/0237735 ENABLING SECURE NETWORK MOBILE DEVICE COMMUNICATIONS
Methods and systems of communicating with secure endpoints included within a secured network from a mobile device external to the secured network is disclosed....
2017/0237734 METHOD AND SYSTEM FOR AUTHENTICATING A USER
Method for authenticating a user, comprising the steps of a)providing a central server (101), in communication with at least one authentication service...
2017/0237733 APPARATUS AND METHOD TO CONTROL TRANSFER APPARATUSES DEPENDING ON A TYPE OF AN UNAUTHORIZED COMMUNICATION...
An apparatus controls transfer apparatuses that transfer a packet transmitted and received by terminals in a network. Upon receiving detection information...
2017/0237732 COMMUNICATION APPARATUS
According to one embodiment, a communication apparatus is provided. The communication apparatus receives first content including first additional information...
2017/0237731 VALIDATING BIOMETRICS WITHOUT SPECIAL PURPOSE READERS
To validate a user's identity a network validation server receives a smartphone image of a preexisting user credential, including both a user biometric and a...
2017/0237730 Identity Federation and Token Translation Module for Use With a Web Application
An identity federation and security token translation module and method for operable engagement with a web application or an internet information service...
2017/0237729 SECURING USER-ACCESSED APPLICATIONS IN A DISTRIBUTED COMPUTING ENVIRONMENT
Provided herein are systems and methods of controlling access to a web-based application. Such a system may include an access determination server, an...
2017/0237728 SELF-ADAPTIVE COMMUNICATION METHOD FOR ENCRYPTION DONGLE
A self-adaptive communication method for an encryption dongle, comprising: an upper-layer software platform sets communication mode information of self, when...
2017/0237727 SYSTEM AND METHOD FOR A SINGLE FIELD BASED AUTHENTICATION
A system and method where a computing device reads an authentication phrase from a single data field user input. The authentication phrase input will typically...
2017/0237725 Password-Based Authentication
A system has .lamda..gtoreq.2 servers. At least each of a set of authentication servers stores a key-share sk.sub.i of secret key sk, shared between q of the...
2017/0237724 SYSTEM AND METHOD FOR TRAVERSING A NAT DEVICE WITH IPSEC AH AUTHENTICATION
A method for routing IP packets with IPSec AH authentication is disclosed. The method includes locating overlay edge routers between private domains and their...
2017/0237723 UTILIZING A CUSTOMIZED DIGITAL FONT TO IDENTIFY A COMPUTING DEVICE
Systems and methods are disclosed for securely identifying a computing device via a web browser utilizing a customized digital font. In particular, in one or...
2017/0237722 NETWORKED SCORE COMMUNICATIONS SYSTEM
The disclosure relates to a telecommunication method for communicating scoring data over a network, comprising: sending, by a client application of a mobile...
2017/0237721 DEEP PACKET INSPECTION (DPI) AT AN ENDPOINT
The subject matter described herein includes methods, systems, and computer program products for performing deep packet inspection at an endpoint. According to...
2017/0237720 SYSTEM AND METHOD OF ENCRYPTED MEDIA ENCAPSULATION
A system for and method of media encapsulation is presented. The method may include receiving, via an audio digitizer, a plurality of packets of data and...
2017/0237719 MOBILE SECURITY OFFLOADER
In an example embodiment, a mobile security offloader (MSOL) is provided. Within the MSOL, a mobile device identification component is used to receive...
2017/0237718 METHOD AND APPARATUS FOR SECURE NETWORK COMMUNICATIONS
Methods and apparatuses are disclosed for secure network communications. An exemplary method may include sending a handshake request message to a server. The...
2017/0237717 IDENTITY BINDING SYSTEMS AND METHODS IN A PERSONAL DATA STORE IN AN ONLINE TRUST SYSTEM
A computer-implemented method for managing a personal data store is described for binding one or more identities of different types associated with a user. The...
2017/0237716 SYSTEM AND METHOD FOR INTERLOCKING INTRUSION INFORMATION
The present invention relates to a system and method for interlocking intrusion information. An intrusion information interlocking system includes at least one...
2017/0237715 ENCODER, DECODER AND METHOD
A method of encoding and encrypting input data (D1) to generate corresponding encoded and encrypted data (E2) is provided. At least a first data block of the...
2017/0237714 SERVER SYSTEMS AND METHODS FOR DECRYPTING DATA PACKETS WITH COMPUTATION MODULES INSERTABLE INTO SERVERS THAT...
A server system can include a plurality of servers interconnected by a network. Each server can include a server processor, a socket configured to receive a...
2017/0237713 METHOD FOR ENSURING MEDIA STREAM SECURITY IN IP MULTIMEDIA SUB-SYSTEM
A method for ensuring media stream security in an IP Multimedia Subsystem network is disclosed. The method includes: assigning an end-to-end media stream...
2017/0237712 SYSTEM FOR DISTRIBUTING DIGITAL MEDIA TO EXHIBITORS
A system for packaging digital media and distributing digital media to exhibitors is described, which system enables distribution by utilizing media content...
2017/0237711 TECHNIQUES FOR PREVENTING LARGE-SCALE DATA BREACHES UTILIZING DIFFERENTIATED PROTECTION LAYERS
Techniques related to preventing large-scale data breaches utilizing differentiated data object (DO) protection layers are described. A security gateway placed...
2017/0237710 METHOD AND SYSTEM OF A CLOUD-BASED MULTIPATH ROUTING PROTOCOL
In one aspect, a computerized system useful for implementing a cloud-based multipath routing protocol to an Internet endpoint includes an edge device that...
2017/0237709 UNOBTRUSIVE PROTECTION FOR LARGE-SCALE DATA BREACHES UTILIZING USER-SPECIFIC DATA OBJECT ACCESS BUDGETS
Techniques for unobtrusively protecting against large-scale data breaches over time are described. A security gateway coupled between clients and servers...
2017/0237708 TELECOMMUNICATION SYSTEM AND METHOD FOR TRAVERSING AN APPLICATION LAYER GATEWAY FIREWALL DURING THE...
The invention relates to a telecommunications assembly (10) and a method for traversing an application layer gateway firewall (40) during the establishment of...
2017/0237707 METHOD AND SYSTEM FOR ALLOCATING COMMUNICATION ID OF BATTERY MANAGEMENT MODULE
The present disclosure relates to a communication ID allocation method and system of a battery management module. The system according to the present...
2017/0237706 METHOD AND APPARATUS FOR SETTING NETWORK RULE ENTRY
A method and apparatus for setting a network rule entry are described. The method for setting a network rule entry includes: detecting, by the first device,...
2017/0237705 Global hosting system
Network architecture supports hosting and content distribution on a global scale. The architecture allows a Content Provider to replicate and serve its most...
2017/0237704 ADDRESSING COMMUNICATION METHOD AND ELECTRONIC DEVICE BASED ON MEDIA ACCESS CONTROL ADDRESS
This disclosure discloses an addressing communication method and electronic device based on a media access control address. The method includes: a first device...
2017/0237703 Network Overlay Systems and Methods Using Offload Processors
A network overlay system can include a data transport module having a network interface and a translation module configured to generate offload processing...
2017/0237702 Selective Call Connection System With In-Flight Control
Systems and methods for selectively providing messages to users equipment (UEs) are disclosed. Different types of messages can be associated with different...
2017/0237701 System and Method for Improved Social Media Aggregation and Notification
A method for collecting and analyzing data related to Social Media Websites and making the results of the collected and analyzed data available to Social Media...
2017/0237700 Photo-sharing or exposure enabling social networking system.
This is a novel system and method(s) that provides a means for a social networking site by utilizing a photograph and posting the photograph on a storefront...
2017/0237699 SYSTEMS AND METHODS FOR MIGRATING MAILBOX DATA FROM SYSTEMS WITH LIMITED OR RESTRICTED REMOTE ACCESS
Examples described include software hosting systems able to provide software as a service to client systems through a firewall and/or to client systems which...
2017/0237698 Method For Scheduled Delivery of Social Media Messaging
A system and method for delaying messages posted to Social Media Websites based on a set or predetermined time period by the Social Media User whereby the...
2017/0237697 SYSTEM AND METHOD FOR DETECTING RELEVANT MESSAGES
A system and method are presented for detecting messages relevant to users in a collaborative environment. In a unified collaboration system, large volumes of...
2017/0237696 Apparatus and Method for Mediating Uploadable Content
Embodiments provide an apparatus and method for mediating uploadable content.
2017/0237695 TELECOMMUNICATION AND MULTIMEDIA MANAGEMENT METHOD AND APPARATUS
A telecommunication and multimedia management apparatus and method that supports voice and other media communications and that enables users to: (i)...
2017/0237694 FITNESS ACTIVITY RELATED MESSAGING
In one embodiment, a method for generating a message to a friend of a user is provided, comprising: processing activity data of a first user measured by an...
2017/0237693 METHOD OF AND SYSTEM FOR PROCESSING AN ELECTRONIC MESSAGE DESTINED FOR AN ELECTRONIC DEVICE
A method of processing an incoming electronic message destined to an application associated with a user, the user being associated with a first electronic...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.