Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0083944 Preserving LDAP Hierarchy in a SCIM Directory Using Special Marker Groups
A method for hierarchically processing Lightweight Directory Access Protocol (LDAP) operations against a System for Cross-domain Identity Management (SCIM)...
2018/0083943 GEOLOCATION DEPENDENT VARIABLE AUTHENTICATION
In an approach to variable authentication, one or more computer processors receive a request to access secure data from a computing device. The one or more...
2018/0083942 COMMUNICATION MANAGEMENT SYSTEM, ACCESS POINT, COMMUNICATION MANAGEMENT DEVICE, CONNECTION CONTROL METHOD,...
An object is to prevent concentration of communication traffic at a management node and to avoid a reduction in communication speed. An AP stores information...
2018/0083941 PLUGGABLE AUTHENTICATION FOR ENTERPRISE WEB APPLICATION
A system and method for facilitating authenticating a client application to enable communications with another server-side application running on a server in...
2018/0083940 SYSTEM TO RESOLVE MULTIPLE IDENTITY CRISIS IN INDENTITY-AS-A-SERVICE APPLICATION ENVIRONMENT
According to a non-limiting embodiment, a multiple identity crisis resolution system includes an IDaaS integrated with a PaaS. The IDaaS is integrated with a...
2018/0083939 GEOLOCATION DEPENDENT VARIABLE AUTHENTICATION
In an approach to variable authentication, one or more computer processors receive a request to access secure data from a computing device. The one or more...
2018/0083938 METHOD FOR OPERATING SERVER AND CLIENT, SERVER, AND CLIENT APPARATUS
Disclosed is a method for operating a server supporting peer-to-peer communication. One embodiment comprises the steps of: issuing a public key in response to...
2018/0083937 CREDENTIAL MANAGEMENT IN CLOUD-BASED APPLICATION DEPLOYMENT
Systems, methods, and computer program products for credential management. An application deployment system receives a deployment manifest for deploying an...
2018/0083936 System and Methods for Point to Point Encryption and Tokenization in a Hosted Environment
Mechanisms for providing point to point encryption and tokenization enabling decryption, tokenization and storage of sensitive encrypted data on one system are...
2018/0083935 METHOD AND SYSTEM FOR SECURE SMS COMMUNICATIONS
A system and method for securing Short Message Service (SMS) communications between two communication devices disclosed herein. SMS communications between...
2018/0083934 CONFIDENTIAL MAIL WITH TRACKING AND AUTHENTICATION
A method for confidential electronic communication between a sender workstation and a receiver workstation is provided, whereby privacy is guaranteed for the...
2018/0083933 METHOD AND APPARATUS FOR PROTECTING CONFIDENTIAL DATA IN AN OPEN SOFTWARE STACK
A method is provided for securely providing data for use in a consumer electronics device having a processor performing instructions defined in a software...
2018/0083932 SYSTEMS AND DEVICES FOR HARDENED REMOTE STORAGE OF PRIVATE CRYPTOGRAPHY KEYS USED FOR AUTHENTICATION
The invention provides for systems and devices for hardened remote storage of private cryptography keys used for authentication. The storage device is...
2018/0083931 METHODS AND SYSTEMS FOR SECURING DATA IN THE PUBLIC CLOUD
Computer implemented systems and methods are provided for securing data. In some embodiments, a system for securing data may comprise one or more processors...
2018/0083930 READS FOR DISPERSED COMPUTATION JOBS
A method for execution by one or more processing modules of one or more computing devices of a dispersed storage network (DSN). The method begins by receiving,...
2018/0083929 SESSION NEGOTIATIONS
A plurality of devices are each operable to provide information that is usable for to prove authorization with any of the other devices. The devices may have...
2018/0083928 SYSTEMS AND METHODS FOR PROTECTING INTERNET ADVERTISING DATA
Systems and methods are disclosed for protecting user privacy in, for example, online advertising environments. The method includes receiving data related to a...
2018/0083927 SYSTEM AND METHOD EMPLOYING AN AGILE NETWORK PROTOCOL FOR SECURE COMMUNICATIONS USING SECURE DOMAIN NAMES
A system for connecting a first network device and a second network device includes one or more servers. The servers are configured to: (a) receive, from the...
2018/0083926 System and Methods for Point to Point Encryption and Tokenization
Mechanisms for providing point to point encryption and tokenization enabling decryption, tokenization and storage of sensitive encrypted data on one system are...
2018/0083925 PACKET FLOW IN AN OVERLAY NETWORK
A computer program product for transmitting data flow in a network between two resources using a processing circuit to perform a method which includes...
2018/0083924 SECURE MESSAGE HANDLING OF AN APPLICATION ACROSS DEPLOYMENT LOCATIONS
A method and system for secure message handling of an application across deployment locations. The application is divided into multiple processing nodes which...
2018/0083923 INTERCONNECTING EXTERNAL NETWORKS WITH OVERLAY NETWORKS IN A SHARED COMPUTING ENVIRONMENT
A method includes obtaining, by one or more processor, data from a virtual network of a tenant and an identifier of the tenant, where the virtual network of...
2018/0083922 FIREWALL POLICY MANAGEMENT
Methods and systems are provided for creation and implementation of firewall policies. According to one embodiment, a firewall maintains a log of observed...
2018/0083921 STRING SEARCH AND MATCHING FOR GATE FUNCTIONALITY
Fast string search and matching is critical for many security tasks in particular if these have "gate functionality" for instance as found in access control...
2018/0083919 GTLD DOMAIN NAME REGISTRIES RDAP ARCHITECTURE
Provided is a method for providing Registration Data Access Protocol ("RDAP") responses. The method includes obtaining, at a RDAP client over a network, a RDAP...
2018/0083918 INFORMATION PROCESSING SYSTEM, PROXY SERVER, ADDRESS DUPLICATION PREVENTION METHOD, AND COMPUTER-READABLE...
Provided is an information processing system capable of preventing duplicate allocation of an IP address. The information processing system includes: a DHCP...
2018/0083917 Topology Based Internet Protocol (IP) Addressing
IP addresses may be allocated to devices in an industrial control system by applying starting address information in combination with each device's relative...
2018/0083916 Internet Protocol (IP) Addressing Using an Industrial Control Program
A system is provided in which a position for each device (relative to other devices) in a topology, and a corresponding device ID for each device, may be...
2018/0083915 SCIM to LDAP Mapping Using Subtype Attributes
A method for mapping SCIM resources to LDAP entries is provided. An LDAP Directory Information Tree (DIT), including a plurality of LDAP DIT entries that...
2018/0083914 COMMUNICATION APPARATUS, SERVER APPARATUS, COMMUNICATION SYSTEM, COMPUTER PROGRAM PRODUCT, AND COMMUNICATION METHOD
According to an embodiment, a communication apparatus includes a communication unit and an output unit. The communication unit is configured to receive an...
2018/0083913 APPARATUS AND METHOD FOR MANAGING NOTIFICATION
A method for managing notifications in an electronic device is provided. The method may include displaying at least one notification message, associated with a...
2018/0083912 Method and System for Presenting Event Notifications In a Social Media Environment
Embodiments of the present disclosure provide a method and system for providing notification of events. Specifically, embodiments disclosed herein describe a...
2018/0083911 Platform Show Pages
In one embodiment, a method includes determining available shows from one or more content sources, providing at least a portion of the available shows for...
2018/0083910 Advice and Polling Methods and Systems
A computerized polling system is provided. The polling system allows a polling user to ask a question posed to a plurality of answering users. The first user...
2018/0083909 Systems And Methods For Providing A Notification Upon The Occurrence Of A Trigger Event Associated With Playing...
The disclosed embodiments include systems and methods for providing a notification upon the occurrence of a trigger event associated with playing media content...
2018/0083908 NOTIFICATIONS OF ACTION ITEMS IN MESSAGES
In some implementations, a method includes extracting completion criteria of an action item and parameters of the completion criteria from a message portion of...
2018/0083907 Methods and Systems for Presenting Modules in an Inbox Interface
Exemplary embodiments relate to improvements in the design of a messaging inbox. The inbox may display different units or "modules" for providing a user with...
2018/0083906 MODULAR INBOX AND GENERATION OF CONTENT MODULES
Exemplary embodiments relate to improvements in the design of a messaging inbox. The inbox may display different units or "modules" for providing a user with...
2018/0083905 MODULE RANKING FOR A MODULAR INBOX
Exemplary embodiments relate to improvements in the design of a messaging inbox. The inbox may display different units or "modules" for providing a user with...
2018/0083904 MESSAGING CLIFF FOR A MODULAR INBOX
Exemplary embodiments relate to improvements in the design of a messaging inbox. The inbox may display different units or "modules" for providing a user with...
2018/0083903 SPAM FILTERING IN MULTIMODAL MOBILE COMMUNICATION
A method for filtering multimodal messages includes receiving an electronic message; enriching the electronic message; extracting one or more features from the...
2018/0083902 AUTOMATED RELEVANCE ANALYSIS AND PRIORITIZATION OF USER MESSAGES FOR THIRD-PARTY ACTION
Techniques are provided for performing automated operations to analyze incoming user messages. An indication of a message sent to a recipient user is received....
2018/0083901 AUTOMATIC RESPONSE SUGGESTIONS BASED ON IMAGES RECEIVED IN MESSAGING APPLICATIONS
Implementations relate to automatic response suggestions based on images received in messaging applications. In some implementations, a computer-executed...
2018/0083900 UNIFORM RESOURCE IDENTIFIER AND IMAGE SHARING FOR CONTEXTUAL INFORMATION DISPLAY
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for generating, in response to a single input operating...
2018/0083899 Management System for Audio and Visual Content
Systems, apparatuses, and methods for managing message content are provided. In one embodiment, a method includes receiving, by one or more computing devices,...
2018/0083898 SUGGESTED RESPONSES BASED ON MESSAGE STICKERS
Implementations relate to automatic suggested responses based on message stickers provided in a messaging application. In some implementations, a ...
2018/0083897 Instant Message User Management
Techniques are disclosed for improving management of user information in instant messaging systems. Expiration criteria are defined, whereby one or more users...
2018/0083896 MODULAR INBOX SURFACE FOR CONTENT DELIVERY
Exemplary embodiments relate to improvements in the design of a messaging inbox. The inbox may display different units or "modules" for providing a user with...
2018/0083895 SYSTEM AND METHOD FOR TRANSMITTING A RESPONSE IN A MESSAGING APPLICATION
Techniques for transmitting a response in a messaging application via a notification can include receiving, at a computing device having one or more...
2018/0083894 BOT INTERACTION
Systems, methods and computer readable media for bot interaction are described. For example, some implementations can include a computer-executed method...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.