Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0097820 MANAGING CONTENT UPLOAD AND CONTENT RETRIEVAL
A method for managing content upload and content retrieval is provided. The method includes receiving a first content for upload to a first address in a first...
2018/0097819 SYSTEM, METHOD AND COMPUTER READABLE MEDIUM FOR DETERMINING USERS OF AN INTERNET SERVICE
An internet service provider (ISP) is configured to analyze data sent by a user to determine a subscriber account associated with the data and a user...
2018/0097818 ENHANCED ACCESS SECURITY GATEWAY
A first login request of a user is received from a first login window. The first login request comprises a login name, a user identifier, and a challenge. The...
2018/0097817 GENERATING SHORT-TERM SIGNATURES FOR ACCESSING CLOUD STORAGE
Securely storing assets in a cloud computer storage service. Preparation to store assets for a user may comprise determining a location to store the assets,...
2018/0097816 ACCESS CONTROL MECHANISMS BASED ON COMPUTATIONAL BEHAVIOR
A method of authorizing a user to access a resource over a communication network includes receiving over a communication network from a computing device...
2018/0097815 PREDICTING CHARACTERISTICS OF USERS OF A THIRD PARTY SYSTEM THAT COMMUNICATES WITH AN ONLINE SYSTEM AND...
An online system maintains characteristics for its users and may access characteristics of users maintained by a third party system. The online system may...
2018/0097814 Method and Apparatus for Prioritization of Data Requests
A data center determines whether requested content is available at the data center. The content is available when the content is both present at the data...
2018/0097813 CROSS-SITE REQUEST FORGERY (CSRF) PREVENTION
A computer program product for cross-site request forgery (CSRF) prevention is provided and includes a computer readable storage medium having program...
2018/0097812 DEVELOPER BASED DOCUMENT COLLABORATION
Organizations maintain and generate large amounts of documentation and entities of these organizations often need to collaborate on generating and reviewing...
2018/0097811 SYSTEM AND METHOD FOR DELEGATION OF PERMISSIONS TO A THIRD PARTY
A system and method for delegating permissions to a third party are presented. A request to access a first computing resource of a computer server is received...
2018/0097810 SYSTEM AND METHOD FOR DEPROVISIONING
A method, computer program product, and computer system for identifying a first user in a network. Access to at least a portion of the network is available to...
2018/0097809 SECURING ACCESS TO CLOUD COMPONENTS
Particular embodiments described herein provide for receiving a request from a first cloud component in a cloud network, wherein the request is to access a key...
2018/0097808 DISTRIBUTED AUTHENTICATION WITH THRESHOLDS IN IOT DEVICES
Managing authentication of a child device includes receiving, by a host device, sensor data from a child device, deriving simplified authentication data from...
2018/0097807 METHOD AND APPARATUS FOR PERFORMING INITIAL ACCESS PROCEDURE BASED ON AUTHENTICATION IN WIRELESS COMMUNICATION...
In the present invention, a method and an apparatus for performing initial access procedure based on authentication in a wireless communication system are...
2018/0097806 MULTI FACTOR USER AUTHENTICATION ON MULTIPLE DEVICES
Systems and methods of the present invention provide for a first and second client computer configured to receive and transmit an authentication credential and...
2018/0097805 Pharmacy Authentication Methods and Systems
An electronic image that includes information identifying a user of a client device is received, as is another electronic image that captures the face of the...
2018/0097804 DRIVER IDENTIFICATION AND AUTHENTICATION SYSTEMS AND METHODS
A method for processing a security authorization is disclosed. The method comprises capturing biometric data with a scanning apparatus of the authentication...
2018/0097803 DETECTING MALICIOUS USAGE OF CERTIFICATES
The misuse of public key, private key, and public/private key certificates poses significant security challenges to computer networks that are addressed by...
2018/0097802 MICROSERVICES BASED MULTI-TENANT IDENTITY AND DATA SECURITY MANAGEMENT CLOUD SERVICE
A system provides cloud-based identity and access management. The system receives a request for performing an identity management service, where the request...
2018/0097801 ESTABLISHING A TRUSTED LOGIN PROCEDURE
A first login request for the first service is received at a first server that provides a first service and from a terminal. Device identifier information of...
2018/0097800 IDENTIFYING USERS BASED ON FEDERATED USER IDENTIFIERS
An online system receives a variety of identifiers associated with a user of the online system and generates a federated list of identifiers for the user that...
2018/0097799 APPARATUSES, SYSTEMS AND METHODS FOR TRACKING NETWORK CONNECTED DEVICES
Apparatuses, systems and methods for tracking network connected devices includes the steps of determining whether a device is associated with an identifier. If...
2018/0097797 METHOD, SYSTEM AND DEVICE FOR GENERATING, STORING, USING, AND VALIDATING NFC TAGS AND DATA
A smart tag and methods of interacting with and authenticating interactions with the same are provided. The smart tag is enabled to generate a Tag...
2018/0097796 LOCATION DETERMINATION FOR USER AUTHENTICATION
User authentication techniques based on geographical locations associated with a client device are provided. An example method for authentication of the client...
2018/0097795 SHARED TERMINAL AND DISPLAY CONTROL METHOD
A shared terminal includes circuitry, a receiver, and a transmitter. The circuitry accepts a turning-on to a power switch of the shared terminal that has been...
2018/0097794 TIMING ARRAY AS CREDENTIALS
A multi-dimensional approach can be used to verify a password. In addition to requiring the input of the correct password, the timing at which the characters...
2018/0097793 SECONDARY AUTHENTICATION USING USER'S LOGIN STATUS
A method is described for storing a plurality of access tokens, each access token associated with a respective login credential of a plurality of login...
2018/0097792 TRACKING USER ACTIVITY FOR DIGITAL CONTENT
High conversion rate content can be displayed with primary content from one or more publishers in order to determine whether the content is being displayed to...
2018/0097791 METHOD AND SYSTEM FOR SECURELY TRANSMITTING VOLUMES INTO CLOUD
A first computing device is provided for transmitting one or more volumes via a secured connection. The first computing device includes a controller that is...
2018/0097790 SYSTEMS AND METHODS TO AUTHENTICATE USERS AND/OR CONTROL ACCESS MADE BY USERS ON A COMPUTER NETWORK BASED ON...
A controller for user authentication and access control, configured to: store data representing a graph having: nodes representing data elements associated...
2018/0097789 TIME-BASED NETWORK AUTHENTICATION CHALLENGES
Techniques for time-based network authentication challenges are disclosed. In some embodiments, a system, process, and/or computer program product for...
2018/0097788 INTERCEPT-BASED MULTIFACTOR AUTHENTICATION ENROLLMENT OF CLIENTS AS A NETWORK SERVICE
Techniques for intercept-based multifactor authentication client enrollment as a network service are disclosed. In some embodiments, a system, process, and/or...
2018/0097787 MULTIFACTOR AUTHENTICATION AS A NETWORK SERVICE
Techniques for multifactor authentication as a network service are disclosed. In some embodiments, a system, process, and/or computer program product for...
2018/0097786 AUTOMATED DELIVERY OF SECURITY CREDENTIALS TO SCHEDULED CREW
A system for delivering to one or more crewmember computing devices a security credential for accessing a management interface of an electronics system of a...
2018/0097785 SCALABLE SECURITY KEY ARCHITECTURE FOR NETWORK ENCRYPTION
An example method of key management for encryption of traffic in a network having a network nodes includes negotiating, between a first network node and a...
2018/0097784 STREAM SPLITTING MOVING TARGET DEFENSE
Systems and methods for utilizing stream splitting Moving Target Defense (MTD) to provide enhanced computer system communication system security by splitting a...
2018/0097783 INFORMATION MASKING USING CERTIFICATE AUTHORITY
An apparatus for use in a digital messaging system includes a storage device and a processor coupled to the storage device. The storage device storing software...
2018/0097782 SINGLE POINT OF CUSTODY SECURE DATA EXCHANGE
A semi-complete secure data container is associated with a unique identifier by a requesting entity but is void of data. The data container, and a request to...
2018/0097781 DEVICE FOR MANAGING MULTIPLE ACCESSES TO A SECURE MODULE OF A SYSTEM ON CHIP OF AN APPARATUS
A device for managing multiple accesses to a secure module of a system on chip of an apparatus, and comprises a stream ciphering means arranged for computing...
2018/0097780 DE-IDENTIFYING DISTRIBUTED BRIDGING NETWORK PLATFORM
Computer implemented systems and methods are presented comprising a platform coordinating data flows between data acquisition, data transformation and data...
2018/0097779 METHOD AND SYSTEM FOR PROVIDING A TRANSACTION FORWARDING SERVICE IN BLOCKCHAIN IMPLEMENTATIONS
A method of providing a transaction forwarding service in a blockchain includes executing a smart contract in the blockchain so as to determine whether a...
2018/0097778 USE OF STATELESS MARKING TO SPEED UP STATEFUL FIREWALL RULE PROCESSING
A novel method for stateful packet classification that uses hardware resources for performing stateless lookups and software resources for performing stateful...
2018/0097777 METHOD OF BUILDING A FIREWALL FOR NETWORKED DEVICES
A device is provided to perform secure operations in a network that includes multiple devices. The device comprises multiple processor cores; multiple physical...
2018/0097776 NETWORK PROTECTION ENTITY AND METHOD FOR PROTECTING A COMMUNICATION NETWORK AGAINST FRAUD MESSAGES
A network protection entity for protecting a communication network against fraud messages includes: a physical interface comprising a connection trunk...
2018/0097775 DYNAMIC PROVISIONING OF A FIREWALL ROLE TO USER DEVICES
A system and method of providing security service to a mobile traffic network are provided. A local network group comprising a plurality of user devices that...
2018/0097774 MULTI-PERIMETER FIREWALL IN THE CLOUD
Systems and methods for providing multi-perimeter firewalls via a virtual global network are disclosed. In one embodiment the network system may comprise an...
2018/0097773 Message Processing Method, Apparatus, and System
A message processing method, apparatus, and system, where the method includes sending, by a Dynamic Host Configuration Protocol for Internet Protocol version 6...
2018/0097772 CONTENT DELIVERY OPTIMIZATION USING ADAPTIVE AND DYNAMIC DNS
Systems, methods, and computer program products for determining network characteristics are provided. The network characteristics may be used to facilitate...
2018/0097771 Device, Network, and Method for Communications with Spatial-specific Sensing
A device, a network, and a method for wireless communication are provided. In an embodiment, the method, performed by a first communication node, includes...
2018/0097770 Delaying a social media post
A social media application, platform, or computer system facilitating same presents a user with an option to post information later, as opposed to immediately....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.