Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0109515 SYSTEM, SERVICE PROVIDING APPARATUS, CONTROL METHOD FOR SYSTEM, AND STORAGE MEDIUM
A client terminal includes a first acquisition unit configured to acquire, in response to a user, who has received a service provided by the second service...
2018/0109514 AUTHENTICATION-FREE CONFIGURATION FOR SERVICE CONTROLLERS
Embodiments generally relate to out-of-band management of a computing system. The present technology discloses enable a primary service controller to provide a...
2018/0109513 MOBILE BASED MULTI-CHANNEL CITIZEN ACCOUNT ORIGINATION IN DIGITAL ECONOMY
Gathering and verifying customer information via SMS and in-person representatives. A hash is received with customer account information from a business...
2018/0109512 MOBILE BASED MULTI-CHANNEL CITIZEN ACCOUNT ORIGINATION IN DIGITAL ECONOMY
Gathering and verifying customer information via SMS and in-person representatives. Customer account information is received, wherein the customer account...
2018/0109511 PRIVATE SIMULTANEOUS AUTHENTICATION OF EQUALS
A passphrase is assigned to an end user device for use in authenticating the end user device for a network using SAE. An identification of the end user device...
2018/0109510 SYSTEMS AND METHODS FOR GENERATING MULTI-DIMENSIONAL PASSWORD AND AUTHENTICATING THEREOF
Systems and methods for multi-dimensional password generation and authentication is provided. The method includes selecting a virtual reality (VR) environment,...
2018/0109509 SYSTEMS AND METHODS FOR LOGIN AND AUTHORIZATION
Systems and methods are provided for login and authorization. For example, a third-party terminal receives a login request from a user and sends an...
2018/0109508 SYSTEMS AND METHODS FOR DATA MANAGEMENT AND THE USE OF SALTS AND KEYS IN DATA ENCRYPTION/DECRYPTION
Methods and systems for encrypting sensitive information are disclosed comprising hashing sensitive information by a hash function and selecting a salt or key...
2018/0109507 SYSTEMS AND METHODS TO AUTHENTICATE USERS AND/OR CONTROL ACCESS MADE BY USERS ON A COMPUTER NETWORK USING A...
A controller for user authentication and access control, configured to: store data representing a graph having: nodes representing data elements associated...
2018/0109506 ABSTRACTING AN AUTHENTICATION SEQUENCE USING HTTP
An enterprise server is provisioned with an authentication response language, where the authentication response language allows the enterprise server to issue...
2018/0109505 AUTHENTICATING MOBILE APPLICATIONS USING POLICY FILES
Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, via a first server, a key pair and a policy...
2018/0109504 SYSTEM AND ASSOCIATED SOFTWARE FOR PROVIDING ADVANCED DATA PROTECTIONS IN A DEFENSE-IN-DEPTH SYSTEM BY...
The advanced data protection system is implemented by distributing data encryption across multiple isolated computing systems and using multi-factor...
2018/0109503 Method and System for Managing Communications in a System Comprising a Receiver Entity, a Sender Entity, and a...
It is provided a system comprising a sender entity, a receiver entity, and a network entity interposed between the sender entity and the receiver entity. The...
2018/0109502 SYSTEM AND METHOD FOR PROVIDING A PROXIED CONTACT MANAGEMENT SYSTEM
A system and method for providing a Proxied Contact Management System (PCMS) so that individual owners of personal contact data may control and manage the...
2018/0109501 MIGRATION CONTAINERS
Various systems and methods for provisioning migration containers are disclosed. A system includes a memory and a processor to generate a migration container...
2018/0109500 Secure Electronic Communication
Techniques are disclosed for secure electronic communication. Examples of metadata include identification of a relationship of a sender and receiver, timing of...
2018/0109499 OBFUSCATION OF EMAIL ADDRESSES
A method, apparatus, and computer program product are disclosed for facilitating two-way email communication in manner that obfuscates sender and recipient...
2018/0109498 SYSTEMS AND METHODS FOR IMPROVING HTTPS SECURITY
Systems and methods for HyperText Transfer Protocol (HTTP) HTTP Strict Transport (HSTS), are implemented by one or more servers associated with a gateway in a...
2018/0109497 METHOD OF UNBLOCKING EXTERNAL COMPUTER SYSTEMS IN A COMPUTER NETWORK INFRASTRUCTURE, DISTRIBUTED COMPUTER...
A method unblocks external computer systems for communication with secured processing computer systems in a computer network infrastructure. An instruction...
2018/0109496 LOCALIZED CONNECTIVITY MANAGEMENT FOR ISOLATION NETWORKS
In one embodiment, a networking device in a local area network (LAN) establishes a virtual network overlay in the LAN to redirect traffic associated with a...
2018/0109495 DISTRIBUTED AND CENTRALIZED MODES FOR ISOLATION NETWORKS
In one embodiment, a networking device in a local area network (LAN) receives an instruction from a server to form a virtual network overlay in the LAN that...
2018/0109494 BEHAVIOR ANALYSIS BASED DNS TUNNELING DETECTION AND CLASSIFICATION FRAMEWORK FOR NETWORK SECURITY
New and improved techniques for a behavior analysis based DNS tunneling detection and classification framework for network security are disclosed. In some...
2018/0109493 OVERLAY MANAGEMENT PROTOCOL FOR SECURE ROUTING BASED ON AN OVERLAY NETWORK
A method for creating a secure network is provided. The method comprises establishing an overlay domain to control routing between overlay edge routers based...
2018/0109492 ISOLATION NETWORKS FOR COMPUTER DEVICES
In one embodiment, a server instructs one or more networking devices in a local area network (LAN) to form a virtual network overlay in the LAN that redirects...
2018/0109491 NON-ELECTRONIC FIREWALL SYSTEM
A non-electronic firewall system may include a first computer isolated from any network, a second computer connected to a network, a display connected to the...
2018/0109490 ACTIVE AND PASSIVE METHOD TO PERFORM IP TO NAME RESOLUTION IN ORGANIZATIONAL ENVIRONMENTS
A system and method for performing IP to name resolution in organizational environments. IP addresses are determined for devices utilizing the corporate...
2018/0109489 Content delivery network (CDN) content server request handling mechanism with metadata framework support
To serve content through a content delivery network (CDN), the CDN must have some information about the identity, characteristics and state of its target...
2018/0109488 INTER-MODAL MESSAGING COMMUNICATION
Inter-modal messaging communication is described. In one embodiment, a method of communication includes receiving an electronic mail message to be distributed...
2018/0109487 SYSTEMS AND METHODS FOR RELAYING MESSAGES IN A COMMUNICATIONS SYSTEM
The various embodiments described herein include methods, devices, and systems for relaying messages in a communications system. In one aspect, a method is...
2018/0109486 MANAGING FOR-SALE GROUP POSTINGS
The present disclosure is directed toward systems and method for managing social networking system for-sale groups. For example, systems and method described...
2018/0109485 SOCIAL NETWORK COMMUNITIES
Disclosed are methods, apparatus, systems, and computer-readable storage media for providing access to communities of users in an online social network. In...
2018/0109484 Generating a Conversation in a Social Network Based on Mixed Media Object Context
A system and method for generating a conversation in a social network based on visual search results. A mixed media reality (MMR) engine indexes source...
2018/0109483 SYSTEM AND METHOD FOR GENERATING A USER STATUS AND AUTHENTICATING SOCIAL INTERACTIONS IN A COMPUTER NETWORK
Providing user status in a computer network includes storing associations of interaction indications to different interaction events, storing values for the...
2018/0109482 BIOMETRIC-BASED SENTIMENT MANAGEMENT IN A SOCIAL NETWORKING ENVIRONMENT
Disclosed aspects relate to biometric-based sentiment management in a social networking environment. A set of biometric data for an originating-user of an...
2018/0109481 DYNAMICALLY UPDATING CONTENT IN E-MAIL
Methods and systems of dynamically updating content in e-mail messages are described. In some embodiments, an e-mail message is generated. The e-mail message...
2018/0109480 TECHNIQUES TO SELECT AND PRIORITIZE APPLICATION OF JUNK EMAIL FILTERING RULES
Techniques to select and prioritize the application of spam filtering rules in a way that reduces processing time may include receiving an email message for a...
2018/0109479 TURN-BASED PICTORIAL CHATTING APPLICATION AND METHOD FOR PICTORIAL CHATTING INSTALLED IN USER TERMINAL
The present disclosure relates to a turn-based pictorial chat application and a method for a pictorial chatting installed in a user terminal, which comprises...
2018/0109478 LOSSY TEXT SOURCE CODING BY WORD LENGTH
According to one embodiment, a method for lossy data compression is provided. The method may also include determining a length and a plurality of bounding...
2018/0109477 METHODS, SYSTEMS, AND MEDIA FOR FACILITATING USER INTERACTIONS WHILE WATCHING MEDIA CONTENT
Methods, systems, and media for facilitating user interactions while watching media content are provided. In accordance with some embodiments, the method...
2018/0109476 Message Suggestions
A method may involve, for each of one or more messages that are selected from a plurality of messages from an account: (a) extracting one or more phrases from...
2018/0109475 VOICE AND TEXT GROUP CHAT DISPLAY MANAGEMENT TECHNIQUES FOR WIRELESS MOBILE TERMINALS
A single content region in a chat history display is used to display entries representative of a plurality of messages corresponding to all chat histories for...
2018/0109474 System and method for integrated private and public instant messaging
A computer-implemented method and system for providing users with an integrated private and public instant messaging solution. More particularly, users are...
2018/0109473 A METHOD OF EMULATING A MULTIPATH CONNECTION
A method of emulating a multipath connection, in which data packets sent or received by a given user equipment are intercepted by a plurality of concentrators...
2018/0109472 CONTROLLER, CONTROL METHOD AND PROGRAM
A controller, comprises: a first unit configured to identify a virtual machine(s) capable of providing a function(s) of a network node; a second unit...
2018/0109471 GENERALIZED PACKET PROCESSING OFFLOAD IN A DATACENTER
The present disclosure generally discloses packet processing offload support capabilities for supporting packet processing offload. The packet processing...
2018/0109470 INQUIRY-BASED ADAPTIVE PREDICTION
Predicting future utilization of a resource. The predicting future utilization of a resource may include receiving inquiries for a potential future utilization...
2018/0109469 SYSTEMS AND METHODS FOR CONTROLLING PROCESS PRIORITY FOR EFFICIENT RESOURCE ALLOCATION
Methods and systems for controlling process priority for one or more work units having one or more processes. The method includes monitoring a combination of a...
2018/0109468 SCHEDULING TRANSMISSIONS OF ADAPTIVE BITRATE STREAMING FLOWS
The present disclosure generally discloses a scheduling control capability for controlling scheduling of transmissions where adaptive bitrate streaming is used...
2018/0109467 TECHNIQUES FOR DYNAMICALLY ALLOCATING RESOURCES IN A STORAGE CLUSTER SYSTEM
Various embodiments are directed to techniques for dynamically adjusting a maximum rate of throughput for accessing data stored within a volume of storage...
2018/0109466 UTILIZING ACCESS CONTROL DATA STRUCTURES FOR SHARING COMPUTING RESOURCES
Systems and methods for sharing resources between multiple processing streams. An example method may comprise: maintaining, by a processing device, a first...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.