Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0131702 Secondary Asynchronous Background Authorization (SABA)
A system for identify threats to the security of an owner's electronic information by performing a secondary background authorization (SABA) that is...
2018/0131701 Position and Authenticate Wi-Fi Users to Enhance Wi-Fi Security Control and Management
An approach is provided that receives, from a radio frequency identification (RFID) tag included with a device, at least three different charge times. Each of...
2018/0131700 IN-VEHICLE NETWORK SYSTEM
An in-vehicle network system includes a plurality of first controllers; a plurality of first communication lines, the first communication lines being...
2018/0131699 METHOD AND APPARATUS FOR PROVIDING PROFILE
Provided are a communication method and system that integrate 5G communication systems with IoT technologies to support higher data rates after 4G systems. The...
2018/0131698 SECURE DATA ACCESS
Technologies are generally disclosed for methods and systems for providing secure document storage and retrieval services. In an example embodiment, a method...
2018/0131697 HARDWARE COMPONENTS CONFIGURED FOR SECURE PHYSICAL SEPARATION OF COMMUNICATION NETWORKS IN A VEHICLE AND...
In some embodiments, the present invention provides for a hardware component that includes at least the following: a logic cell; where the logic cell is...
2018/0131696 SYSTEMS AND METHODS FOR PROVIDING DYNAMIC AUTHORIZATION
Systems, methods, and computer-readable media are disclosed for providing dynamic authorization by receiving requests for access to a resource or configuration...
2018/0131695 METHODS AND SYSTEMS USING TRUST-BUT-VERIFY DYNAMIC QUALITY-OF-SERVICE (QOS)
Exemplified system and method optimizes dynamic Quality of Service (QoS) operation across a network infrastructure to alleviate time constraints when applying...
2018/0131694 PROVISION OF ACCESS TO A NETWORK
Disclosed is a method for granting access for a device to a private local network with a gateway device. The method includes: establishing a connection over...
2018/0131693 SYSTEMS AND METHODS FOR CREATING AND DISPLAYING AN ELECTRONIC COMMUNICATION DIGEST
Systems and methods are disclosed for creating an electronic communication digest. In one implementation, a system receives a first electronic communication...
2018/0131692 SYSTEM AND A METHOD FOR APPLYING DYNAMICALLY CONFIGURABLE MEANS OF USER AUTHENTICATION
The present invention provides a method for dynamically adjusting authentication procedure of user access to an authorizing entity or action using a...
2018/0131691 FRAMEWORK FOR EXECUTING OPERATIONS ON SYSTEMS
Methods and system are disclosed that execute an operation associated with a system. In one aspect, upon receiving a request to execute an operation, a...
2018/0131690 Utilizing a Trusted Platform Module (TPM) of a Host Device
Techniques for utilizing a trusted platform module of a host device are described. According to various embodiments, a client device that does not include a...
2018/0131689 IOT DEVICE AUTHENTICATION
The disclosed technology is generally directed to device authentication in an IoT environment. For example, such technology is usable in authenticating IoT...
2018/0131688 METHOD, APPARATUS, AND SYSTEM FOR REMOTELY ACCESSING CLOUD APPLICATIONS
Disclosed herein are methods, apparatuses, and systems for remotely accessing cloud applications. In one embodiment, the method comprises receiving an access...
2018/0131687 Layered Certification
A certification provenance tree (CPT) structure may provide information concerning a layered certification of a device that comprises a hierarchy of...
2018/0131686 SELECTIVELY ENABLING MULTI-FACTOR AUTHENTICATION FOR MANAGED DEVICES
Disclosed are various examples of selectively enabling multi-factor authentication for applications on managed devices. An identity provider receives an...
2018/0131685 NON-INTRUSIVE SECURITY ENFORCEMENT FOR FEDERATED SINGLE SIGN-ON (SSO)
The technology disclosed relates to non-intrusively enforcing security during federated single sign-on (SSO) authentication without modifying a trust...
2018/0131684 Delegated Authorization for Isolated Collections
Examples of the present disclosure describe systems and methods of delegating authorization to access isolated collections of data. In aspects, a request to...
2018/0131683 AUTO-USER REGISTRATION AND UNLOCKING OF A COMPUTING DEVICE
The subject technology provides for detecting, by a first computing device, a second computing device being within a predetermined distance of the first...
2018/0131682 METHOD OF PUSHING PASSWORDS, AND PUSHING SYSTEM
A method of pushing passwords, and a pushing system are provided. The method includes establishing a sharing cryptographic library which stores a plurality of...
2018/0131681 User to User Content Authentication
Devices, systems and methods for authenticating a user to access electronic content include use of a processor configured to identify a technical condition for...
2018/0131680 SYSTEM, METHOD AND APPARATUS FOR SELECTING CONTENT FROM WEB SOURCES AND POSTING CONTENT TO WEB LOGS
A method, system and apparatus for selecting, displaying, managing, tracking tagging and transferring access to specific content of Internet web pages and...
2018/0131679 Method and Device for Establishing a Computational Puzzle for Use in Communication Between a Client and a Server
The disclosure relates to a method (20) for a serving device (3) of establishing a computational puzzle for use in communication between a client device (2)...
2018/0131678 Managing Idempotent Operations while Interacting with a System of Record
Managing idempotent operations is provided. A request to perform an operation on a system of record is received from a client via a network. An idempotency...
2018/0131677 BALANCING PUBLIC AND PERSONAL SECURITY NEEDS
Apparatus and methods for balancing public and personal security needs in a computing device (1). In an apparatus embodiment, the device (1) comprises a first...
2018/0131676 CODE ENCRYPTION
A device receives a privacy template from a network node. The device forms a temporary privacy mask using a time-varying value and the privacy template; and...
2018/0131675 FIREWALL RULE CREATION IN A VIRTUALIZED COMPUTING ENVIRONMENT
Example methods are provided for a network management entity to perform firewall rule creation in a virtualized computing environment. The method may comprise...
2018/0131674 DATA LEAK PROTECTION
Methods and systems for Data Leak Prevention (DLP) in an enterprise network are provided. According to one embodiment, a network security device maintains a...
2018/0131673 INTERNET PROTOCOL OVER A CONTENT-CENTRIC NETWORK (IPoC)
Internet Protocol (IP) over a content/name/information centric network is contemplated, such as for devices, software or other entities lacking capabilities...
2018/0131672 METHOD AND SYSTEM FOR ENABLING MEDIA OPTIMIZATION IN A CLOUD CONFERENCE
An example method is provided and includes receiving a relay address allocation request from an endpoint, the relay address allocation request comprises a...
2018/0131671 DYNAMIC LOCAL MEDIA ACCESS CONTROL (MAC) ADDRESS ASSIGNMENT
A device implementing a dynamic local media access control (MAC) address assignment system may include at least one processor that is configured to initiate a...
2018/0131670 SYSTEM AND METHOD FOR TRANSMITTING OVER MULTIPLE SIMULTANEOUS COMMUNICATION NETWORKS BY USING POINT-TO-POINT...
A system and method for controlling simultaneous communications over a plurality of communication networks that employs Point-to-Point Protocol over Ethernet...
2018/0131669 PROVIDING CONTENT TO DEVICES IN A CLUSTER
Methods, systems, and apparatus, include computer programs encoded on a computer-readable storage medium, and include a method for providing content. The...
2018/0131668 REGISTERING FOR INTERNET-BASED PROXY SERVICES
A domain name is received from a customer. DNS is queried for multiple possible subdomains of the domain. For each subdomain that resolves, information about...
2018/0131667 SYSTEMS AND METHODS TO VERIFY OWNERSHIP OF A TELEPHONE NUMBER AND TO TRACK OWNERSHIP REASSIGNMENTS
The ownership verification and reassignment tracking solution of the present disclosure can be used to identify if a telephone number belongs to a stated...
2018/0131666 EFFICIENT STORAGE OF NETWORK DISCOVERY RANGES
A system includes a computing device communicatively connectable with network devices via a network. The computing device has a processor and a storage device...
2018/0131665 Resolving Domain Name System (DNS) Requests Via Proxy Mechanisms
Systems and methods are described herein for providing proxy mechanisms for DNS services, such as resolving DNS requests. In some embodiments, the systems and...
2018/0131664 DATA TRANSMISSION METHOD AND ELECTRONIC DEVICE FOR SUPPORTING THE SAME
An electronic device includes a display, a communication interface, a processor electrically connected with the display and the communication interface, and a...
2018/0131663 Systems and Methods to Control the Lifetime of Online Posts
Systems and methods to control the lifetime of social networking posts. The viewable range and/or duration of a post is determined as a function (e.g.,...
2018/0131662 ELECTRONIC MESSAGE ORGANIZATION VIA SOCIAL GROUPS
A mechanism for automatically organizing electronic messages is described herein. Social groups of a particular user that may be representative of topics,...
2018/0131661 INFORMATION PUSHING METHOD, APPARATUS, AND SYSTEM
The present disclosure provides an information pushing method, server, and storage medium. The method includes: obtaining first behavioral data of a user...
2018/0131660 MANAGING DIGITAL MESSAGES ACROSS A PLURALITY OF SOCIAL NETWORKING GROUPS
One or more embodiments of the disclosure include a digital multi-group messaging system that manages digital messages across a plurality of social networking...
2018/0131659 Generating Relationship Maps in Online Social Networks
Disclosed herein are system, method, and computer program product embodiments creating and expanding family maps through an online social-networking system. An...
2018/0131658 SUBSCRIPTION TRANSFER
One or more computing devices, systems, and/or methods for transferring subscriptions are provided. For example, a user (e.g., and/or a device associated with...
2018/0131657 Displaying Interactive Notifications on Touch Sensitive Devices
The disclosed embodiments include a method for providing interactive notification elements. A device receives a first message and displays a first notification...
2018/0131656 TAKING ACTIONS ON NOTIFICATIONS USING AN INCOMPLETE DATA SET FROM A MESSAGE
An apparatus, a system, and a method in which a message notification application such as an e-mail notification application resident in a first memory on a...
2018/0131655 THIRD PARTY APPLICATION CONFIGURATION FOR ISSUING NOTIFICATIONS
Methods, systems, and apparatus, including computer programs encoded on a computer-readable storage medium for implementing one or more application programming...
2018/0131654 SYSTEM AND METHOD FOR DETECTING GEO-LOCATIONS IN SOCIAL MEDIA
A method of determining locations for social media postings may include: retrieving, by communicating with at least one application programming interface (API)...
2018/0131653 DYNAMIC FILTER GENERATION FOR MESSAGE MANAGEMENT SYSTEMS
Filtering rules for incoming messages can be dynamically generated by a message management service based on patterns in the user's behavior. The message...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.