Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0176209 V2X Certificate Management
Concepts and technologies disclosed herein are directed to vehicle-to-everything ("V2X") certificate management. According to one aspect of the concepts and...
2018/0176208 SYSTEM AND METHODS FOR WEAK AUTHENTICATION DATA REINFORCEMENT
Systems and methods for weak authentication data reinforcement are described. In some embodiments, authentication data is received in a request to authenticate...
2018/0176207 Approach For Accessing Third-Party Content Collaboration Services On Interactive Whiteboard Appliances Using...
An approach for managing collaboration on IWBs allows users of different third-party collaboration services to participate in collaboration meetings on IWBs....
2018/0176206 Dynamic Data Protection System
A dynamic data protection system may include a data management server includes a processor and a non-transitory memory device storing instructions that cause...
2018/0176205 SYSTEM AND METHOD FOR AUTOMATIC SERVICE DISCOVERY AND PROTECTION
A system for automatically discovering services operating on a network including a service discovery database configured to store expected service behavioral...
2018/0176204 INDEPENDENT ADMINISTERING OF VERIFIED USER-CONTROLLED ELECTRONIC IDENTIFICATIONS UTILIZING SPECIFICALLY...
In some embodiments, the instant invention provides for a central identification management computer system that includes at least: a computer programmed with...
2018/0176203 TECHNIQUES FOR PROVIDING AUTHENTICATION INFORMATION TO EXTERNAL AND EMBEDDED WEB BROWSERS
Representative embodiments set forth herein disclose techniques for enabling a client application to supplement its features by utilizing the functionalities...
2018/0176202 DEVICE FOR ENCRYPTING AND/OR DECRYPTING PACKETS AND METHOD FOR ROUTING PACKETS IN MEMORY NETWORK INCLUDING THE SAME
A device transmits or receives a packet in a memory network including one or more processors and/or one or more memory devices. The device includes a key...
2018/0176201 Device, Method, and Computer Program Product For Security Data Communication
The invention relates to devices, methods, and computer program products for secure data communication according to a network protocol having a plurality of...
2018/0176200 AUTOMATIC GENERATION OF UNIQUE IDENTIFIERS FOR DISTRIBUTED DIRECTORY MANAGEMENT USERS
A controller is configured to perform various steps including receiving a plurality of user identification values. Another step includes determining a first...
2018/0176199 SECURE SHELL PUBLIC KEY AUDIT SYSTEM
A system for auditing authorized key files associated with secure shell (SSH) servers is disclosed. In an example, the system may include a purpose-built SSH...
2018/0176198 DUAL PHYSICAL CHANNEL SECURE CONNECTION
Various systems and methods for initiating a communication session are provided herein. A system for initiating a communication session includes a transmitter...
2018/0176197 Dynamic Data Protection System
A dynamic data protection system may include a data management server includes a processor and a non-transitory memory device storing instructions that cause...
2018/0176196 SYSTEM, APPARATUS AND METHOD FOR MIGRATING A DEVICE HAVING A PLATFORM GROUP
A method for migrating logical devices from one Internet of Things (IoT) device to another includes: receiving, by a first IoT device having a first platform...
2018/0176195 PASSWORD MANAGEMENT SYSTEM AND PROCESS
The present disclosure provides a password management process and system. The updating of the password data in the process and system is performed based, at...
2018/0176194 SERVICE PROCESSING METHOD AND APPARATUS
The disclosure relates to a service processing method and apparatus. The method includes: setting up, by a proxy node, a first encrypted connection to UE, and...
2018/0176193 SECURE DATA DISTRIBUTION OF SENSITIVE DATA ACROSS CONTENT DELIVERY NETWORKS
A computing resource service provider may operate a secure proxy fleet within a content delivery network. The secure proxy fleet may protect sensitive data...
2018/0176192 SECURE DATA EGRESS FOR SENSITIVE DATA ACROSS NETWORKS
A computing resource service provider may operate a secure proxy fleet responsible for directing network traffic from one or more backend services to one or...
2018/0176191 EFFICIENT FORWARDING OF ENCRYPTED TCP RETRANSMISSIONS
A network device receives TCP segments of a flow via a first SSL session and transmits TCP segments via a second SSL session. Once a TCP segment has been...
2018/0176190 Location Control and Access Control of Emails
A sender device includes a non-transitory memory storage comprising instructions and a location control policy, and a processor coupled to the memory. The...
2018/0176189 In-Session Splitting Of Network Traffic Sessions For Server Traffic Monitoring
Methods and systems are disclosed that provide in-session splitting of network traffic sessions for monitoring of traffic between network clients and network...
2018/0176188 Network Monitoring Apparatus, and Remote Encryption and Remote Activation Method, Device and System Thereof
A network monitoring apparatus, and a remote encryption and remote activation method, device and system thereof are provided. The method includes the following...
2018/0176187 SECURE DATA INGESTION FOR SENSITIVE DATA ACROSS NETWORKS
A computing resource service provider may operate a secure proxy fleet responsible for directing network traffic to one or more backend services. The network...
2018/0176186 NETWORK POLICY UPDATE WITH OPERATIONAL TECHNOLOGY
A network security system monitors data traffic being transmitted between a first device and a second device in a network to identify a plurality of commands...
2018/0176185 FIREWALL RULE MANAGEMENT FOR HIERARCHICAL ENTITIES
System and method for managing firewall rules for hierarchical entities modify a processing order of the firewall rules to be executed in a distributed...
2018/0176184 COLLECTING FIREWALL FLOW RECORDS OF A VIRTUAL INFRASTRUCTURE
In a computer-implemented method for collecting firewall flow records, firewall flow records are received from a plurality of data end nodes of a virtualized...
2018/0176183 MANAGING FIREWALL FLOW RECORDS OF A VIRTUAL INFRASTRUCTURE
In a computer-implemented method for managing firewall flow records, firewall flow records of a virtual infrastructure including a distributed firewall are...
2018/0176182 Active Firewall Control For Network Traffic Sessions Within Virtual Processing Platforms
Methods and systems are disclosed that provide active firewall control for network traffic sessions within virtual processing platforms. Client agent instances...
2018/0176181 ENDPOINT ADMISSION CONTROL
In an example, there is disclosed a network switch, including: an ingress interface; an egress interface; an endpoint repository network interface; and one or...
2018/0176180 CONFIGURING INTERACTIONS WITH A FIREWALL SERVICE VIRTUAL MACHINE
For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel virtualization architecture for utilizing a firewall...
2018/0176179 Data Ferry Systems, Devices and Methods
A computing machine, methods and devices for operating a data ferry as a secure data link from a secured computer not connected to a WAN network to a browser...
2018/0176178 SYSTEM FOR MEDIATING CONNECTION
Disclosed herein is a system for mediating connection for assisting a first node of a network for NAT traversal. The system for mediating connection includes...
2018/0176177 METHOD FOR MANAGING SERVICE CHAINING AT A NETWORK EQUIPMENT, CORRESPONDING NETWORK EQUIPMENT
A network equipment comprising at least one access point interface and configured to operate a plurality of network functions, the network equipment being...
2018/0176176 DNS RESOLUTION OF OVERLAPPING DOMAINS IN A MUTLI-TENANT COMPUTING ENVIRONMENT
A method and associated systems for a multi-tenant DNS mechanism. A multi-tenant computing environment hosts multiple private overlay networks, each of which...
2018/0176175 SYSTEMS AND METHODS FOR CREATING AND ACCESSING COLLABORATIVE ELECTRONIC MULTIMEDIA COMPOSITIONS
Systems and methods for production of a collaborative electronic multimedia composition allow an initiator to select a collaboration template and multiple...
2018/0176174 SCALABLE MESSAGING SYSTEM
A system and method provides a computer-implemented messaging service. Users subscribe to message channels. A message queue buffers messages to a router. The...
2018/0176173 DETECTING EXTRANEOUS SOCIAL MEDIA MESSAGES
A social network server system may receive a social media message that is to be posted at the social network server system, the social media message being...
2018/0176172 SYSTEMS AND METHODS FOR SHARING CONTENT
Systems, methods, and non-transitory computer-readable media can present a content item on a display. A composer is presented with the content item on the...
2018/0176171 PREDICTIVE ELECTRONIC MESSAGE MANAGEMENT SYSTEMS AND CONTROLLERS
Systems, methods, and articles of manufacture provide for interaction management (IM) data processing that allows for automated analysis of, response to,...
2018/0176170 SYSTEMS AND METHODS FOR ELECTRONIC MESSAGE PRIORITIZATION
Systems and methods for prioritizing electronic messages in an electronic message repository are disclosed. According to one embodiment, a method may include...
2018/0176169 Messaging Aggregator Selection Based On Message Priority
In one embodiment, a method includes determining a reliability score for multiple message aggregators and calculating a rank score for each of the message...
2018/0176168 VISUAL FEEDBACK SYSTEM
A method of providing a visual feedback system may include providing an application programming interface (API) by which a third party electronic device...
2018/0176167 EMAIL CHAIN NAVIGATION
Technical solutions are described to arbitrarily order and access email messages based on text analysis and social network analysis. One general aspect...
2018/0176166 SHORT MESSAGE COMMUNICATION WITHIN A MOBILE GRAPHICAL MAP
In one embodiment, a computer-implemented process is programmed or configured to allow a first mobile device to generate and send enriched pin data to a...
2018/0176165 THIRD PARTY MESSAGING SYSTEM FOR MONITORING AND MANAGING DOMAIN NAMES AND WEBSITES
A method is disclosed for a domain name registrar or a website hosting provider to authenticate a user as having authority to manage an account. The user may...
2018/0176164 SELECTIVE COMMUNICATION OF MESSAGES
A message originator may generate messaging data for selective communication by a messaging provider via an interface generated by a browser software...
2018/0176163 AUTOMATIC SUMMARIZATION OF EMAILS AND GENERATION OF SUBJECT LINES
Embodiments include techniques for performing automated email summarization and subject line generation. The technique includes determining, by a computing...
2018/0176162 VOICE ENABLED SOCIAL ARTIFACTS
A user is prompted to select a social site for generating a voice enabled social artifact. A user selection of the social site is received. Responsive to...
2018/0176161 METHOD FOR TRACKING AND ROUTING FINANCIAL MESSAGES FOR MOBILE DEVICES
A financial messaging apparatus configured to encapsulate and transmit a financial message along with actions to a mobile device. The actions relate to rules...
2018/0176160 COMPUTERIZED SYSTEM AND METHOD FOR AUTOMATICALLY COMMUNICATING CONDITIONAL MESSAGES WITHIN A MOBILE APPLICATION...
Disclosed are systems and methods for improving interactions with and between computers in content searching, generating, hosting and/or providing systems...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.