Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0183811 EMAIL BASED SLAs MANAGEMENT FOR EFFECTIVE BUSINESS
A method includes determining that a message sent using a sender account to a first user account of an email application is unopened for a first predetermined...
2018/0183810 Data Collaboration
A method and system are provided for enabling collaborative access to a data object. The method comprises establishing an access control policy, the access...
2018/0183809 UNIVERSAL LOGIN AUTHENTICATION SERVICE
A system and method enables secure login at linked sites with a universal ID (UID) and possibly different or same password to linked identities. In such...
2018/0183808 MEDICAL DEVICE WITH INPUT UNIT
A medical device has a device component with an operating state controllable by predefining a predefined value for an operating parameter. A data network...
2018/0183807 METHOD FOR AUDITING CLOUD ACCESS IN REAL TIME
A method for auditing cloud access in real time includes steps of Step 1: client obtains necessary information from a synchronization server (SYS), by...
2018/0183806 GUEST ACCESS PROVISIONING
Example implementations may relate to a policy management system that may receive, from a scheduling application, a request to provision access for a guest....
2018/0183805 SYSTEM AND METHOD OF AUTHORIZATION OF SIMPLE, SEQUENTIAL AND PARALLEL REQUESTS WITH MEANS OF AUTHORIZATION...
This invention provides a system and a method for the authorization of simple, sequential and parallel requests, such transactions are preferably of the...
2018/0183804 SYSTEMS AND METHODS FOR MANAGING ELECTRONIC TOKENS FOR DEVICE INTERACTIONS
Systems and methods are provided for managing electronic tokens for device interactions. In some embodiments, a unified graphical user interface is provided...
2018/0183803 SECURE COMPUTING SYSTEM RECORD ACCESS CONTROL
A computing system record security architecture comprises, in one example, a record generation component configured to generate a record in a computing system,...
2018/0183802 RESOURCE-DRIVEN DYNAMIC AUTHORIZATION FRAMEWORK
Embodiments concern a dynamic authorization framework. Security Classification Process (SCP) is the process of classifying raw data, information extracted from...
2018/0183801 METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR MANAGING ACCESS PERMISSIONS FOR A SEARCHABLE ENTERPRISE...
Embodiments of the present invention provide methods, systems, apparatuses, and computer program products for managing access permissions for a searchable...
2018/0183800 CHOOSING OBJECT NAMES BASED ON STORAGE UNIT (SU) AND/OR MEMORY DEVICE AVAILABILITY
A computing device includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational...
2018/0183799 METHOD AND SYSTEM FOR DEFENDING AGAINST MALICIOUS WEBSITE
A system for defending against malicious website includes an intelligent module and a deploying module. The intelligent module collects and stores information...
2018/0183798 METHOD AND SYSTEM FOR CLASSIFYING NETWORK REQUESTS
Methods, systems and programming for classifying network requests. In one example, a network request for content to be fetched by a content server is received...
2018/0183797 SYSTEMATIC ENHANCEMENT OF CONTACT INFORMATION
A system for systematically enhancing consumer and business contact information is disclosed. A server located "in the cloud" systematically controls a...
2018/0183796 ONBOARDING AND ACCOUNTING OF DEVICES INTO AN HPC FABRIC
A method to onboard a slave node to a high performance computing system that includes a fabric switch network that includes a fabric switch master and a group...
2018/0183795 PROVIDING AUTHENTICATION INFORMATION FROM AN ONLINE SYSTEM TO A CLIENT DEVICE TO ALLOW THE CLIENT DEVICE TO...
A client device including an application associated with an online system transmits information identifying the client device to the online system when the...
2018/0183794 SYSTEMS AND METHODS FOR CLOUD BASED UNIFIED SERVICE DISCOVERY AND SECURE AVAILABILITY
Systems and methods implemented by an application executed on a user device for service discovery and connectivity include discovering one or more cloud...
2018/0183793 CROSS-REGION REQUESTS
A request is received by a user in a second region. The request, which is digitally signed with credential associated with the user in the second region causes...
2018/0183792 EXPANDED iOS.RTM. DEVICE CAPABILITY
A method includes receiving a request from a host device to authenticate a device. The method further includes transmitting authenticating data to the host...
2018/0183791 REMOTE COMMUNICATION SYSTEM, REMOTE COMMUNICATION METHOD, AND RECORDING MEDIUM
A remote communication system authenticates each of a plurality of first communication terminals by using first authentication information of each of the...
2018/0183790 CLOUD-BASED ONBOARDING OF CLOUD-CONTROLLED WI-FI NETWORK DEVICES
A cloud-based onboarding server receives first identification information associated with a network device, from a wireless station authenticated to the...
2018/0183789 FABRIC ASSISTED IDENTITY AND AUTHENTICATION
Context-based authentication in a secure network comprised of multiple interconnected programmable devices is described. One technique includes receiving, from...
2018/0183788 ELECTRONIC APPARATUS, CONTROL AUTHORITY AUTHENTICATION METHOD THEREOF AND USER TERMINAL APPARATUS
An electronic apparatus is provided. The electronic apparatus includes a communicator configured to communicate with a guest terminal apparatus requesting...
2018/0183787 METHODS AND SYSTEMS FOR VALIDATING AN INTERACTION
Methods and systems for validating an interaction between a user and a service provider system are disclosed. Electronically-stored credential data for the...
2018/0183786 Dual Authentication using a Password Card
A method and apparatus for providing and processing two-factor authentication using a Password Card. There is a need to increase security during the...
2018/0183785 SYSTEMS AND METHODS FOR MANAGING SECURE SHARING OF ONLINE ADVERTISING DATA
Systems and methods are disclosed for managing online advertising data secure sharing. One method includes receiving, at a server, a request for proprietary...
2018/0183784 AUTOMATED PRODUCTION OF CERTIFICATION CONTROLS BY TRANSLATING FRAMEWORK CONTROLS
A compliance application automatically produces certification controls by translating framework controls. The framework controls are common certification...
2018/0183783 PUSH NOTIFICATION ACTIVATION
A mobile computing device is operated to receive a trigger at a first instance. The trigger may be associated with a predefined condition or event or action....
2018/0183782 Single Sign-On for Interconnected Computer Systems
Methods, systems, and computer-readable media support provisioning a computer application that is executed on an associated computing component through a...
2018/0183781 RELAY APPARATUS, COMMUNICATION APPARATUS AND RELAY METHOD
A relay apparatus is connected to a communication apparatus, a service providing apparatus and a browser-equipped apparatus. The relay apparatus includes: a...
2018/0183780 METHOD FOR ESTABLISHING PROTECTED ELECTRONIC COMMUNICATION, SECURE TRANSFER AND PROCESSING OF INFORMATION AMONG...
A method of establishing protected electronic communication, secure transfer and processing of information among three or more subjects in which, at first, a...
2018/0183779 Multi-Level User Device Authentication System for Internet of Things (IOT)
The present invention describes the user authentication system comprising of multiple levels of security which is used to authorize the user. The system uses...
2018/0183778 METHOD AND SYSTEM FOR ESTABLISHING TRUSTED COMMUNICATION USING A SECURITY DEVICE
Method and system for secure access from a security device at a local network location to a remote network location are disclosed. At the security device...
2018/0183777 METHODS AND SYSTEMS FOR USER AUTHENTICATION
Methods and systems for passwordless authenticating of a user are provided. A first request to access a first content is received from a first user of a first...
2018/0183776 DIGITAL COMMUNITY SYSTEM
A method includes receiving, via a network, a join request from a client device for a user to access a digital community. The join request includes a...
2018/0183775 METHOD AND SYSTEM FOR PROVIDING A PRE-LAUNCHED VIRTUAL DESKTOP SESSION
The present disclosure relates to a method and system for providing a pre-launched virtual desktop session by a smart scheduling server. The smart scheduling...
2018/0183774 KEY DISTRIBUTION IN A DISTRIBUTED COMPUTING ENVIRONMENT
A key distribution service operated by a signature authority distributes one-time-use cryptographic keys to one or more delegates that generate digital...
2018/0183773 ENCRYPTED COMMUNICATION SYSTEM AND METHOD FOR CONTROLLING ENCRYPTED COMMUNICATION SYSTEM
An encrypted communication system includes on-board devices configured to perform encrypted communication with a server located outside a vehicle. Each of the...
2018/0183772 METHOD OF PERFORMING SECURE COMMUNICATION AND SECURE COMMUNICATION SYSTEM
In a method of performing secure communication between at least two devices, a first security session is formed between a first device and a second device...
2018/0183771 KEY REVOCATION
A signature authority generates revocable one-time-use keys that are able to generate digital signatures. The signature authority generates a set of...
2018/0183770 Device and Method of Handling Mobile Data Transmissions in a Wireless Communication System
A first communication device for transmitting data to a second communication device comprises a storage device for storing instructions and a processing...
2018/0183769 CONTROL SYSTEM AND CONTROL METHOD
A control system comprises a server and a gateway. The server is configured to encrypt a control signal according to a public key for generating a first...
2018/0183768 SYSTEMS AND METHODS FOR PRIVACY IN DISTRIBUTED LEDGER TRANSACTIONS
Systems and methods for privacy in distributed ledger transactions are disclosed. In one embodiment, in an information processing apparatus comprising at least...
2018/0183767 SECURITY KEY GENERATION AND MANAGEMENT METHOD OF PDCP DISTRIBUTED STRUCTURE FOR SUPPORTING DUAL CONNECTIVITY
The present disclosure relates to a pre-5.sup.th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond...
2018/0183766 DETECTING AND MITIGATING FORGED AUTHENTICATION OBJECT ATTACKS USING AN ADVANCED CYBER DECISION PLATFORM
A system for detecting and mitigating forged authentication object attacks is provided, comprising an authentication object inspector configured to observe a...
2018/0183765 METHOD OF SECURING AUTHENTICATION IN ELECTRONIC COMMUNICATION
A method of securing authentication in electronic communication between at least one user authentication mechanism and at least one server authentication...
2018/0183764 COLLECTING AND PROCESSING CONTEXTUAL ATTRIBUTES ON A HOST
Some embodiments of the invention provide a novel architecture for capturing contextual attributes on host computers that execute one or more machines, and for...
2018/0183763 Multi-Tunneling Virtual Network Adapter
Multiple virtual private network connections to be created without the need for administrative privileges, and network traffic to be routed using a single...
2018/0183762 SECURE EXECUTION AND TRACKING OF WORKFLOWS IN A PRIVATE DATA CENTER BY COMPONENTS IN THE CLOUD
One or more embodiments provide techniques for executing a workflow in a private data center. The cloud data center receives a request from a user. The cloud...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.