Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,338,176 Systems and methods of identity and access management
The present disclosure generally provides systems and methods of providing identification and access management. The system could include a network security...
US-9,338,175 Methods and systems for providing comprehensive cyber-security protection using an open application programming...
Methods of providing cyber-security services to a plurality of customers include providing a platform that includes a software program that is configured to run...
US-9,338,174 Systems and methods for inhibiting attacks on applications
In accordance with some embodiments of the present invention, systems and methods that protect an application from attacks are provided. In some embodiments of...
US-9,338,173 Methods and apparatuses for avoiding damage in network attacks
Methods and apparatuses in a client terminal and a web server for enabling safe communication between said terminal and server. When the terminal obtains a web...
US-9,338,172 Enhanced IPsec anti-replay/anti-DDOS performance
A method for authenticating an Internet Protocol Security (IPsec) packet, wherein the method comprises, receiving the IPsec packet via an input port, performing...
US-9,338,171 Method and apparatus for controlling access to resources
An approach is provided for controlling access to resources according to social connections and/or characteristics of the resources. An access control platform...
US-9,338,170 On board vehicle media controller
The present disclosure describes a microprocessor executable media controller operable to receive a media stream from a remote node, the received media stream...
US-9,338,169 System for managing resources accessible to a mobile device server
A system that incorporates teachings of the present disclosure may include, for example, a non-transitory computer-readable storage medium operating in a mobile...
US-9,338,168 Method and device for controlling digital living network alliance contents
The present document provides a method and apparatus for controlling digital living network alliance contents. One Media Access Control (MAC) recording unit is...
US-9,338,167 Self-service terminal (SST) thin client
Self-Service Terminal (SST) thin clients and operation thereof are provided. A SST includes an operating system (OS), and authorized thin-client application,...
US-9,338,166 System and method for a single request and single response authentication protocol
Various embodiments of a system and method for a single request and single response authentication protocol are described. A client may send to an...
US-9,338,165 Common internet file system proxy authentication of multiple servers
Techniques are described for a proxy system to provide a client device with transparent access to multiple network file servers. The proxy system may appear to...
US-9,338,164 Two-way authentication using two-dimensional codes
A system for two-way authentication using two-dimensional codes is provided herein. The system includes a memory and a processor coupled to the memory. The...
US-9,338,163 Method using a single authentication device to authenticate a user to a service provider among a plurality of...
A method for authenticating a user to a provider, among a plurality of providers. The method uses an authentication device comprising, for each of provider, a...
US-9,338,162 CAPTCHA challenge incorporating obfuscated characters
A method for determining if a user of a computer system is a human. A processor receives an indication that a computer security program is needed and acquires...
US-9,338,161 System and method for biometric protocol standards
An initial certificate is provided that enables an initial two-way secured communication session between a user computing device and a trusted server. An...
US-9,338,160 Certificate checkin service
A method and system for a content provider to enable the consumption of content by properly entitled consumers (e.g., end-users, clients, customers) within a...
US-9,338,159 Method and apparatus for sharing wireless network subscription services
A method, apparatus and computer program product are provided for enabling multiple mobile terminals to access a subscription service. The method may further...
US-9,338,158 System and method for secure content sharing and synchronization
A flexible content sharing system may comprise a network based application built on a client device using information from dissociated user experience component...
US-9,338,157 Credential technology
In one implementation, a server system receives, from a device of a user, a request to add a credential issued by an organization and authentication information...
US-9,338,156 System and method for integrating two-factor authentication in a device
A system and method for providing secondary-factor authentication with a third party application that can include enrolling a device application instance of an...
US-9,338,155 Security device provisioning
The provisioning of a security token object to a user is disclosed. The security token object is used for accessing a computing resource through a mobile...
US-9,338,154 Authentication apparatus, authentication method, and non-transitory computer readable medium storing program
An authentication apparatus includes a detection unit that detects whether or not communication with a portable storage medium storing identification...
US-9,338,153 Secure distribution of non-privileged authentication credentials
An authentication credentials push service (ACPS) that securely pushes non-privileged authentication credentials to registered client entities. The ACPS...
US-9,338,152 Personal control of personal information
A personal information server provides personal information about an individual to a third-party only when authorized by the individual through use of a...
US-9,338,151 Method and device for controlling the execution of at least one function in a short range wireless...
A method and device for controlling the execution of at least one function in a short-range wireless communication module of a mobile apparatus adapted for...
US-9,338,150 Content-centric networking
Methods of content-centric networking, a client, a server and a non-transitory computer-readable storage device storing a computer program product are...
US-9,338,149 DLNA/DTCP stream conversion for secure media playback
A process for converting a DTCP-IP transport stream into HLS format, comprising receiving an encrypted DTCP-IP transport stream comprising DTCP frames at a...
US-9,338,148 Secure distributed information and password management
A method, performed by a computer device, may include receiving an indication that a first user has acquired rights to access a digital content; generating a...
US-9,338,147 Secure communication secret sharing
Embodiments are directed to sharing secure communication secrets with a network monitoring device (NMD). The NMD may passively monitor network packets...
US-9,338,146 Method and apparatus for monitoring transmission characteristics in a network
A method for monitoring transmission characteristics in a network including a media client, a media server, and a data processor, the method including...
US-9,338,145 Security patch without changing the key
A method of patching a cryptographic implementation without changing a key in a cryptographic system, including: sending a message from a first message set to...
US-9,338,144 System and method for operating on streaming encrypted data
Method for data privacy in a distributed communication system includes: receiving first and second encrypted data from first and second client terminals, each...
US-9,338,143 Stateless web content anti-automation
A computer-implemented method for coordinating content transformation includes receiving, at a computer server subsystem and from a web server system, computer...
US-9,338,142 Method for verifying the security of a device that generates private and public cryptographic keys
A method for verifying the security of a device for generating private and public cryptographic keys. Such a method includes generating at least one pair of...
US-9,338,141 Embedded module system with encrypted token authentication system
Method and systems for accessing and providing protected content are disclosed herein. An example system includes a client configured to access a third-party...
US-9,338,140 Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-9,338,139 System, apparatus and method for encryption and decryption of data transmitted over a network
A method and system for securing data transmitted between a client device and a server by obtaining input text at an intermediate module, processing the input...
US-9,338,138 Method for hiding source of wireless sensor network and node
A method for hiding a source of a wireless sensor network and a node are provided. The method comprises: determining a first node having a shortest distance...
US-9,338,137 System and methods for protecting confidential data in wireless networks
Systems and methods can detect the unintended transfer of confidential data or confidential information over wireless networks. Further, systems and methods can...
US-9,338,136 Security key generation for simultaneous multiple cell connections for mobile device
A first security context is established between a given user computing device and a first network computing device associated with a first network cell of a...
US-9,338,135 Device, system and method of maintaining connectivity over a virtual private network (VPN)
Some demonstrative embodiments include devices, systems and/or methods of maintaining connectivity over a Virtual-Private-Network (VPN). For example, a system...
US-9,338,134 Firewall policy management
Methods and systems are provided for creation and implementation of firewall policies. Method of the present invention includes enabling a firewall device to...
US-9,338,133 Locating optimum security gateway
A method, system, and medium are provided for locating an optimal security gateway. A default gateway receives a request to access a macrocell. The default...
US-9,338,132 Providing notification of spam avatars
Provided are approaches for monitoring activities, movements, and other behavior patterns necessary to determine whether an avatar is a spam advertisement. A...
US-9,338,131 Information processing apparatus, control method for information processing apparatus, and storage medium
An information processing apparatus including a network controller which controls communication with an apparatus on a network includes a storage unit...
US-9,338,130 Apparatus and method to register Wi-Fi clients on a Wi-Fi network
Techniques are provided to enable the registration of an embedded device with a wireless network, such as a Wi-Fi network. An established client of the wireless...
US-9,338,129 Remote user computer control and monitoring
A computer-implemented monitoring method includes electronically determining destination naming conventions of packets passing out of a first computing device...
US-9,338,128 Controlling the status of network address space
Methods, computer systems, and computer readable media provide for automated control of the status of network address space. Blocks of networking address space...
US-9,338,127 Browser based hostname resolution for non-DNS (domain name service) and/or different DNS environments
Communication between (at least) two domains where domain name resolution for the first domain is not going to be available to clients in the second domain "as...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.