Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,344,433 Unregistered user account generation for content item sharing
Various embodiments of the present technology involve the sharing of a content item though a synchronized content management system (CMS) without requiring a...
US-9,344,432 Network layer claims based access control
Embodiments of the invention provide techniques for basing access control decisions at the network layer at least in part on information provided in claims,...
US-9,344,431 System and method for assessing an application based on data from multiple devices
Disclosed herein is a system and method for efficiently gathering information about applications for mobile communications devices (e.g., smartphones, netbooks,...
US-9,344,430 Resource-centric authorization schemes
A first request to change a permission of a first user for accessing a first resource is received via a service application programming interface (API) of an...
US-9,344,429 Network apparatus based on content name and method for protecting content
A content protection method includes generating content protection information regarding a content to be protected by a content producer, and generating a...
US-9,344,428 Method and system for digitally certifying the association between an entity and a place
A method of processing data in order to digitally certify the association of at least one entity with a place, the method comprising the receipt of at least one...
US-9,344,427 Facilitating multiple authentications
Techniques and constructs to facilitate multiple authentications of passwords are described. For instance, the disclosure describes systems and processes that...
US-9,344,426 Accessing enterprise resources while providing denial-of-service attack protection
Techniques for accessing enterprise resources while providing denial-of-service attack protection may include receiving, at a gateway from a client device, a...
US-9,344,425 Dynamic object creation and certificate management
Systems and methods that facilitate dynamic directory service object creation and certificate management are discussed. One such method can include discovering...
US-9,344,424 Authorizing access by a third party to a service from a service provider
Systems and methods are provided for authorizing third-party access to a specific service from a service provider. In an example embodiment, a server system...
US-9,344,423 System and method for user identification and authentication
Systems and methods for user identification and authentication are disclosed. In one embodiment, a method of authenticating a first party to a second party may...
US-9,344,422 Method to modify android application life cycle to control its execution in a containerized workspace environment
Methods, devices, and systems are described to modify the life cycle of a Google Android.RTM. application, in its application manifest file and byte code, such...
US-9,344,421 User access authentication based on network access point
Systems and methods of authenticating user access based on an access point to a secure data network include a secure data network having a plurality of a...
US-9,344,420 Systems and methods for deploying rich internet applications in a secure computing environment
Systems and methods for deploying rich internet applications in a secure computing environment. An example distributed computer system may comprise: a first...
US-9,344,419 Methods of authenticating users to a site
Systems and methods for user authentication within federated computing systems are provided. In a session, a user can be authenticated multiple times by...
US-9,344,418 Systems and methods for inhibiting attacks with a network
Systems and methods for inhibiting attacks with a network are provided. In some embodiments, methods for inhibiting attacks by forwarding packets through a...
US-9,344,417 Authentication method and system
An authenticating method including establishing trust between an authentication provider and service provider; establishing trust between the authentication...
US-9,344,416 File vault and cloud based document notary service
In one embodiment, a trusted cloud service such as an "electronic vault" may store records of a consumer's electronic data file history. These documents may...
US-9,344,415 Authentication method of accessing data network and electronic device therefor
Disclosed is an electronic device and an authentication method performing therein. The authentication method includes transmitting a first address to a service...
US-9,344,414 User similarity provision method
A user similarity provision method for providing mobile communication devices with information about common interests among first and second users of the mobile...
US-9,344,413 Methods and systems for device disablement
A method for disabling a device associated with a virtual identity may include receiving, from the device, a request to use the virtual identity, where the...
US-9,344,412 Security key management in IMS-based multimedia broadcast and multicast services (MBMS)
A system, method, and nodes for managing shared security keys between a User Equipment, UE, an authentication node such as an SCF/NAF, and a service node such...
US-9,344,411 Key handling in communication systems
In a method for key handling in mobile communication systems, first and second numbers are exchanged between entities of the mobile communication system. The...
US-9,344,410 Telecommunication method for securely exchanging data
The invention provides for a telecommunication method of securely exchanging unencrypted data between a telecommunications device and a first server computer...
US-9,344,409 Method and apparatus for masking non-public data elements in uniform resource indentifiers ("URI")
Methods may display a URI of a resource. Methods may determine the presence of a non-public data element in the URI. Methods may generate a random number in...
US-9,344,408 Cloud-basd digital verification system and method
A method for formal verification of a digital circuit using a cloud-based verification engine. The method comprises extracting a proof problem from a design of...
US-9,344,407 Centrally managed use case-specific entity identifiers
Disclosed are various embodiments for centrally managed use case-specific entity identifiers. An identifier translation service receives an identifier...
US-9,344,406 Information processing device, information processing method, and computer program product
According to an embodiment, an information processing device includes an event processor and a first determining unit. The event processor includes an event...
US-9,344,405 Optimized transport layer security
A method for establishing a secure communication session over communication paths between one or more client devices and one or more server computers according...
US-9,344,404 System and method for synchronizing connection credentials
In one embodiment, a method includes establishing a connection with an access-point (AP) device via a first communication path. The method further includes...
US-9,344,403 Industrial network security
A private overlay network is introduced into an existing core network infrastructure to control information flow between private secure environments. Such a...
US-9,344,402 Method, device, and system for automatically selecting IPV6 address transmission mode
A method, device, and system for automatically selecting an IPv6 address transmission mode are provided. The method includes a Gateway General Packet Radio...
US-9,344,401 Methods and systems for providing translations of data retrieved from a storage system in a cloud computing...
A method for providing translations of data retrieved from a storage system in a cloud computing environment includes receiving, by an interface object...
US-9,344,400 System and methods of installing and operating devices without explicit network addresses
A method of discovering addressing information of one or more upstream devices to respond to specific messages by a second device on behalf of the one or more...
US-9,344,399 Relay server and relay communication system
A relay server stores a routing apparatus belonging to a VPN group to which the relay server itself belongs, a second routing object address that is an address...
US-9,344,398 Communicating between clients at same location according to predetermined naming convention with location-based...
A method of automatic hostname configuration includes receiving a request from a client device. A location detection module may be utilized for determining a...
US-9,344,397 Client aware DHCP lease management
The management of DHCP address leased based on client properties is described. According to a method of operation, clients are managed in a wireless digital...
US-9,344,396 System and method for persistent multimedia conferencing services
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for managing a virtual meeting room communication session. The method...
US-9,344,395 Subscription groups in publish-subscribe system
Disclosed is a technology for publishing subscriptions in a publish-subscribe system in accordance with subscription groups. The technology may include (i)...
US-9,344,394 System for facilitating thread-based message prioritization
To perform thread-based message prioritization, metadata may be extracted from a received electronic message. Based on the extracted message metadata and...
US-9,344,393 Secure end-to-end transport through intermediary nodes
A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second...
US-9,344,392 Location sensitive messaging
Methods including computer program products for receiving a request from a first device, the request incorporating a message. One or more users from a first set...
US-9,344,391 High density hosting for messaging service
Aspects of the subject matter described herein relate migrating message for a messaging service. In aspects, a determination is made that messages need to be...
US-9,344,390 Systems and methods for electronic document review
Systems and methods enable convenient and accurate searching, filtering, reviewing, and classification of electronic documents without the loss of metadata. A...
US-9,344,389 Split transcript view for business object integration into messaging
Embodiments of the present invention address deficiencies of the art in respect to messaging and provide a method, system and computer program product for...
US-9,344,388 System and method for integrating an address book with an instant messaging application in a mobile station
This relates to a method for operating a mobile station. The method includes grouping two or more member addresses into a group. The group is presented as a...
US-9,344,387 Analysis of content sharing in a messaging platform
A system and method for message analysis, including: receiving, from a client device, a reporting request identifying a first broadcasted message authored by a...
US-9,344,386 Methods and apparatus for providing distributed load balancing of subscriber sessions in a multi-slot gateway
A method and apparatus for providing load balancing of subscriber session in a multi-slot gateway employing utilization counts are disclosed. A process of load...
US-9,344,385 Asynchronous pipelined interconnect architecture with fanout support
Circuits comprising an asynchronous programmable interconnect with fan out support that include a multi-port switch and a first and second buffer-switch...
US-9,344,384 Inter-packet interval prediction operating algorithm
An appliance receives packets that are part of a flow pair, each packet sharing an application protocol. The appliance determines an estimated application...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.