Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,350,728 Method and system for generating and authorizing dynamic password
A method and system for generating and authorizing a dynamic password, which relate to the field of identity authentication. The method comprises: a token...
US-9,350,727 System and a method for validating an identification token
An Identification Device for providing validation information. The Identification Device includes a Token and a Validator. The display is adapted to display,...
US-9,350,726 Recovery from rolling security token loss
An aspect of recovery from rolling security token loss includes storing, in a memory device accessible by a server computer, a token pair (B) transmitted to a...
US-9,350,725 Enabling access to a secured wireless local network without user input of a network password
A method includes identifying, at a security device of a secured wireless network, a wireless-enabled device that is not authorized to access the secured...
US-9,350,724 Authentication server system for performing control of notifications during service use, control method, and...
When authentication processing is performed without requesting a user to input authentication information and receiving the authentication information in...
US-9,350,723 Determination and classification of defense measures in web applications
Techniques for determining classifications of defense measures as described herein. Security tokens are identified to be used to test defense measures of a web...
US-9,350,722 Authentication of an end user
A method and system for authenticating an end user. A selected subset of root nodes of a set of root nodes in a server mask is received, the selected subset of...
US-9,350,721 Air interface security method and device
Provided is an air interface security method. In the process of protocol transmission, the method executes: 1) a short-range coupling device sending a security...
US-9,350,720 Delegating authorizations
Delegation of authorizations from one device to another device is contemplated. The contemplated capabilities may enable an authenticated device to confer...
US-9,350,719 Device, information processing terminal, information processing system, display control method, and recording...
A device includes an operation unit; a first processing unit sending a display request; a detection unit detecting a change of an authentication state of a...
US-9,350,718 Using representational state transfer (REST) for consent management
A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to...
US-9,350,717 Location service for user authentication
A method and apparatus for location authentication of the user are disclosed. In the method and apparatus, the location of the user is authenticated if one or...
US-9,350,716 System and method for authentication of a communication device
A system and method for authentication of a communication device is disclosed. A system that incorporates teachings of the present disclosure may include, for...
US-9,350,715 Methods and apparatus for network communications via a transparent security proxy
A data security device for providing a network transport connection via a transparent network proxy that employs different encryption security mediums along a...
US-9,350,714 Data encryption at the client and server level
Embodiments of the present invention include a computer system and computer program product for implementing encryption of data. A computer system determines...
US-9,350,713 System and method for encrypting traffic on a network
According to embodiments of the present invention a system and method for encrypting traffic on a network is disclosed. Encrypted data is transmitted between a...
US-9,350,712 Packet analysis apparatus and method and virtual private network server
A packet analysis apparatus and method and a VPN server, which secure evidence against a situation in which a hacker disguises a packet as a normal packet to...
US-9,350,711 Data transmission method, system, and apparatus
A data transmission method is applied in a virtual private network (VPN) and includes: querying, by an initiating client, a VPN server for external network...
US-9,350,710 Intelligent, cloud-based global virtual private network systems and methods
A method includes connecting to a client at a Virtual Private Network (VPN) device in a cloud system; forwarding requests from the client for the Internet or...
US-9,350,709 Synchronizing a routing-plane and crypto-plane for routers in virtual private networks
Techniques are presented herein for optimizing secure communications in a network. A router in a virtual private network determines whether or not it has...
US-9,350,708 System and method for providing secured access to services
A system and method for providing authenticated access to an initiating terminal in relation to the services provided by a terminating terminal via a...
US-9,350,707 System and method for detecting a compromised computing system
A digital security threat management system is disclosed. The system detects the presence of a computing system, on a network, that has been compromised by an...
US-9,350,706 Network traffic data scrubbing with services offered via anycasted addresses
Novel tools and techniques for filtering network traffic in an anycasting environment includes receiving network traffic addressed to a plurality of anycasted...
US-9,350,705 Methods and systems for providing a token-based application firewall correlation
Token-based firewall functionality. A request is received for access to a resource from a remote user device, the request received by an application firewall. A...
US-9,350,704 Provisioning network access through a firewall
A method may include determining one or more rules and communicating the one or more rules to a firewall, where the firewall receives a data unit and...
US-9,350,703 Enforcement of network-wide context aware policies
A method implemented in an edge router, the method comprising receiving an authentication request from a device, forwarding the authentication request to an...
US-9,350,702 Virtual insertion into a network
A network appliance is virtually inserted in a data path within a network. Packet data that matches a criteria is intercepted at a logical point within the data...
US-9,350,701 Method and apparatus for extending remote network visibility of the push functionality
An approach is provided for extending remote network visibility for push functionality. An application is transmitted, via a push agent, from a first network to...
US-9,350,700 Watermark generator, watermark decoder, method for providing a watermark signal in dependence on binary message...
A watermark generator for providing a watermark signal in dependence on binary message data includes an information processor configured to provide, in...
US-9,350,699 Scalable NAT traversal
A system and method for traversing a firewall for a voice-over-IP session or other communication session uses four main components: a relay agent, and NAT...
US-9,350,698 Computer program product and system for double IP address recovery
A computer program product and computer system for double IP address recovery. Double IP address is a situation of a same IP address for different hosts in a...
US-9,350,697 Providing network addresses for network nodes
Methods, systems, and apparatus for providing network addresses are disclosed. In one aspect, a network element device in a telecommunication network includes a...
US-9,350,696 Handling NAT in logical L3 routing
A non-transitory machine readable medium storing a program that configures first and second managed forwarding elements to perform logical L2 switching and L3...
US-9,350,695 Method for transferring and storing CPM service message and service thereof
A method is described for transferring a converged IP messaging (CPM) service based message using a server. The server transmits one or more messages via a...
US-9,350,694 Method and apparatus for propagating address change in an email
There is provided a system, method and computer program product for managing an email comprising a plurality of email boxes with corresponding email addresses;...
US-9,350,693 Method and apparatus for cross device notifications
A method and apparatus for providing cross device notifications. A cross notification component is provided in multiple devices. In some devices, the cross...
US-9,350,692 Integration of email and persistent conversations
Systems, methods and computer readable media for persistent conversation and email integration are described. Some implementations can include a method...
US-9,350,691 Information processing system, linkage server, and information processing method
An information processing system 1 includes an acquiring unit 20 that acquires business-operation information in response to a request from a mobile terminal...
US-9,350,690 User perception of electronic messaging
Determining user use context for electronic messaging and disseminating a subset of the user use context to recipients and/or senders of such electronic message...
US-9,350,689 Systems and methods for protecting header fields in a message
Embodiments of the systems and methods described herein facilitate the transmitting, receiving, and processing of encoded messages wherein the header fields in...
US-9,350,688 Fatigue control-based message float-out method, system and instant messaging client
Embodiments of the present application relate to a method of controlling float-out messages, a system for controlling float-out messages, an instant messaging...
US-9,350,687 Instant messaging transcript sharing for added participants to an instant messaging session
Embodiments of the present invention address deficiencies of the art in respect to instant messaging and provide a method, system and computer program product...
US-9,350,686 Data access device and method for communication system
A data access device for a communication system includes: a write controller controlled by the host and outputting a write pointer; a read controller controlled...
US-9,350,685 Network switch connected to a sensor
A system comprises a rack and a network switch contained in the rack. The switch comprises a plurality of ports. The system further comprises a movable access...
US-9,350,684 Packet network routing
A line card for use in a router or packet switch is disclosed. A problem with conventional routers or packet switches is that they can take over a second to...
US-9,350,683 Reliable bulk data dissemination using rateless codes
In one embodiment, an aggregating node receives feedback messages from one or more destination nodes in the network. The destination nodes are designated to...
US-9,350,682 Compute instance migrations across availability zones of a provider network
A provider network may implement compute instance migrations across availability zones. Compute instances may be located in a particular availability zone of...
US-9,350,681 System and method for distributed management of cloud resources in a hosting environment
Some embodiments provide a method of managing cloud resources on several of nodes of a hosting system. The method receives a cloud resource configuration. The...
US-9,350,680 Protection switching over a virtual link aggregation
One embodiment of the present invention provides a switch. The switch comprises one or more ports and a link management module. The link management module...
US-9,350,679 Sequence number retrieval for voice data with redundancy
A sequence number is used to indicate where a payload of a voice data packet should fit in a data stream and a technique is described for retrieving the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.