Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,380,083 Systems and methods of distributed silo signaling
The embodiments described herein recite a telephone communication system used for handling information such as messages, typically voice mail messages, and,...
US-9,380,082 Remote multi-party and/or event-driven visitation for residents of controlled-environment facilities
Remote multi-party and/or event-driven visitation for controlled-environment facilities. In some embodiments, a method may include receiving a request to...
US-9,380,081 Bidirectional network data replications
A system and method establishes bidirectional contact through firewall devices. A method includes establishing a first connection between a first device and a...
US-9,380,080 Session initiation for multimedia services
A method includes receiving, at a first communication service provider, a request (by a first device and including identification information associated with a...
US-9,380,079 Content multicasting
A multicast system is contemplated. The multicast system may be configured to facilitate changing between multicast steams by caching one multicast stream while...
US-9,380,078 Method and system to add video capability to any voice over internet protocol (Vo/IP) session initiation...
Systems and methods of configuring an add-on device to augment the capability of existing endpoint infrastructure are disclosed. In one embodiment, a video...
US-9,380,077 Switching between networks
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for switching between parallel networks. One of the methods...
US-9,380,076 Access management system
An access management system includes an access management server and one or more fulfillment servers associated with endpoint computers of a production computer...
US-9,380,075 System for supervising the security of an architecture
A method is provided for supervising security of an architecture having a plurality of interconnected clouds. A cloud includes a plurality of resources and a...
US-9,380,074 Unified generation of policy updates
User input mechanisms are displayed for defining a compliance policy update. A unified compliance policy update is generated according to a unified schema that...
US-9,380,073 Reputation system in a default network
A system and a method are disclosed for computing a reputation score for user profiles of a social network according to actions taken by user profiles of the...
US-9,380,072 System, method, and computer program for preventing infections from spreading in a network environment using...
A method for containing a threat in network environment using dynamic firewall policies is provided. In one example embodiment, the method can include detecting...
US-9,380,071 Method for detection of persistent malware on a network node
The present invention relates to methods and devices for detecting persistency of a first network node (12). In a first aspect of the invention, a method is...
US-9,380,070 Intrusion detection mechanism
In one embodiment, a method implemented on a node connected to a network bus includes: storing one or more message identifiers, the one or more identifiers...
US-9,380,069 Method and device for data transmission
Embodiments of the present disclosure provide a method and a device for data transmission. In the method, a network layer communication entity of a receiving...
US-9,380,068 Modification of computing resource behavior based on aggregated monitoring information
A computer system deploys monitoring agents that monitor the status and health of the computing resources. An analysis engine aggregates and analyzes event...
US-9,380,067 IPS detection processing method, network security device, and system
An IPS detection processing method, a network security device and a system are disclosed. The method includes: determining, by a network security device,...
US-9,380,066 Distributed traffic pattern analysis and entropy prediction for detecting malware in a network environment
Technologies are provided in embodiments to detect malware. The embodiments are configured to receive an entropy rate of a potentially affected system. The...
US-9,380,065 Systems and methods for identifying illegitimate activities based on historical data
Systems, methods, and non-transitory computer-readable media can acquire historical data including a plurality of features associated with known legitimate...
US-9,380,064 System and method for improving the resiliency of websites and web services
A system is disclosed for monitoring the status of a website operating on a host and for remedying any identified problems. A first platform is coupled to the...
US-9,380,063 Rule-based application access management
A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and...
US-9,380,062 Techniques for sharing virtual machine (VM) resources
Techniques for sharing virtual machine (VM) resources are provided. A relative location for a resource within a VM is created; the relative location dynamically...
US-9,380,061 Service protection
A method and system for determining whether user accounts in a client-server architecture are legitimate is described, the method and system including...
US-9,380,060 Machine-to-machine service based on common data format
A method, a device, and a non-transitory storage medium having instructions to establish a connection with the simple sensor device; receive sensor data from...
US-9,380,059 Systems and methods for configuring an electronic device
A method for configuring a device is performed at a target device with a processor and memory storing instructions for execution by the processor. In some...
US-9,380,058 Systems and methods for anonymous authentication using multiple devices
A system and method of anonymous authentication is described. In operation, the authenticator receives a request to access a resource from one of the user...
US-9,380,057 Systems and methods for combined OTP and KBA identity authentication
Certain implementations include systems and methods for combined one-time-passcode (OTP) and knowledge-based-authentication (KBA) identity authentication. A...
US-9,380,056 Multiple input based passwords
A computer-implemented method, carried out by one or more processors, for utilizing one or more input methods for passwords. In an embodiment, the method...
US-9,380,055 Device control method, device management system, and in-house server apparatus connected to device management...
A method in the disclosure includes: receiving, from an information device, a device password which is used for controlling a target device via an in-house...
US-9,380,054 Application signing
Systems and methods for application signing are disclosed. In some implementations, an application package identifier and a password may be received at an...
US-9,380,053 Using resource records for digital certificate validation
A digital certificate incorporated within a communication is received from a server associated with a host name. Resource records associated with the host name...
US-9,380,052 System and method for biometric protocol standards
A one-time certificate is provided that enables an initial two-way secured communication session between a user computing device and a trusted server. An...
US-9,380,051 Automatically authenticating a host key via a dynamically generated certificate using an embedded cryptographic...
A network device initiates a transmission control protocol (TCP) connection to establish a TCP session with a management device, and performs, via the TCP...
US-9,380,050 Scan image authentication
Methods and systems receive an electronic scanned image generated by activity of an application running on a portable computerized device, and calculate a...
US-9,380,049 Method and system for authentication-based multi-user online video game
The invention relates to a method, comprising: registering user groups to a video game server, and assigning video game identifiers for the user groups;...
US-9,380,048 Certificate authority server protection
This invention includes a solution to enable a digital authentication solution comprising a network. Next, a first device is coupled to the network. The first...
US-9,380,047 Insecure connection prohibition
A server system may be configured to receive a request for a connection from a client application. The server system may also be configured to determine if the...
US-9,380,046 Communication apparatus and control method therefor
It is determined whether a user who has logged in in communication using a selfsigned certificate stored by default is an administrator or a general user. If it...
US-9,380,045 Method and apparatus for providing authentication
A method and apparatus for providing authentication are disclosed. For example, the method receives a request from a customer to access a service via a first...
US-9,380,044 Supporting differentiated secure communications among heterogeneous electronic devices
A gateway apparatus supports differentiated secure communications among heterogeneous electronic devices. A communication port communicates via communication...
US-9,380,043 System and method for providing a one-time key for identification
A server includes a key generator and an authenticator. The key generator is configured to receive a request for a first key from a worker device, to create the...
US-9,380,042 Method for operating a network device
The invention relates to a method for releasing a network device of a network system that comprises at least the one network device and at least one server. At...
US-9,380,041 Identification, verification, and authentication scoring
Systems and methods are provided for responding to a communication received from an individual. An identification score may be obtained for the communication...
US-9,380,040 Method for downloading preauthorized applications to desktop computer using secure connection
A method and computer program product for establishing a connection and downloading server applications on a desktop. A user downloads and installs custom...
US-9,380,039 Systems and methods for automatically logging into a user account
Systems and methods for automatically logging into a user account are described, including receiving, using a device, data from an external source or from two...
US-9,380,038 Bootstrap authentication framework
A bootstrap authentication framework may automatically provide stored authentication credentials to an application server on behalf of an application. The...
US-9,380,037 Methods and devices for trusted protocols for a non-secured, distributed environment with applications to...
The present invention discloses methods for trusted protocols for a non-secure computing-environment. Methods include the steps of: upon request for determining...
US-9,380,036 Methods and devices for securing keys for a nonsecured, distributed environment with applications to...
The present invention discloses methods and devices for securing keys for a non-secure computing-environment. Methods include the steps of: providing a...
US-9,380,035 Decoding of encrypted file
A method and system for decoding an encrypted file. A recipient computer: receives, from a sender computer, the encrypted file having a filename that includes...
US-9,380,034 Systems and methods for data gathering without internet
Systems and methods are provided in which external key devices are used for sealing and unsealing data-gathering devices without Internet, wherein the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.