Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,473,490 Bidirectional authentication
Systems, methods, and other embodiments associated with bidirectional authentication are described herein. According to one embodiment, a method includes a user...
US-9,473,489 Private simultaneous authentication of equals
A passphrase is assigned to an end user device for use in authenticating the end user device for a network using SAE. An identification of the end user device...
US-9,473,488 Control device and method for electronic atomization device based on mobile terminal
Disclosed are a control device and a control method for electronic atomization device based on mobile terminal. The device includes a Bluetooth control module,...
US-9,473,487 Network identity certificate pinning
Systems, methods and apparatuses for ensuring that a computing device is attempting to connect to a network, such as a wireless network, provided by an expected...
US-9,473,486 Single sign on availability
Methods and computer program products relate to single sign on (SSO) availability including identifying a set of single sign on applications in a system in...
US-9,473,485 Secure single sign-on for a group of wrapped applications on a computing device and runtime credential sharing
A mobile device user is able to execute an app in a federation of wrapped apps without having to login to that app provided that the user has already logged...
US-9,473,484 Internetwork authentication
A technique for network authentication interoperability involves initiating an authentication procedure on a first network, authenticating on a second network,...
US-9,473,483 Facilitated information exchange to a service provider for a requested service
A method, a computer program product and a computer system, for exchanging information to provide services, is provided. A computer processor creates an...
US-9,473,482 Push-based trust model for public cloud applications
In accordance with the exemplary embodiments of the invention there is at least a method and apparatus to perform operations including deploying, with a device...
US-9,473,481 Method and system for providing a virtual asset perimeter
A system and method provides a virtual perimeter by maintaining a data structure for identifying a first plurality of assets, according to one embodiment. The...
US-9,473,480 Controlled access
User access to a protected resource is controlled by: intercepting a request from a client browser (80) directed to a server (50); requesting user credentials...
US-9,473,479 Automating authentication with multi-channel media distributors
In some embodiments, a processing device extracts a cookie from a first media application that is prevented from providing the cookie to a second media...
US-9,473,478 Residential gateway based policy
Various exemplary embodiments relate to a method performed by a policy server in a communication network. The method includes receiving an access request...
US-9,473,476 Program guide data management for media content access systems and methods
An exemplary system includes a data loader and a data slicer. The data loader is configured to receive and process raw program guide data, and to store the...
US-9,473,475 Low-cost authenticated signing delegation in content centric networking
One embodiment provides a system that delegates signature production in a CCN. During operation, a first content producing device monitors content objects...
US-9,473,474 Communicating an identity of a group shared secret to a server
An identity is communicated by a client device to a server without requiring the identity to be disclosed to eavesdroppers and without requiring the use of...
US-9,473,473 Data accessing method and system and memory storage apparatus
A data accessing method and system for a memory storage apparatus are provided. The method includes: performing a near field communication between a memory...
US-9,473,472 Enterprise cloud security gateway
A security virtual machine is provided in a network including a resource shared among two or more virtual machines. All data traffic from each virtual machine...
US-9,473,471 Method, apparatus and system for performing proxy transformation
A method for performing proxy transformation between a user and a server includes: selecting a first proxy relationship between a target user and a first user...
US-9,473,470 Method and system for the supply of data, transactions and electronic voting
A method for supply of data, including generating an empowerment certificate signed with a signing entity's electronic signature. The empowerment certificate...
US-9,473,469 Method and system for establishing a communications pipe between a personal security device and a remote...
A method and a system is provided for establishing a communications path over a communications network between a personal security device (PSD) and a remote...
US-9,473,468 Methods and systems of data security in browser storage
Mechanisms and methods are provided for managing OAuth access in a database network system, and extending the OAuth flow of authentication to securely store the...
US-9,473,467 Customer controlled data privacy protection in public cloud
Techniques to protect selected data in a cloud computing environment are disclosed. In various embodiments, an indication is received that a data value to be...
US-9,473,466 System and method for internet protocol security processing
A decentralized method for IPSec processing in virtual environments includes assigning a unique identifier to each of a set of compute nodes. Each compute node...
US-9,473,465 Lingual transformation based encryption
For lingual transformation-based encryption, a method parses a secure message into lingual units. The method further generates a validation nonce from the...
US-9,473,464 Key management for mixed encrypted-unencrypted content
Based on a request for media content from a media client, a device identifies one or more: segments of encrypted media content; encryption keys for decrypting...
US-9,473,463 Control word and associated entitlement control message caching and reuse
Methods, systems, computer-readable media, and apparatuses for providing control word and associated entitlement control message (ECM) functionalities are...
US-9,473,462 Method and system for configuring and securing a device or apparatus, a device or apparatus, and a computer...
A computer-implemented method for configuring and securing a first device, the method including performing a first check of the first device to determine the...
US-9,473,461 Transparent tunneling architecture for a secured database
A method and associated systems for a transparent tunneling architecture for a secured database. A tunneling driver captures a user's database-access request...
US-9,473,460 Using hypertext transfer protocol as a transport for bi-directional data streams
The present invention extends to methods, systems, and computer program products for using HyperText Transfer Protocol communication as a transport for...
US-9,473,459 Peel ply, method of surface preparation and bonding composite structures using the same
A resin-rich peel ply that does not leave behind residual fibers after peeling and can work well with different resin-based composite substrates. The resin-rich...
US-9,473,458 Connection configuration
A connection method is provided. The method includes retrieving by a data retrieval device, unique data comprising an identifier associated with a wireless...
US-9,473,457 Interactive management of web application firewall rules
A computer implemented method, information processing system, and computer program product manage web application firewall rule configuration. A web application...
US-9,473,456 Incremental application of resources to network traffic flows based on heuristics and business policies
Disclosed herein are system, method, and computer program product embodiments for increasingly applying network resources to traffic flows based on heuristics...
US-9,473,455 Data plane packet processing tool chain
This present disclosure relates to systems and methods for providing a data plane processing tool chain for processing packets that can use OSI layers 4 and...
US-9,473,454 Security gateway communication
A gateway device and methods performed therein to prevent unauthorized client devices from connecting to the host network of the gateway device is described....
US-9,473,453 Methods, systems, and computer program products for tokenized domain name resolution
A method, system, and computer program product for tokenized domain name resolution are provided. The method includes receiving a tokenized domain name, where...
US-9,473,452 NAT traversal in VoIP communication system
Methods, systems, and apparatuses are provided for VoIP communication with endpoint devices via a network address translator (NAT). A plurality of proxy servers...
US-9,473,451 Methods, systems, and computer readable media for providing mapping information associated with port control...
Methods, systems, and computer readable media for a testing platform involving application traffic are disclosed. According to one method, the method occurs at...
US-9,473,450 Wireless chat automatic status tracking
A technique and apparatus to provide status tracking of presence and/or location of wireless devices to requesting entities inside and/or outside a particular...
US-9,473,449 Multi-platform collaboration appliance
The invention contains a private self-aware network. The network will use multi-point Bluetooth technology or Wi-Fi or a direct connection (though not limited...
US-9,473,448 System for social media tag extraction
A system for extracting and monitoring media tags within video content includes at least one server in communication with a plurality of content sources, the...
US-9,473,447 Systems and methods for enabling dialog amongst different participant groups
An electronic communication system, such as a question-and-answer service, is provided in which a user submitting a question specifies one or more recipients of...
US-9,473,446 Personalized delivery time optimization
Techniques for optimizing a delivery time for the delivery of messages are described. According to various embodiments, a system determines, for each of a...
US-9,473,445 Comment processing device, comment processing method, and storage medium
The agent server of the present invention includes (i) a conversation monitoring section for monitoring, based on a conversation log saved in a family message...
US-9,473,444 Content sharing platform playlists and subscriptions based on user history
A method for generating content sharing platform playlists and subscriptions based on user history is disclosed. The method includes identifying one or more...
US-9,473,443 Methods and systems for sharing email in a multitenant database system
A method for sharing an email in a multi-tenant database system is provided. The method receives, at one or more computer systems associated with the...
US-9,473,442 On demand email response
An improvement to an electronic mail program is disclosed. In particular, the improved electronic mail program enables a user to mark individual action items...
US-9,473,441 E-mail with discretionary functionality
An embodiment, by way of non-limiting example, comprises an e-mail method including creating an e-mail having discretionary functionality and sending the...
US-9,473,440 Hyperlink validation
A method and associated computer system. A composed message portion, of an electronic message, that includes a hyperlink is received and sent to a set of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.