Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,485,239 Implementing single sign-on across a heterogeneous collection of client/server and web-based applications
Leveraging an established authenticated session in obtaining authentication to a client application includes receiving a request for access to a client...
US-9,485,238 Security framework for HTTP streaming architecture
Methods and apparatus for preventing unauthorized access to online content, including in particular streaming video and other media, are provided. In various...
US-9,485,237 Confidence-based authentication
Disclosed are various embodiments that perform confidence-based authentication of a user. An identification of a user account is obtained from a user, and a...
US-9,485,236 System and method for verified social network profile
A method for verifying the on-line identity of a subscribed user and securely displaying an indicia in connection with that user's on-line content, wherein the...
US-9,485,235 Systems and methods for inter-network service selection
Systems, methods, and devices for inter-network service selection are described herein. Through the use of one or more of device identifiers and device classes,...
US-9,485,234 Virtualized endpoints in a multi-tenant environment
Customers accessing resources or services in a multi-tenant environment can obtain assurance that a provider of that environment will honor only requests...
US-9,485,233 Virtual desktop accelerator support for network gateway
The subject disclosure relates to a method for initiating an accelerated desktop session between a client device and a remote server. In some aspects, the...
US-9,485,232 User equipment credential system
A user equipment in a communications system, the user equipment comprising: a memory arranged to store at least one identifier associated with the user...
US-9,485,231 Securing internet of things communications across multiple vendors
A secure connection between a user mobile device and a "Internet-of-Things" network-connected device (e.g., a home appliance or a vehicle) may be provided using...
US-9,485,230 Efficient key generator for distribution of sensitive material from multiple application service providers to a...
A method provides end-to-end security for transport of a profile to a target device (e.g., a mobile computing device) over at least one communications network...
US-9,485,229 Object level encryption system including encryption key management system
A symmetric PGP encrypted communications path is provided in which the recipient may be identified with only publicly available information. Data to be...
US-9,485,228 Selectively performing man in the middle decryption
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for selectively performing man in the middle decryption. One of...
US-9,485,227 Code domain isolation
A method for achieving code domain isolation. A first set of data is received in a first domain format. The first set of data is changed to a second domain...
US-9,485,226 Method for including an implicit integrity or authenticity check into a white-box implementation
A method of performing a cryptographic operation using a cryptographic implementation in a cryptographic system, including: receiving, by the cryptographic...
US-9,485,225 Method for manufacturing a filtering module
A method is provided for defining a filtering module between a first module processing information with a first sensitivity level, and a second module...
US-9,485,224 Information delivery system with advertising mechanism and method of operation thereof
An information delivery system includes: a control unit configured to: generate an anonymous identity for concealing client information of an anonymous client...
US-9,485,223 System and method for controlling features on a device
Trust between entities participating in an upgrade or enablement/disablement process is established and, to facilitate this remotely and securely, a highly...
US-9,485,222 Data stream traffic control
Techniques related to data stream traffic control are disclosed herein. A bit equivalent entropy of an anonymized data stream is computed. Traffic of the data...
US-9,485,221 Selective content cloud storage with device synchronization
Programmable devices selectively allocate file content portions between cloud and secured hardware device storage mediums. A confidential portion of a first...
US-9,485,220 Virtual desktop accelerator with support for dynamic proxy thread management
In particular embodiments, a method includes determining a data flow rate of the active connections at a proxy, comparing the data flow rate to a first...
US-9,485,219 VPN for containers and virtual machines in local area networks
A method, system and computer program product for a VPN for containers and VMs implemented on different network node. A number of network hardware nodes have...
US-9,485,218 Device for preventing, detecting and responding to security threats
A device to prevent, detect and respond to one or more security threats between one or more controlled hosts and one or more services accessible from the...
US-9,485,217 Method for configuring network nodes of a telecommunications network, telecommunications network, program and...
A method for configuring network nodes of a telecommunications network includes configuring a remote network node of a plurality of remote network nodes based...
US-9,485,216 Multi-layered application classification and decoding
An intrusion detection system is described that is capable of applying a plurality of stacked (layered) application-layer decoders to extract encapsulated...
US-9,485,215 Multiple inspection avoidance (MIA) using a protection scope
A multiple inspection avoidance (MIA) technique is implemented in a virtualized environment. Preferably, the technique is implemented in a packet processing...
US-9,485,214 Use of reversed DNS records for distributed mapping of asymmetric cryptographic keys to custom data
A server sends a lookup request for a first domain name to a Domain Name System (DNS) in response to receiving data associated with a user. The first domain...
US-9,485,213 Cross registrar compliance and communication mechanism
What is described is a system and method providing an improved customer experience for the registrant. The registrant is able to use a single interface and a...
US-9,485,212 Message management method
A method for managing computer based messaging involves monitoring messages transmitted within a messaging system over time; identifying related messages; and...
US-9,485,211 Social networking website system with automatic participation based on current location information
A social networking website system with automatic registration based on a current location information. Individuals are automatically enrolled into social...
US-9,485,210 Systems and methods for social parenting platform and network
A parent social network based on relationship of children, including of activities, needs, interests or combinations thereof, is described. The parent social...
US-9,485,209 Marking of unfamiliar or ambiguous expressions in electronic messages
A method comprising using at least one hardware processor for constructing an index of corpora of multiple users, wherein each corpus of said corpora is...
US-9,485,208 Managing notification messages
Methods and apparatuses that generate a subtopic identifier identifying a client application within a client device are described. The client application may be...
US-9,485,207 Processing of messages using theme and modality criteria
Embodiments related to a message processing system are disclosed herein. In some embodiments, a computing system may include receiver logic to receive a message...
US-9,485,206 Devices and methods for improving web safety and deterrence of cyberbullying
Devices, systems, and methods for allowing parents to view and track smart phone activities of their children can include one or more child software modules....
US-9,485,205 User initiated rule-based restrictions on messaging applications
A method, system and computer program product are disclosed for user initiated rule based restrictions on sending messages from a sender to a receiver in a...
US-9,485,204 Reducing photo-tagging spam
A photo spam detector detects illegitimate non-natively captured images through extracting image features and feeding the extracted features into a...
US-9,485,203 Method and system for attaching scanned documents to email replies via a mobile communications device
A method and system for attaching a scan to an email reply utilizing a mobile communications device and any standard email client. A scan-to-email attachment...
US-9,485,202 Alerting recipients to errors occurring when accessing external services
A hosting provider operates a server system that provides a service to one or more tenants. The server system receives configuration data from the tenants. As...
US-9,485,201 System, method, and computer program for partially authorizing a multi-target communication request
A system, method, and computer program product are provided for partially authorizing a multi-target communication request. In use, a plurality of targets...
US-9,485,200 Network switch with external buffering via looparound path
Described embodiments process data packets received by a network switch coupled to an external buffering device. The network switch determines a queue of an...
US-9,485,199 System and method for data flow identification and alignment in a 40/100 gigabit ethernet gearbox
A system and method for data flow identification and alignment in a 40/100 gigabit Ethernet gearbox. Virtual lane (VL) identifiers can be identified to create...
US-9,485,198 Methods and apparatus for multicast traffic failover in a network
An apparatus includes an access switch having a set of ports and configured to be operatively coupled to a multicast router via a first port from the set of...
US-9,485,197 Task scheduling using virtual clusters
In one embodiment, a device receives information regarding a data set to be processed by a map-reduce process. The device generates a set of virtual clusters...
US-9,485,196 Internal packet steering within a wireless access gateway
In general, techniques are described for steering data traffic for a subscriber session from a network interface of a wireless access gateway to an anchoring...
US-9,485,195 Instantaneous random early detection packet dropping with drop precedence
A circuit that receives queue number that indicates a queue stored within a memory unit and a packet descriptor that includes a drop precedence value, and in...
US-9,485,194 Virtual link aggregation of network traffic in an aggregation switch
Access switches in a switching system may use virtual aggregated links. When a link between an aggregation switch and an access switch fails, the link failure...
US-9,485,193 Method and apparatus for allocating network medium data resources
A method of allocating network medium data resources is disclosed. The method is performed at an apparatus having one or more processors and memory for storing...
US-9,485,192 Selectable service node resources
In one example, a method includes receiving, by a service node, a request from an access node to establish a pseudowire to be used for sending subscriber...
US-9,485,191 Flow-control within a high-performance, scalable and drop-free data center switch fabric
A high-performance, scalable and drop-free data center switch fabric and infrastructure is described. The data center switch fabric may leverage low cost,...
US-9,485,190 Allocating shaping resources for a cloud computing environment based on transfer speeds associated with the...
A device stores shaping resource information in a data structure, where the shaping resource information includes identifiers associated with shaping resources...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.