Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,497,195 System, method of disclosing information, and apparatus
A system includes a first device configured to provide a first service usable by a first user, a second device configured to provide a second service usable by...
US-9,497,194 Protection of resources downloaded to portable devices from enterprise systems
Protection of resources hosted on enterprise systems. In an embodiment, an enterprise system receives a request from a portable device to download a resource,...
US-9,497,193 Remote operation system, relay device, communication device, and remote operation method
There is provided a remote operation system, a relay device, a communication device, and a remote operation method which are capable of executing collective...
US-9,497,192 Data leak protection
Methods and systems for Data Leak Prevention (DLP) in an enterprise network are provided. According to one embodiment, a data leak protection method is...
US-9,497,191 Multiple user authentications on a communications device
A communications device provides a biometric reader to authenticate users onto the communications device based on a single biometric input. The communications...
US-9,497,190 Information processing apparatus, method of controlling the same, storage medium and information processing system
An information processing apparatus holds a first script for acquiring authentication information stored in an external apparatus, and acquires authentication...
US-9,497,189 Method and system for verification of presence
The present disclosure provides a more accurate and secure for verification of presence which comprises: reading an identifier which is associated with a...
US-9,497,188 Offline authentication with embedded authorization attributes
There is provided a method that includes (a) including in a dataset, data indicative of a time, (b) executing a hash function on the dataset to yield a hash...
US-9,497,187 Controlling a discovery component, within a virtual environment, that sends authenticated data to a discovery...
A discovery bundle component is applied in a virtual image deployed within a virtual environment, wherein the discovery bundle automatically discovers asset...
US-9,497,186 Methods and systems for securing proofs of knowledge for privacy
Embodiments described herein relate to securing the privacy of knowledge used to authenticate a user (i.e., Proof of Knowledge (PoK) test(s)). In some...
US-9,497,185 Systems, methods, and computer program products for providing application validation
Systems, methods, and computer program products are provided for application validation. A first request is transmitted to a ticket generation application. A...
US-9,497,184 User impersonation/delegation in a token-based authentication system
A "trusted service" establishes a trust relationship with an identity provider and interacts with the identity provider over a trusted connection. The trusted...
US-9,497,183 Systems and methods for authorizing services in a telecommunications network
A computer-implemented method for authorizing access by a user device to at least one service offered over an Internet Protocol (IP) network is provided. A...
US-9,497,182 Cloud queue access control
An example implementation may involve a media playback system obtaining an authorization token corresponding to a particular queue of media items at a remote...
US-9,497,181 System and method for concurrent sessions in a peer-to-peer hybrid communications network
An improved system and method are disclosed for peer-to-peer communications. In one example, the method provides for concurrent sessions to be maintained by...
US-9,497,180 Content access authentication for dynamic adaptive streaming over hypertext transfer protocol
A technology that is operable to authenticate content access for dynamic adaptive streaming over hypertext transfer protocol (HTTP) (DASH) is disclosed. In one...
US-9,497,179 Provisioning layer three access for agentless devices
A method may include obtaining a layer two identification of an endpoint that is seeking access to a network, the endpoint omitting an agent to communicate a...
US-9,497,178 Generating challenge response sets utilizing semantic web technology
Embodiments of the present invention relate to generating challenge response sets utilizing semantic web technology. In response to detecting an authentication...
US-9,497,177 Communications relay apparatus
A communications relay apparatus for relaying communications between an electronic control unit (ECU) connected to the apparatus via an in-vehicle local area...
US-9,497,176 Communication system, user equipment and communication node
Disclosed is a technique to enable a user equipment at a remote place to perform local IP access to a locally-accessible network with simpler procedure and such...
US-9,497,175 Iterative data secret-sharing transformation
Provided are a method, system, and article of manufacture for iterative data secret-sharing transformation and reconversion. In one aspect, data secret-sharing...
US-9,497,174 Systems, methods, and computer-readable media for secure digital communications and networks
Provided are system, methods, and computer-readable media for systems, methods, and computer-readable media for secure digital communications and networks. The...
US-9,497,173 System for the unified organization, secure storage and secure retrieval of digital and paper documents
A method and system implements storing one or more encrypted electronic documents and document information associated therewith, organizing the one or more...
US-9,497,172 Method of encrypting and transferring data between a sender and a receiver using a network
A method of encrypting and transferring data between a sender and a receiver using a network thereby transferring data in a secure manner includes the steps of...
US-9,497,171 Method, device, and system for securely sharing media content from a source device
A method, device, and system for sharing media content with a sink device includes performing a cryptographic key exchange with the sink device and generating...
US-9,497,170 Computer assisted name-based aggregation system for identifying names of anonymized data
A computer assisted name-based aggregation system that acquires anonymized data from a plurality of service providing systems without obtaining the personal...
US-9,497,169 Method and system for selective protection of data exchanged between user equipment and network
A method and system for providing selective protection of data exchanged between user equipment (UE) and network is disclosed. The selective protection is...
US-9,497,168 Method and apparatus for supporting communications between a computing device within a network and an external...
A network communication bridge establishes communication between a computing system within a protected network and an external computing system. A registrar is...
US-9,497,167 System and method for automatic provisioning of multi-stage rule-based traffic filtering
Methods and systems for filtering communication packets using a multi-stage filtering system that receives a large volume of communication packets from a...
US-9,497,166 Firewall interface configuration to enable bi-directional VoIP traversal communications
Methods and systems for an intelligent network protection gateway (NPG) and network architecture are provided. According to one embodiment, a firewall provides...
US-9,497,165 Virtual firewall load balancer
According to one exemplary embodiment, a method for load balancing between a virtual component within a virtual environment and a Host Intrusion Prevention...
US-9,497,164 System and method of redirecting internet protocol traffic for network based parental controls
A method of redirecting traffic on a network includes receiving a subscriber request to use a parental control service, assigning to the subscriber's access...
US-9,497,163 Identifying malicious devices within a computer network
This disclosure describes techniques for proactively identifying possible attackers based on a profile of a device. For example, a device includes one or more...
US-9,497,162 Interface groups for rule-based network security
Systems and methods for designating interfaces of a network security appliance as source/destination interfaces in connection with defining a security rule are...
US-9,497,161 Bi-directional data security for supervisor control and data acquisition networks
A cyber-security device provides secure communications bi-directionally between an external network and an internal network including a supervisor control and...
US-9,497,160 Symmetric NAT traversal for direct communication in P2P networks when some of the routing NATs are symmetric
Systems, apparatuses and methods are described for facilitating connection between two or more clients across a network that includes network address...
US-9,497,159 System and method for IP network semantic label storage and management
Embodiments described herein provide devices, methods, and systems for managing IPv6 and IPv4 addresses within an IP address management (IPAM) system, wherein...
US-9,497,158 Secure electronic mail system
An e-mail system is disclosed that overcomes many deficiencies of, but is backward compatible with, existing e-mail systems. Embodiments of the system may...
US-9,497,157 Secure electronic mail system
An e-mail system is disclosed that overcomes many deficiencies of, but is backward compatible with, existing e-mail systems. Embodiments of the system may...
US-9,497,156 Suggested out of network communication recipients
Disclosed in some examples are methods, systems and machine readable medium for recommending an out-of-network communication by determining a set of potential...
US-9,497,155 Sharing television and video programming through social networking
In particular embodiments, one or more computer systems of a social-networking system identify a user viewing video content on a first display device, identify...
US-9,497,154 Measuring social network-based interaction with web content external to a social networking system
A social networking system includes a mechanism for generating nodes in the social graph corresponding to web content external to the social networking system....
US-9,497,153 Associating a segment of an electronic message with one or more segment addressees
Methods and apparatus related to associating a segment of an electronic message with one or more segment addressees. One or more message addressees of an...
US-9,497,152 Managing team mailbox integrating email repository and content management store services
A communication application creates a team mailbox integrating messages from an email repository and documents from a content management store (CMS). The...
US-9,497,151 Optimization framework for in-memory storage of policy session data
The present disclosure provides for an optimization framework that optimizes the amount of information persisted in a policy session using rule introspection....
US-9,497,150 System and method for managing electronic conversations
A system provides a conversation construct for the routing of external communications to a party within an entity. Internal interactions of individuals in the...
US-9,497,149 System and method for reducing unsolicited E-mails
A method for reducing unsolicited e-mails includes receiving an e-mail message from a sender, storing the e-mail message within a holding unit, and sending a...
US-9,497,148 Context-based automated/intelligent content management
Methods and systems to predictively determine to perform a computing activity based on contextual information. Context-based criteria are defined based...
US-9,497,147 Systems and methods for supporting downloadable applications on a portable client device
Systems, methods, and computer readable storage mediums for providing message services from a server are described. In some embodiments, a server stores an...
US-9,497,146 Message transfer system including display device, mobile device and message transfer method thereof
A display device is provided, which includes a memory which stores a plurality of templates which are differently set according to kinds of messages, a detector...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.