Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,509,692 Secured access to resources using a proxy
A method of authentication and accessing resources is provided. A client device may send a request to a proxy device to access a resource, such as an enterprise...
US-9,509,691 Secure transfer of web application client persistent state information into a new domain
A technique to reassign one or more stored elements of web application client state information is provided in an HTTP-based client upon receipt of an HTTP...
US-9,509,690 Methods and systems for managing network activity using biometrics
The present disclosure describes systems and methods for managing network traffic using biometrics. A server may store a first value N, a primitive root modulo...
US-9,509,689 Security for cloud systems and virtualization cloud systems, mobile cloud systems and mobile virtualization...
A computer implemented method and a cloud security system are provided for securing data in a cloud storage environment. The cloud security system receives data...
US-9,509,688 Providing malicious identity profiles from failed authentication attempts involving biometrics
A technique provides malicious identity profiles. The technique involves storing unsuccessful authentication entries in a database, the unsuccessful...
US-9,509,687 Communication terminal, communication method, program, and communication system
There is provided a communication terminal including a transmission controller configured to allow transmission of, to a verification target device,...
US-9,509,686 Secure element authentication
Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified...
US-9,509,685 User authentication based on other applications
The present invention includes a system for authenticating a second action based on a first action, wherein the system is configured to: receive a first request...
US-9,509,684 System and method for resource access with identity impersonation
A gateway device comprising a processor and a memory, the processor is configured to receive a resource request message from an endpoint associated with a user,...
US-9,509,683 Multi-factor authentication
According to some embodiments, a method provides a designated link in a notification to an intended recipient of the message. The designated link includes a...
US-9,509,682 Obscuring usernames during a login process
In general, the subject matter described in this document can be embodied in methods, systems, and program products. A computing system receives a token that...
US-9,509,681 Secure instant messaging system
A secure instant messaging (IM) system integrates secure instant messaging into existing instant messaging systems. A certificate authority (CA) issues security...
US-9,509,680 Information processing system, information processing method and communication device
Provided is a state with which each user is able to use information processing service of each user. A router (2) receives, from a terminal device,...
US-9,509,679 System and method for non-replayable communication sessions
Systems, methods, and non-transitory computer-readable storage media for a non-replayable communication system are disclosed. A first device associated with a...
US-9,509,678 Facilitated information exchange to a service provider for a requested service
A method, a computer program product and a computer system, for exchanging information to provide services, is provided. A computer processor creates an...
US-9,509,677 Method, apparatus, and system for sending credentials securely
A software application executing in a first local operating environment may be used to connect to a remote server that requires a credential of a user to...
US-9,509,676 Efficient startup and logon
Methods and systems for receiving a detection of a physical presence of a user and, in response, initiating a start-up process on an enterprise device according...
US-9,509,674 Information security and privacy system and method
A programmable management method and system provides mechanism for processing, viewing and transactions of secure and private information allowing user of the...
US-9,509,673 Automated accounts for media playback
Content stored on a server may be selected using a user device and enabled on a central device. The identity of the central device may be authenticated without...
US-9,509,672 Providing seamless and automatic access to shared accounts
A method for providing seamless access to a first account using authentication information associated with a second account includes receiving a first account...
US-9,509,671 3D bot detection
In one embodiment, a computer method of verifying an operator is human includes automatically selecting a pattern and dividing the pattern into a plurality of...
US-9,509,670 System and method for managing secure communications in an Ad-Hoc network
The present invention provides a system and method for managing secure communications in an ad-hoc network having three or more users including a first user, a...
US-9,509,669 Efficient routing of streams encrypted using point-to-point authentication protocol
Embodiments relate to routing encrypted data from a source to a sink via a router without decrypting the data in the router. The source authenticates with the...
US-9,509,668 Content distribution method, content distribution system, source device, and sink device
Provided is a content distribution method which allows a source device to safely distribute copyrighted content to a sink device in response to a request from...
US-9,509,667 Method and system for digital rights management of documents
An improved method and system for digital rights management is described.
US-9,509,666 Migrating authenticated content towards content consumer
Techniques involving migrating authenticated content on a network towards the consumer of the content. One representative technique includes a network node...
US-9,509,665 Protecting against malicious modification in cryptographic operations
A message and an identifying parameter associated with the message are obtained. The message comprises a plurality of units. A plurality of one-unit message...
US-9,509,664 Data exchange in the internet of things
A device is configured to store a hash value and an encrypted hash value. The device may broadcast a boot label including the encrypted hash value. The device...
US-9,509,663 Secure distribution of session credentials from client-side to server-side traffic management devices
Securely transferring session credentials from a client-side traffic management device (TMD) to a second server-side TMD that replaces a first server-side TMD....
US-9,509,662 Techniques for providing services to multiple tenants via a shared end-point
A service is provided that supports a plurality of tenants. Server(s) of the service are communicatively coupled with a plurality of gateways of the service....
US-9,509,661 Method and apparatus for displaying HTTPS block page without SSL inspection
The present disclosure discloses a method and system for displaying an HTTPS block page without SSL inspection. Specifically, a network device snoops a first...
US-9,509,660 Systems and methods for dynamic network security control and configuration
A computer-implemented method according to one embodiment of the present disclosure includes identifying, by a computer system, an asset associated with a...
US-9,509,659 Connectivity platform
Disclosed are a connectivity platform that allows for proprietary connectivity modules to plug into the operating system and also allows the operating system...
US-9,509,658 Method of restoring a MAC address and recording medium
A method of restoring a MAC address in system, the method includes, first transmitting a first frame, in which a origin of a transmission is a first MAC address...
US-9,509,657 Information processing apparatus, relay method, and computer-readable storage medium
An information processing apparatus includes a receiving unit configured to receive request data to an application via a global network allocated to the...
US-9,509,656 Broadcast distribution table for BACnet/IP
A system for providing addresses to a broadcast distribution table. A BACnet device may have an internet protocol, be connectable to a name server via a...
US-9,509,655 Aligning content and social network audience using analytics and/or visualization
Various embodiments provide for the use of analytics to determine a number of key factors prior to a user sending a communication (e.g., an email or instant...
US-9,509,654 Delivering recall messages via internet or telephony communication paths
A method, system, and medium are provided for delivering recallable messages via Internet or telephony paths. A sender may configure a message as a recallable...
US-9,509,653 Systems and methods for directing messages to multiple user profiles on a mobile device
The disclosed technology covers messaging systems and methods, and computer program products embodying such systems and methods. An example computer-implemented...
US-9,509,652 Method and system for displaying similar email messages based on message contents
A method and system for identifying changes to a data set, such as data within a mailbox, and performing actions based on the identified changes is discussed....
US-9,509,651 Presentation of messages in multi-sectioned views
Systems and methods for presenting electronic messages are provided. In some implementations, a method includes, at a computing device having one or more...
US-9,509,650 Electronic message management with conversation participation status
Electronic message management with conversation participation status is enabled. Accordingly, time may be saved and lost productivity due to overload of...
US-9,509,649 Providing centralized message notification
A mechanism for providing centralized message notification for user interface. disclosed. A method includes intercepting a plurality of message notifications....
US-9,509,648 Associating sentiment with objects presented via social media
An approach for associating a sentiment with a picture posted on a social media account is provided herein. A computing device receives user preferences...
US-9,509,647 Systems and methods for downloading and viewing images
A system for displaying images associated with a received electronic message concurrently displays the received electronic message, a view-all-images icon and a...
US-9,509,646 Inter-carrier communications for multimedia-message delivery
A method, system, and medium are provided for causing a first multimedia messaging service center (MMSC) on a home network to communicate a multimedia messaging...
US-9,509,645 Mobile terminal, message transceiving server and controlling method thereof
A mobile terminal can include a wireless communication unit for transceiving messages with another terminal, and a touchscreen for displaying the messages in an...
US-9,509,644 System and method for sharing content in an instant messaging application
A method and system for sharing content in an instant messaging application are disclosed. According to one embodiment a computer-implemented method comprises...
US-9,509,643 Network-based content discovery using messages of a messaging platform
A system, method, and computer-readable medium for identifying relevant content from a messaging platform. The method can include: identifying a context...
US-9,509,642 Messaging architecture configured to use an execution-enabled element to initiate an operation in an application
A method, system, and computer-program product for communicating within a messaging architecture using a structured data object are disclosed. The method...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.