Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,525,689 Detection of an unauthorized wireless communication device
A technique for the detection of an unauthorized wireless communication device includes monitoring of Bluetooth.RTM. communications activity by a Bluetooth.RTM....
US-9,525,688 Electronic support allowing access to remote audio/video assets
A physical device, the possession of which may provide access to digital media content in a fashion similar to the possession of a DVD providing access to the...
US-9,525,687 Template for customer attributes
The present disclosure extends to methods, systems, and computer program products for establishing an attribute template for a customer for distribution to...
US-9,525,686 Captcha challenge incorporating obfuscated characters
A method for determining if a user of a computer system is a human. A processor receives an indication that a computer security program is needed and acquires...
US-9,525,685 User authentication based on other applications
The present invention includes a system for authenticating a second action based on a first action, wherein the system is configured to: receive a first request...
US-9,525,684 Device-specific tokens for authentication
A user who is authenticated to a system or service across a network can receive a token that includes a device fingerprint. The fingerprint can include...
US-9,525,683 Secret supplemental username
Methods for a secret supplemental username are provided. In one example, a method includes the steps of detecting a threat to an account with a primary username...
US-9,525,682 Communication between authentication plug-ins of a single-point authentication manager and client systems
Various arrangements for providing authentication information to a user are presented. A single-point authentication manager executed by a computer system may...
US-9,525,681 Terminal authentication system and method for vehicle network connection
A terminal authentication method for vehicle network connection is disclosed. The terminal authentication method includes acquiring unique identification...
US-9,525,680 Splitting an SSL connection between gateways
A system for secure communication, including a first security computer communicatively coupled with a client computer via an SSL connection, including a...
US-9,525,679 Sending session tokens through passive clients
A session token can be requested to be sent to a first computing service from a second computing service, and a first computing service can receive the...
US-9,525,678 Non-transitory computer readable medium, server and system
A server may store one or more accounts. Each account may be associated with an authentication code and a total number of information devices that are allowed...
US-9,525,677 Methods, systems, and computer program products for managing media content by capturing media content at a...
Media content is managed by defining a list of authorized recipients in a network accessible security information repository, recording media content at a...
US-9,525,676 Message content adjudication based on security token
A computer program product for processing a message is provided. The computer program product comprises a computer readable storage medium having program...
US-9,525,675 Encryption key retrieval
Particular embodiments described herein provide for an electronic device that can be configured to include an authentication module. The authentication module...
US-9,525,674 Method for the encryption of data
To improve known encryption methods for communication in non-secured wireless networks, the invention proposes using an active key for encryption, in each...
US-9,525,673 Content protection for extract, transform, load (ETL) scripts
Embodiments encrypt Extract, Transform, Load (ETL) scripts created by a developer for an initial customer, against unauthorized access and copying. Such...
US-9,525,672 Multi-faceted compute instance identity
A compute instance of a virtual computing service (VCS) is assigned first and second cryptographically verifiable identities (CVIs) within respective...
US-9,525,671 Secure address resolution protocol
This disclosure describes, in part, systems, devices, and techniques to encrypt address resolution protocol (ARP) messages to prevent a rogue device from...
US-9,525,670 Computer product, recording medium, communications apparatus, and communications method
Improvement of the security of communication is facilitated. A server receives from an on-vehicle device, encrypted data obtained by encrypting ECU information...
US-9,525,669 Method and opportunistic sensing
A method in a first device for anonymously delivering data to a part that has initiated a task is provided. The first device and the part initiating a task are...
US-9,525,668 Face based secure messaging
In an embodiment, a system includes at least one core and a trusted execution environment (TEE) to conduct an identity authentication that includes a comparison...
US-9,525,667 Method and system for roaming website account and password
A method and system for roaming website accounts and passwords are provided. The method is operational on a first client and includes: authenticating website...
US-9,525,666 Methods and systems for managing concurrent unsecured and cryptographically secure communications across...
An endpoint, method, and authorization server are disclosed which can be used to allow concurrent secure and clear text communication. An endpoint includes a...
US-9,525,665 Systems and methods for obscuring network services
A computer-implemented method for obscuring network services may include (1) identifying a local network comprising at least one client and at least one host,...
US-9,525,664 Systems and methods for providing secure access to local network devices
A computer-implemented method for providing secure access to local network devices may include (1) identifying a local area network that provides Internet...
US-9,525,663 Multiple CPU architecture platform network firewall
A system includes a communication processor and an application processor communicatively coupled to the communication processor. The communication processor is...
US-9,525,662 Automatic assignment of internet protocol addresses in a ring network
In one embodiment, a negotiation is performed between each adjacent pair of a plurality of packet switching devices in a ring network to determine an Internet...
US-9,525,661 Efficient method of NAT without reassemling IPV4 fragments
A method, apparatus, and machine readable storage medium is disclosed for performing network address translation (NAT) on fragments of a Internet Protocol (IP)...
US-9,525,660 Manage encrypted network traffic using DNS responses
Managing encrypted network traffic using Domain Name System responses includes requesting an address associated with a domain name from a resolution server, the...
US-9,525,659 Request routing utilizing point of presence load information
A system, method and computer-readable medium for request routing based on prioritization and load information are provided. A client request processing a...
US-9,525,658 Synchronous communication system and method
A method, computer program product, and computing system for providing a plurality of users of a social network with the ability to indicate affinity with an...
US-9,525,657 System for automatic blogging and social group interactions
A system that supports automatic blogging as well as social group interactions comprises a mobile device with a client application that is communicatively...
US-9,525,656 Offender message delivery system
A correctional facility communication system for sending an external message to an offender of a correctional facility is disclosed. The correctional facility...
US-9,525,655 Reserving space in a mail queue
A mail handler is provided. The mail handler manages a source queue for incoming messages. The source queue has a first count of slots in memory and is...
US-9,525,654 Method of and system for reformatting an e-mail message based on a categorization thereof
There is disclosed a method of reformatting an e-mail message having a header and a body having content in a received format, the method comprising: receiving,...
US-9,525,653 Enhanced wireless short message service
A wireless device for processing an SMS message stores the message on a local first storage device, and sends the message to a wireless carrier SMS facility....
US-9,525,652 Selecting subsets of participants in electronic message threads
Embodiments of the present invention provide methods, computer program products, and systems for selecting subsets of participants in electronic message...
US-9,525,651 Method and system for improving establishing of a multimedia session
Multimedia communication systems and methods are disclosed. An exemplary system comprises a server adapted to communicate with two or more multimedia endpoints;...
US-9,525,650 Method and system for updating reorder depth in robust header compression
The present document provides a method and system for updating a reorder depth in robust header compression. The method comprises: when determining a reorder...
US-9,525,648 Method for acquiring physical address of virtual machine
A method for acquiring a physical address of a virtual machine includes acquiring, by a first switching endpoint, an address list of N switching endpoints from...
US-9,525,647 Network control apparatus and method for creating and modifying logical switching elements
A network controller for managing several managed switching elements that forward data in a network that includes the managed switching elements. The network...
US-9,525,646 Method, device and computer program for selecting a router node in an LLN network
A method for selecting a router node in a LLN (Low power and Lossy Network) type telecommunication network wherein, upon receipt by a router node of a data...
US-9,525,645 Connecting stack member devices in stacked switches systems
A stacked switches system may include multiple stack member devices, which belong to more than two stack groups. Number of the stack groups is less than number...
US-9,525,644 Method and system for managing resources among different clients for an exclusive use
A method and a system share resources of a server among different clients. The system has a server which contains a maximum number m of resources among which a...
US-9,525,643 Using templates to configure cloud resources
The present invention extends to methods, systems, and computer program products for using templates to configure cloud resources. Embodiments of the invention...
US-9,525,642 Ordering traffic captured on a data connection
Ordering partial network traffic. In an embodiment, data packets are received from a network tap and separated into two queues. For each queue, a push-sequence...
US-9,525,641 Facilitating buffer wait time determination based on device- or entity-related conditions
Systems and methods that relate to determination of buffer wait time based on defined parameters are described. A method includes: determining, by a first...
US-9,525,640 System and method for controlling lifespan of interaction requests
An apparatus for controlling lifespan of interaction requests includes a processor and a memory, the memory storing instructions that when executed by the...
US-9,525,639 2.5 GBPS/5GBPS ethernet communications over a full duplex communication channel
Transceiver architecture includes circuitry and a method to transmit and receive high speed WAP data over lower speed cabling such as Cat5e. The method begins...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.