Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,560,040 Mitigating risk of account enumeration
Technology is disclosed for mitigating account enumeration and thus enhances network security. The technology can receive from a client computing device a...
US-9,560,039 Controlled discovery of SAN-attached SCSI devices and access control via login authentication
A method for accessing data in a storage area network is provided. The method initiates with receiving a request for a list of targets on the storage area...
US-9,560,038 Method and apparatus for verifying an application to authorize content repository access using SSL certificates
A computer implemented method and apparatus for verifying an application to authorize content repository access using SSL certificates. The method comprises...
US-9,560,037 Integrated APIs and UIs for consuming services across different distributed networks
User interface integration across multiple clouds is achieved by hosting UI extensions for different services in the same browser window. The UI extensions are...
US-9,560,036 Cross-protocol federated single sign-on (F-SSO) for cloud enablement
A method to enable access to resources hosted in a compute cloud begins upon receiving a registration request to initiate a user's registration to use resources...
US-9,560,035 Systems, devices, methods and computer program products for establishing network connections between service...
A login session server is configured to establish a communications session between an application that runs natively on a device and a service that is secured...
US-9,560,034 Limited viewing time in online education
A method of limiting tokens for use by a student within an education application displays numerous membership options. For a price, a certain number of tokens...
US-9,560,033 Method and system for authenticating user identity
Embodiments of the present application relate to a method for authenticating user identity, a system for authenticating user identity, and a computer program...
US-9,560,032 Method and apparatus for preventing illegitimate outflow of electronic document
An apparatus and method for preventing illegitimate outflow of an electronic document. The apparatus includes a taking-out control unit, a taking-out management...
US-9,560,031 Identity management via cloud
A system and method of maintaining a user profile for a handheld computer in a shared, scalable computing resource is described. The method includes receiving...
US-9,560,030 Nodal random authentication
Systems, methods, and computer program products related to transaction application security are disclosed. In a particular embodiment, application nodes are...
US-9,560,029 Publicly available protected electronic mail system
A secure messaging system provides a secure messaging exchange service to identified user. In one embodiment, the System comprises a User Record Server (URS)...
US-9,560,028 Systems and methods for filtering interprocess communications
The disclosed computer-implemented method for filtering interprocess communications may include (1) identifying a service process that provides a service on the...
US-9,560,027 User authentication
There is disclosed some techniques for processing an authentication request. In one example, a method comprises the step of determining the velocity between...
US-9,560,026 Secure computer operations
In some implementations, a computing device includes an identifier that is embedded into a firmware of the computing device. The identifier uniquely identifies...
US-9,560,025 Apparatus and method for secure delivery of data from a communication device
A system that incorporates the subject disclosure may perform, for example, providing an upload request to a mobile communication device to cause a secure...
US-9,560,024 Pairwise temporal key creation for secure networks
A system and method for establishing a pairwise temporal key (PTK) between two devices based on a shared master key and using a single message authentication...
US-9,560,023 Systems and methods for protecting internet advertising data
Systems and methods are disclosed for protecting user privacy in, for example, online advertising environments. The method includes receiving data related to a...
US-9,560,022 Avoiding collection of biometric data without consent
Electronic content, such as an image, video, or audio file, may be tagged as being associated with an individual. When the electronic content contains biometric...
US-9,560,020 Securing email conversations
At least a portion of a transmission of an outgoing first email from a first email account to at least a second email account is encrypted. Second email address...
US-9,560,019 Method and system for managing security in a computing environment
A method and system for managing data security in a computing environment. A processor at the gateway server receives, from a user device, at least one message....
US-9,560,018 Autonomic locator/identifier separation protocol for secure hybrid cloud extension
A method is provided in one example embodiment and includes configuring a local network element as an autonomic registrar for a designated network domain;...
US-9,560,017 Methods and apparatus to route traffic in a virtual private network
Methods and apparatus disclosed herein include receiving, at a first provider router that is not an edge router, first route information from a provider edge...
US-9,560,016 Supporting IP address overlapping among different virtual networks
System and method embodiments are disclosed here to resolve Internet Protocol (IP) address overlap of Virtual eXtensible Local Area Network (VXLAN) endpoints in...
US-9,560,015 Systems and methods for protecting network devices by a firewall
A computer-implemented method, including: upon a request from a client device, establishing, by a computer system implementing a gateway to a private network, a...
US-9,560,014 System and method for an endpoint hardware assisted network firewall in a security environment
A method is provided in one example embodiment and includes receiving a traffic flow at a tamper resistant environment from an application, where the tamper...
US-9,560,013 Firewall based prevention of the malicious information flows in smart home
A system for preventing malicious attacks on a device in a Smart Home network comprises logical circuitry suitable to compare information flows in said network...
US-9,560,012 Cross domain gateway having temporal separation
A computer network is disclosed that includes a first domain and a second domain. The second domain has a higher security classification than the first domain....
US-9,560,011 System and method for protecting service-level entities
An architecture is provided for protecting service-level entities. Such an architecture may escrow service requests prior to forwarding the requests to the...
US-9,560,010 Network file transfer
A technology is described for transferring a file from an unsecure network to a secure network. An example method may include identifying an unsecure account...
US-9,560,009 Systems and methods for commissioning a wireless lighting device with a magnetic reed switch
The present disclosure provides techniques for commissioning a light switch and a control device. A wireless light system implementing such techniques includes...
US-9,560,008 Method and arrangement for providing a wireless mesh network
A method and an arrangement for providing a wire-free mesh network are provided. An approval procedure is carried out in situations in which a subscriber who is...
US-9,560,007 Server apparatus, information processing system, address management method of server apparatus
A server apparatus includes a storage unit to store table data including an IP address and a MAC address of each of information processing apparatuses connected...
US-9,560,006 Method and apparatus for expiring messages in electronic communications
The present disclosure includes systems and methods for off-the-record communication including expiring messages. An example method comprises receiving an...
US-9,560,005 Organizing social network messages based on temporal characteristics
A method for organizing messages may include detecting, by a processor, receipt of each new message of an activity stream comprising a group of messages and...
US-9,560,004 Organizing social network messages based on temporal characteristics
A method for organizing messages may include detecting, by a processor, receipt of each new message of an activity stream comprising a group of messages and...
US-9,560,003 Erroneous addressing prevention for electronic messaging
An electronic mail client includes features for preventing addressing errors in electronic messaging such as those caused by predictive text features. A...
US-9,560,002 Preventing a user from missing unread documents
According to one exemplary embodiment, a processor-implemented method for informing a user that an important unread email (IUE) will be removed from an online...
US-9,560,001 Managing notifications across services
Systems and methods for managing notifications are provided. One of the methods includes sending notification data to a first client service and a second client...
US-9,560,000 Reconfiguring an electronic message to effect an enhanced notification
An electronic message may be reconfigured to effect an enhanced notification using an input interface to receive at least one electronic message created by or...
US-9,559,999 Method and system for processing large scale emails and limiting resource consumption and interruption therefrom
Techniques for reducing and discouraging sending large scale emails are described herein. According to one embodiment, in response to a first email received...
US-9,559,997 Client agnostic email processing
A custom email handler comprises network interface circuitry and in-line email processing circuitry. The network interface circuitry uses the simple mail...
US-9,559,996 Systems and methods for integrating cloud storage and network service
A cloud storage system receives information associating a user's cloud storage account with a network service account associated with a service provider. The...
US-9,559,995 System and method for broadcasting contents from web-based browser to a recipient device using extensible...
Disclosed is a system and method for broadcasting one or more contents to a recipient device. The system comprises a web server accessed by a sender device via...
US-9,559,994 Systems and methods for previewing communications sessions
A system and method allows a user to view communications exchanged between other participants within an online chat room without the user becoming a participant...
US-9,559,993 Virtual agent proxy in a real-time chat service
Techniques are disclosed for implementing real-time chat systems including virtual agents as chat participants, and more specifically, to the use of a virtual...
US-9,559,992 System and method for updating information in an instant messaging application
A method is performed by a mobile device having one or more processors and memory for updating information in an instant messenger application installed on the...
US-9,559,991 Automated text response system
An automated message response system includes computer programmable software that stores a bank of pre-recorded responses. Each response is capable of being...
US-9,559,990 System and method for supporting host channel adapter (HCA) filtering in an engineered system for middleware...
A system and method can provide a data service in a network environment. The network environment can include a node, which supports a data service component...
US-9,559,989 Link problem handling
In a computer network comprising a stack device and a plurality of network devices, the plurality of network devices are each connected to the stack device via...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.