Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,571,493 System and method for a storage area network virtualization optimization
A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming...
US-9,571,492 Hardware identification through cookies
Multiple cookies of a client device are used to form an identifier of the client device such that a change in one or even several browser cookies does not...
US-9,571,491 Discovery of familiar claims providers
Aspects of the subject matter described herein relate to identity technology. In aspects, profile data is mined to determine claims providers with which a user...
US-9,571,490 Method and system for distinguishing humans from machines
A method and an apparatus for distinguishing humans from computers. During user registration, a computer prompts a human user to provide a spoken response to...
US-9,571,489 System and method for performing commands from a remote source
According to one embodiment of the invention, a method for secured execution of commands is described. Initially, a second electronic device authenticates a...
US-9,571,488 Adaptive timeouts for security credentials
Session-specific information stored to a cookie or other secure token can be selected and/or caused to vary over time, such that older copies will become less...
US-9,571,487 Systems and methods for providing a covert password manager
The present invention relates to an application that is configured to provide secure access to confidential information. To protect the confidential...
US-9,571,486 System and method for authentication
The purpose of the invention is to provide a password with lower cost but higher safety used in an authentication system, and users may choose one specific...
US-9,571,485 Spatial and temporal verification of users and/or user devices
Approaches for facilitating spatial and temporal verification of users and/or user devices are disclosed. In some implementations, a user device may be detected...
US-9,571,484 Device certificate based appliance configuration
Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer...
US-9,571,483 Multi user device management system
Disclosed is a personal device container system. The personal device container system typically includes a processor, a memory, and an access management module...
US-9,571,482 Secure on-line sign-up and provisioning for Wi-Fi hotspots using a device management protocol
Embodiments of a mobile device and method for secure on-line sign-up and provisioning of credentials for Wi-Fi hotspots are generally described herein. In some...
US-9,571,481 Once only distribution of secrets
A secret distribution system may disclose a secret once to a client computing resource while maintaining the privacy of the message and allowing for recovery...
US-9,571,480 Authentication methods and apparatus
Methods and apparatus for authenticating a user equipment device (UE) requesting services through a session border controller (SBC) are described. In some...
US-9,571,479 Role-based access control using dynamically shared cloud accounts
A server computer system within a network of an organization receives a request from a user to access a cloud account. The request includes a user identifier....
US-9,571,478 Conditional request processing
A method and system for processing a request is provided. An example system includes a security module that authenticates a request from a client. The system...
US-9,571,477 Mechanism for facilitating remote access of user and device credentials for remoting device activities between...
A mechanism is described for facilitating remote access of device and user credentials for at computing devices according to one embodiment of the invention. A...
US-9,571,476 Multi-platform single sign-on database driver
Systems and methods of performing single sign-on authentication from multiple platforms when establishing a connection to a database are described. An...
US-9,571,475 Call encryption systems and methods
Techniques described herein may be used to encrypt a telephone call between users. User devices (e.g., smart phones) may be connected to encryption relay...
US-9,571,474 Method for providing a service based on tag information, and corresponding tag and tag reading device
A method for providing a service by a server to a reader device is disclosed, the provision being based on the readout information of a readout operation by the...
US-9,571,473 Early content engine receiver synchronization
An HDCP receiver device that receives frames from an HDCP transmitter device. The receiver device has a frame counter that is updated for each frame that is...
US-9,571,472 Establishing an initial root of trust for individual components of a distributed security infrastructure
The embodiments described herein describe technologies for a device definition process to establish a unique identity and a root of trust of a cryptographic...
US-9,571,471 System and method of encrypted transmission of web pages
Disclosed are systems and method for encrypted transmission of web pages. One exemplary method comprises: receiving, by a proxy server, a web page requested by...
US-9,571,470 Communication system, management server, server, concentrator, and encryption setting method
After an IP address of a concentrator is changed by a management server (management platform), a server and the concentrator acquire the changed IP address of...
US-9,571,469 Computer implemented system and method for ahead-of-time delivery of electronic content
A computer implemented system, method and a computer program product for ahead of time delivery of electronic content, have been provided. A file policy...
US-9,571,468 Encoding data using a variable number of pixels and bits based on entropy
Electronic information is encoded and transmitted by comparing values of adjacent pixels in an electronic image, determining an amount of entropy present in...
US-9,571,467 Information management system, information processing device, and non-transitory computer readable medium
An information management system includes an information processing device, and an information management device that prepares log information indicating a...
US-9,571,465 Security verification by message interception and modification
Data security is enhanced by injecting insecurity into communications between two computer systems to test one of the computer systems. The insecurity is...
US-9,571,464 Network-enabled device provisioning
Systems, devices, and techniques for network-enabled device provisioning are disclosed herein. In some embodiments, a network-enabled device may include: a...
US-9,571,463 Policy-based access control in content networks
Systems and techniques for policy-based access control in content networks are herein described. Content and metadata describing the content may be encrypted by...
US-9,571,462 Extensible personality-based messaging system in a distributed computerized infrastructure for establishing a...
An extensible personality-based secure messaging infrastructure deployed in a computerized system comprising at least one central processing unit, a memory, a...
US-9,571,461 Adaptive communication anonymization
A method identifies anonymized parties in a transmitted communication. A sender replaces one or more communication party identifiers in control data within a...
US-9,571,460 Adaptive communication anonymization
A system and computer program product identifies anonymized parties in a transmitted communication. A sender replaces one or more communication party...
US-9,571,459 Synchronizing a routing-plane and crypto-plane for routers in virtual private networks
Techniques are presented herein for optimizing secure communications in a network. A router in a virtual private network determines whether or not it has...
US-9,571,458 Anti-replay mechanism for group virtual private networks
A virtual private network (VPN) device is described that provides a strict anti-replay mechanism for packets in a group VPN. An example first VPN device...
US-9,571,457 Dynamically defined virtual private network tunnels in hybrid cloud environments
A plurality of virtual private network (VPN) tunnels between a first cloud and a second cloud in a hybrid cloud environment are managed by a VPN Manager. A...
US-9,571,456 Systems and methods for fine grain policy driven clientless SSL VPN access
The present disclosure provides solutions that may enable an enterprise providing services to a number of clients to determine whether to establish a client...
US-9,571,455 Remote credential management for hybrid clouds with enterprise networks
A system and method of initializing a virtual machine within a secure hybrid cloud is disclosed. One method includes transmitting service mode credentials to a...
US-9,571,454 Dynamic re-ordering of scanning modules in security devices
A method and apparatus are provided for preserving bandwidth of a security gateway by dynamically placing a module with a highest ratio of block rate to...
US-9,571,453 Kernel-level security agent
A kernel-level security agent is described herein. The kernel-level security agent is configured to observe events, filter the observed events using...
US-9,571,452 Deploying a security policy based on domain names
A firewall uses a variety of techniques to obtain a useful domain name from a network request, that is, a domain name that facilitates the accurate enforcement...
US-9,571,451 Creating network isolation between virtual machines
A method, system, and program product for creating network isolation between virtual machines is provided, including receiving, by a security virtual machine...
US-9,571,450 Detecting and correcting network interruptions using network address translation
Embodiments provide a network address translation (NAT) service for network devices. A network connection from at least one private network device to the NAT...
US-9,571,449 Technique for operating a vehicle effectively and safely
A control system is employed in a vehicle to assist a user to operate the vehicle effectively and safely. In accordance with the invention, the system provides...
US-9,571,448 Address assignment protocol
Exemplary embodiments of the present invention provide a method comprising receiving, at a node, an address assignment message, allocating, by the node, a...
US-9,571,447 System and method for accessing information
A mobile terminal accesses global DNS server using a URI of a resource in an intranet. The global DNS server returns an IP address of an intranet domain access...
US-9,571,446 Messaging media to go viral
Systems and techniques are disclosed for transmitting a message via one or more platforms, the messages being associated with media content and/or related media...
US-9,571,445 Unified messaging system and method with integrated communication applications and interactive voice recognition
A method and apparatus for a computer and telecommunication network which can receive, send and manage information from or to a subscriber of the network, based...
US-9,571,444 Building a proximate social networking database based on relative distance profiling of two or more operably...
Computer systems and methods for generating a social network of users based on the users' devices being operably coupled are discussed herein. Specifically,...
US-9,571,443 Mobile device message enabled on-line community bulletin board
A community information sharing system, method and program product therefore. A communications network with connected communications devices serves community...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.