Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,596,242 Information processing apparatus, method of controlling the same, and storage medium
An information processing apparatus receives a request from a Web server over a network, adds security information to the request, and determines whether to...
US-9,596,241 Preserving an authentication state by maintaining a virtual local area network (VLAN) association
A method may include detecting a presence of a first server device; communicating, with the first server device, to obtain information associated with the first...
US-9,596,240 Method and system for layer-3 subscriber login in a cable data network
A subscriber login server is used for managing a subscriber login session. The login server is associated with a DHCP server for configuring a premise equipment...
US-9,596,239 Controlling virtual overlay infrastructure
A system has a virtual overlay infrastructure mapped onto physical resources for processing, storage and network communications, the virtual infrastructure...
US-9,596,238 Using clock drift, clock skew, and network latency to enhance machine identification
Methods and systems for authenticating a user device employ a database of global network latencies categorized and searchable by location and calendar date-time...
US-9,596,237 System and method for initiating transactions on a mobile device
Systems and methods are provided for providing a more seamless purchasing experience using a mobile device. The mobile device acquires data, such a barcode...
US-9,596,236 Method for veryifying authorized signer for mobile device based document escrow service
A method for authenticating a user to a document escrow service includes steps of logging a mobile phone onto a mobile network, wherein the mobile phone has a...
US-9,596,235 Power efficient storage management
One or more systems and/or techniques are provided for managing a partially encrypted file system, for storage hardware virtualization, and/or for storage...
US-9,596,234 Methods and systems for providing bidirectional authentication
Methods and systems for providing access to a secure computing device are disclosed. A security device is used to generate a one-time password, a sequence of...
US-9,596,233 Management and authentication in hosted directory service
A user, group, and device management and authentication system allows administrators to manage one or more directories with devices that are not associated with...
US-9,596,232 Managing sharing of wireless network login passwords
Managing sharing of wireless network login passwords is disclosed, including: receiving from a terminal an authentication request to authenticate a wireless...
US-9,596,231 Grid-based authentication on touch-aware devices
Systems and methods for generating secure passwords, personal identification numbers (PINs), and other user credentials using touch-aware devices are described....
US-9,596,230 Conferencing intelligence engine in a collaboration conferencing system
Aspects of the present disclosure involve systems, methods, computer program products, and the like, for collaboration conferencing with multiple participants...
US-9,596,229 Secure port forwarding to access data between public processing locations and on-premise components
A method for transmitting data from an on-premise component to an off-premise computer image includes: sending a message from the off-premise computer image to...
US-9,596,228 Methods and systems for handling trusted content from various service providers
A method including authenticating one or more service providers that provide one or more services to users, the one or more service providers being...
US-9,596,227 Computerized method and system for managing an email input facility in a networked secure collaborative...
In embodiments of the present invention improved capabilities are described for managing an email input facility in a networked secure collaborative computer...
US-9,596,226 Carrier network security interface for fielded devices
Carrier-side security services for fielded devices is disclosed. In contrast to conventional authentication systems for fielded devices, wherein an end-to-end...
US-9,596,225 Out-of-vehicle device interface apparatus and method for protecting in-vehicle network
An out-of-vehicle device interface apparatus includes a request message reception unit, a response message request unit, and a response message transmission...
US-9,596,224 Systems, devices, components and methods for communicating with an IMD using a portable electronic device and a...
The present disclosure involves a method of communicating with an implantable medical device. An authentication process is performed to verify an identity of a...
US-9,596,223 Cross-site, TOTP-based two factor authentication
A host machine has a web browser. A user of the host machine also has a mobile device. A time-based, one-time password (TOTP) authentication scheme leverages a...
US-9,596,222 Method and apparatus encoding a rule for a lookup request in a processor
In one embodiment, a method includes encoding a key matching rule having at least one dimension by storing in a memory (i) a header of the key matching rule...
US-9,596,221 Encryption of user data for storage in a cloud server
Disclosed are systems, methods and computer program products for encryption of user data for storage on a remote network server. In one aspect, an example...
US-9,596,220 Secure protocol for peer-to-peer network
A wireless computing device operating as a controller of a peer-to-peer group configured to generate unique master keys for each device joining the group. The...
US-9,596,219 Method of transmission of encrypted documents
The application discloses an improved method of transmitting encrypted emails by prompting the user to select at least one attachment for attaching with the...
US-9,596,218 Methods and systems of encrypting messages using rateless codes
A method of communicating a message using rateless codes, may include, by a sender electronic device, identifying a message to be sent to a receiver,...
US-9,596,217 Manage encrypted network traffic using spoofed addresses
Methods and systems for managing encrypted network traffic using spoofed addresses. One example method includes receiving a request to resolve a domain name;...
US-9,596,216 Systems and methods for secure cloud-based media file sharing
Cloud-based systems and methods to securely share electronic files use a cloud or virtualized server to handle management tasks related to file sharing, while...
US-9,596,215 Partitioning a filter to facilitate filtration of packets
A method may include obtaining a match vector that indicates one or more filter rules that are potentially applicable to a packet. The method may include...
US-9,596,214 Firewall with two-phase filtering
Two-phase filtering for a firewall is disclosed. In the first, general phase, a request is filtered to verify one or more of: that the request is pursuant to a...
US-9,596,213 Monitoring arrangement
A monitoring arrangement (1) for use with a computer network. The arrangement (1) comprises a filtering module (7) which is operable to filter content delivered...
US-9,596,212 Apparatus, method, and system for hardware-based filtering in a cross-domain infrastructure
An apparatus for hardware-based filtering in a multi-level secure cross-domain infrastructure includes a programmable logic device that includes a filter engine...
US-9,596,211 Cloud based customer premises equipment
Network (cloud) based customer premises equipment may receive, over a broadband access circuit, layer 2 traffic from an access device at a customer premises;...
US-9,596,210 Subscriber-aware duplicate address detection proxy in edge devices
Methods, systems, and apparatus used to provide duplicate address detection in edge devices. Edge devices can include CMTS devices or DSLAMs where network nodes...
US-9,596,209 Causing client device to request a new internet protocol address based on a link local address
The present disclosure discloses a method and a network device for causing client devices to renew DHCP IP addresses based on link local addresses....
US-9,596,208 Event based social networking
A method, apparatus, and computer program product are disclosed for facilitating networked communication. An event creation module is configured to create an...
US-9,596,207 Bootstrap social network using event-related records
Event-related data including at least one event-related record belonging to a first user is received. The event-related record is processed for an event. The...
US-9,596,206 In-line images in messages
In one embodiment, a computing device detects an identifier of an object entered by a user participating in a message session. The message session includes one...
US-9,596,205 System and method for mailing list identification and representation
Disclosed is a system and method for managing mailing list newsletter messages for a recipient user, and organizing such messages in accordance with a receiving...
US-9,596,204 Determination of a navigational text candidate
A method comprising receiving a text input that defines text input information, determining message text information to include the text input information,...
US-9,596,203 Collecting messages from a group chat window that mention a specific user
Collecting online group chat messages. The method may include receiving a message associated with an online group chat session between chat participants. The...
US-9,596,202 Methods and apparatus for throttling electronic communications based on unique recipient count using...
In some embodiments, a mail verification server can use probabilistic methods to determine whether a user's emails should be throttled based on the recipients...
US-9,596,201 Identifying first contact unsolicited communications
Techniques involving identification of electronic messages that are the first contact between the sender identification and addressed recipients. One...
US-9,596,200 Linking selected messages in electronic message threads
Embodiments of the present invention provide methods, computer program products, and systems for linking selected messages in electronic message threads. In one...
US-9,596,199 Enabling and supporting a presence server cache
A method, computer program product, and computer system for enabling and supporting a presence server cache are described herein. A presence server cache may...
US-9,596,198 Enabling and supporting a presence server cache
A method, computer program product, and computer system for enabling and supporting a presence server cache are described herein. A presence server cache may...
US-9,596,197 Techniques for sender-validated message transmissions
Disclosed are various embodiments, implemented in one or more computing devices, for filtering objectionable content from messages prior to transmission of the...
US-9,596,196 Message grouping
Technology for message grouping is provided. In one example, a method may include identifying message addresses to group together. Messages from the message...
US-9,596,195 System and method for targeting information based on message content in a reply
A method of presenting information to a party through a messaging application is described. Responsive to receipt of a communication from a party (e.g., the...
US-9,596,194 System and method for verifying delivery and integrity of electronic messages
The invention provides a system and method for determining when a message is received by a recipient or an agent for the recipient. A link is activated at the...
US-9,596,193 Messaging with flexible transmit ordering
In one embodiment, a system includes a packet reception unit. The packet reception unit is configured to receive a packet, create a header indicating scheduling...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.