Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,648,050 Routing of a service request aimed at an IMS subscriber
A serving call server control function (S-CSCF) server in an IMS network is configured to receive a service request targeting a client device belonging to the...
US-9,648,049 System and method for extending IP multimedia subsystem to HTML5 environments
The present invention provides a system and method for real-time communication signaling between HTML5 endpoints and the IMS Core of a telecommunication...
US-9,648,048 Message handling in an IP multimedia subsystem
A method of handling a Session Initiation Protocol (SIP) communication at a SIP application server within an IP Multimedia Subsystem, the method including...
US-9,648,047 Security device controller
In some embodiments, a security device controller (SDC) is provided. In some embodiments, a security device controller includes receiving a configuration policy...
US-9,648,046 Dynamic adjustment of authentication policy
A computer-implemented method for managing an authentication policy for a user on a network of an organization includes determining at least one social media...
US-9,648,045 Systems and methods involving aspects of hardware virtualization such as hypervisor, detection and interception...
Systems, methods, computer readable media and articles of manufacture consistent with innovations herein are directed to computer virtualization, computer...
US-9,648,044 Securing communication over a network using client system authorization and dynamically assigned proxy servers
A method for securing communication over a network is disclosed. A trust broker system receives a request to connect to applications and resources from a client...
US-9,648,043 Services within reverse proxy servers
Embodiments of the invention provide techniques for processing messages transmitted between computer networks. Messages, such as requests from client devices...
US-9,648,042 Apparatus and method for managing security content using virtual folder
Provided are an apparatus and method for managing security contents using a virtual folder. The apparatus for managing security contents includes a data control...
US-9,648,041 Security management system, input apparatus, security management method, and recording medium
A security management system managing security of plural types of client apparatuses which are mutually connected to each other via a network, includes an...
US-9,648,039 System and method for securing a network
Communications can be proactively monitored using a system that is rules-based instead of anomaly-based or signature-based. Large quantities of information can...
US-9,648,038 Propagation of viruses through an information technology network
Requests to send data from a first host within a network of hosts are monitored against a record of destination hosts that have been sent data in accordance...
US-9,648,037 Security threat detection using access patterns and domain name registrations
Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses associated...
US-9,648,036 Systems for network risk assessment including processing of user access rights associated with a network of devices
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network risk assessment. One of the methods includes...
US-9,648,035 User behavioral risk assessment
A predetermined particular behavioral profile is identified associated with at least one particular user of a computing system, the particular behavioral...
US-9,648,034 Systems and methods for detecting and scoring anomalies
Systems and methods for detecting and scoring anomalies. In some embodiments, a method is provided, comprising acts of: determining whether the digital...
US-9,648,033 System for detecting the presence of rogue domain name service providers through passive monitoring
A method, system, computer program product embodied in a computer readable storage medium, and computer system are disclosed for identifying a rogue domain name...
US-9,648,032 System and method for blocking execution of scripts
Disclosed are exemplary aspects of systems and methods for blocking execution of scripts. An exemplary method comprises: intercepting a request for a script...
US-9,648,031 Identifying an imposter account in a social network
A method for identifying an imposter account in a social network includes a monitoring engine to monitor user accounts of a social network, an identifying...
US-9,648,029 System and method of active remediation and passive protection against cyber attacks
A system and method for active remediation and/or passive protection against cyber attacks includes an active remediation and passive protection server computer...
US-9,648,028 Verification of signed video streams
Methods, apparatus, and systems are disclosed for, among other things, secure passphrase handling for computing devices. In one respect, a method is provided....
US-9,648,027 Segment authentication for dynamic adaptive streaming
A method including generating a segment signature for a segment of a media content based on the segment, trusted information contained in a media presentation...
US-9,648,026 Cryptographic method for securely exchanging messages and device and system for implementing this method
At least one embodiment refers to a method for securely exchanging messages between at least two devices, each of them storing a shared secret key. The method...
US-9,648,025 Using space-filling curves to fingerprint data
A file is received. Contents of the file are transformed using a space-filling curve. One example of a space-filling curve that can be used for the...
US-9,648,024 Using connections between users in a social networking system to regulate operation of a machine associated...
A social networking system includes information identifying a machine (e.g., a robot, a drone, a computer, a thermostat, etc.) and a connection between the...
US-9,648,023 Vehicle module update, protection and diagnostics
Updating, protecting, diagnosing and/or otherwise managing a server, module or other analogous device(s) included on a vehicle for the purposes of facilitating...
US-9,648,022 Digital rights domain management for secure content distribution in a local network
Systems and methods for secure content distribution to playback devices connected to a local network via a residential gateway using secure links are disclosed....
US-9,648,021 HTTPS content filtering method and device
A method for an HTTPS content filtering device includes forwarding a domain name resolution request from a client to a DNS server. One or more virtual IP...
US-9,648,020 License management system
A license management system comprises at least one processor capable of executing processor-executable code coupled with a non-transitory processor-readable...
US-9,648,019 Wi-Fi integration for non-SIM devices
The embodiments herein relate to a method performed by an AAA server (113) for enabling a non-SIM device (101b) to access a first network (100a) via a second...
US-9,648,018 Methods, systems, and computer readable media for controlling deep parsing of diameter messages
A system for controlling deep parsing of Diameter messages comprises a Diameter node. The Diameter node includes at least one processor and a Diameter parsing...
US-9,648,017 Method for controlling a device requiring user-related permissions via a mobile terminal
In a method for controlling a device requiring user-related permissions via a mobile terminal using a local data connection between the mobile terminal and the...
US-9,648,016 Predictive information transmission
Embodiments of a system and methods for predictive transmission of information are generally described herein. In some embodiments, a system includes a ground...
US-9,648,015 Systems and methods for facilitating secure authentication using a biometric-enabled transitory password...
Secure authentication may be facilitated using a biometric-enabled transitory password authentication device. Exemplary implementations may facilitate secure...
US-9,648,014 Methods and apparatus for non-contact radio frequency detection and automatic establishment of corresponding...
Methods and apparatus for establishing secure communications are disclosed. An identifier is received from a personal object such as a ring. This identifier is...
US-9,648,013 Systems, methods and devices for performing passcode authentication
The invention provides systems, methods and devices for performing passcode authentication. In one embodiment of the invention, a method of performing passcode...
US-9,648,012 Automatic propagation of password updates on multiple devices
Embodiments are directed to techniques to automatically propagate password updates onto other devices that use a shared password to protect respective secure...
US-9,648,011 Tokenization-driven password generation
Applications usually require users to present passwords as a form of identification in order to access user accounts. To improve the security and convenience...
US-9,648,010 Relay device, non-transitory storage medium storing instructions executable by the relay device, and service...
A relay device communicates with a server and a client device and includes a storage and a controller. The controller is configured to: receive, from the...
US-9,648,009 Efficient network layer for IPv6 protocol
An electronic device may include a network interface that may enable the electronic device to wirelessly couple the electronic device to other electronic...
US-9,648,008 Terminal identification method, and method, system and apparatus of registering machine identification code
A terminal identification method, a machine identification code registration method and related system and apparatus are disclosed. After receiving a first...
US-9,648,007 Token-based storage service
A token-based storage service may comprise a repository of key-value data. In response to a request to store a data item, the storage service may generate a...
US-9,648,006 System and method for communicating with a client application
A system and method for communicating with a client application that can include at a communication platform, receiving an authorization token of a first client...
US-9,648,005 Method and system for extending network resources campus-wide based on user role and location
A method, system, and computer readable medium is disclosed which utilizes the LISP control plane to increase communications and access to enterprise resources...
US-9,648,004 Secure domain name system
A method and system for authenticating answers to Domain Name System (DNS) queries originating from recursive DNS servers are provided. A verification component...
US-9,648,003 Delegating authorizations
Delegating authorizations sufficient to access services is contemplate. The authorization may be delegated in the form of a token or other transmissible...
US-9,648,002 Location-based user disambiguation
Embodiments are directed to validating the identity of a user. In one scenario, a computer system determines that a login account has been created for a user,...
US-9,648,001 Secure messaging
Systems and methods are disclosed for secure messaging and content sharing. In one implementation, a processor receives a message associated with a recipient,...
US-9,648,000 Authenticating a device when connecting it to a service
There is provided a method and apparatus for authenticating user equipment access to a device over a communications network. The method comprises: sending a...
US-9,647,999 Authentication level of function bucket based on circumstances
Embodiments are directed to systems, methods and computer program products for assigning a level of authentication to an authentication bucket. Embodiments...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.