Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,667,700 Rendering a redeemable document
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for detecting documents within content received by a computing device....
US-9,667,699 Method for transmitting data via a CANopen bus
The invention relates to a method for transmitting data between a first automation appliance, and at least one second automation appliance, via a CANopen bus...
US-9,667,698 Secure port forwarding to access data between public processing locations and on-premise components
A method for transmitting data from an on-premise component to an off-premise computer image includes: sending a message from the off-premise computer image to...
US-9,667,697 Direct memory access with conversion or reverse conversion of data
The transfer data amount between a server and storage is effectively reduced, and the broadband of an effective band between the server and the storage is...
US-9,667,696 Low latency web-based DICOM viewer system
Systems and methods of the present invention enable low latency viewing of medical images over a network and therefore can fulfill the functionality that is...
US-9,667,695 Method and device for publishing promotion contents and computer storage medium
A method and device for publishing promotion contents and computer storage medium are described. The compatibility of the promotion content publishing method...
US-9,667,694 Capturing and automatically uploading media content
A computer-implemented method for automatically uploading media content from a mobile device to an online service provider can include receiving, in the mobile...
US-9,667,692 System and method for remote analysis, remote training or remote maintenance on a mobile machine
A system for remote analysis, remote training and/or remote maintenance on a mobile machine comprises a first display unit (10), command input means and a...
US-9,667,689 System and method for providing real-time data
A system and method for providing real-time data to a Rich Internet Application is disclosed. The graphical and networking features of RIA frameworks in...
US-9,667,686 System and method for improving audio quality during web conferences over low-speed network connections
A method that includes: (1) transmitting, at a first transmit time point, a first probe packet over a network connection to a conferencing server immediately...
US-9,667,683 Scalable architecture for media mixing
A proxy mixer includes a transceiver configured to receive one or more first requests to provide one or more first media streams to one or more first endpoints....
US-9,667,681 Systems and methods for providing messages to multiple subscribers
Methods, systems, and apparatus, including computer programs encoded on a computer storage device, for: receiving messages from a plurality of publishers;...
US-9,667,679 Indicating an association between a social-media account and a media playback system
Examples disclosed herein include a social-media computing system receiving, from a first computing device, a first message indicating that a media playback...
US-9,667,676 Real time collaboration and document editing by multiple participants in a content management system
A content management system allows users to collaboratively edit, draft, or otherwise work with the same content item simultaneously by displaying a real-time...
US-9,667,673 Extending EPON multi-point control protocol to run on Ethernet PON over coax networks
A method implemented by a middlebox comprising registering a customer premises equipment (CPE) in the middlebox, wherein the CPE is coupled to the middlebox via...
US-9,667,671 Method and system for facilitating communication between message consumers and message producers
A method and system for facilitating communication between message producers and message consumers is disclosed. When a message producer is interested in...
US-9,667,670 Identifying intended communication partners in electronic communications
An apparatus, computer program product, and method for assisting communication with an intended communication partner. The apparatus may include a user...
US-9,667,669 Managing associated sessions in a network
A method and a system for managing associated sessions in a network is described, wherein the network comprises a network element configured for managing...
US-9,667,665 Session initiation protocol (SIP) communications over trusted hardware
A server system exchanges trust signaling with a first access network, establishes hardware trust with the first access network, and determines that the first...
US-9,667,664 Providing SIP signaling data for third party surveillance
A method for facilitating surveillance of a targeted user participating in communication sessions conducted over a communications network, such as a voice over...
US-9,667,663 Electronic messaging exchange
A computer-implemented system and method for secure electronic message exchange including coupling a control platform to a workstation of a plurality of...
US-9,667,662 Lawful interception for targets in a proxy mobile internet protocol network
A method for providing Law Enforcement Agencies in a telecommunications network with interception and/or retention data related to a target mobile node in a...
US-9,667,659 Determining security factors associated with an operating environment
Embodiments of the present invention disclose a method, computer program product, and system for determining security factors associated with an operating...
US-9,667,654 Policy directed security-centric model driven architecture to secure client and cloud hosted web service...
A policy directed, security-centric model driven architecture is described to secure internal web services, such as those implementing service-oriented...
US-9,667,653 Context-aware network service policy management
A method includes converting, by a computer, a set of context-aware data forwarding policies to a set of network configuration forwarding rules for one or more...
US-9,667,652 Mobile remote access
Providing mobile remote access in a secure manner. A bridge application is provided for devices such as smart phones which establishes a first secure connection...
US-9,667,647 Detecting malicious resources in a network based upon active client reputation monitoring
Systems and methods for detecting malicious resources by analyzing communication between multiple resources coupled to a network are provided. According to one...
US-9,667,645 Performance benchmarking for simulated phishing attacks
Described herein are methods, network devices and machine-readable media for conducting a simulated phishing attack on a first group of individuals, and...
US-9,667,639 Systems and methods for detecting fraudulent electronic communication
Systems and methods are presented for receiving a plurality of request messages to analyze electronic communications. For each request message of the plurality...
US-9,667,634 Method and apparatus for providing an adaptable security level in an electronic communication
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a frame type, and...
US-9,667,632 Reliable configuration for network access
A system, method and device for reliable configuration for network access. The method includes connecting an AP to a computer, connecting one or more clients...
US-9,667,627 Airport security check system and method therefor
A decryption system for decrypting user identification information encrypted on a storage device associated with a user identity document is disclosed. The...
US-9,667,626 Network authentication method and device for implementing the same
A method is to be implemented using a network authentication device and a user end for authenticating the user end. The network authentication device stores...
US-9,667,623 Authentication apparatus that assists input of user ID and password authentication method, and recording medium
An authentication apparatus includes an authentication determination circuit, a partial determination circuit, and a combination determination circuit. The...
US-9,667,622 Managing access to an on-demand service
In accordance with embodiments, there are provided mechanisms and methods for managing a risk of access to an on-demand service as a condition of permitting...
US-9,667,621 Providing data security with a token device
A computer-implemented method for providing security to access and store data may include transferring first information for display from a token device having...
US-9,667,620 Encryption methods and apparatus
The embodiments discussed herein relate to updating and encrypting passwords for one or more computing devices. The computing devices can be associated with a...
US-9,667,619 Systems and methods for utilizing client side authentication to select services available at a given port number
Typically, clients request a service from a computer hosting multiple services by specifying a destination port number associated with the desired service. In...
US-9,667,618 Method for domain control validation
A system and method for domain control validation is presented. At a certificate authority a request is received. The request includes a certificate signing...
US-9,667,617 Automatic elevation of system security
A system for automatic setting of system security comprises an input interface and a processor. The input interface is configured to receive an indication to...
US-9,667,616 Authentication processing apparatus, authentication processing system, authentication processing method and...
A communication apparatus sends a processing request, including request information, a digital signature, and an electronic certificate, to a control apparatus....
US-9,667,615 In-vehicle communication system
The present invention is directed to solve a problem that time is required for a process related to verification of a public key certificate of a message...
US-9,667,614 Systems and methods for setting up a collaborative communication system
A collaborative communication system comprises a highly flexible architecture that facilitates connecting communication devices and networks to establish...
US-9,667,613 Detecting mobile device emulation
A technique detects mobile device emulation. The technique involves identifying, by processing circuitry, a user apparatus for mobile device emulation...
US-9,667,612 CAPTCHA provision method and program
[Problem] To selectively provide, in accordance with a user terminal a CAPTCHA that can be easily executed by an operator of the user terminal. [Solution] A web...
US-9,667,611 Situationally aware authentication
Improved techniques involve selecting a set of authentication factors from among multiple factors based on a current situation and information about how well...
US-9,667,605 Electronic communication system and method for communication of the same in an open environment
An electronic communication system and a method allowing communication to be performed in an open environment are provided for a server to authenticate a user...
US-9,667,604 Tunnel interface for securing traffic over a network
Methods and systems for a flexible, scalable hardware and software platform that allows a managed security service provider to easily provide security services...
US-9,667,603 Methods and systems for filtering encrypted traffic
Application programming interface (API) hooks are injected into an application program executing at a client during run-time. Responsive to these hooks, data...
US-9,667,602 Off-host authentication system
An off-host authentication system includes an authentication information handling system (IHS) that is coupled to a network. The off-host authentication system...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.