Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,794,252 Information processing system and device control method
An information processing system includes a terminal device connected to a first network; and an information processing device connected to a second network...
US-9,794,251 Systems and methods for authenticating using air-blow by user
The disclosure related generally to systems and methods for authenticating using air-blow by user. At least one input device receives one or more air-blows...
US-9,794,250 On-demand service security system and method for managing a risk of access as a condition of permitting access...
In accordance with embodiments, there are provided mechanisms and methods for managing a risk of access to an on-demand service as a condition of permitting...
US-9,794,249 Using a digital certificate with multiple cryptosystems
In a general aspect, a digital certificate can be used with multiple cryptography systems ("cryptosystems"). In some cases, the digital certificate includes a...
US-9,794,248 Alternative approach to deployment and payment for digital certificates
A method for managing payment of digital certificates includes receiving a request to issue a digital certificate to a subscriber, capturing and saving payment...
US-9,794,247 Method to prevent cloning of electronic components using public key infrastructure secure hardware device
An electronic component includes a processor and a memory. The electronic component has a secure platform capable of storing at least one dual key pair and a...
US-9,794,246 Increased communication security
An apparatus may include a communication interface and a security component. The communication interface may be configured to receive a Constrained Application...
US-9,794,245 Credential technology
In one implementation, a server system receives, from a device of a user, a request to add a credential issued by an organization and authentication information...
US-9,794,244 Method for operating a network and a network
A method for operating a network in which a Software-Defined Networking (SDN) functionality between at least some of a plurality of elements of the network is...
US-9,794,243 Systems and methods for location-based device security
A device may collect environmental information surrounding the device. Based on the collected environmental information, the device may automatically identify a...
US-9,794,242 Method, apparatus and application platform for realizing logon to an application service website
The present disclosure provides a method for realizing logon to an application service website on an operation platform, including when a user terminal visits...
US-9,794,241 System and method for connecting to security device by means of peer-to-peer (P2P) relay demon
A system and method for connecting to a security device by means of a Peer-to-Peer (P2P) relay demon. In the present disclosure, a P2P technology is applied to...
US-9,794,240 System and method for signaling and verifying URL signatures for both URL authentication and URL-based content...
Signaling and verifying URL signatures for accessing URL addressable content in adaptive streaming. A plurality of URL authentication and URL authorization...
US-9,794,239 Method and system for authenticating service providers to communicate with a primary service provider
A method and system for authenticating a user device includes an identity provider reading service and an external service provider receiving a request to...
US-9,794,238 System for key exchange in a content centric network
One embodiment provides a system that facilitates secure communication between computing entities. During operation, the system generates, by a ...
US-9,794,237 Secured networks and endpoints applying internet protocol security
A method of managing secure communications states in an endpoint within a secure network is disclosed. The method includes, in a disconnected state,...
US-9,794,236 Method and system for the supply of data, transactions and electronic voting
A method and system for supply of data, including generating a first digital certificate referred (empowerment certificate) signed with a first signing entity's...
US-9,794,235 Systems and methods for encrypted communication in a secure network
A method for users of devices including mobile phones and computers to engage in encrypted communications with other devices using asymmetrical key exchange...
US-9,794,234 Pairwise pre-shared key generation system
A Key Generation System (KGS) includes a key server, a first network element, and a second network element. The first and second network elements register with...
US-9,794,233 Systems and methods for application identification
Systems and methods for application identification in accordance with embodiments of the invention are disclosed. In one embodiment, a user device includes a...
US-9,794,232 Method for data privacy in a fixed content distributed data storage
A storage cluster of symmetric nodes includes a data privacy scheme that implements key management through secret sharing. The protection scheme preferably is...
US-9,794,231 License management using cloud based enrollment
Systems and methods are disclosed for registering a host computing device at a server and registering a lock device at the server via an application running on...
US-9,794,230 Method and system for encrypting multimedia streams
A method and system for encrypting data packets in a multimedia stream are disclosed. Each data packet includes a header portion and a payload portion. In one...
US-9,794,229 Behavior analysis based DNS tunneling detection and classification framework for network security
New and improved techniques for a behavior analysis based DNS tunneling detection and classification framework for network security are disclosed. In some...
US-9,794,228 Security challenge assisted password proxy
Systems, apparatus, and methods of authentication utilizing contextual data to authenticate individuals and prevent security breaches are described herein. An...
US-9,794,226 Methods, apparatuses and articles for identifying and authorizing location servers and location services using...
Techniques are provided which may be implemented in various methods, apparatus, and/or articles of manufacture to allow a mobile device to obtain certain...
US-9,794,225 Secure network communications in a mobile device over IPsec
Methods and systems of communicating with secure endpoints included within a secured network from a mobile device external to the secured network is disclosed....
US-9,794,224 System and method for creating a trusted cloud security architecture
The present invention provides a method for providing a computer implemented method and system for creating a trusted cloud security architecture having the...
US-9,794,223 System and method for facilitating data leakage and/or propagation tracking
Systems and methods for facilitating data leakage and/or propagation tracking are provided. In some embodiments, a set of hashes associated with files of a user...
US-9,794,222 Stateful processing for stateless forwarding element
Some embodiments provide a method for performing stateful processing of a packet at a flow-based managed forwarding element (MFE). The method receives a packet...
US-9,794,221 Recovery of a failed registry
A system, method, and computer-readable medium, is described that enables a registry recovery service to retrieve zone files from a target registry, archive the...
US-9,794,220 Wireless extension of broadband access
Wireless extension of a wired network through the use of strand-mounted access nodes. In some aspects, private network addresses may be assigned to wireless...
US-9,794,219 Systems and methods for ARP resolution over an asynchronous cluster network
In the present solution, when a cluster node sends an ARP request for an external IP, the node sends a message to all the other nodes, which are part of the...
US-9,794,218 Persistent network addressing system and method
An improved computer system for maintaining a network connection whereby a local computer stores a persistent address application, which adapts at least one...
US-9,794,217 Attention commands enhancement
A method of performing a packet domain event report by a mobile termination (MT) of a user equipment (UE) to a terminal equipment (TE) of the UE; and the UE...
US-9,794,216 Request routing in a networked environment
A system, methods, and interfaces for managing request routing functionality associated with resource requests for one or more resources associated with a...
US-9,794,215 Private tunnel network
A processor-based system and method comprising a private tunnel connector operable to receive a network connection request, test the connection request for...
US-9,794,214 Grouping electronic messages
Arrangements relate to the grouping electronic messages by a messaging client. A plurality of electronic messages to a message recipient from a sender...
US-9,794,213 Social interaction data preservation for augmented photos
Embodiments of the present invention provide a method, system and computer program product for social interaction data preservation for augmented photos. In an...
US-9,794,212 Ascertaining events in media
Disclosed are various embodiments relating to the identification of events that occur within a media item. A plurality of messages are received from client...
US-9,794,211 Event-based comment grouping for content items
A method for event-based comment grouping for content items is disclosed. The method includes identifying comments corresponding to a content item, the comments...
US-9,794,210 Priority assignment based on similarity
Priority assignment embodiments are discussed. In one embodiment, a system comprises a comparison component configured to make a first comparison of a first...
US-9,794,209 User interface for multi-modality communication
Disclosed herein are example embodiments for multi-modality communication user interfaces. By way of example but not limitation, at least one user interface...
US-9,794,208 Method of and system for constructing a listing of e-mail messages
There is provided a method of constructing a listing of e-mail messages, the method comprising: retrieving, by at least one server, information in respect of a...
US-9,794,207 Email conversation management system
System and methods of searching conversations are provided. At a computing device having one or more processors and memory storing programs executed by the one...
US-9,794,206 Method and apparatus for managing the display of messages of a group chat
A computing device performs a method of managing the display of messages on its screen. After receiving a first user request to open a target communication...
US-9,794,205 Modifying rich media components for an interactive email
An interactive email experience is customized to the recipient's interests by modifying rich media components provided by the email based on the recipient's...
US-9,794,204 Method and apparatus for forwarding multimedia message
A method and an apparatus for forwarding a multimedia message are provided. The method for forwarding a multimedia message includes that a gateway receives a...
US-9,794,203 Communication systems and methods
Example communication systems and methods are described. In one implementation, a method receives a message from a message server and identifies a network link...
US-9,794,202 Messaging including standard and custom characters
Embodiments of the present technology enable messages including both standard and custom characters to be communicated between client devices. Each of the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.