At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-9,866,555 |
Maintaining user authentications with common trusted devices Various embodiments are generally directed to an apparatus, method, and other techniques to maintain user authentications with common trusted devices. If a user... |
US-9,866,554 |
Mutual authentication method and system with network in machine type
communication A method for a Mobile Mobility Entity (MME) to carry out mutual authentication with a group of Machine Type Communication (MTC) devices includes receiving... |
US-9,866,553 |
Method for securing access to a computer device The invention relates to a method for securing access to a computer device, that includes the step of establishing a secured connection and authentication of... |
US-9,866,552 |
Network authentication of a geo-fenced volume Provided is a method for managing a software defined network using a software control layer to regulate a geo-fenced volume. The software control layer can use... |
US-9,866,551 |
One time password generation device and authentication method using the
same Disclosed are a one time password generation device and an authentication method. The one time password generation device includes: a reference information... |
US-9,866,550 |
System and method to share a resource or a capability of a device A method includes receiving, from a first device at a second device, a message indicating that the first device is available to share a resource. The method... |
US-9,866,549 |
Antialiasing for picture passwords and other touch displays Antialiasing for picture passwords and other touch displays is disclosed. In some embodiments a client device for authenticating a user is operable to obtain a... |
US-9,866,548 |
Authentication-free configuration for service controllers Embodiments generally relate to out-of-band management of a computing system. The present technology discloses enable a primary service controller to provide a... |
US-9,866,547 |
Controlling a discovery component, within a virtual environment, that
sends authenticated data to a discovery... A discovery bundle component is applied in a virtual image deployed within a virtual environment, wherein the discovery bundle automatically discovers asset... |
US-9,866,546 |
Selectively enabling multi-factor authentication for managed devices Disclosed are various examples of selectively enabling multi-factor authentication for applications on managed devices. An identity provider receives an... |
US-9,866,545 |
Credential-free user login to remotely executed applications Provided is a process including: receiving, with an intermediary server, a request to access web content at a web server; submitting, from the intermediary... |
US-9,866,544 |
Systems and methods for location-based authentication Systems and methods are disclosed for performing location-based authentication using location-aware devices. One method includes: receiving an access request... |
US-9,866,543 |
Authentication through multiple pathways based on device capabilities and
user requests There are provided systems and methods for authentication through multiple pathways depending on device capabilities and user requests. A user may wish to... |
US-9,866,542 |
Responding to electronic in-vehicle intrusions A system and method of responding to unauthorized electronic access to a vehicle includes: receiving data indicating unauthorized electronic access to... |
US-9,866,541 |
Communication control apparatus, communication control method, and
recording medium A communication unit and a controller are included, the communication unit being configured to communicate with a communication apparatus using a first... |
US-9,866,540 |
System and method for rule matching in a processor In one embodiment, a system includes a format block configured to receive a key, at least one rule, and rule formatting information. The rule can have one or... |
US-9,866,539 |
System and method for protecting transmission of audio data from
microphone to application processes Disclosed are systems and methods for protecting transmission of audio data from microphone to application process. An exemplary method includes receiving a... |
US-9,866,537 |
Systems and methods for long universal resource locator compression Methods and systems for managing universal resource locators (URLs) at a server include receiving, at the server, a search query from a client device; creating,... |
US-9,866,536 |
Privacy preserving registry browsing A method, system, and computer-readable memory containing instructions include requesting a tokenizing authority to provide a tokenized string that represents a... |
US-9,866,535 |
Content reproduction system, information processing terminal, media
server, secure device, and server secure device A content reproduction system includes an information processing terminal (102) and a secure device (103). The information processing terminal (102) receives a... |
US-9,866,534 |
Computer ecosystem providing privacy and tracking in sharing
user-generated content Methods and apparatus are disclosed for securely sharing user-generated content using DRM principles, and for tracking statistics of content viewing. In this... |
US-9,866,533 |
Secured cloud data storage, distribution and restoration among multiple
devices of a user A method is provided to share a content stored on a secured server. The content is associated to a first electronic device and encrypted using a public key of... |
US-9,866,532 |
Anonymization of traffic patterns over communication networks A computer-implemented method of obfuscating communication traffic patterns occurring over a cloud-based communication infrastructure includes detecting first... |
US-9,866,531 |
Traversing firewalls A remote administrator device is provided outside a firewall that prevents remote devices from accessing, but allows remote devices to send electronic mail... |
US-9,866,530 |
Method and apparatus for provision of secure connection A method and apparatus is shown for provision of a secure connection via a public network. In a particular implementation, a communication session may be... |
US-9,866,529 |
Systems and methods for ETAG persistency The systems and methods of the present solution are directed to providing Entity Tag persistency by a device intermediary to a client and a plurality of... |
US-9,866,528 |
System and method for interlocking a host and a gateway A method is provided in one example embodiment and includes exchanging a session descriptor associated with a network connection and an application on a host,... |
US-9,866,527 |
Information processing device and information processing method An information processing device is connected to a plurality of networks and performs information processing. The networks include a control network connected... |
US-9,866,526 |
Presentation of candidate domain name stacks in a user interface A system and method for the generation and presentation of candidate domain names are presented. The method includes receiving, by at least one server... |
US-9,866,525 |
Source-destination network address translation (SDNAT) proxy and method
thereof A proxy and method for performing source destination network address translation are presented. The method includes receiving a first message from a node... |
US-9,866,524 |
Home gateway apparatus and packet transfer method In order to provide a home gateway apparatus capable of smoothly executing transfer processing while ensuring security, when transferring a packet between a... |
US-9,866,523 |
Method and system for increasing speed of domain name system resolution
within a computing device A system for resolving domain name system (DNS) queries, contains a communication device for resolving DNS queries, wherein the communication device further... |
US-9,866,522 |
Method to control dynamic host configuration protocol pool exhaustion in
dynamic network environments The present disclosure discloses a method and a network device for controlling DHCP pool exhaustion in dynamic network environments. Specifically, a network... |
US-9,866,521 |
Methods, systems, and computer readable storage devices for determining
whether to forward requests from a... A determination is made whether to forward a request for communication services associated with a specific number range from a physical telephone number mapping... |
US-9,866,520 |
Method and apparatus for managing internet content A method and apparatus for managing Internet content is disclosed. An apparatus that incorporates teachings of the present disclosure may include, for example,... |
US-9,866,519 |
Name resolving in segmented networks A method is provided, in one embodiment, which is performed on a client computing device, the method comprising: connecting the client with a plurality of... |
US-9,866,518 |
Introduction and communication system A communication system to facilitate introduction and communication of two of the user's acquaintances, regardless of which contact information the user has on... |
US-9,866,517 |
Inter-modal messaging communication Inter-modal messaging communication is described. In one embodiment, a method of communication includes receiving an electronic mail message to be distributed... |
US-9,866,516 |
Method and apparatus of processing social networking-based user input
information A method and apparatus of processing communications with end users are disclosed. One example method may include detecting a message or post on a website over... |
US-9,866,515 |
Facilitating interaction among users of a social network In one embodiment, a computing device receives an indication of a first user action by a first user. The computing device determines a topic of the first user... |
US-9,866,514 |
Electronic message organization via social groups A mechanism for automatically organizing electronic messages is described herein. Social groups of a particular user that may be representative of topics,... |
US-9,866,513 |
Systems and methods to control the lifetime of online posts Systems and methods to control the lifetime of social networking posts. The viewable range and/or duration of a post is determined as a function (e.g.,... |
US-9,866,512 |
Social network communities for support and accountability based on tracked
tips Bookmarking content modules and tracking scores of user properties against the bookmarked content modules on a computer implemented social network are provided.... |
US-9,866,511 |
Ensuring that a composed message is being sent to the appropriate
recipient A method, system and computer program product for ensuring that the composed message is being sent to the appropriate recipient. A message being composed by an... |
US-9,866,510 |
Coordinated notifications across multiple channels A server system can provide coordinated event-based notifications to a target user across multiple notification channels. The selection of channels for a... |
US-9,866,509 |
Spam filtering and person profiles Systems and methods to reduce false positives in spam filtering. In one aspect, a method includes automatically generating profiles for persons identified in... |
US-9,866,508 |
Aggregating and presenting recent activities for synchronized online
content management systems Systems, methods, and computer-readable storage media for aggregating and presenting recent activities for online synchronized content management system are... |
US-9,866,507 |
Method of monitoring well-being of semi-independent persons and system
thereof A client system for monitoring elders in a residential setting, the client system comprising communication apparatus operative for sending real time... |
US-9,866,506 |
Method of controlling group chatting in portable device and portable
device performing the same A method of controlling group chatting in a portable device, and a portable device performing the same, which are capable of extracting and displaying a dialog... |
US-9,866,505 |
Configuring presence and notifications in persistent conversations Implementations generally relate to configuring presence and notifications in persistent conversations. In one implementation, a method includes receiving a... |