Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,866,555 Maintaining user authentications with common trusted devices
Various embodiments are generally directed to an apparatus, method, and other techniques to maintain user authentications with common trusted devices. If a user...
US-9,866,554 Mutual authentication method and system with network in machine type communication
A method for a Mobile Mobility Entity (MME) to carry out mutual authentication with a group of Machine Type Communication (MTC) devices includes receiving...
US-9,866,553 Method for securing access to a computer device
The invention relates to a method for securing access to a computer device, that includes the step of establishing a secured connection and authentication of...
US-9,866,552 Network authentication of a geo-fenced volume
Provided is a method for managing a software defined network using a software control layer to regulate a geo-fenced volume. The software control layer can use...
US-9,866,551 One time password generation device and authentication method using the same
Disclosed are a one time password generation device and an authentication method. The one time password generation device includes: a reference information...
US-9,866,550 System and method to share a resource or a capability of a device
A method includes receiving, from a first device at a second device, a message indicating that the first device is available to share a resource. The method...
US-9,866,549 Antialiasing for picture passwords and other touch displays
Antialiasing for picture passwords and other touch displays is disclosed. In some embodiments a client device for authenticating a user is operable to obtain a...
US-9,866,548 Authentication-free configuration for service controllers
Embodiments generally relate to out-of-band management of a computing system. The present technology discloses enable a primary service controller to provide a...
US-9,866,547 Controlling a discovery component, within a virtual environment, that sends authenticated data to a discovery...
A discovery bundle component is applied in a virtual image deployed within a virtual environment, wherein the discovery bundle automatically discovers asset...
US-9,866,546 Selectively enabling multi-factor authentication for managed devices
Disclosed are various examples of selectively enabling multi-factor authentication for applications on managed devices. An identity provider receives an...
US-9,866,545 Credential-free user login to remotely executed applications
Provided is a process including: receiving, with an intermediary server, a request to access web content at a web server; submitting, from the intermediary...
US-9,866,544 Systems and methods for location-based authentication
Systems and methods are disclosed for performing location-based authentication using location-aware devices. One method includes: receiving an access request...
US-9,866,543 Authentication through multiple pathways based on device capabilities and user requests
There are provided systems and methods for authentication through multiple pathways depending on device capabilities and user requests. A user may wish to...
US-9,866,542 Responding to electronic in-vehicle intrusions
A system and method of responding to unauthorized electronic access to a vehicle includes: receiving data indicating unauthorized electronic access to...
US-9,866,541 Communication control apparatus, communication control method, and recording medium
A communication unit and a controller are included, the communication unit being configured to communicate with a communication apparatus using a first...
US-9,866,540 System and method for rule matching in a processor
In one embodiment, a system includes a format block configured to receive a key, at least one rule, and rule formatting information. The rule can have one or...
US-9,866,539 System and method for protecting transmission of audio data from microphone to application processes
Disclosed are systems and methods for protecting transmission of audio data from microphone to application process. An exemplary method includes receiving a...
US-9,866,537 Systems and methods for long universal resource locator compression
Methods and systems for managing universal resource locators (URLs) at a server include receiving, at the server, a search query from a client device; creating,...
US-9,866,536 Privacy preserving registry browsing
A method, system, and computer-readable memory containing instructions include requesting a tokenizing authority to provide a tokenized string that represents a...
US-9,866,535 Content reproduction system, information processing terminal, media server, secure device, and server secure device
A content reproduction system includes an information processing terminal (102) and a secure device (103). The information processing terminal (102) receives a...
US-9,866,534 Computer ecosystem providing privacy and tracking in sharing user-generated content
Methods and apparatus are disclosed for securely sharing user-generated content using DRM principles, and for tracking statistics of content viewing. In this...
US-9,866,533 Secured cloud data storage, distribution and restoration among multiple devices of a user
A method is provided to share a content stored on a secured server. The content is associated to a first electronic device and encrypted using a public key of...
US-9,866,532 Anonymization of traffic patterns over communication networks
A computer-implemented method of obfuscating communication traffic patterns occurring over a cloud-based communication infrastructure includes detecting first...
US-9,866,531 Traversing firewalls
A remote administrator device is provided outside a firewall that prevents remote devices from accessing, but allows remote devices to send electronic mail...
US-9,866,530 Method and apparatus for provision of secure connection
A method and apparatus is shown for provision of a secure connection via a public network. In a particular implementation, a communication session may be...
US-9,866,529 Systems and methods for ETAG persistency
The systems and methods of the present solution are directed to providing Entity Tag persistency by a device intermediary to a client and a plurality of...
US-9,866,528 System and method for interlocking a host and a gateway
A method is provided in one example embodiment and includes exchanging a session descriptor associated with a network connection and an application on a host,...
US-9,866,527 Information processing device and information processing method
An information processing device is connected to a plurality of networks and performs information processing. The networks include a control network connected...
US-9,866,526 Presentation of candidate domain name stacks in a user interface
A system and method for the generation and presentation of candidate domain names are presented. The method includes receiving, by at least one server...
US-9,866,525 Source-destination network address translation (SDNAT) proxy and method thereof
A proxy and method for performing source destination network address translation are presented. The method includes receiving a first message from a node...
US-9,866,524 Home gateway apparatus and packet transfer method
In order to provide a home gateway apparatus capable of smoothly executing transfer processing while ensuring security, when transferring a packet between a...
US-9,866,523 Method and system for increasing speed of domain name system resolution within a computing device
A system for resolving domain name system (DNS) queries, contains a communication device for resolving DNS queries, wherein the communication device further...
US-9,866,522 Method to control dynamic host configuration protocol pool exhaustion in dynamic network environments
The present disclosure discloses a method and a network device for controlling DHCP pool exhaustion in dynamic network environments. Specifically, a network...
US-9,866,521 Methods, systems, and computer readable storage devices for determining whether to forward requests from a...
A determination is made whether to forward a request for communication services associated with a specific number range from a physical telephone number mapping...
US-9,866,520 Method and apparatus for managing internet content
A method and apparatus for managing Internet content is disclosed. An apparatus that incorporates teachings of the present disclosure may include, for example,...
US-9,866,519 Name resolving in segmented networks
A method is provided, in one embodiment, which is performed on a client computing device, the method comprising: connecting the client with a plurality of...
US-9,866,518 Introduction and communication system
A communication system to facilitate introduction and communication of two of the user's acquaintances, regardless of which contact information the user has on...
US-9,866,517 Inter-modal messaging communication
Inter-modal messaging communication is described. In one embodiment, a method of communication includes receiving an electronic mail message to be distributed...
US-9,866,516 Method and apparatus of processing social networking-based user input information
A method and apparatus of processing communications with end users are disclosed. One example method may include detecting a message or post on a website over...
US-9,866,515 Facilitating interaction among users of a social network
In one embodiment, a computing device receives an indication of a first user action by a first user. The computing device determines a topic of the first user...
US-9,866,514 Electronic message organization via social groups
A mechanism for automatically organizing electronic messages is described herein. Social groups of a particular user that may be representative of topics,...
US-9,866,513 Systems and methods to control the lifetime of online posts
Systems and methods to control the lifetime of social networking posts. The viewable range and/or duration of a post is determined as a function (e.g.,...
US-9,866,512 Social network communities for support and accountability based on tracked tips
Bookmarking content modules and tracking scores of user properties against the bookmarked content modules on a computer implemented social network are provided....
US-9,866,511 Ensuring that a composed message is being sent to the appropriate recipient
A method, system and computer program product for ensuring that the composed message is being sent to the appropriate recipient. A message being composed by an...
US-9,866,510 Coordinated notifications across multiple channels
A server system can provide coordinated event-based notifications to a target user across multiple notification channels. The selection of channels for a...
US-9,866,509 Spam filtering and person profiles
Systems and methods to reduce false positives in spam filtering. In one aspect, a method includes automatically generating profiles for persons identified in...
US-9,866,508 Aggregating and presenting recent activities for synchronized online content management systems
Systems, methods, and computer-readable storage media for aggregating and presenting recent activities for online synchronized content management system are...
US-9,866,507 Method of monitoring well-being of semi-independent persons and system thereof
A client system for monitoring elders in a residential setting, the client system comprising communication apparatus operative for sending real time...
US-9,866,506 Method of controlling group chatting in portable device and portable device performing the same
A method of controlling group chatting in a portable device, and a portable device performing the same, which are capable of extracting and displaying a dialog...
US-9,866,505 Configuring presence and notifications in persistent conversations
Implementations generally relate to configuring presence and notifications in persistent conversations. In one implementation, a method includes receiving a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.