Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,923,905 System and method for zone access control
In some example embodiments, a method comprises receiving a web service request for accessing a resource of a web service, with the web service request...
US-9,923,904 Sharing document information
The disclosure of the present document can be embodied in a non-transitory computer-readable medium storing instructions that cause one or more processors to...
US-9,923,903 Method, a server and a client providing secured communication in a power distribution communication network
A technique is provided that addresses how to provide secured communication in a power distribution communication network. Specifically, upon receipt of a...
US-9,923,902 Remote processsing of mobile applications
In an example implementation of the disclosed technology, a method includes accessing, by a management agent associated with a client device, a profile...
US-9,923,901 Integration user for analytical access to read only data stores generated from transactional systems
The technology disclosed preserves the tenant specificity and user specificity of the tenant data by associating user IDs to complementary special IDs referred...
US-9,923,900 Online privacy management system with enhanced automatic information detection
A privacy management system (PMS) is disclosed for a Chief Privacy Officer (CPO) or other user to use in monitoring and/or controlling in realtime the flow of...
US-9,923,899 Content access control in a social network
Disclosed are systems and methods associated with a social network application. A plurality of posts associated with a client system user is displayed. First...
US-9,923,898 Resource management in a presentation environment
A computer system comprises a processor and a memory coupled to the at least one processor. The processor is configured to collect context information for a...
US-9,923,897 Edge server selection for enhanced services network
An enhanced services network provides enhanced privacy and/or security over public networks to client subscribers of the service. Client devices access the...
US-9,923,896 Providing access to a restricted resource via a persistent authenticated device network
Providing access to a restricted resource via a persistent authenticated device network, including: authenticating a user; joining a persistent authenticated...
US-9,923,895 Machine-to-machine network assisted bootstrapping
The service layer may leverage the access network infrastructure so that applications on a device may bootstrap with a machine-to-machine server without...
US-9,923,894 System and method of facilitating the identification of a computer on a network
A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may...
US-9,923,893 Simplified IoT services for cloud environments
Methods and systems provide management, monitoring, and onboarding of a device, a service, and/or an application in the context of the Internet of Things (IoT)....
US-9,923,892 Enhanced automatic response culling with signature generation and filtering
A method of testing a web application, wherein a web application is a program that operates on a server and interacts with clients that access the program over...
US-9,923,891 Human body communication device with secure access
Systems, apparatuses, and methods may include a human body communication data storage device having at least first and second electrodes and a human body...
US-9,923,890 Generating and distributing pre-computed data (PCD) assets to a target device
The embodiments described herein describe technologies for pre-computed data (PCD) asset generation and secure deployment of the PCD asset to a target device in...
US-9,923,889 Data processing system, data processing apparatus and log in method
A data processing system including a data processing apparatus, includes a user data storing unit that stores user data of a user who uses a first service, the...
US-9,923,888 Single sign-on method for appliance secure shell
A system and method for efficiently establishing a secure shell connection for accessing Web resources. A user attempts to establish a secure Hypertext Transfer...
US-9,923,887 Push notification activation
A mobile computing device is operated to receive a trigger at a first instance. The trigger may be associated with a predefined condition or event or action....
US-9,923,886 Trusted service interaction
In one embodiment a controller comprises logic configured to define, for display on a region of a display device coupled to the controller, a dialog box, lock...
US-9,923,885 Systems and methods for using imaging to authenticate online users
Systems and methods are disclosed for authenticating an identity of an online user. One method includes receiving from the user, through a first device, a...
US-9,923,884 In-circuit security system and methods for controlling access to and use of sensitive data
The invention disclosed herein is an in-circuit security system for electronic devices. The in-circuit security system incorporates identity credential...
US-9,923,883 Downloadable security and protection methods and apparatus
Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional...
US-9,923,882 Domain based authentication scheme
In one example, a system for authenticating domains operates by authenticating a first domain and the extensions that make up the URI of an initial or primary...
US-9,923,881 System, apparatus and method for migrating a device having a platform group
In one embodiment, an apparatus comprises a processor to execute instructions and having at least a first logic to execute in a trusted execution environment, a...
US-9,923,880 Authenticating mobile applications using policy files
Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, at a first server, a key pair and a policy file...
US-9,923,879 Sharing keys
The subject matter described herein can be embodied in a computer-readable medium storing instructions that cause one or more processors to perform operations...
US-9,923,878 Primitive functions for use in remote computer management
The invention facilitates remote management of a computer via a network. Remote computer management capability can be expanded beyond that previously available...
US-9,923,877 External indexing and search for a secure cloud collaboration system
An end-to-end secure cloud-hosted collaboration service is provided with a hybrid cloud/on-premise index and search capability. This approach includes...
US-9,923,876 Secure randomized input
A user inserts a received random sequence into the user's password or PIN. The user enters and transmits this randomized password to a service provider. The...
US-9,923,875 Operating method for sharing content in a home network and system thereof
A system and method for enabling access of content in a home network are provided. The method includes receiving a content on a source device. Further, the...
US-9,923,874 Packet obfuscation and packet forwarding
A packet obfuscation method comprising receiving a data packet having a routing header portion and a payload portion, performing a first obfuscation on the...
US-9,923,872 Cloud computing gateway, cloud computing hypervisor, and methods for implementing same
Embodiments of the present invention provide a cloud gateway system, a cloud hypervisor system, and methods for implementing same. The cloud gateway system...
US-9,923,871 Application-aware connection for network access client
Virtual private network (VPN)-related techniques are described. The techniques provide intuitive mechanisms by which a client device more efficiently...
US-9,923,870 Method and system for analyzing a data flow
A method for analyzing a data flow includes extracting packet information of a packet of the data flow, determining the status of the packet and the status of...
US-9,923,868 Working method for a system and system
A system includes a first network with a first computer and a first release computer; a second network with a second computer and a second release computer; a...
US-9,923,867 Security threat identification, isolation, and repairing in a network
A first computing system may identify a security threat located at least at a first virtual server. The first virtual server may be within a second computing...
US-9,923,866 Communication system, terminal apparatus and server
A communication system allows terminals PC1 and PC2 located behind NAT routers to communicate with each other by using source address, source port number,...
US-9,923,865 Network address management
A technology is described for assigning a logical private network address to a computing instance. An example method may include obtaining a preserved logical...
US-9,923,864 Information process device, information process method and program for executing information process device
In order to attain the above object, an information process device of the present invention detects a connection of an electric appliance 100 to a network,...
US-9,923,863 Voice and SMS communication from a mobile device over IP network and satellite or communication network
Systems, devices, and methods for communication system that includes a mobile application (software) installed on a user mobile device, a communications...
US-9,923,862 Communication message consolidation with content difference formatting
A set of similar messages addressed to a user is detected. Redundantly similar portions of the set of similar messages and a progressive set of differences...
US-9,923,861 Electronic message recipient disposition characteristics
A computer implemented method for determining recipient disposition characteristics of an electronic message that was acted upon by an electronic message reader...
US-9,923,860 Annotating content with contextually relevant comments
Automatically augmenting online content with contextually relevant comments. Online content and associated comments are received. The comments are classified as...
US-9,923,859 Creating a group of members based on monitoring a social network
In a computer-implemented method to facilitate administration of a virtualization infrastructure, operational conditions of members of the virtualization...
US-9,923,858 Electronically processing bounceback messages from communications networks
Examples of systems and methods for processing email bounceback messages are disclosed. One disclosed method includes the steps of receiving a bounceback email...
US-9,923,857 Symbolic variables within email addresses
Embodiments of the disclosure relate to processing email having symbolic variables in the address. Aspects include receiving, by an email server, an email...
US-9,923,855 Systems and methods for electronic message prioritization
Systems and methods for prioritizing electronic messages in an electronic message repository are disclosed. According to one embodiment, a method may include...
US-9,923,854 Microblog information publishing method, server and storage medium
A microblog information publishing method, a server and a storage medium are described, which pertain to the technical field of networks. The method includes:...
US-9,923,853 Folders that employ dynamic user training rules to organize content
Dynamic user training rules can be employed to organize content within a folder. Each folder can be associated with a dynamic rule that defines a number of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.