Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,930,051 Remote management of hardware hosts in cloud infrastructure
In a cloud environment, each host computer can have its own security service processor with an independent network interface for communicating with a remote...
US-9,930,050 Device management proxy for secure devices
A hardware device architecture is described that improves security and flexibility in access to hardware device settings. A device management proxy service is...
US-9,930,049 Method and apparatus for verifying source addresses in a communication network
In one embodiment, a method includes receiving a packet from an end node, the packet comprising an authenticated source MAC (Media Access Control) address and a...
US-9,930,048 Customer identification for seamless wireless-network access
An electronic device connects to a network associated with a service provider via a router at a home location. During a time interval, the electronic device...
US-9,930,047 Transparent overlay and headless browser execution for welcome flow
Associating a website with a credential manager includes identifying the launch of a first instance of a website to be associated with a credential manager in a...
US-9,930,046 Systems and methods for providing information-technology assets in an open environment
The disclosed embodiments include methods and systems for providing information-technology (IT) assets in an open environment. In certain aspects, an IT system...
US-9,930,045 Logging system for blacklisting URLs in toll-free data service
A method, a device, and a non-transitory storage medium that stores instructions to load a first web page; scan each embedded uniform resource locator (URL) of...
US-9,930,044 Boosting remote direct memory access performance using cryptographic hash based approach
A mechanism is provided in a data processing system for performing a remote direct memory access operation. Responsive to receiving in a network interface...
US-9,930,043 Systems and methods of virtual world interaction
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that...
US-9,930,042 Controlled environment secure media streaming system
A Controlled Environment Secure Media Streaming System manages the delivery of content to Secured Devices. Cloud Services provide content to Integration Hub....
US-9,930,041 Anti-takeover systems and methods for network attached peripherals
Methods, systems, and devices are described for the prevention of network peripheral takeover activity. Peripheral devices may implement an anti-takeover...
US-9,930,040 System and method for provisioning a security token
The provisioning of a security token object to a user is disclosed. The security token object is used for accessing a computing resource through a mobile...
US-9,930,039 Device authentication within deployable computing environment
A deployable computing environment may facilitate interaction and data sharing between users and devices. Users, devices, and relationships between the users...
US-9,930,038 Probabilistically expedited secure connections via connection parameter reuse
Methods for probabilistically expediting secure connections via connection parameter reuse are provided. In one aspect, a method includes determining whether a...
US-9,930,037 Encrypting a unique identification header to create different transactional identifiers
A system may receive a content request associated with a user device. The content request may include information that identifies a subscriber associated with...
US-9,930,036 System and method for providing location based security controls on mobile devices
A computer implemented method for providing location based security controls on a plurality of user devices is provided. The method includes the following steps...
US-9,930,035 Methods and apparatus for establishing a secure communication channel
A method for establishing a secure communication channel between an off-card entity and an embedded Universal Integrated Circuit Card (eUICC) is provided. The...
US-9,930,034 Authenticating applications using a temporary password
A mobile device can receive, from an application installed on a wearable device, an authentication query. Based upon the authentication query, an application...
US-9,930,033 On demand passwords
In one embodiment, a user password is received in relation to a user identifier, wherein the user identifier and user password are associated with a user...
US-9,930,032 Selective password synchronization
A mechanism is provided for selective password synchronization. An indication is received that a password is to be changed for an account in a plurality of...
US-9,930,031 Multi-factor user authentication based on user credentials and entry timing
A method of performing operations on an account server processor includes receiving authentication query messaging through a network interface from a user...
US-9,930,030 Extensible configuration system to allow a website to authenticate users based on an authorization protocol
An extensible configuration system to allow a website to authenticate users based on an authorization protocol is disclosed. In some embodiments, the extensible...
US-9,930,029 Hypervisor agnostic bidirectional secure channel for guest agent transport
Systems, methods, and computer readable medium for virtualized computing environments. A method for providing a connection between a guest virtual machine and a...
US-9,930,028 Method to enroll a certificate to a device using SCEP and respective management application
The method to enroll a certificate to a device comprises the steps of providing a management application on a management device, the management application...
US-9,930,027 Authenticated messages between unmanned vehicles
An unmanned vehicle communicates with other unmanned vehicles. When the unmanned vehicle receives a message from another unmanned vehicle, the unmanned vehicle...
US-9,930,026 Encryption/decryption in a cloud storage solution
The disclosure generally describes computer-implemented methods, software, and systems, including a method for decryption of data stored in the cloud. A record...
US-9,930,025 System and method for automatic service discovery and protection
A system for automatically discovering services operating on a network including a service discovery database configured to store expected service behavioral...
US-9,930,024 Detecting social login security flaws using database query features
Techniques for detecting security flaws are described herein. An example system includes a processor to perform a login attempt into a website to be tested...
US-9,930,023 Access control center auto launch
Methods and systems provide indirect and temporary access to a company's IT infrastructure and business applications. The methods/systems involve establishing...
US-9,930,022 Information processing system, information processing apparatus, method of controlling the same, and storage medium
There is provided an information processing system, information processing apparatus, and a method of controlling the same. Upon receiving an encrypted...
US-9,930,021 Secure devices using entropy multiplexing
Systems and techniques for implementing secure devices using entropy multiplexing are described herein. An entropy-multiplexing (EM) tree containing a plurality...
US-9,930,020 Validation method and system for use in securing nomadic electronic transactions
A method involving a communication device, which comprises sending a request to a communication device; receiving a response from the communication device over...
US-9,930,018 System and method for providing source ID spoof protection in an infiniband (IB) network
A system and method can provide source ID spoof protection in an InfiniBand (IB) fabric. The IB fabric can support a plurality of tenants in a subnet that...
US-9,930,017 Issuing, presenting and challenging mobile device identification documents
Methods and systems of authenticating electronic identification (ID) documents may provide for receiving a decryption key and an encrypted ID document from a...
US-9,930,016 Security key generation and management method of PDCP distributed structure for supporting dual connectivity
The present disclosure relates to a pre-5.sup.th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond...
US-9,930,015 Communication device and method for performing encrypted communication in multipoint networks
A communication device for performing encrypted communication with at least one further communication device in a communication network is provided....
US-9,930,014 Methods and apparatus for key delivery in HTTP live streaming
A key delivery mechanism that delivers keys to an OS platform (e.g., iOS platform) devices for decrypting encrypted HTTP live streaming data. An HTTPS URL for a...
US-9,930,013 Control of out-of-band multipath connections
An intermediate device (such as a firewall) is disposed between first and second devices (such as a client and a server device, respectively). Communications...
US-9,930,012 Private network request forwarding
Private network request forwarding can include receiving a request from a user for Internet services over a public network. Private network request forwarding...
US-9,930,011 Private network request forwarding
Private network request forwarding can include receiving a request from a user for Internet services over a public network. Private network request forwarding...
US-9,930,010 Security agent for distributed network security system
Some embodiments of the invention provide a method that performs security operations for packets that are processed by a forwarding element. The method of some...
US-9,930,009 Systems and methods to enable network coordinated MAC randomization for wi-fi privacy
This disclosure describes systems, methods, and apparatus related to receiving, at an access point and from a wireless communication station, a media access...
US-9,930,008 Dynamic service chain with network address translation detection
In one embodiment, a method includes receiving a packet associated with a flow at a network device, classifying the packet at the network device based on...
US-9,930,007 IP address and domain name automation of virtual infrastructure
Provisioning an Internet Protocol address is disclosed. A request to provision an Internet Protocol address to a virtual resource is received. An Internet...
US-9,930,006 Method for assigning logical addresses to the connection ports of devices of a server cluster, and...
A method and system for assigning logical addresses to connection ports of devices of a server cluster. The method includes defining a logical addressing policy...
US-9,930,005 Method, device and system for processing DNS cache information
Provided are a DNS cache information processing method, device and system. The method comprises: upon reception of a client request, resolving and obtaining...
US-9,930,004 Method and apparatus for expedited domain name system query resolution
In one embodiment, a method and apparatus for resolving domain name system queries using unique top-level domains in a private network space are disclosed. For...
US-9,930,003 Location-based domain name system service discovery
Systems and methods are provided for location-based Domain Name System (DNS) service discovery using a central DNS server in which network resources are...
US-9,930,002 Apparatus and method for intelligent delivery time determination for a multi-format and/or multi-protocol...
This disclosure relates generally to apparatus, methods, and computer readable media for composing communications for computing devices across multiple formats...
US-9,930,001 Conditional disclosure of a response to content posted in a social network
Technologies are generally described for a social networking service (SNS). In some examples, a method performed under control of a server may include receiving...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.