Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,935,954 System and method for securing machine-to-machine communications
This invention concerns the implementation of end-to-end security for the communication between objects in the domain of the Internet of Things (or Internet of...
US-9,935,953 Secure authenticating an user of a device during a session with a connected server
Securely authenticating a user of a device for a service during a session including a transaction between a client and a connected server connected to a...
US-9,935,952 Selectively permitting a receiver device to access a message based on authenticating the receiver device
A device may receive an indication to generate a link associated with accessing a message. The message may be intended for a shared device identifier of a...
US-9,935,951 Remote blind hashing
A remote data protection network provides a blind hashing service. A blind hashing server receives a message such as a digest from a client, and uses the...
US-9,935,950 Systems and methods for establishing ownership and delegation ownership of IOT devices using domain name system...
Provided is a method for establishing ownership of a component of an internet of things ("IoT") device. The method comprises receiving, at a registration...
US-9,935,949 Systems and methods for mutual authentication of electronic devices
Embodiments are provided for mutually authenticating a pair of electronic devices. According to certain aspects, the electronic devices may connect to each...
US-9,935,948 Biometric data hashing, verification and security
A fingerprint identification system comprising a smart device, a fingerprint scanner, a processor coupled to a transceiver and to the fingerprint scanner, and a...
US-9,935,947 Secure and reliable protection and matching of biometric templates across multiple devices using secret sharing
Biometric information from an initial sample is used to generate a biometric template for a user. The biometric template is split into multiple template shares...
US-9,935,946 Method and system for tracking an electronic device at an electronic device docking station
A system and method for identifying an electronic device user and tracking the electronic device at a docking station is provided. The system includes a CPU, a...
US-9,935,945 Trusted management controller firmware
A method for ensuring management controller firmware security, by a security manager of a computing device, includes storing a public key and raw identity data,...
US-9,935,944 Systems and methods for controlling a local application through a web page
At a client computer, a web browser displays a control for a local utility executed on the client computer, wherein the control includes a link. The web browser...
US-9,935,943 Methods and systems for dynamic creation of hotspots for media control
A non-transitory computer-readable storage medium stores instructions for execution by a first client device, including instructions for transmitting an...
US-9,935,942 Authentication processing method and electronic device for supporting the same
An electronic device and authentication processing method for operating the electronic device is provided. The authentication processing method includes...
US-9,935,941 Mobile based multi-channel citizen account origination in digital economy
A method for gathering and verifying customer information via SMS and in-person representatives are provided. The method may include a business correspondent...
US-9,935,940 Password security
Techniques are disclosed for increasing the security of a database. A database is coupled with an access manager to limit certain applications that use the...
US-9,935,939 Keyboard login manager
A user-input application comprises a login manager configured to receive an input call from an application and determine whether stored information associated...
US-9,935,938 DTCP certificate authentication over TLS protocol
Authenticating devices utilizing Transport Layer Security (TLS) protocol to facilitate exchange of authentication information or other data to permit or...
US-9,935,937 Implementing network security policies using TPM-based credentials
A method for implementing network security policies in a multi-tenant network environment may include receiving a request for implementation of at least one...
US-9,935,936 Federated realm discovery
A federated realm discovery system within a federation determines a "home" realm associated with a portion of the user's credentials before the user's secret...
US-9,935,935 Identity selector for use with a user-portable device and method of use in a user-centric identity management...
An identity selector manages the identity requirements of an online interaction between a user and a service provider environment. The identity selector is...
US-9,935,934 Token management
A method and system for management access tokens is described. Access tokens for accessing third-party resources are stored and managed in a token repository....
US-9,935,933 Systems and methods for secure operation of an industrial controller
A method of securing an industrial control system includes operating the industrial control system in an open mode, wherein communications between a plurality...
US-9,935,932 Wireless sensor field enumeration
A system for authenticating data acquired by multiple sensors prior to storing the data in a database is described. The system also authenticates users...
US-9,935,931 Authorizing user access to resource by determining whether other, authorized users have indicated that the user...
A user who is currently unauthorized to access a resource sends a request to access the resource. It is determined whether a number of authorized users of the...
US-9,935,930 Private and secure communication architecture without utilizing a public cloud based routing server
A method for use with a public cloud network is disclosed. The method includes setting up a private cloud routing server and a smart device client in a client...
US-9,935,929 Information processing apparatus, information processing method, and non-transitory computer-readable storage...
Before one of a first user and a second user has been authenticated, an information processing apparatus acquires first setting information corresponding to the...
US-9,935,928 Method and apparatus for automated password entry
A method and apparatus are provided for protecting security credentials (e.g., username/password combinations) and/or other sensitive data in a "password...
US-9,935,927 System and method for low energy double authentication between mobile device and server nodes
Disclosed are systems, methods, and computer-readable storage media for Bluetooth low energy (BLE) double authentication between a mobile device and server...
US-9,935,926 Methods and apparatus to identify media distributed via a network
Methods, apparatus, systems and articles of manufacture to monitor media presentations are disclosed. An example method includes extracting first network packet...
US-9,935,925 Method for establishing a cryptographically protected communication channel
Some embodiments are directed to a cryptographic method for providing an electronic first device, an electronic second device and an electronic intermediary...
US-9,935,924 Decentralized authoritative messaging
A secure chat client is described that allows users to exchange encrypted communications via secure chat rooms, as well as one-to-one communications. In...
US-9,935,923 Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-9,935,922 Methods, systems, and computer readable media for screening diameter messages within a diameter signaling...
According to one aspect, the subject matter described herein includes a method for screening Diameter messages within a Diameter signaling router (DSR) having a...
US-9,935,921 Correlating nameserver IPv6 and IPv4 addresses
Nameserver addresses are correlated in a multi-tier name server hierarchy comprising a first level authority for a domain, and one or more second level...
US-9,935,920 Virtualization gateway between virtualized and non-virtualized networks
Methods and apparatus are provided for controlling communication between a virtualized network and non-virtualized entities using a virtualization gateway. A...
US-9,935,919 Directory partitioned system and method
This disclosure relates in general to the field of directory information systems and/or services. In a method embodiment, a method of arranging objects in a...
US-9,935,918 Cloud-based infrastructure for determining reachability of services provided by a server
Technologies are described for using a cloud-based computer system to access services provided by a particular server over public Internet Protocol (IP)...
US-9,935,917 Methods of detecting and assigning IP addresses to devices with ARP requests
A method of discovering and assigning an IP address to a device to be discovered in a communication network having multiple interconnected nodes includes...
US-9,935,916 Dynamically mapping network addresses
Exemplary embodiments include a system and method to systematically map complex network topologies for providing real-time network address and service port...
US-9,935,915 System and method that bridges communications between multiple unfied communication(UC) clients
This disclosure describes a system and method that bridges communications between multiple unified communication (UC) clients. This disclosure provides a UC...
US-9,935,914 Method and apparatus for expiring messages in electronic communications
The present disclosure includes systems and methods for off-the-record communication including expiring messages. An example method comprises receiving an...
US-9,935,913 Establishing connections between third party accounts maintained by various third party systems and between...
Online system users interact with one or more third party systems, with the online system maintaining an account for each of its users and each third party...
US-9,935,912 Ad hoc message sharing between email and social networks
There are provided a system, a method and a computer program product for sharing messages between an email client and a social network. The system prepares,...
US-9,935,911 Real-time notifications of concurrent email thread replies
In an embodiment of the present invention, a first message is determined. The first message is associated with two or more users. The two or more users include...
US-9,935,910 Recipient location aware notifications in response to related posts
In one aspect, a method is provided, including the following method operations: receiving a request to generate a first post data item at a first location;...
US-9,935,909 Device, system and method for smart notifications
A device, system and method for smart notifications is provided. When a new message is received for a unified mailbox, a relevance level associated with the new...
US-9,935,908 Download of current portions of email messages
In general, this disclosure describes techniques of enabling devices to download only current portions of email messages without downloading historical portions...
US-9,935,907 System and method for serving a message client
A system and method for synchronizing messages between client application instances and a message service provider includes a connection service communicatively...
US-9,935,906 Selectively unmuting electronic messaging conversations
A first user muting a conversation, taking place among a plurality of users using an exchange of electronic messages, can be detected. Responsive to the first...
US-9,935,905 System for restricting the distribution of attachments to electronic messages
A method of restricting the distribution of an image attachment to an electronic message via an electronic communications network comprises receiving, via the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.