Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,992,205 Systems and methods for performing operations on a computing device
Methods and systems for performing one or more operations on a first computing device are disclosed. A method includes receiving, from a second computing device...
US-9,992,204 Virtual machine access control in mobile computing device based on positional range from beacon signal
A system is provided and includes a broadcasting device configured to emit a beacon signal over a predefined range and a mobile computing device. The mobile...
US-9,992,203 Providing access to remote networks via external endpoints
Systems and methods for providing access to a remote network via an external endpoint are provided. A client establishes a secure connection between an external...
US-9,992,202 Access control through dynamic grouping
Certain aspects and features of the present disclosure relate to providing access control using groups that can be dynamically controlled by group owners, such...
US-9,992,201 Threat-aware provisioning and governance
A management component of a computing system evaluates end-users, end-user devices, and user accounts for access to provisioned-resources of the computing...
US-9,992,200 System and method for secure content sharing and synchronization
A flexible content sharing system may comprise a network based application built on a client device using information from dissociated user experience component...
US-9,992,199 Systems and methods for authenticating an online user using a secure authorization server
A secure authorization server computer system for verifying an identity of an end-user is provided. The computer system is programmed to receive, from a...
US-9,992,198 Network-based frictionless two-factor authentication service
Techniques described herein may be used to enable users to access services protected by two-factor security systems without having to provide additional...
US-9,992,197 Method and system for secured communication of control information in a wireless network environment
A method and system for securely communicating control information in a wireless network environment is provided. When a transmitting station has to transmit...
US-9,992,196 Information processing device, wireless communication system, information processing method, and program
[Object] To propose an information processing device, wireless communication system, information processing method, and storage medium which can mutually...
US-9,992,195 Network authentication of a geo-fenced volume
Provided is a method for managing a software defined network using a software control layer to regulate a geo-fenced volume. The software control layer can use...
US-9,992,194 System and method of notifying mobile devices to complete transactions
A method including registering an authority device for an account on an auth platform; receiving transaction request from an initiator to the auth platform;...
US-9,992,193 High-safety user multi-authentication system and method
A high-safety user multi-authentication system, comprising: a server having a user habit information and a key generator for generating a real key corresponding...
US-9,992,192 User interface for control of personal information privacy
The longstanding problem of providing efficient and rapid online user services while maintaining user privacy is addressed. Disclosed is a system and method for...
US-9,992,191 Cloud key directory for federating data exchanges
A data store provides access to portions of secured data. Each portion is associated with a client-defined access control and is encrypted with attribute-based...
US-9,992,190 Multi-party secure authentication system, authentication server, intermediate server, multi-party secure...
Even when an intermediate server exists, a plurality of servers simultaneously authenticates a user securely. A user apparatus disperses a password. The user...
US-9,992,189 Generation and validation of derived credentials
A CAC/PIV certificate associated with a HSPD-12 identity is used to generate a derived credential for storage on a device, such as a mobile device, that lacks a...
US-9,992,188 Methods and systems for single sign-on while protecting user privacy
A method of enabling applications to reference user information is provided, including receiving a request for a user identifier that references a user of the...
US-9,992,187 Single sign-on authentication via browser for client application
In one embodiment, a method includes initiating at a client application at a client device, a single sign-on authentication with a security device, receiving at...
US-9,992,186 SAML representation for multi-tenancy environments
In response to a request received from a client device, the user is authenticated based on user credentials extracted from the request. Upon having successfully...
US-9,992,185 Virtual desktop accelerator support for network gateway
The subject disclosure relates to a method for initiating an accelerated desktop session between a client device and a remote server. In some aspects, the...
US-9,992,184 Method of using server, server reservation control apparatus and program storage medium
In a content supply system, in order to use a streaming server to perform a live distribution, a user PC used makes a reservation for a time zone, etc. to a...
US-9,992,183 Using an IP multimedia subsystem for HTTP session authentication
Disclosed is a method and system for utilizing an Internet Protocol Multimedia Subsystem (IMS) to authenticate an HTTP session between a communication device...
US-9,992,181 Method and system for authenticating a user based on location data
Disclosed is a method of authenticating a user based on location data. The method includes receiving, using a communication device, a user location from a...
US-9,992,180 Systems and methods for protecting communications between nodes
Systems and methods for protecting communications between at least two nodes protect the identity of a node requesting information, provide content of...
US-9,992,179 Message encryption system
A system includes a plurality of mail encryption gateways and a router. Each mail encryption gateway encrypts email according to an encryption policy of a...
US-9,992,178 Method, apparatus and system for dynamically controlling secure vehicle communication based on ignition
A method of controlling secure vehicle communication in a vehicle gateway includes: detecting whether a vehicle is started; generating a new public key for each...
US-9,992,177 Method and system for modifying an authenticated and/or encrypted message
A method and system for modifying an authenticated and/or encrypted message by a modifying party exchanged between a sending party and a receiving party based...
US-9,992,176 Systems and methods for encrypted communication in a secure network
A method for users of devices including mobile phones and computers to engage in encrypted communications with other devices using asymmetrical key exchange...
US-9,992,175 Systems and method for providing a data security service
Systems, methods, and computer-readable media for providing standards compliant encryption, storage, and retrieval of date are disclosed. In an embodiment, data...
US-9,992,174 Detecting disclosed content sources using dynamic steganography
Systems for forensic steganography. A server is interfaced with storage facilities that store an object accessible by two or more users, each of which users are...
US-9,992,173 Apparatus for and method of playing back content
A method of playing back streaming content includes decoding the content based on a first decryption circuit configured based on a first key and outputting the...
US-9,992,172 Secure key management in a data storage system
A system for remotely storing data includes a communication component that is configured to receive a data file to be stored on a remote data storage system. An...
US-9,992,171 Method and system for digital rights management of encrypted digital content
Various aspects of a method and system for digital rights management of encrypted digital content are disclosed herein. The method includes determination of a...
US-9,992,170 Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-9,992,169 Mapping and obscuring digital representations of a number of user accounts on a social network map
Mapping and obscuring digital representations of a number of user accounts on a social network map includes identifying a primary user account from a number of...
US-9,992,168 Data transfer
A data transfer system includes a set of switch and/or router devices (104B, 104E, 104F), each said device in the set being a layer 1, 2 and/or 3 device of OSI...
US-9,992,167 Systems and methods for a VPN ICA proxy on a multi-core system
The present invention is directed towards systems and methods for sharing licenses across resources via a multi-core intermediary device. A device intermediary...
US-9,992,166 Hierarchical rule development and binding for web application server firewall
At least one of an HTTP request message and an HTTP response message is intercepted. A corresponding HTTP message model includes a plurality of message model...
US-9,992,165 Detection of undesired computer files using digital certificates
Methods and systems for detecting undesirable computer files based on scanning and analysis of information contained within an associated digital certificate...
US-9,992,164 User based stateless IPv6 RA-guard
The present disclosure relates to an apparatus, a method, and a non-transitory computer readable storage medium for filtering routing assignment (RA) messages...
US-9,992,163 Multi-tiered protection platform
A multi-tier platform provides security at a perimeter of a computer system, where an intermediate layer interacts between a web layer and an application layer....
US-9,992,162 Device, system and method for network-based address translation for multiple recipients
A network system, switch controller for multicast packet distribution by controlling a network switch having at least one ingress interface and at least one...
US-9,992,161 DDOS protection infrastructures using IP sharing across wide area networks
According to some embodiments, a plurality of geographically remote distribution points may be established, each distribution point being associated with a...
US-9,992,160 Optical communication system to automatically configure remote optical nodes
An optical Internet Protocol (IP) router serves a cell-site over an optical communication network. The optical IP router transmits a network attach request...
US-9,992,159 Communication information detecting device and communication information detecting method
A communication information detecting device includes: a receiving unit that receives an address resolution request message transmitted from a start-point...
US-9,992,158 Locale profile for a fabric network
Methods and systems for conveying locale information for an electronic device includes receiving, from a remote device and via a network interface of at least...
US-9,992,157 DNS application server
A method for providing access to an Internet resource includes receiving a DNS query including a hostname to be resolved, receiving status data, invoking a code...
US-9,992,156 DNS security system and failure processing method
The present invention provides a DNS security system and failure processing method. The DNS security system comprises: at least one client, configured to...
US-9,992,155 DNS alias synchronization in replication topology
A redundant array of independent nodes are networked together. Each node executes an instance of an application that provides object-based storage. The nodes...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.