Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,009,1197 Configuring, controlling and monitoring computers using mobile devices
A portable computing device captures imagery from a screen of a second computer, decodes information steganographically-encoded in the screen display, and uses...
US-1,009,1196 Method and apparatus for authenticating user by using information processing device
A method and apparatus for authenticating a user is disclosed that includes measuring biometric information of the user to create biometric measurement...
US-1,009,1195 System and method for bootstrapping a user binding
A system, apparatus, method, and machine readable medium are described for bootstrapping an authenticator. For example, one embodiment of a method comprising:...
US-1,009,1194 Preventing unauthorized access to secured information systems using multi-device authentication techniques
A computing platform may receive, from a client portal server, a request to authenticate a first user to a first user account. The computing platform may...
US-1,009,1193 One time passcode
A one-time passcode authentication system includes an application server, an authentication server, and an access device, wherein the access includes an...
US-1,009,1192 Merged video streaming, authorization, and metadata requests
Implementations disclose merged video streaming, authorization, and metadata request. A method includes receiving, by a streaming server, a first request to...
US-1,009,1191 Distributed authorization
Systems and methods for distributed authorization are described. In some embodiments, an Information Handling System (IHS) may include a processor; and a memory...
US-1,009,1190 Server-assisted authentication
Authentication of a device through a constructed authentication token. Components of an authentication key are distributed across at least a device and a...
US-1,009,1189 Secured data channel authentication implying a shared secret
The invention solves the way of authentication of secured data channel between two sides (A, B) when there is at first established a non-authenticated protected...
US-1,009,1188 Accelerated passphrase verification
Systems and methods for providing accelerated passphrase verification are disclosed. In one embodiment, a method includes receiving a full security string,...
US-1,009,1187 Bypassing certificate pinning
A client application performs certificate pinning as a means of authenticating the identity of a server. A proxy is interposed in the communications path of the...
US-1,009,1186 Secure authenticated distance measurement
The invention relates to a method for a first communication device to perform authenticated distance measurement between the first communication device and a...
US-1,009,1185 Method and system for managing data
The system has a user terminal. A client provides access for the user terminal to data entries stored in a database. A database holds information consisting of...
US-1,009,1184 Continuous multi-factor authentication
Technologies for continuously authenticating a user via multiple authentication factors include a computing device for generating a continuous authentication...
US-1,009,1183 Method and decision gateway for authorizing a function of an embedded control unit
A method for authorizing a function of an embedded electronic control unit, including: a decision gateway requests from a hardware security module a function...
US-1,009,1182 System and method for pool-based identity authentication for service access without use of stored credentials
A computer-implemented system and method for pool-based identity authentication for service access without use of stored credentials is disclosed. The method in...
US-1,009,1181 Suppression of authorization risk feedback to mitigate risk factor manipulation in an authorization system
Dynamic risk communication associated with a computer device may include automatically detecting one or more security risk factors for the computer device based...
US-1,009,1180 Behavioral profiling method and system to authenticate a user
Methods and systems for behavioral profiling, and in particular, utilizing crowd-managed data architectures to store and manage that profile, are described. In...
US-1,009,1179 User authentication framework
Described herein is a framework to authenticate users. In accordance with one aspect of the framework, an authentication library is provided to implement an...
US-1,009,1178 Method for supplying protected multimedia content to a terminal
A Method for supplying protected multimedia content during which a terminal a) acquires a service date from a date server and b) evaluates a temporal criterion...
US-1,009,1177 Controlling access to a computerized resource of a mobile device based on whether the mobile device is within a...
A technique controls access to a computerized resource of a mobile device (e.g., a smart phone, a tablet, etc.). The technique involves, in response to...
US-1,009,1176 Enhanced EVPN MAC route advertisement having MAC (L2) level authentication, security and policy control
Techniques are described that enable MAC (L2) address authentication within an L2 switching network, such as a metro transport network. Moreover, when used in...
US-1,009,1175 Authenticating a device in a network
A mobile device and an authentication server are configured to re-establish a security context that was previously established using an Authentication Key...
US-1,009,1174 Identifying related user accounts based on authentication data
In some embodiments, upon detecting malicious activity associated with a user account, a content management system can identify other user accounts related to...
US-1,009,1173 Electronic device and method of transmitting content item
According to one embodiment, an electronic device includes a content transmitter. The content transmitter is configured to output a content item including first...
US-1,009,1172 Data encryption in a network memory architecture for providing data based on local accessibility
A network memory system is disclosed. The network memory system comprises a first appliance configured to encrypt first data, and store the encrypted first data...
US-1,009,1171 Adaptive traffic encryption for optical networks
A technique is provided for a transmitting optical network element with an encrypting entity. The transmitting optical network element has an interface for...
US-1,009,1170 Method and apparatus for distributing encryption and decryption processes between network devices
In one embodiment, a method includes establishing at a security device, a secure session for transmitting data between a client device and an end host,...
US-1,009,1169 Method and system for protecting cloud-based applications executed in a cloud computing platform
A method and system for protecting cloud-based applications executed in a cloud computing platform are presented. The method includes intercepting traffic flows...
US-1,009,1168 Wireless access point security
Techniques are disclosed to increase security of a wireless access point (WAP). In embodiments, a cellular network provider has an arrangement with an owner of...
US-1,009,1167 Network traffic analysis to enhance rule-based network security
A method of interpreting a rule and a rule-interpreting apparatus for rule-based security apparatus, and an apparatus implementing the method. The method...
US-1,009,1166 Sequentially serving network security devices using a software defined networking (SDN) switch
Systems and methods for an SDN switch that provides service group chaining for sequentially serving multiple network security devices are provided. According to...
US-1,009,1165 Methods and systems for providing context-based outbound processing application firewalls
Outbound processing with application firewalls. An outbound message is generated with an application. The outbound message includes at least a trustworthiness...
US-1,009,1164 System and method for mapping physical locations of motors in a network
A motor network mapping device is provided. The motor network mapping device includes a processor coupled to a memory device. The motor network mapping device...
US-1,009,1163 Server device, control method for the same and computer-readable recording medium
A program which is capable of offering a reward to a user who has registered a simple access means to a predetermined screen is disclosed. The program causes a...
US-1,009,1162 Allocation of network addresses for network subscribers
A method for allocating network addresses for network subscribers in a segmented network having a plurality of subnetworks that are each connected via a...
US-1,009,1161 Assignment of router ID for logical routers
Some embodiments provide a method for determining a router identifier for a centralized routing component of a logical router. The method determines that a...
US-1,009,1160 Wireless access gateway
A wireless network including a wireless access gateway (WAG) and methods are provided for routing traffic between non-cellular and cellular networks. The WAG...
US-1,009,1159 Assigning network addresses to possible network ports to fullest extent to which addresses can be assigned to ports
The possible network ports of a computing device are determined, regardless of whether they are currently usable. A network address is assigned to each possible...
US-1,009,1158 Systems and methods for resolving data inconsistencies between domain name systems
In one aspect, a computer-implemented method for managing Domain Name System (DNS) information is provided. The method uses a computing device having a...
US-1,009,1157 Systems and methods for transmitting and displaying private message data via a text input application
The present disclosure relates to systems and methods for transmitting and displaying private messages securely using a mobile device. The mobile device...
US-1,009,1156 Transmission device that determines a received mail is a reply to a previously sent mail and generates a mail...
A communication device is provided which includes a transmission unit, a BCC memory unit, a reception unit, a determination module, an accepting module and a...
US-1,009,1155 Message management and message modification application
Identifying messages transferred to and from a mobile user device may provide a way to monitor message transfers. One example method of operation includes...
US-1,009,1154 Intelligent presentation of multiple proximate audible alerts
A computing device can receive an incoming message. The incoming message can be one directed to a set of different client machines at approximately the same...
US-1,009,1153 Processing messages
An apparatus for processing messages input from a plurality of clients. The apparatus includes an acquisition unit configured to obtain a first message input...
US-1,009,1152 Location based event invitation generation
A method, computer program product, and computer system for receiving, by at least one remote computing device, location information of one or more other...
US-1,009,1151 Preempting spam filters based on transactions
Technical solutions are described for a seller to bypass a spam filter. An example method includes sending, by a message preempting apparatus, for receipt by a...
US-1,009,1150 Identifying first contact unsolicited communications
Techniques involving identification of electronic messages that are the first contact between the sender identification and addressed recipients. One...
US-1,009,1149 Spoiler alert scheme
Technologies are generally described for a spoiler alert scheme. In some examples, a spoiler alert system may include an event determination unit configured to...
US-1,009,1148 Message delivery management based on device accessibility
A processor may receive an electronic message sent to a first device associated with a user. The electronic message may have a first format. The processor may...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.