Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,013,5801 On-line account recovery
Example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, using one or more computing devices to...
US-1,013,5800 Electronic discovery insight tool
An electronic discovery insight tool is presented. The tool is implemented in an apparatus comprising one or more processors, one or more memories...
US-1,013,5799 Systems and methods for cloud data security
Techniques for providing data security services with respect to cloud-based services are described. Examples include a security service provider ("SSP")...
US-1,013,5798 Systems and methods for implementing a proximity lock using bluetooth low energy
Systems and methods for implementing a proximity lock using Bluetooth Low Energy are disclosed. According to one embodiment, a Bluetooth low energy proximity...
US-1,013,5797 Method and system for the supply of data, transactions and electronic voting
A method and system for supply of data, including generating a first digital certificate referred (empowerment certificate) signed with a first signing entity's...
US-1,013,5796 Masking and unmasking data over a network
An apparatus with one or more masking rules stored in a memory receives unmasked data associated with a first session identifier via a network and converts the...
US-1,013,5795 Downlink control channel encryption for jamming resilience
Methods, systems, and devices for wireless communication are described. The methods, systems, and devices may employ mechanisms for encrypting downlink control...
US-1,013,5794 Cryptographic communication device, cryptographic communication method, and non-transitory storage medium...
When a device is connected to a home gateway, if a common connection method is selected, a not-high-security connection method is inevitably selected even for a...
US-1,013,5793 Security maximization for a computer related device based on real-time reaction
Methods and a system are provided that, in turn, are for providing security between a user device and a computer related device. A method includes providing a...
US-1,013,5792 Secure communications with internet-enabled devices
A network device allows inbound connections from external addresses to a computer on a local network while forbidding output connections from the computer to...
US-1,013,5791 Secure communications with internet-enabled devices
A network device allows inbound connections from external addresses to a computer on a local network while forbidding output connections from the computer to...
US-1,013,5790 Secure communications with internet-enabled devices
A network device allows inbound connections from external addresses to a computer on a local network while forbidding output connections from the computer to...
US-1,013,5789 Method and system of establishing a virtual private network in a cloud service for branch networking
In one aspect, a computerized system useful for implementing a virtual private network (VPN) including an edge device that automatically establishes an Internet...
US-1,013,5788 Using hypergraphs to determine suspicious user activities
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for detecting suspicious user activities. One of the methods...
US-1,013,5787 Filtering system, management device, filtering method and management program
The present invention prevents all of the filter rules from leaking and the filter functions of an entire network from stopping, even if problems arise in a...
US-1,013,5786 Discovering and selecting candidates for sinkholing of network domains
Techniques for discovering and selecting candidates for sinkholing of network domains are provided. In some embodiments, a process for discovering and selecting...
US-1,013,5785 Network security system to intercept inline domain name system requests
Example embodiments disclosed herein relate to a network security system. The network security system intercepts inline DNS requests. It is determined whether a...
US-1,013,5784 Verifying source addresses associated with a terminal
Verifying source addresses associated with a terminal is disclosed, including: receiving a packet from a terminal, wherein the packet comprises a source...
US-1,013,5783 Method and apparatus for maintaining network communication during email data transfer
Methods and apparatus provide for network communication to be maintained during transfer of email data between two devices. In one aspect a method includes...
US-1,013,5782 Determining close contacts using communication data
One embodiment provides a method including: accessing, using a processor, communication data received at an electronic device of a first entity; identifying,...
US-1,013,5781 Context and content in notifications
A system and method is disclosed for informing a user of recent activities in an online social network. A message group in an online activity stream of an...
US-1,013,5780 Management of commercial messages in a social network
Methods, systems, and computer programs are presented for managing the flow of messages among users of a social network. One method enables the election of an...
US-1,013,5779 Levels of competency in an online community
Techniques and systems are described to determine levels of competency of users as part of an online community and control generation of subsequent digital...
US-1,013,5778 Custom encoded messages amongst a customized social group
A system and method for sending custom encoded messages amongst a customized social group. A selection of intended recipients within a subgroup from a list of...
US-1,013,5777 Leveraging an internet of things to initiate a physical object to perform a specific act that enhances an...
A first community Internet of Things (IoT) concentrator can receive first data corresponding to an interaction of a user with at least one of a first plurality...
US-1,013,5776 Cross platform social networking messaging system
Disclosed is a method of cross-social network communication. The method may include determining a plurality of recipients of a social networking service...
US-1,013,5775 Dynamic re-configuration of a user interface based on transaction information
A device may receive transaction information that identifies a set of third parties. The device may process messages in an electronic messaging account using a...
US-1,013,5774 Methods and apparatus for targeting communications using social network metrics
A method for a computer system includes receiving a first user communication, determining a first group of users, determining a target number of users,...
US-1,013,5773 Communications system
An electronic communications method includes receiving, by an electronic communications platform, a request to create an electronic communications event. The...
US-1,013,5772 Systems and methods for message prompting
Systems and methods are provided for message prompting. For example, a communication client corresponding to a first user acquires a first communication message...
US-1,013,5771 Secure end-to-end transport through intermediary nodes
A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second...
US-1,013,5770 Email chain navigation
Technical solutions are described to arbitrarily order and access email messages based on text analysis and social network analysis. One general aspect includes...
US-1,013,5769 Electronic communication system
An electronic communication system for sending, receiving, storing, organizing, displaying, and sharing electronic messages and content (e.g., text, image,...
US-1,013,5768 Method and computer-readable recording medium for managing sent message in messenger server
A method and computer readable recording medium having a program for managing sent messages in a messenger server includes receiving a message to be transmitted...
US-1,013,5767 Method and system for sender-controlled messaging and content sharing
An access-control device that controls access to encrypted messages. During operation, the access-control device can receive an access key for a corrupted...
US-1,013,5766 System and method for evaluating domains to send emails while maintaining sender reputation
Systems, device and techniques are disclosed for evaluating domains to send emails while maintaining sender reputation. Registration records of a domain are...
US-1,013,5765 Real-time display of multiple annotated images
A user can share (show) multimedia information while simultaneously communicating (telling) with one or more other users over a network. Multimedia information...
US-1,013,5764 Universal interaction platform for people, services, and devices
A universal interaction platform that communicates with service providers and smart devices by receiving a message object that includes information indicative...
US-1,013,5763 System and method for secure and efficient communication within an organization
The present disclosure relates to system(s) and method(s) for enabling secure and efficient communication between user devices within an organization....
US-1,013,5762 Bidirectional group text messaging system and method
A bidirectional group text messaging system is disclosed having a group owner that initiates a group by obtaining a provisioned telephone number, the group...
US-1,013,5761 Switch device, control method, and storage medium
A switch device includes a plurality of ports respectively including a queue and transmits a flow including packets; and a processor configured to detect...
US-1,013,5760 Flexible Ethernet chip-to-chip inteface systems and methods
A Chip-to-Chip (C2C) interface utilizing Flexible Ethernet (FlexE) includes circuitry configured to provide a packet interface on a single card or over...
US-1,013,5759 Context and power control information management for proximity services
Management of context and power control information enables different power control schemes for point-to-point or point-to-multipoint based on proximity...
US-1,013,5758 Chip and transmission scheduling method
A chip is provided, where the chip is formed by packaging at least two dies, and the at least two dies form at least one die group. The die group includes a...
US-1,013,5757 Inquiry-based adaptive prediction
Predicting future utilization of a resource. The predicting future utilization of a resource may include receiving inquiries for a potential future utilization...
US-1,013,5756 Transparent and efficient multi-destination TCP communications based on bit indexed explicit replication
Systems, methods, and computer-readable storage media for multi-destination TCP communications using bit indexed explicit replication (BIER). In some examples,...
US-1,013,5755 Information technology infrastructure discovery utilizing discovery adapters
A method comprises building a registry of available discovery adapters, obtaining discovery data from information technology infrastructure, generating a...
US-1,013,5754 Method for coordinating web communications
Method for coordinating web communications, executable at a browser coordination server in communication with a first electronic device and a second electronic...
US-1,013,5753 System to share network bandwidth among competing applications
The present invention pertains to the allocation of bandwidth on a global large scale network. Systems and methods are provided to base bandwidth allocation on...
US-1,013,5752 Expansion device for virtual interface and network server system thereof
An expansion device for a virtual interface is provided. The expansion device is disposed on a mainboard of a server and is configured to acquire control of a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.