Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0244702 ELECTRONIC APPARATUS HAVING AUTHENTICATION MODULE AND METHOD FOR AUTHENTICATING USER BY CONTROLLING...
According to various example embodiments of the present disclosure, an electronic device and an operating method thereof may include receiving an access...
2017/0244701 VOICEPRINT VERIFICATION METHOD, APPARATUS, STORAGE MEDIUM AND DEVICE
The present invention discloses a voiceprint verification method, apparatus, storage medium and device. The method includes the following steps: generating and...
2017/0244700 DEVICE AND METHOD FOR VALIDATING A USER USING AN INTELLIGENT VOICE PRINT
A method of validating a user for accessing a secure system comprising selecting a picture that is prompted to the user, generating, through the user, an...
2017/0244699 SECURE COMMUNICATION
There is provided a system comprising a first device of a user and a second device of a user, in which a user carries out a secure transaction utilising a user...
2017/0244698 AUTHENTICATION PROCESSING FOR A PLURALITY OF SELF-ENCRYPTING STORAGE DEVICES
Authentication processing for a plurality of self-encrypting storage devices, e.g. SEDs) of a computer system is provided. The authentication processing for...
2017/0244697 AUTHENTICATED NETWORK TIME FOR MOBILE DEVICE SMART CARDS
A mobile device sends a network attach request to a network node, and receives an authentication challenge from the network node, where the authentication...
2017/0244696 DELEGATING AUTHORIZATIONS
Delegating authorizations sufficient to access services is contemplate. The authorization may be delegated in the form of a token or other transmissible...
2017/0244695 DELEGATING AUTHORIZATIONS
Delegating authorizations sufficient to access services is contemplate. The authorization may be delegated in the form of a token or other transmissible...
2017/0244694 INCORRECT PASSWORD MANAGEMENT
The management of credentials subject to a lockout policy can include dynamically determining appropriate lockout thresholds and other such values appropriate...
2017/0244693 Customer Call Logging Data Privacy in Cloud Infrastructure
Systems and methods are provided for encrypting data at a customer for storage at a hosted service provider. In addition to the data being encrypted by the...
2017/0244692 AUTHENTICATION OF A USER USING A SECURITY DEVICE
A mechanism for using a mobile device connected to a security device to authenticate a user to a service provider using a security device operating according...
2017/0244691 METHOD OF SENDING DATA FROM A SECURE TOKEN TO A DISTANT SERVER
The invention is a method for managing a response from an application embedded in a secure token acting as an UICC, in response to a command requesting opening...
2017/0244690 METHOD AND COMPUTER-BASED SYSTEM FOR ANONYMOUSLY AUTHENTICATING A SERVICE USER
A computer-implemented method of and a first web service system for anonymously authenticating a service user having an account associated with a first web...
2017/0244689 RETROSPECTIVE DISCOVERY OF SHARED CREDENTIALS
A method for identifying a shared credential within a networked computing environment. The method includes a computer processor accessing information...
2017/0244687 TECHNIQUES FOR CONFIDENTIAL DELIVERY OF RANDOM DATA OVER A NETWORK
Techniques for confidential delivery of entropy and random data over a network are disclosed. In some embodiments, a client device may receive a first set of...
2017/0244686 Port Scrambling For Computer Networks
A method, system and computer program product providing port scrambling for securing communications in internal computer networks are disclosed. A...
2017/0244685 MULTIPATH DEMULTIPLEXED NETWORK ENCRYPTION
An encryption application splits a data payload into multiple segments. Each of the segments is encoded using one of multiple encryption keys. The encryption...
2017/0244684 TECHNOLOGIES FOR SECURE STORAGE AND USE OF BIOMETRIC AUTHENTICATION INFORMATION
Generally, this disclosure describes technologies for securely storing and using biometric authentication information, such as biometric reference templates....
2017/0244683 ELECTRONIC AUTHENTICATION OF AN ACCOUNT IN AN UNSECURE ENVIRONMENT
Systems and methods are provided for accessing a user account by a user with a first password, and then changing the first password to a second password in...
2017/0244682 Caching content securely within an edge environment, with pre-positioning
A technique to cache content securely within edge network environments, even within portions of that network that might be considered less secure than what a...
2017/0244681 Terminating SSL connections without locally-accessible private keys
An Internet infrastructure delivery platform (e.g., operated by a service provider) provides an RSA proxy "service" as an enhancement to the SSL protocol that...
2017/0244680 Caching content securely within an edge environment
A technique to cache content securely within edge network environments, even within portions of that network that might be considered less secure than what a...
2017/0244679 DIVERSIFYING A BASE SYMMETRIC KEY BASED ON A PUBLIC KEY
A symmetric key that is stored at a device may be received. A public key from a remote entity may also be received at the device. Furthermore, a derived key...
2017/0244678 USER AUTHENTICATION OVER NETWORKS
Methods are provided for authenticating user authentication data, associated with a user ID, at an authentication system. The authentication system comprises...
2017/0244677 OPERATION METHOD BASED ON WHITE-BOX CRYPTOGRAPHY AND SECURE TERMINAL FOR PERFORMING THE METHOD
Provided are an operation method and a secure terminal for performing the method. The operation method may include receiving, from a user terminal, a plain...
2017/0244676 METHOD AND SYSTEM FOR AUTHENTICATION
Described herein is a method of authentication between a mobile device and a service provider server. The method enables a session to be established between a...
2017/0244675 COERCED ENCRYPTION ON CONNECTED DEVICES
Techniques for coercing users to encrypt synchronized content stored at their personal computing devices. In some aspects, one or more computing devices...
2017/0244674 DISTRIBUTED FIREWALL IN A VIRTUALIZED COMPUTING ENVIRONMENT
Example methods are provided for a firewall controller to implement a distributed firewall in a virtualized computing environment that includes a source host...
2017/0244673 FIREWALL IN A VIRTUALIZED COMPUTING ENVIRONMENT USING PHYSICAL NETWORK INTERFACE CONTROLLER (PNIC) LEVEL...
Example methods are provided for a destination host to implement a firewall in a virtualized computing environment that includes the destination host and a...
2017/0244672 TECHNIQUES FOR SECURELY DETECTING COMPROMISES OF ENTERPRISE END STATIONS UTILIZING TUNNEL TOKENS
A token tunnel server (TTS) within an enterprise network receives packets from a source address directed to a destination address (both of the enterprise...
2017/0244671 FIREWALL PORT ACCESS RULE GENERATION
A method includes generating firewall port access rules between a first cloud system a second cloud system for each tenant of a plurality of tenants. A unique...
2017/0244670 Behavior-Based Filters For Signaling System Number 7 Networks
Concepts and technologies disclosed herein are directed to behavior-based filters for signaling system number 7 ("SS7") networks. According to one embodiment...
2017/0244669 METHOD AND SYSTEM FOR DETERMINING AN ADDRESS CORRESPONDING TO A MOST PROBABLE PHYSICAL LOCATION OF AN...
A method of determining an address corresponding to a most probable physical location of an electronic device associated with a user is executable on a...
2017/0244668 SYSTEMS, DEVICES, AND METHODS FOR DYNAMIC ALLOCATION OF DOMAIN NAME ACQUISITION RESOURCES
Embodiments relate to systems, devices, and computing-implemented methods for dynamically allocating domain name acquisition resources by receiving indications...
2017/0244667 SYSTEMS AND METHODS FOR CONTENT SERVER RENDEZVOUS IN A DUAL STACK PROTOCOL NETWORK
Implementations described and claimed herein provide systems and methods for serving content over a network. In one implementation, a method of serving content...
2017/0244666 NETWORK CONTROL SYSTEMS, BUILDING CONTROL SYSTEMS, REMOTE COMMUNICATION DEVICES AND METHOD THEREOF
A remote communication device for controlling at least one building control system, the remote communication device comprising a processor arranged to:...
2017/0244665 Provisioning tool for a content delivery network (CDN)
A tool that allows a CDN customer, partner, or other authorized entity to create a DNS canonical name (CNAME) on the content delivery network without having to...
2017/0244664 SYSTEMS AND METHODS FOR DETERMINING CHARACTER ENTRY DYNAMICS FOR TEXT SEGMENTATION
A method can include receiving a string of characters. The method can include determining one or more possible word boundaries for words in the string of...
2017/0244663 METHOD AND APPARATUS FOR INTERCARRIER COMMUNICATION
A method includes receiving, at a network component of a first carrier network from a source device, a telephone number of a destination device configured to...
2017/0244662 COMPUTER IMPLEMENTED METHODS AND APPARATUS FOR COMMUNICATING FEED INFORMATION TO ONE OR MORE RECIPIENTS
Disclosed are systems, apparatus, methods and computer-readable media for communicating feed information to one or more recipients. In some implementations, an...
2017/0244661 TECHNIQUES FOR ASCRIBING SOCIAL ATTRIBUTES TO CONTENT
Techniques for ascribing social attributes to content items and for selecting content to display in a content feed are described. According to various...
2017/0244660 Taking Actions On Notifications Using An Incomplete Data Set From A Message
An apparatus, a system, and a method in which a message notification application such as an e-mail notification application resident in a first memory on a...
2017/0244659 PROXIMITY BASED MESSAGING
Examples disclosed herein relate to providing a message to a user device. As per an example, a user device, from among a plurality of user devices, being in...
2017/0244658 PROCESSING SYSTEM FOR MULTIVARIATE SEGMENTATION OF ELECTRONIC MESSAGE CONTENT
Mediums, apparatus, computer program code, and means may be provided to launch electronic messages via a distributed communication network by an automated...
2017/0244657 MESSAGE DELIVERY IN A MESSAGE SYSTEM
Control of message delivery from publisher devices to a subscriber application of a messaging system is provided. The subscriber application has a subscription...
2017/0244656 VERIFIED HYPERMEDIA COMMUNICATIONS
A verified method of high-value, person-to-person communication is provided. The method comprises creating a unique dynamic messaging link recognizable to a...
2017/0244655 METHOD FOR SHARING CONTENT GROUP OF ELECTRONIC DEVICE AND ELECTRONIC DEVICE THEREOF
According to various example embodiments, a method for sharing a content group of an electronic device may include transmitting, to a server, information for a...
2017/0244654 METHOD AND SYSTEM OF OBTAINING CONTACT INFORMATION FOR A PERSON OR AN ENTITY
Methods and systems are provided for obtaining status information associated with a person or an entity and performing actions based on the status information....
2017/0244653 PROVISIONING CONFERENCE ROOMS
A method, executed by a computer, for provisioning chat rooms (e.g. audio, video, and/or text-based communication) includes determining a topic by accessing...
2017/0244652 SYSTEM AND METHOD FOR INTEGRATING MESSAGING NETWORK AND EXTERNAL SERVICE PROVIDERS
A system for integrating messaging network and external service providers includes: a messaging server connected to a network; and an integration server...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.