Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0318015 INTERLINKING CROSS PLATFORM AUTHORIZATION AND PROCESSING
A user authorizes cross-platform interlinking or user data. The cross-platforms are mined for user-authorized data. The data is processed into graph data and...
2017/0318014 METHOD AND SYSTEM FOR AUTHENTICATING A SESSION ON A COMMUNICATION DEVICE
Method and system for authenticating a session on a communication device. One method includes determining a use context of the communication device and an...
2017/0318013 METHOD AND SYSTEM FOR VOICE-BASED USER AUTHENTICATION AND CONTENT EVALUATION
The disclosed embodiments illustrate methods for voice-based user authentication and content evaluation. The method includes receiving a voice input of a user...
2017/0318012 Communication Enhancement Methods
A system for automatic authentication of service requests includes authentication of a remote access device. This authentication may be accomplished...
2017/0318011 USER AUTHENTICATION METHOD FOR ENHANCING INTEGRITY AND SECURITY
Disclosed is a user authentication method including at least: (1) performing a primary conversion to generate a first common authentication key and performing...
2017/0318010 METHOD AND SYSTEM FOR DISTINGUISHING HUMANS FROM MACHINES AND FOR CONTROLLING ACCESS TO NETWORK SERVICES
A method and an apparatus for distinguishing humans from computers and for controlling access to network services. One intended application of the method is a...
2017/0318009 PROTECTION OF APPLICATION PASSWORDS USING A SECURE PROXY
Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target...
2017/0318008 ARTIFICIAL INTELLIGENCE ENCRYPTION MODEL (AIEM) WITH DEVICE AUTHORIZATION AND ATTACK DETECTION (DAAAD)
A user of a client device establishes a secure connection to a server (or other) device without using public keys or third-party certification by entering only...
2017/0318007 IDENTIFICATION SYSTEM AND METHOD
An identification system for identifying a user accessing a website hosted by a web server with a user device comprising a user database arranged to store data...
2017/0318006 ENCRYPTION METHODS AND APPARATUS
The embodiments discussed herein relate to updating and encrypting passwords for one or more computing devices. The computing devices can be associated with a...
2017/0318005 SECURELY CONNECTING CONTROL DEVICE TO TARGET DEVICE
In an approach, a target computing device receives a pairing request from a controller computing device, the pairing request including controller credentials...
2017/0318004 METHOD AND APPARATUS FOR AUTHENTICATING A COMMUNICATION DEVICE
A method and apparatus for authenticating a communication device is disclosed. An system that incorporates teachings of the present disclosure may include, for...
2017/0318003 CONTENT RESTRICTION COMPLIANCE USING REVERSE DNS LOOKUP
A method for alerting Internet content providers of the age or other personal information of a computer user, which includes receiving a reverse DNS lookup...
2017/0318002 INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND RECORDING...
An information processing system performing highly secure broadcast authentication while reducing a delay until authentication, a communication amount, and a...
2017/0318001 SEARCH ENGINE FOR AUTHENTICATED NETWORK RESOURCES
A method and corresponding computer system for authenticating a network resource are disclosed. The method comprises receiving an input at a computer system...
2017/0318000 SYSTEMS AND METHODS OF USER AUTHENTICATION FOR DATA SERVICES
Embodiments of the invention are directed to systems and methods of user authentication for data services. The data services may include accessing a tax return...
2017/0317999 SECURITY CREDENTIAL PROTECTION WITH CLOUD SERVICES
Presented herein are techniques for remotely releasing bootstrap credentials to a cloud management proxy device. In particular, a cloud management proxy device...
2017/0317998 SYSTEM AND METHOD FOR SECURE MESSAGING IN A HYBRID PEER-TO-PEER NETWORK
An improved system and method are disclosed for peer-to-peer communications. In one example, the method enables endpoints to securely send and receive messages...
2017/0317997 METHODS AND SYSTEMS OF PROVIDING VERIFICATION OF THE IDENTITY OF A DIGITAL ENTITY USING A CENTRALIZED OR...
Methods and systems of providing verification of the identity of a digital entity are provided, including receiving information and a public key of the digital...
2017/0317996 TECHNOLOGIES FOR SECURE MEDIATED REALITY CONTENT PUBLISHING
Technologies for secure mediated reality content publishing includes one or more mediated reality servers, multiple mediated reality listeners, and multiple...
2017/0317995 SYSTEM AND METHOD FOR AUTOMATIC WIRELESS CONNECTION BETWEEN A PORTABLE TERMINAL AND A DIGITAL DEVICE
Methods and apparatuses are provided for automatic wireless connection to a digital device in a portable terminal. A phone number and an Electronic Serial...
2017/0317994 GENERATING BRIDGE MATCH IDENTIFIERS FOR LINKING IDENTIFIERS FROM SERVER LOGS
Systems and methods of matching identifiers between multiple datasets are described herein. A system can transmit a first identifier vector to a third party...
2017/0317993 USER AUTHENTICATION BASED ON TRACKED ACTIVITY
An apparatus for user authentication based on tracked activity includes an activity tracker module, a challenge module, and an authentication module. The...
2017/0317992 SYSTEM FOR SECURING EXCHANGES BETWEEN A COMMUNICATING THING AND A SERVICES PLATFORM
A security system makes secure exchanges between a services platform and a communicating thing, which includes a control device. The system further includes a...
2017/0317991 OFFLOADING STORAGE ENCRYPTION OPERATIONS
To decrease a load on a network and a storage system, encryption operations can be offloaded to a server locally connected to the storage system. The server...
2017/0317990 APPARATUS AND METHOD FOR MANAGING VIRTUAL SUBSCRIBER INDENTITY MODULE
An electronic device is provided. The electronic device includes at least one processor that is configured to execute a first application in an REE, to execute...
2017/0317989 EFFICIENT SENSOR DATA DELIVERY
A method is provided to enhance efficiency of sensor event data transmission over network. Specifically, a method is described to buffer a set of sensor data,...
2017/0317988 ELECTRONIC DEVICE AND METHOD OF TRANSMITTING CONTENT ITEM
According to one embodiment, an electronic device includes a content transmitter. The content transmitter is configured to output a content item including...
2017/0317987 Enhanced Network Security Using Packet Fragments
A network system comprising a first network element and a second network element. The first network element is programmed to provide the step of first,...
2017/0317986 METHOD AND SYSTEM FOR RATELESS AND POLLUTION-ATTACK-RESILIENT NETWORK CODING INCLUDING DECODER(S)
A decoder deployed in one or more terminals, includes a computer readable storage medium storing program instructions, and a processor executing the program...
2017/0317985 SYSTEMS AND DEVICES FOR ENCRYPTING, CONVERTING AND INTERACTING WITH MEDICAL IMAGES USING A MOBILE DEVICE
A network device and a peripheral device for attachment with a medical imaging device provides for the encryption and conversion of a medical image into a...
2017/0317984 SYSTEMS AND METHODS FOR PROTECTING USER PRIVACY IN NETWORKED DATA COLLECTION
Disclosed herein are systems and methods for protecting user privacy in networked data collection. One embodiment takes the form of a method that includes...
2017/0317983 IMAGE DOCUMENT PROCESSING IN A CLIENT-SERVER SYSTEM INCLUDING PRIVACY-PRESERVING TEXT RECOGNITION
Disclosed are devices and methods for processing an image document in a client-server environment such that privacy of text information contained in the image...
2017/0317982 ELECTRONIC DEVICE WITH AN OPERATIONAL UNIT
An electronic device has an operational unit for communication. The operational unit is provided with a first interface unit for secure communication and a...
2017/0317981 HOME NETWORK TRAFFIC ISOLATION
Implementations provide for extending an authentication protocol to dynamically create a per user end to end encryption over a multi-hop path for data traffic,...
2017/0317980 INFORMATION PROCESSING DEVICE WITH NETWORK INTERFACE HAVING PROXY RESPONSE FUNCTION
An information processing device that can communicate with an external device includes a controller for controlling the information processing device, and a...
2017/0317979 Publication of Firewall Configuration
A novel method for distributing firewall configuration of a software defined data center is provided. The network manager of the data center receives update...
2017/0317978 SECURE INTERFACE ISOLATION
Techniques for isolating interfaces of a protocol stack are discussed herein. In some instances, an apparatus may store a firewall policy that defines a set of...
2017/0317977 FAST ORDERING OF FIREWALL SECTIONS AND RULES
A novel method for managing firewall configuration of a software defined data center is provided. Such a firewall configuration is divided into multiple...
2017/0317976 Priority Allocation for Distributed Service Rules
Some embodiments provide a method for a network controller that manages a flow-based managed forwarding element (MFE). The method receives multiple sets of...
2017/0317975 SYSTEMS AND METHODS FOR SECURE COMMUNICATIONS OVER BROADBAND DATALINKS
Systems and methods for secure communications over broadband datalinks are provided. In certain implementations, a system for providing secure communications...
2017/0317974 IMPLEMENTING LOGICAL METADATA PROXY SERVERS IN LOGICAL NETWORKS
Some embodiments provide a method for providing metadata proxy services to different data compute nodes that are associated with different logical networks...
2017/0317973 VERIFICATION OF DOMAIN EVENTS
A method for providing a verification process for verifying eligibility of a domain name registrant via a verification web interface for a domain name either...
2017/0317972 METHOD OF TRANSLATING A LOGICAL SWITCH INTO A SET OF NETWORK ADDRESSES
A method of providing a set of network addresses associated with a managed forwarding element (MFE) in a logical network that includes a set of data compute...
2017/0317971 Assignment of Router ID for Logical Routers
Some embodiments provide a method for determining a router identifier for a centralized routing component of a logical router. The method determines that a...
2017/0317970 CLIENT DEVICE ADDRESS ASSIGNMENT FOLLOWING AUTHENTICATION
Methods and systems are described for assigning the proper Internet protocol (IP) address to a client device following authentication of the client device on a...
2017/0317969 IMPLEMENTING LOGICAL DHCP SERVERS IN LOGICAL NETWORKS
Some embodiments provide a method for providing dynamic host configuration protocol (DHCP) services to different data compute nodes (e.g., virtual machines)...
2017/0317968 DYNAMIC DNS-BASED SERVICE DISCOVERY
Techniques are provided for performing dynamic DNS-SD. In an embodiment, an apparatus includes one or more databases, one or more transceivers to receive a...
2017/0317967 METHOD AND DEVICE FOR REDIRECTION TO WEB PAGE
Disclosed are a method and device for redirection to a Web page. The method includes: when a first device receives a Domain Name System (DNS) request from a...
2017/0317966 TAGGING POSTED CONTENT IN A SOCIAL NETWORKING SYSTEM WITH MEDIA INFORMATION
A social networking system allows a user to insert media information into content posted by the user, where the media information identifies a media item that...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.