Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0324732 SYSTEM AND METHOD FOR PROVIDING A CERTIFICATE FOR NETWORK ACCESS
Provided is a system and method for providing a certificate, and more specifically a certificate for network access upon a second system. The method includes,...
2017/0324731 TECHNOLOGIES FOR AUTHENTICATION AND SINGLE-SIGN-ON USING DEVICE SECURITY ASSERTIONS
Technologies for remote device authentication include a client computing device, an identity provider, and an application server in communication over a...
2017/0324730 METHOD AND APPARATUS FOR IDENTITY FEDERATION GATEWAY
Techniques for an ID federation gateway include determining whether a user associated with a request for a particular network resource is to be identified by...
2017/0324729 Method and Device for Information System Access Authentication
A method is provided to improve authentication of a user to login with a client device to a computer system. A mobile device stores a list of Uniform Resource...
2017/0324728 RESOURCE ACCESS CONTROL FOR VIRTUAL MACHINES
To provide enhanced operation of virtualized computing systems, various systems, apparatuses, methods, and software are provided herein. In a first example, a...
2017/0324727 Facilitating Network Login
A system and method for transmitting user credentials to another device. According to some embodiments, a method is described of receiving into a first...
2017/0324726 DIGITAL AUTHENTICATION USING AUGMENTED REALITY
An augmented reality (AR) interactive system and method is provided. In one embodiment the systems comprises a user interface configured to receive user input,...
2017/0324725 INCREASED COMMUNICATION SECURITY
A system may include a first computer system and a second computer system. The first computer system may be configured to generate a Constrained Application...
2017/0324724 DNSSEC SIGNING SERVER
Systems and methods for performing DNSSEC signing are described in which digital signature operations may be performed by a network accessible signing server...
2017/0324723 System and Method for Verifying User Supplied Items Asserted About the User For Searching
A system and method validates user supplied photographs and/or characteristics using a video, audio or series of images of the user responding to instructions,...
2017/0324722 MANAGEMENT OF DYNAMIC CREDENTIALS
In an embodiment, a method comprises intercepting, from a first computer, a first set of instructions that define one or more original operations, which are...
2017/0324721 Methods, Systems, and Products for Authenticating Users
Methods, systems, and products authenticate a user to a device. A user selects or submits a media file for authentication. Features in the media file are...
2017/0324720 INFORMATION RECORDING APPARATUS
An information recording apparatus has a drive unit to record digital information including digital contents; and a host unit to control reading and writing of...
2017/0324719 USER AUTHENTICATION FRAMEWORK
Described herein is a framework to authenticate users. In accordance with one aspect of the framework, an authentication library is provided to implement an...
2017/0324718 Methods and Devices Having a Key Distributor Function for Improving the Speed and Quality of a Handover
A key distributer node for a network includes a memory device with at least one first key, at least one data communication device that can exchange data with...
2017/0324716 Autonomous Key Update Mechanism with Blacklisting of Compromised Nodes for Mesh Networks
Various embodiments described herein relate to network key manager which is configured to manage keys in nodes in the network, wherein the network key manager...
2017/0324715 LIGHT-WEIGHT KEY UPDATE MECHANISM WITH BLACKLISTING BASED ON SECRET SHARING ALGORITHM IN WIRELESS SENSOR NETWORKS
Various embodiments include a network manager for managing network keys in a network having a plurality of nodes, the device including: a memory; and a...
2017/0324714 AUTHENTICATED GROUP CONTEXT IN TRANSITIVE IP NETWORK DOMAINS
A method is provided in one example embodiment and includes receiving at a node of a transitive IP network a data packet including a Network Services Header...
2017/0324713 TECHNIQUES FOR LOAD BALANCING IN A PACKET DISTRIBUTION SYSTEM
Various embodiments are generally directed to techniques to distribute encrypted packets among multiple cores in a load-balanced manner for further processing....
2017/0324712 RELATING PRIVATE DATA OF DIFFERENT ENTITIES
Aspects of the present disclosure relate to cryptography. In particular, example embodiments relate to computing a relationship between private data of a first...
2017/0324711 Method for establishing, securing and transferring computer readable information using peer-to-peer public and...
System and method for confirming and transferring information from one party to another via block chain escort, using central and decentralized databases...
2017/0324710 SYSTEMS FOR PROVIDING DEVICE-SPECIFIC ACCESS TO AN E-MAIL SERVER
Systems and methods herein can provide device-specific access to an e-mail server, including an EWS-based e-mail server. In an example, a management server...
2017/0324709 Efficient Packet Capture for Cyber Threat Analysis
Methods, systems, and computer-readable media for efficiently detecting threat incidents for cyber threat analysis are described herein. In various...
2017/0324708 Concurrent Security Processing Of Network Packets By Multiple In-Line Network Security Tools
Systems and methods provide concurrent security processing for multiple network security tools. An input packet is received at a network packet forwarding...
2017/0324707 NETWORK SERVICE PROVIDER ARCHITECTURE WITH INTERNET-ROUTE-FREE CONTROL PLANE
In a network service provider environment, the service provider infrastructure is protected by separating internet routing from the default context and placing...
2017/0324706 SYSTEM AND METHOD FOR SUPPORTING FLEXIBLE FORWARDING DOMAIN BOUNDARIES IN A HIGH PERFORMANCE COMPUTING ENVIRONMENT
System and method for supporting flexible forwarding domain boundaries in a high performance computing environment. In accordance with an embodiment, flexible...
2017/0324705 CREATE AND DISPLAY TO A CUSTOMER AN INTERNET PRODUCT USAGE TIMELINE OF A SUCCESSFUL COMPETITOR BUSINESS
A domain name registrar, preferably with website hosting capabilities, may assist a customer in creating and planning for a new Internet business. The...
2017/0324704 SYSTEM FOR IMPLEMENTING A SMALL COMPUTER SYSTEMS INTERFACE PROTOCOL OVER A CONTENT CENTRIC NETWORK
One embodiment provides a system that facilitates schematized access control in a content centric network. During operation, the system generates, by a content...
2017/0324703 SYSTEM AND METHOD FOR SUPPORTING MULTIPLE CONCURRENT SL TO VL MAPPINGS IN A HIGH PERFORMANCE COMPUTING ENVIRONMENT
System and method for supporting multiple concurrent SL to VL mappings in a high performance computing environment. In accordance with an embodiment, systems...
2017/0324702 Endpoint Identifiers Registration
An Egress Tunnel Router (ETR) may establish a neighbor connection with a Map Server (MS). After the ETR establishes the neighbor connection with the MS, or...
2017/0324701 ENABLING IDENTIFICATION OF ONLINE IDENTITIES BETWEEN DIFFERENT MESSAGING SERVICES
A method and system for populating identities in a message service involves registering a user of a first messaging service with a second messaging service....
2017/0324700 METHOD AND SYSTEM FOR ADDING AN IDENTIFIER
A computer-implemented method of automatically adding an identifier related to a content item to a communication in a multi-user communication network such as...
2017/0324699 METHOD AND SYSTEM OF PRIVATE MESSAGING IN A FAMILY NETWORKING COMPUTING PLATFORM
In one aspect, a method of a managing an online social network includes the step of providing an online social network. The online social network includes a...
2017/0324698 MODIFICATION OF SOCIAL MESSAGE BASED ON EVENT DATA
A method, system, and/or computer program product alter a state of a transmitted message. One or more processors detect an initial broadcast of a message. The...
2017/0324697 MAINTAINING RELATIONSHIPS BETWEEN USERS IN A SOCIAL NETWORK BY EMPHASIZING A POST FROM A FIRST USER IN A SECOND...
A method, system and computer program product for maintaining relationships between users in a social network. Online interactions between users in the social...
2017/0324696 RELATIONSHIP CHANGE ALERT
A first input is received. The first input is from a first user to one or more second users. The first input includes a text to be sent from the first user to...
2017/0324695 AUTOMATED MONITORING OF ELECTRONIC MESSAGING FOR TIMED ALERTS OF PREVIOUSLY TRANSMITTED MESSAGES
There are provided systems and methods for automated monitoring of electronic messaging for timed alerts of previously transmitted messages. A sender may...
2017/0324694 Method for Streamlining Communications Between Groups of Users
A method for method for streamlining communications between groups of users uses multiple user accounts and a remote server. Each user account is associated to...
2017/0324693 Information processing method, user equipment, server, and computer-readable storage medium
A first selectable command is displayed on a User Interface (UI) of the UE, and a first request is sent to a server via the UI, such that the server returns a...
2017/0324692 METHOD AND DEVICE FOR SAVING CHAT RECORD OF INSTANT MESSAGING
A method for saving chat records of instant messaging (IM) includes when an instant message transmitted or received by an IM chat window comprises non-text...
2017/0324691 Electronic mail data management systems and methods for generating a dataset for such systems
A method of updating electronic mails (emails) data dataset that comprises providing a dataset which comprises a plurality of previously identified original...
2017/0324690 DYNAMIC INCLUSION THRESHOLDS FOR SOCIAL NETWORK CONVERSATIONS
A social network conversation dynamic inclusion threshold causes a first subset of social network group members of a social network group to be included in a...
2017/0324689 SYSTEM AND METHOD FOR AUTOMATICALLY CLASSIFYING E-MAIL
Provided is a task tracking method including identifying a mail that includes at least one piece of mail information among sender information, receiver...
2017/0324688 INTERACTIVE AVATAR IN MESSAGING ENVIRONMENT
Among other things, embodiments of the present disclosure relate to communicating via an avatar embedded in an email message. In some embodiments, the avatar...
2017/0324687 USER TERMINAL AND METHOD OF DISPLAYING LOCK SCREEN THEREOF
An example user terminal device includes a display unit, including a display, configured to display a lock screen. The lock screen includes content...
2017/0324686 SYSTEM AND METHOD FOR SECURE AND EFFICIENT COMMUNICATION WITHIN AN ORGANIZATION
The present disclosure relates to system(s) and method(s) for enabling secure and efficient communication between user devices within an organization....
2017/0324685 System and Method for Enabling Voice and Video Communications Using a Messaging Application
A method and system are provided for enabling voice communications via a messaging application. The method comprises enabling an instant messaging (IM)...
2017/0324684 CENTRALIZED MESSAGE SYSTEM AND METHODS
A centralized message system includes a controller in communication with one or more vendor user interfaces for each vendor and one or more consumer user...
2017/0324683 SYSTEMS AND METHODS FOR VIRTUAL INTERACTION
In one aspect, at least one processor may receive a first user input and identify one or more first keywords from the first user input to determine one or more...
2017/0324682 DISTRIBUTED CONFIGURATION MANAGEMENT FOR VIRTUAL CLUSTER SWITCHING
One embodiment of the present invention provides a switch. The switch includes a port to couple to a second switch. The switch also includes a control...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.