Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0353467 Network monitoring system with remote access
Methods and apparatus for Network Monitoring System with Remote Access (10) are disclosed. A secured customer network (12) comprises computing resources that...
2017/0353466 AUTOMATICALLY SHARING A DOCUMENT WITH USER ACCESS PERMISSIONS
Inline command functionality for automatically sharing a document with user access permissions is provided. Automatic sharing of a document is performed in...
2017/0353465 HANDLING POTENTIAL SERVICE LOAD INTERRUPTIONS BY PRESENTING ACTION ITEMS FOR SERVICE REQUESTER TO COMPLETE TO...
A method, system and computer program product for handling potential service load interruptions. The utilization of resources, such as servers in a service...
2017/0353464 TECHNIQUES FOR SECURE DEBUGGING AND MONITORING
Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure...
2017/0353463 Remotely Controlling Access to Online Content
Various embodiments provide an approach to controlled access to online content. Such control may be based on a multitude of factors including but not limited...
2017/0353462 METHOD AND SYSTEM FOR IMPROVING NETWORK SECURITY
Methods and systems for securing a network including IoT devices are provided. A networking device system can regulate the ability of IoT devices to...
2017/0353461 SYSTEM AND METHOD FOR PROVIDING COMMAND AND CONTROL PARAMETERS, CONFIGURATION DATA, AND OTHER DATA TO NODES OF...
A method includes detecting a storage device and determining whether the storage device has been checked-in for use with at least a protected node. The method...
2017/0353460 APPARATUS AND METHOD FOR PREVENTING FILE ACCESS BY NODES OF A PROTECTED SYSTEM
A method includes detecting a storage device at a protected node and determining whether the storage device has been checked-in for use with at least the...
2017/0353459 SECURITY POLICY EFFICACY VISUALIZATION
A management entity communicates over a network with devices on which security rules are configured to control network access. Data that indicates a hit count...
2017/0353458 SYSTEM AND METHOD TO ALLOW THIRD-PARTY DEVELOPER TO DEBUG CODE IN CUSTOMER ENVIRONMENT
A platform is provided to allow the developer to log into a subscriber's computer system by using the credential of the developer or the subscriber to view and...
2017/0353457 UNIVERSAL ACCESS TO DOCUMENT TRANSACTION PLATFORM
A system and method are described in which a document transaction management platform coordinates performance of trust actions across a plurality of trust...
2017/0353456 CONTROLLING ACCESS TO A VAULT SERVER IN A MULTITENANT ENVIRONMENT
A computer-implemented method includes: receiving, by a computing device, a vault access request for vault credentials stored by a vault server; verifying, by...
2017/0353455 METHOD AND MANAGEMENT SERVER FOR REVOKING GROUP SERVER IDENTIFIERS OF COMPROMISED GROUP SERVERS
Method and management server for revoking group server identifiers of compromised group servers. One method includes determining, with a management server, an...
2017/0353454 NETWORK CREDENTIALS FOR WIRELESSLY ACCESSING A LAN VIA AN ALTERNATE COMMUNICATIONS NETWORK
A computer-implemented method includes: connecting, by a network device, with a user device via an alternate communications network; and providing, by the...
2017/0353453 Principal Access Determination In An Environment
An access determination management system obtains information regarding various different entities in a system (e.g., a networked environment) and what rights...
2017/0353452 NETWORK ACCESS CONTROL
A network access control method includes obtaining network information of an electronic device, determining, using the network information, whether the...
2017/0353451 METHOD AND APPARATUS FOR ISSUING A CREDENTIAL FOR AN INCIDENT AREA NETWORK
A method and apparatus for issuing an incident-issued credential for an incident area network. One embodiment provides an identity server including an...
2017/0353450 Protection and Verification of User Authentication Credentials against Server Compromise
Authenticating a user is provided. A decryption key corresponding to an authentication account of the user of a client device and authentication credential...
2017/0353449 INFORMATION PROCESSING APPARATUS AND DEVICE COORDINATION AUTHENTICATION METHOD
An information processing apparatus includes a processor configured to execute processing. The processing includes receiving authentication information for one...
2017/0353448 ELECTRONIC MECHANISM TO SELF-AUTHENTICATE AND AUTOMATE ACTIONS
Systems and methods for a authenticating a user on an alien electronic device is described. The system may include a first device associated with a first user...
2017/0353447 SSO FUNCTIONALITY BY MEANS OF A TEMPORARY PASSWORD AND OUT-OF-BAND COMMUNICATIONS
A system and method for using a single-use password to add SSO functionality to a service of a Service Provider belonging to an F-SSO federation that does not...
2017/0353446 VIRTUAL ELECTRONIC SECURITY PERIMETER USING DETERMINISTIC NETWORKING
In one embodiment, a supervisory device for a network of a power substation identifies a plurality of nodes in the network of the power substation. The...
2017/0353445 UNIVERSAL ACCESS TO DOCUMENT TRANSACTION PLATFORM
A system and method are described in which a document transaction management platform coordinates performance of trust actions across a plurality of trust...
2017/0353444 TENANT-AWARE DISTRIBUTED APPLICATION AUTHENTICATION
Flexible authentication technologies customized to particular tenants of a data center network can be implemented. For example, an administrator can specify a...
2017/0353443 SYSTEMS AND METHODS FOR ACCESSING MULTIPLE RESOURCES VIA ONE IDENTIFIER
Systems and methods for accessing multiple resources via one identifier are described, including receiving an input that includes at least an authentication...
2017/0353442 PROXIMITY-BASED AUTHENTICATION
A first device requests a protected resource (managed by a second device). A first authentication is performed by the second device upon receipt of the...
2017/0353441 SYSTEM AND METHOD FOR SECURELY CHANGING NETWORK CONFIGURATION SETTINGS TO MULTIPLEXERS IN AN INDUSTRIAL CONTROL...
A secure control system includes a network of multiplexers that control end/field devices of an infrastructure system, such as an electric power grid. The...
2017/0353440 PACKET TRANSMITTING APPARATUS, PACKET RECEIVING APPARATUS, AND COMPUTER READABLE MEDIUM
An edit data generation unit concatenates the message authentication code of an X-1th data block with the message authentication code of an Xth data block,...
2017/0353439 APPARATUS AND METHOD FOR MANAGING FILES
An apparatus includes a file managing application and a device management policy data. The apparatus receives deadline data from a remote administration...
2017/0353438 METHOD AND SERVER FOR ISSUING CRYPTOGRAPHIC KEYS TO COMMUNICATION DEVICES
Method and server for issuing a cryptographic key. One method includes distributing a first group key to a first communication device and a second...
2017/0353437 Filtering TLS connection requests using TLS extension and federated TLS tickets
A system to deliver an application, hosted by a private application provider, over a network to a user device comprising: an application delivery system that...
2017/0353436 COMPROMISE ALERT AND REISSUANCE
A user device operated by a user receives a compromise alert indicating a potentially compromised use of first access data associated with a user. The...
2017/0353435 ROOT OF TRUST OF GEOLOCATION
A root-of-trust of geolocation is provided for an apparatus that includes a trust anchor module with a cryptographic processor and a secure memory. The...
2017/0353434 METHODS FOR DETECTION OF REFLECTED CROSS SITE SCRIPTING ATTACKS
An anti-cross-site scripting (anti-XSS) feature is provided at an operating system without reliance on higher-level third-party software (e.g., browsers,...
2017/0353433 TRAFFIC HANDLING FOR CONTAINERS IN A VIRTUALIZED COMPUTING ENVIRONMENT
An example method is provided for a computing device to perform traffic handling for a container in a virtualized computing environment. The method may...
2017/0353432 NETWORK DEVICE THAT REGISTERS EVENT, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM
A network device that avoids useless processing for registering an event which cannot be transmitted. An image forming apparatus as a network device has a...
2017/0353431 NETWORK ISOLATION
One or more techniques and/or systems are provided for network isolation. For example, nodes within a mesh of devices may be configured with routing rules,...
2017/0353430 TRUSTED ROUTING BETWEEN COMMUNICATION NETWORK SYSTEMS
An apparatus of a communication network system, which routes data packets and stores trusted routes between different communication network systems in a...
2017/0353429 METHOD AND DEVICE FOR MAINTAINING TRANSPORT ADDRESS ASSOCIATIONS FOR AN ADDRESS TRANSLATION ENTITY
A method of maintaining transport address associations in a transport address translation entity connected in series between a first device and a second device...
2017/0353428 INFORMATION PROCESSING APPARATUS AND METHOD AND NON-TRANSITORY COMPUTER READABLE MEDIUM
An information processing apparatus includes an obtaining unit, a trying unit, a specifying unit, and a connecting unit. The obtaining unit obtains addresses...
2017/0353427 METHOD AND SYSTEM FOR IDLE MODE TRANSFER FOR LOAD BALANCING ACROSS DISTRIBUTED DATA PLANE PROCESSING ENTITIES...
A system and an algorithm in a mobile core network to distribute the data load across multiple data processing entities. The system is seen as having one data...
2017/0353426 CONNECTION GENERATION AND RECOGNITION SYSTEMS AND METHODS
This disclosure relates to systems and methods that facilitate more efficient and/or improved connection generation in connection with social media and/or...
2017/0353425 Unifying Web and Phone Presence
The subject matter of this specification can be embodied in, among other things, a computer-implemented method that includes obtaining, at a computer system, a...
2017/0353424 MESSAGE COMPRESSION IN SCALABLE MESSAGING SYSTEM
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving from a plurality of publisher clients a...
2017/0353423 SYSTEMS AND METHODS FOR ENABLING DIALOG AMONGST DIFFERENT PARTICIPANT GROUPS WITH VARIABLE AND...
A network-connected communication system is provided, via which individuals may engage in dialog with one or more dialog members. Differing views of the dialog...
2017/0353422 SYSTEMS AND METHODS FOR TRANSACTION MESSAGING USING SOCIAL NETWORKING PLATFORMS
A computer-implemented method for processing transaction messages using a social network platform between a requestor and a responder is provided. The method...
2017/0353421 Contextual Feed
A news feed system of an on-line social network system obtains and utilizes data related to events that originate with members of the on-line social network...
2017/0353420 An Interface, Method and Computer Program Product for Controlling the Transfer of Electronic Messages
The present invention provides an interface for controlling the transfer of electronic transaction messages between a first financial institution and a...
2017/0353419 A METHOD FOR CONTROLLING THE SHARING OF AT LEAST ONE ELECTRONIC CONTENT BETWEEN A FIRST USER EQUIPMENT AND AT...
A method sharing at least one electronic content between first and second user equipment. A server stores the contents enabling transmission of the content to...
2017/0353418 METHOD AND DEVICE FOR MANAGING SHARED MEMORY IN ROBOT OPERATING SYSTEM
Disclosed in the present application are a method and device for managing a shared memory in a robot operating system. A detailed embodiment of the method...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.