Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0041506 Biometric Capture for Unauthorized User Identification
A computing device may determine to capture biometric information in response to the occurrence of one or more trigger conditions. The trigger condition may be...
2018/0041505 METHOD FOR GENERATING A KEY AND ACCESS CONTROL METHOD
The invention relates to a method for generating a cryptographic key for applying an access control method to a resource of a server (20) by a client-terminal...
2018/0041504 ENHANCEMENT OF PRIVACY/SECURITY OF IMAGES
Embodiments for enhancing privacy and security of an image by a processor. Metadata associated with the image is configured with a usage designation, the usage...
2018/0041503 AUTHENTICATION TECHNIQUES INCLUDING SPEECH AND/OR LIP MOVEMENT ANALYSIS
A system, apparatus, method, and machine readable medium are described for attesting an authenticator. For example, one embodiment of an apparatus comprises: a...
2018/0041502 METHOD AND SYSTEM FOR ENHANCED VALIDATION OF CRYPTOGRAMS IN CLOUD-BASED SYSTEMS
A method for enhanced validation of cryptograms for varying account number lengths includes: storing one or more primary account numbers and a plurality of...
2018/0041501 WIRELESS AUTHENTICATION METHOD AND DEVICE OF RECYCLABLE LOGISTICS APPARATUS
The present invention relates to wireless authentication method and device of recyclable logistics apparatus, the recyclable logistics apparatus comprises a...
2018/0041500 CROSS-PLATFORM CLASSIFICATION OF MACHINE-GENERATED TEXTUAL DATA
A system and method for classifying machine-generated textual data into statistical metrics are determined. The system comprises receiving machine-generated...
2018/0041499 SYSTEM AND METHOD FOR SECURING IPMI REMOTE AUTHENTICATED KEY-EXCHANGE PROTOCOL (RAKP) OVER HASH CRACKS
Systems and methods for continuously secure Intelligent Platform Management Interface (IPMI) Remote Authenticated Key-Exchange Protocol (RAKP) over hash...
2018/0041498 PROGRAM, METHOD AND SYSTEM FOR AUTHENTICATING CONTROL DEVICE
An authentication system, is provided, which includes a control device configured to confirm validity of using a program installed in the control device by...
2018/0041497 NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM, CONNECTION MANAGEMENT METHOD, AND CONNECTION MANAGEMENT DEVICE
A non-transitory computer-readable recoding medium having stored therein a connection management program that causes a computer to execute a process that...
2018/0041496 TRUST ESTABLISHMENT TO DEPLOY SERVERS IN DATA CENTERS
In one example, a system is disclosed, which may include a network device, a new server connected to the network device, and a management server...
2018/0041495 Technique for Handling Accesses of User Equipments
A technique for handling an access from a user equipment (110) accessing an application function (150) is provided. As to a method aspect of the technique, the...
2018/0041494 Method and system for issuing and using derived credentials
At a mobile device, a password is used to create a proof of knowledge (POK). The POK is stored in a controller accessible via a communication network. The POK...
2018/0041493 AUTHENTICATING MOBILE LOCKERS
In some embodiments, apparatuses and methods are provided herein useful for the storage, transportation, and delivery of items. A mobile locker is described...
2018/0041492 SYSTEMS AND METHODS FOR PROXIMITY IDENTITY VERIFICATION
Systems and methods are provided for authenticating a user of a computing device. An example system includes a memory storing instructions, and a processor...
2018/0041490 TECHNIQUES FOR ESTABLISHING A SECURE CONNECTION BETWEEN A WIRELESS DEVICE AND A LOCAL AREA NETWORK VIA AN...
Methods, systems, and devices for wireless communication are described. In one method, a wireless device may establish a connection with an access node (AN) of...
2018/0041489 Secure Private Location Based Services
Representative embodiments disclose unique mechanisms to use beacons to provide access to cloud services. In order to access the cloud services a user presents...
2018/0041488 SYSTEM AND METHODS FOR ENHANCING AUTHENTICATION PROCEDURES IN AN ANTI-FRAUD ENVIRONMENT
A system, method, and computer readable medium enhance authentication procedures in an anti-fraud environment when an access control server (ACS) is...
2018/0041487 TOKEN BASED NETWORK SERVICE AMONG IOT APPLICATIONS
One embodiment of the invention is directed to a computer-implemented method comprising, receiving registration information for one or more application...
2018/0041486 RESOURCE TRANSFER SETUP AND VERIFICATION
Systems and techniques are provided for a resource transfer setup and verification. A request for transfer conditions for a transfer of resources may be...
2018/0041485 SYSTEMS AND METHODS FOR SECURING DATA USING MULTI-FACTOR OR KEYED DISPERSAL
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses...
2018/0041484 SYSTEMS AND METHODS FOR DELEGATED CRYPTOGRAPHY
In some embodiments, an authentication method comprises receiving a request for a digital signature of data from a delegate computer over a secure channel...
2018/0041483 SYSTEMS, DEVICES, AND METHODS FOR PREVENTING UNAUTHORIZED ACCESS TO STORAGE DEVICES
Embodiments include a storage device, comprising: a communication interface; data storage media; key storage media; and control logic configured to: receive a...
2018/0041482 MOBILE INFORMATION APPARATUS WITH AN APPLICATION FOR RECEIVING DIGITAL CONTENT FROM A DIGITAL CONTENT SERVICE...
Mobile information apparatus (e.g., smart phone, Internet appliances, information pad) with software applications for receiving digital content from a service...
2018/0041481 METHODS AND SYSTEMS FOR ENHANCED DATA-CENTRIC ENCRYPTION SYSTEMS USING GEOMETRIC ALGEBRA
Disclosed are methods and systems to encrypt and decrypt a data message using Geometric Algebra. The encrypt operation performed on a source computing device...
2018/0041480 RESOURCE LOCATORS WITH KEYS
Requests are pre-generated to include a cryptographic key to be used in fulfilling the requests. The requests may be encoded in uniform resource locators and...
2018/0041479 SYSTEM AND METHOD FOR IDENTITY AUTHENTICATION
Embodiments of the present application relate to a method, device, and system for processing data. The method includes receiving a login request from a...
2018/0041478 DYNAMIC CRYPTOGRAPHIC POLYMORPHISM (DCP) SYSTEM AND METHOD
Described herein is a method of enhancing the security of an internet transaction which includes the transmission of structurally formatted information, the...
2018/0041477 METHOD TO SPLIT DATA OPERATIONAL FUNCTION AMONG SYSTEM LAYERS
A method for accelerating data transfer and improving data storage in a computing environment is provided that includes splitting a function into two layers of...
2018/0041476 DATA-AT-REST (DAR) ENCRYPTION FOR INTEGRATED STORAGE MEDIA
An improved system for providing transparent, in-line encryption of data-at-rest (DAR) stored by a host controller of a host device. An encryption core is...
2018/0041475 CENTRALIZED MANAGEMENT AND ENFORCEMENT OF ONLINE PRIVACY POLICIES
Systems and methods for centralized management and enforcement of online privacy policies of a private network are provided. According to one embodiment,...
2018/0041474 HIERARCHICAL CLUSTERING IN A GEOGRAPHICALLY DISPERSED NETWORK ENVIRONMENT
An example method for facilitating hierarchical clustering in a geographically dispersed network environment is provided and includes receiving a packet at one...
2018/0041473 DEVICE, SYSTEM AND METHOD FOR DEFENDING A COMPUTER NETWORK
A device, system, and method for defending a computer network are described. network communications are received by a traffic filter, which dynamically...
2018/0041472 INTELLIGENT SORTING FOR N-WAY SECURE SPLIT TUNNEL
A method of intelligently sorting packets/datagrams for sending through appropriate branches of a N-way split VPN tunnel according to embodiments of the...
2018/0041471 CONTROL DEVICE, BORDER ROUTER, CONTROL METHOD, AND CONTROL PROGRAM
When an attack is detected, a controller samples an attack-target addressed DNS reply, received by a border router, from each of the border routers. Then, the...
2018/0041470 APPLICATIONS AND INTEGRATED FIREWALL DESIGN IN AN ADAPTIVE PRIVATE NETWORK (APN)
A firewall is described that is integrated in an input stage of a packet processing pipeline so that it recognizes and has access to internal information...
2018/0041469 INFORMATION PROCESSING APPARATUS, CONTROL METHOD THEREOF, AND STORAGE MEDIUM
An information processing apparatus obtains an IP address from a DHCP server, and in the case where the obtainment of an IP address from the DHCP server has...
2018/0041468 MANAGING DYNAMIC IP ADDRESS ASSIGNMENTS
Various systems and processes may be used to manage Internet Protocol (IP) addresses that are dynamically assigned. In particular implementations, systems and...
2018/0041467 LDAP To SCIM Proxy Service
An LDAP (Lightweight Directory Access Protocol) to SCIM (System for Cross-domain Identity Management) proxy service is provided. The LDAP to SCIM proxy service...
2018/0041466 SURROGATE NAME DELIVERY NETWORK
A method for providing access to an Internet resource includes registering a surrogate nameserver to be an authoritative nameserver in a DNS network, receiving...
2018/0041465 DISTRIBUTED MOBILITY MANAGEMENT SYSTEM AND METHOD
A distributed mobility management method includes: receiving, by a base station, an address resolution protocol (ARP) request message from a user terminal in a...
2018/0041464 SYSTEMS AND METHODS FOR DIRECTING MESSAGES BASED ON SOCIAL DATA
Systems, methods, and non-transitory computer-readable media can receive a request to send a message from a sender to a recipient. It can be determined that...
2018/0041463 Event-Based Comment Grouping for Content Items
A method for event-based comment grouping for content items is disclosed. The method includes identifying, by a processing device, user comments corresponding...
2018/0041462 ELECTRONIC SYSTEM AND METHOD FOR FACILITATING SOUND MEDIA AND ELECTRONIC COMMERCE BY SELECTIVELY UTILIZING ONE...
A system and method permit users to selectively search for, and identify short segments (called snippets) of music. The user may enter one or more search terms...
2018/0041461 ONE-TO-MANY ICEBREAKER POST GENERATING REAL-TIME PRIVATE ONE-ON-ONE CHAT THREADS
Embodiments include providing an icebreaker message that may be broadcast publicly by a poster to users of a social media application. The icebreaker message...
2018/0041460 Aggregation in a Communication System or Service
A system and method for aggregating user response data in a communication system such as an instant messaging (IM system). Aggregation is performed according...
2018/0041459 EMAIL CONVERSATION MANAGEMENT SYSTEM
A process searches electronic messages. The process displays a user interface for an electronic messaging application, including a label list panel comprising...
2018/0041458 ADAPTIVE PRESENTATION OF COMMENTS BASED ON SENTIMENT
A computer-implemented method is disclosed for determining, for comments associated with a content item, response likelihood scores indicating likelihood of a...
2018/0041457 METHOD AND APPARATUS FOR AN INTERACTIVE ACTION LOG IN A COLLABORATIVE WORKSPACE
A method and apparatus is provided to determine that a comment has been added to a document associated with the collaborative workspace, and display an entry...
2018/0041456 SELECTIVELY UNMUTING ELECTRONIC MESSAGING CONVERSATIONS
A first user muting a conversation, taking place among a plurality of users using an exchange of electronic messages, can be detected. Responsive to the first...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.