Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0205773 SYSTEM AND METHOD FOR AUGMENTED AND VIRTUAL REALITY
One embodiment is directed to a system for enabling two or more users to interact within a virtual world comprising virtual world data, comprising a computer...
2018/0205772 FOLDER AND FILE BASED COLLABORATION USING MESSAGING
Disclosed herein are a method and a system for message collaboration. The system, when configured, monitors and identifies messages with attachments. Further,...
2018/0205771 METHOD AND APPARATUS FOR SHARING PRESENTATION DATA AND ANNOTATION
A method and apparatus for sharing presentation data, interactions, and annotation information between devices. The method includes: converting the...
2018/0205770 INFRASTRUCTURE APPARATUS AND METHOD OF PROVIDING COLLABORATION BETWEEN THING DEVICES
Provided are an infrastructure apparatus and method of providing collaboration between thing devices. Since a plurality of thing devices located in a specific...
2018/0205769 INTERCEPTING AND DECRYPTING MEDIA PATHS IN REAL TIME COMMUNICATIONS
This disclosure pertains to establishing or reestablishing media streams for interception and decryption of media traffic in a service using fingerprint to...
2018/0205768 COMMUNICATION DEVICES AND METHODS FOR OPERATING A COMMUNICATION DEVICE
A communication device may include a message generator configured to generate a message in accordance with a command set to use a communication service...
2018/0205767 SYSTEMS AND METHODS FOR CONFERENCING
Systems and methods are provided for establishing a video conference session. The systems and methods may include receiving, from a first conference client...
2018/0205766 NOTIFYING RESPONSE SENDER OF MALFORMED SESSION INITIATION PROTOCOL (SIP) RESPONSE MESSAGES
A method, computer program product, and computer system for notifying a response sender of a malformed SIP response message. The method includes, producing a...
2018/0205765 NOTIFYING RESPONSE SENDER OF MALFORMED SESSION INITIATION PROTOCOL (SIP) RESPONSE MESSAGES
A method, computer program product, and computer system for notifying a response sender of a malformed SIP response message. The method includes, producing a...
2018/0205764 METHOD FOR COMMUNICATION USING PLURALITY OF PROTOCOLS AND ELECTRONIC DEVICE THEREOF
A method for communication using a plurality of communication protocols and an electronic device thereof are provided. An electronic device according to...
2018/0205763 SYSTEMS AND METHODS OF INTENT-BASED LAWFUL INTERCEPTION (LI) IN COMMUNICATION NETWORKS
This disclosure relates to intent based Lawful Interception (LI) in a communication network. The method includes interpreting an LI intent of a Law Enforcement...
2018/0205762 AUTOMATICALLY SECURING DATA BASED ON GEOLOCATION, NETWORK OR DEVICE PARAMETERS
Disclosed herein are a method and a system for securing data in user devices. The system collects on a real time or periodic basis, certain trigger input (s)...
2018/0205761 POLICY MANAGEMENT
In embodiments of the present invention improved capabilities are described for the operation of a threat management facility, wherein the threat management...
2018/0205760 SYSTEMS AND METHODS FOR PROVIDING NETWORK SECURITY USING A SECURE DIGITAL DEVICE
A system may include a traffic interception module configured to intercept network traffic of a host device. A traffic virtualization module may be configured...
2018/0205759 RECONFIGURATION OF SECURITY REQUIREMENTS FOR DEPLOYED COMPONENTS OF APPLICATIONS
Method and system are provided for reconfiguration of security requirements for deployed components of applications. The method includes referencing a deployed...
2018/0205758 METHOD AND SYSTEM FOR DETECTING PHISHING PAGE
The present disclosure provides a method and system for detecting a phishing page. The method comprises: intercepting user data attempted to be submitted by a...
2018/0205757 PASSWORD BREACH REGISTRY
A password breach registry is utilized to secure a service provided by a service provider. The password breach registry is a publicly accessible registry and...
2018/0205756 SYSTEM AND METHOD TO SELECT AND APPLY HYPOTHETICAL MITIGATION PARAMETERS
A system and method are provided to select mitigation parameters. The method includes receiving selection of at least one mitigation parameter, accessing a...
2018/0205755 SYSTEMS AND METHODS FOR ADAPTIVE VULNERABILITY DETECTION AND MANAGEMENT
Systems and methods providing adaptive vulnerability detection and management are described. Certain embodiments include monitoring system parameters of a...
2018/0205754 REAL-TIME NETWORK VULNERABILITY ANALYSIS AND PATCHING
A security system can provide monitoring and vulnerability testing of networks within a vehicle and perform patching or take other remedial action when...
2018/0205753 TIME-BASED DETECTION OF MALWARE COMMUNICATIONS
A technique includes processing domain name system queries generated by a host to identify a subset of the queries for which domain names were not resolved....
2018/0205752 Security Breach Detection in a Digital Medium Environment
Security breach detection techniques in a digital medium environment are described. In one example, usage behavior data is received that describes a number of...
2018/0205751 Near Real-Time System or Network Incident Detection
Systems and arrangements for performing a textual analysis to identify incidents likely to cause a significant business impact are provided. Historical data...
2018/0205750 STATISTICAL FINGERPRINTING OF NETWORK TRAFFIC
In one embodiment, a device in a network determines a set of lattice points in a multi-dimensional space constructed using message characteristics of messages...
2018/0205749 Detecting A Rogue Access Point Using Network-Independent Machine Learning Models
Embodiments include systems and methods of detecting a rogue access point by a computing device. A processor of the computing device may determine one or more...
2018/0205748 INTRUSION DETECTION BASED ON LOGIN ATTEMPTS
An attempt by a user to login to a destination server is identified from a source server. A destination score is determined based on the count of attempts by...
2018/0205747 DETERMINISTIC REPRODUCTION OF CLIENT/SERVER COMPUTER STATE OR OUTPUT SENT TO ONE OR MORE CLIENT COMPUTERS
Computer systems and methods for improving security or performance of one or more client computers interacting with a plurality of server computers. In an...
2018/0205746 NETWORK TRAFFIC ANALYSIS FOR MALWARE DETECTION AND PERFORMANCE REPORTING
Computer networks, particularly larger networks, may have various issues and vulnerabilities. By collecting network traffic data from a network in multiple...
2018/0205745 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR ACCESS AUTHENTICATION
A method and technique for access authentication includes: responsive to receiving an access request from a user for a secure resource, generating a token;...
2018/0205744 TAINT MECHANISM FOR MESSAGING SYSTEM
A method for managing a plurality of messages associated with an online messaging system is provided. The method may include receiving a message from a...
2018/0205743 ELECTRONIC INTERACTION AUTHENTICATION AND VERIFICATION, AND RELATED SYSTEMS, DEVICES, AND METHODS
Systems, devices, and methods are disclosed for exchanging electronic information over a communication network and, more specifically, to authenticating and...
2018/0205742 AUTOMATIC TOKEN BASED SECURE CONTENT STREAMING METHOD AND APPARATUS
Disclosed are systems and methods for improving interactions with and between computers in secure content access, distribution and download and/or providing...
2018/0205741 REDUCED USER AUTHENTICATION INPUT REQUIREMENTS
Techniques disclosed herein enable a system to reduce user authentication requirements during a user's travels by analyzing transportation data and/or event...
2018/0205740 ONLINE INTERACTION CONTROL METHOD
A method for controlling permissions relating to online interactions of a sub-account, the sub-account being linked with a main account, the method comprising...
2018/0205739 Security for Accessing Stored Resources
The present disclosure relates to a server system or other computer equipment for storing data of a first party and determining whether a second party is...
2018/0205738 PARAMETER BASED KEY DERIVATION
A delegation request is submitted to a session-based authentication service, fulfilment of which involves granting an entity an access privilege to a computing...
2018/0205737 System and method for capturing identity related information of the link visitor in link-based sharing
The embodiments herein disclose a secure means for sharing data with at least one user using a secure means for identifying and providing access to the at...
2018/0205736 ALTERING APPLICATION SECURITY TO SUPPORT JUST-IN-TIME ACCESS
A method and a computing system for allowing just-in-time ("JIT") access to a machine is provided. A system receives a request to allow JIT access to the...
2018/0205735 Consumer Choice for Broadband Application and Content Services
Novel tools and techniques might provide for implementing application, service, and/or content access control. Based at least in part on a consumer's choice of...
2018/0205734 SECURITY POLICY FOR HTTPS
In one embodiment, a browser operating on a host device receives, from a user, a request to access a web server that includes a Uniform Resource Locator (URL)...
2018/0205733 MACHINE-TO-MACHINE NETWORK ASSISTED BOOTSTRAPPING
The service layer may leverage the access network infrastructure so that applications on a device may bootstrap with a machine-to-machine server without...
2018/0205732 USER DATA PROCESSING APPARATUS AND METHOD, AND SYSTEM
The present disclosure relates to a user data processing apparatus and method, and a system. In the user data processing apparatus disclosure, an interface...
2018/0205731 AUTHENTICATION AND ACCESS TO A DEVICE OF A FIXED LINE COMMUNICATION DEVICE
A method is provided accessing a device of a fixed line system comprising: (i) determining at least one measurement result by a measurement function of the...
2018/0205730 Hostless mDNS-SD Responder with Authenticated Host Wake Service
Conventional wireless interface (WiFi) controllers cannot resolve authentication for trusted client devices without calculation from a host processor. Leaving...
2018/0205729 METHOD AND APPARATUS FOR ENCRYPTION, DECRYPTION AND AUTHENTICATION
A method, apparatus and system for encryption, decryption and/or authentication are provided. The method includes: generating vehicle data based on information...
2018/0205728 Biometric Device Pairing
A first electronic device is associated with a biometric sensor. Biometric data received by the biometric sensor is used to permit the first electronic device...
2018/0205727 DYNAMIC KNOWLEDGE-BASED AUTHENTICATION
A computer-implemented method includes receiving user data from a plurality of data sources, where the user data describes a user. A plurality of events are...
2018/0205726 Cognitive Intelligence Based Voice Authentication
Mechanisms are provided to detect a potentially fraudulent voice conversation. The mechanisms process a corpus of electronic information to extract a fraud...
2018/0205725 Verifying Party Identities for Secure Transactions
A method for verifying identities of parties to a transaction includes receiving a login attempt from a mobile communication device, the login attempt...
2018/0205724 GENERALIZED CERTIFICATE USE IN POLICY-BASED SECURE MESSAGING ENVIRONMENTS
Within a secure messaging environment, a determination is made that a request to send a message has been generated by a message sender. A message protection...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.