Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0219862 ACTIVELY FEDERATED MOBILE AUTHENTICATION
To make a trusted web service call, a client application sends a series of messages to obtain tokens that allow service requests to pass through a service...
2018/0219860 METHOD AND SYSTEM FOR TRACKING AN ELECTRONIC DEVICE AT AN ELECTRONIC DEVICE DOCKING STATION
A system and method for identifying an electronic device user and tracking the electronic device at a docking station is provided. The system includes a CPU, a...
2018/0219859 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR GENERATING A COGNITIVE ONE-TIME PASSWORD
A cognitive one-time password generation method, system, and computer program product, include generating a cognitive one-time password question when a user...
2018/0219858 HYPERVISOR AGNOSTIC BIDIRECTIONAL SECURE CHANNEL FOR GUEST AGENT TRANSPORT
Systems, methods, and computer readable medium for virtualized computing environments. A method for providing a connection between a guest virtual machine and...
2018/0219857 SYSTEMS AND METHODS FOR CERTIFICATE CHAIN VALIDATION OF SECURE ELEMENTS
In certificate chain validation, a parent certificate is used to validate a child certificate. The child certificate can indicate which parent certificate can...
2018/0219856 Device Control Method, Control Terminal Device and Device Control System
In a control terminal device for controlling a plurality of devices, when account information is registered in a first device which is one of the plurality of...
2018/0219855 COMPUTER READABLE STORAGE MEDIA FOR LEGACY INTEGRATION AND METHODS AND SYSTEMS FOR UTILIZING SAME
Systems and methods for integrative legacy context management are disclosed herein. An example computer hardware system may include at least one processing...
2018/0219854 SINGLE AUTHENTICATION TO A MULTI-TENANCY SINGLE-PAGE CLOUD APPLICATION
A system and method for single authentication to a multi-tenancy single-page application hosted in a plurality of different datacenters. The method comprises:...
2018/0219853 AUTHENTICATION APPARATUS AND AUTHENTICATION PROGRAM
An authentication apparatus in a multifunction peripheral is configured to display, in a screen, an account field and a password field so as to allow an input,...
2018/0219852 HIGHLY AVAILABLE WEB-BASED DATABASE INTERFACE SYSTEM
Techniques are provided for a highly available web-based database interface system (WDIS) processing database requests that target one or more databases...
2018/0219851 METHOD AND SYSTEM FOR AUTHENTICATION
An authentication system performing user-centered authentication may include: an authentication service component acting as an authentication procedure of an...
2018/0219850 CONNECTION SYSTEM AND CONNECTION METHOD
A connection server is a connection system that is able to perform communication with a plurality of user side terminals and establishes a connection between...
2018/0219849 Method and Apparatus for Enabling Co-Browsing of Third Party Websites
An agent providing customer support to visitors on a website can co-browse with the visitors as they interact with the website. The agent is provided with a...
2018/0219848 SYSTEM AND METHOD FOR PROVIDING SECURITY MONITORING
The present disclosure describes systems and methods for processing security sensor data that enhances the ability of a user to quickly and efficiently review...
2018/0219847 MESSAGING APPLICATION HOSTING FOR MESSAGE CAPTURE
Provided are methods, systems, and computer-program products for hosting a messaging application remote from a user to facilitate tracking messages sent to or...
2018/0219846 INTEGRATING SENSITIVE DATA FROM A DATA PROVIDER INTO INSTANCES OF THIRD-PARTY APPLICATIONS EXECUTED ON USER DEVICES
Certain aspects involve facilitating the integration of sensitive data from a data provider into an instance of a web-based, third-party application. For...
2018/0219845 CONTROL METHOD
A control method includes receiving, from a user through a screen displayed on a display unit by using a first program, an execution instruction to execute...
2018/0219844 SYSTEM AND METHOD FOR DETERMINING USE OF NON-HUMAN USERS IN A DISTRIBUTED COMPUTER NETWORK ENVIRONMENT
Embodiments of systems and methods as disclosed herein may determine that an initiator of a communication on a distributed computer network is an automated...
2018/0219843 MANAGEMENT OF ACCESS SESSIONS
Disclosed are examples of managing access sessions for a computing device. In some examples, a key is generated using a code obtained through a user interface....
2018/0219842 Performing Privacy-Preserving Multi-Party Analytics on Vertically Partitioned Local Data
Examples disclosed herein relate to: computing, by a computing device at a party among a plurality of parties, a sum of local data owned by the party, wherein...
2018/0219841 DYNAMIC AND EFFICIENT PROTECTED FILE LAYOUT
A file layout and encryption scheme to protect a data file are introduced. A system, computer-readable medium, and method are provided for selecting an...
2018/0219840 SERVER AND METHOD FOR TRANSMITTING A GEO-ENCRYPTED MESSAGE
Disclosed embodiments are directed to a server for a communication system, comprising a signature device configured to determine a measured location signature...
2018/0219839 DEVICE IDENTIFICATION ENCRYPTION
In one example in accordance with the present disclosure, a system may comprise a a combination engine to combine an encrypted device identification and a...
2018/0219838 SECURED TRANSFER OF DATA BETWEEN DATACENTERS
In various embodiments, a method of transferring data between datacenters may be performed. The method may include running a first plurality of host programs...
2018/0219837 MAPPING AND OBSCURING DIGITAL REPRESENTATIONS OF A NUMBER OF USER ACCOUNTS ON A SOCIAL NETWORK MAP
Mapping and obscuring digital representations of a number of user accounts on a social network map includes identifying a primary user account from a number of...
2018/0219836 Distributed Data System
A distributed data system has a network, a first organization connected to the network having a first database having personal identifiable information, the...
2018/0219835 SECURE COMMUNICATION SYSTEM
A secure communication system includes an outer VPN gateway representative of an outer tunnel for facilitating communication with a black network. The outer...
2018/0219834 SYSTEMS AND METHODS FOR PROVIDING MULTI-LEVEL NETWORK SECURITY
Systems and methods for providing network security include receiving, by a first server of a first network, data having a destination of a second network;...
2018/0219833 MITIGATION AGAINST DOMAIN NAME SYSTEM (DNS) AMPLIFICATION ATTACK
Presented herein are techniques for mitigating a domain name system (DNS) amplification attack. A methodology is provided including receiving, at a (DNS)...
2018/0219832 SECURITY APPARATUS, ATTACK DETECTION METHOD, AND STORAGE MEDIUM
A security apparatus is provided that is connected to a bus. The security apparatus includes a receiver that receives a first frame from the bus, a memory that...
2018/0219831 METHOD AND APPARATUS FOR EXPEDITED DOMAIN NAME SYSTEM QUERY RESOLUTION
In one embodiment, a method and apparatus for resolving domain name system queries using unique top-level domains in a private network space are disclosed. For...
2018/0219830 INTRODUCING A NEW MESSAGE SOURCE INTO AN ELECTRONIC MESSAGE DELIVERY ENVIRONMENT
Provided herein is an electronic message management platform that enables management and execution of electronic message campaigns while appropriately managing...
2018/0219829 ELECTRONIC MESSAGE LIFECYCLE MANAGEMENT
Provided herein is an electronic message management platform that enables management and execution of electronic message campaigns while appropriately managing...
2018/0219828 POSTING CONTENT TO SOCIAL MEDIUM
A computer-implemented method of posting content to a social medium comprises receiving content posted by a user along with an associated posting time which...
2018/0219827 METHOD, DEVICE AND SOFTWARE PRODUCT FOR FILLING AN ADDRESS FIELD OF AN ELECTRONIC MESSAGE
A content, context or the like as entered by a user may be used to automatically evaluate a recipient or recipients to whom the message is directed. A method...
2018/0219826 PRIORITIZATION OF LOCK ALLOCATION
Aspects of the present invention disclose a method, computer program product, and system for prioritization of lock allocation. The method includes one or more...
2018/0219825 NOTIFYING A USER ABOUT A PREVIOUS CONVERSATION
Notifying a user about a previous conversation includes based on an analysis of the previous conversation between a first user and second user determining a...
2018/0219824 ELECTRONIC APPARATUS AND CONTROLLING METHOD THEREOF
Provided is an electronic device which includes a display; and a processor configured to control the display to display an execution screen of an application...
2018/0219823 AUTOMATED EMAIL CATEGORIZATION AND RULE CREATION FOR EMAIL MANAGEMENT
Automated email categorization and rule creation for email management is provided. An automated filing engine parses an email message for identifying key terms...
2018/0219822 System and Method for Smart and Secure e-Mail using Per-Recipient Attributes
An information handling system includes a memory having machine-executable code, and a processor configured to execute the code. The code is configured to...
2018/0219821 METHOD AND SYSTEM FOR SENDER-CONTROLLED MESSAGING AND CONTENT SHARING
An access-control device that controls access to encrypted messages. During operation, the access-control device can receive an access key for a corrupted...
2018/0219820 MITIGATING ABUSE IN AN ELECTRONIC MESSAGE DELIVERY ENVIRONMENT
Provided herein is an electronic message management platform that enables management and execution of electronic message campaigns while appropriately managing...
2018/0219819 MANAGING ELECTRONIC MESSAGES WITH A MESSAGE TRANSFER AGENT
Provided herein is an electronic message management platform that enables management and execution of electronic message campaigns while appropriately managing...
2018/0219818 QUALITY-BASED ROUTING OF ELECTRONIC MESSAGES
Provided herein is an electronic message management platform that enables management and execution of electronic message campaigns while appropriately managing...
2018/0219817 PERSONALIZED MESSAGE PRIORITY CLASSIFICATION
A system and method of automatically assigning a priority rank to messages. The system and method accesses a message data store and assigns a priority rank to...
2018/0219816 SYSTEM AND METHOD OF MANAGING ELECTRONIC MEETING INVITATIONS
Various messaging systems and methods are disclosed for meeting invitation management. In one aspect, a method of messaging is provided that includes...
2018/0219815 TELECOMMUNICATION AND MULTIMEDIA MANAGEMENT METHOD AND APPARATUS
A telecommunication and multimedia management apparatus and method that supports voice and other media communications and that enables users to: (i)...
2018/0219814 COMPUTERIZED SYSTEM AND METHOD FOR AUTOMATICALLY DETERMINING AND PROVIDING DIGITAL CONTENT WITHIN AN ELECTRONIC...
Disclosed are systems and methods for improving interactions with and between computers in content searching, generating, hosting and/or providing systems...
2018/0219813 HANDLING OF OVERSIZED EMAIL ATTACHMENTS
Systems and methods herein provide for improved handling of oversized email attachments. An example system can identify an oversized email attachment before an...
2018/0219812 MOBILE APP MESSAGING PLATFORM SYSTEM
A mobile app messaging platform system including an electronic mobile device a software interface, a plurality of messages, a server, a user profile, a check...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.