Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0227313 Method and apparatus for trusted branded email
A trusted branded email method and apparatus in one aspect detects branded electronic messages and performs validation before it is sent to a recipient. In...
2018/0227312 Visitor Authorization Management Method and Apparatus, Terminal, Server, and Storage Medium
A visitor authorization management method is provided. In the method, an authorization object identifier and an authorization operation information...
2018/0227311 ENHANCING INTEGRITY OF DATA CENTER SPECIFIC INFORMATION
There is provided a method comprising: receiving, by an apparatus of a data center, a request message from a server computer of said data center, the apparatus...
2018/0227310 MULTI-LEVEL SECURITY ENFORCEMENT UTILIZING DATA TYPING
A computer-implemented method, a computer system, and a computer program product are provided for enforcing multi-level security (MLS) on a message transmitted...
2018/0227309 DIFFERENTIATED CONTAINERIZATION AND EXECUTION OF WEB CONTENT BASED ON TRUST LEVEL AND OTHER ATTRIBUTES
Systems and methods may provide for receiving web content and determining a trust level associated with the web content. Additionally, the web content may be...
2018/0227308 SYSTEM AND METHODS OF VIRTUAL WORLD INTERACTION
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that...
2018/0227307 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR GATHERING AND DELIVERING PERSONALIZED USER INFORMATION
A system, method and computer program product for providing a secure data channel between a user and associates. The method may receive pushed information from...
2018/0227306 SECURITY GATEWAY MODULE FOR ON-BOARD DIAGNOSTICS PORT OF A VEHICLE
A security gateway module for an automotive vehicle is couplable in series between an OBD CAN bus and an internal CAN bus of the vehicle over which electronic...
2018/0227305 SOFTWARE DEFINED NETWORK (SDN) APPLICATION INTEGRITY
A Network Function Virtualization Infrastructure (NFVI) controls a Software Defined Network (SDN) Application Programming Interface (API) between a source SDN...
2018/0227304 DEVICES AND METHODS CONFIGURED TO CONTROL NETWORK ACCESS TIME
A computer-implemented method of limiting access time to a computer network for client computing devices may comprise disposing an access controlling device...
2018/0227303 Systems and Methods to Authenticate Users and/or Control Access Made by Users on a Computer Network using...
A controller for user authentication and access control, configured to: store data representing a graph having: nodes representing data elements associated...
2018/0227302 SESSION MANAGEMENT AUTHORIZATION TOKEN
Techniques are described that provide a session management authorization token by receiving a session request message to establish a protocol data unit (PDU)...
2018/0227301 INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, PROGRAM, AND MAPPING SERVER
[Object] To improve the convenience of a service using anonymous information. [Solution] Provided is an information processing device including: a real name...
2018/0227300 SECURE ASYNCHRONOUS RETRIEVAL OF DATA BEHIND A FIREWALL
Computing systems and related methods are provided for retrieving data residing behind a firewall. One exemplary method involves a server receiving a first...
2018/0227299 METHODS AND DEVICES FOR IDENTIFYING AN AUTHENTICATION SERVER
A method for connecting a terminal of a user to an anchoring gateway connected to a packet-switching network. The method is implemented by an access gateway to...
2018/0227298 SELECTIVELY PERMITTING A RECEIVER DEVICE TO ACCESS A MESSAGE BASED ON AUTHENTICATING THE RECEIVER DEVICE
A device may receive an indication to generate a link associated with accessing a message. The message may be intended for a shared device identifier of a...
2018/0227297 ENTERPRISE KEY AND PASSWORD MANAGEMENT SYSTEM
A hardware, key-file and password assisted enterprise key and password management system. By leveraging hardware and key files, along with public-key...
2018/0227296 AUTHENTICATION ON THIN CLIENTS USING INDEPENDENT DEVICES
Authentication can be performed on thin clients using independent mobile devices. Because many users have smart phones or other similar mobile devices that...
2018/0227295 SECURING A COMPUTING DEVICE ACCESSORY
Various embodiments are disclosed that relate to security of a computer accessory device. For example, one non-limiting embodiment provides a host computing...
2018/0227294 DTCP CERTIFICATE AUTHENTICATION OVER TLS PROTOCOL
Authenticating devices utilizing Transport Layer Security (TLS) protocol to facilitate exchange of authentication information or other data to permit or...
2018/0227293 CERTIFICATE ISSUING SYSTEM BASED ON BLOCK CHAIN
The present invention provides a certificate issuing system based on a block chain, the system having a means for directly generating a certificate-specific...
2018/0227292 Caching Network Generated Security Certificates
Provided are methods and systems for caching network generated security certificates. An example system may include a security gateway node and a storage...
2018/0227291 WEB TICKET BASED UPON A SYMMETRIC KEY USABLE FOR USER AUTHENTICATION
Described herein are various aspects pertaining to generating web tickets for use with authenticating computing devices to a computing system. Symmetric keys...
2018/0227290 TRUSTED LOGIN OF USER ACCOUNTS
Technologies related to trusted user account login are disclosed. In one implementation, a temporary trusted login token request for accessing a service page...
2018/0227289 SYSTEM AND METHOD FOR IDENTITY AUTHENTICATION
A system, comprising includes an orchestration server including a processor, the orchestration server to receive authentication factors. A rules engine...
2018/0227288 PASSWORD SECURITY
The description relates to password reset security. One example can receive a login request and a password for a cloud-based user account. The example can also...
2018/0227287 Anonymous Social Communications
An anonymous or ad hoc communication is established between unknown contacts. For example, in today's mobile communications environment, there are many...
2018/0227286 AUTHENTICATION DEVICE AND COMPUTER-READABLE RECORDING MEDIUM
An authentication device includes a first login module and a second login module. Upon a login request to a first account among predetermined accounts which is...
2018/0227285 AUTHENTICATION THROUGH MULTIPLE PATHWAYS BASED ON DEVICE CAPABILITIES AND USER REQUESTS
There are provided systems and methods for authentication through multiple pathways depending on device capabilities and user requests. A user may wish to...
2018/0227284 COMMUNICATION APPARATUS, COMMUNICATION METHOD, AND COMMUNICATION PROGRAM PRODUCT
A communication apparatus includes a counter, a reception portion, an update portion, a code generation portion, a determination portion, and a transmission...
2018/0227283 ENCRYPTED GROUP COMMUNICATION METHOD
Embodiments herein include, for example, a method, comprising: generating a shared symmetric key to begin a communication session among a group of users by a...
2018/0227282 TECHNIQUES FOR SECURELY COMMUNICATING A DATA PACKET VIA AT LEAST ONE RELAY USER EQUIPMENT
Techniques are described for wireless communication. A method of wireless communication at a transmitting wireless device includes generating a first Message...
2018/0227281 VIRTUALIZED HOST ID KEY SHARING
In virtualized environments a method of determining authorization to a resource cannot use a hardware specific identifier, such as a MAC address. As a result...
2018/0227280 MANAGEMENT OF ENCRYPTION WITHIN PROCESSING ELEMENTS
A streaming environment includes at least a first processing element of a first compute node and a second processing element of a second compute node. A tuple...
2018/0227279 METHOD FOR COMMUNICATION BETWEEN DEVICES AND DEVICES THEREOF
Disclosed is a method of performing, by a first device, short-range wireless communication with a second device, the method including receiving, from the...
2018/0227278 Communication of Messages Over Networks
A method is provided for communicating messages between sender and receiver computers, connectable via a network to a system of servers, based on...
2018/0227277 EXAMINING A CONSISTENCY BETWEEN REFERENCE DATA OF A PRODUCTION OBJECT AND DATA OF A DIGITAL TWIN OF THE...
A method to an associated computer program product, to a production unit, and to an arrangement for examining a consistency between reference data of a...
2018/0227276 DATA INTERACTION METHOD AND DEVICE FOR COMPOSITE SMART CARD DEVICE
The present application discloses a data interaction method and a data interaction device for a composite smart card device, in which, the composite smart card...
2018/0227275 ESTABLISHMENT OF CONSORTIUM BLOCKCHAIN NETWORK
The disclosed technology is generally directed to blockchain and other security technology. In one example of the technology, a first node is endorsed. During...
2018/0227273 SYSTEMS AND METHODS FOR MANAGING TELECOMMUNICATIONS
Systems and methods of the present disclosure are directed to a telecommunications management system (TMS) that receives an indication from a first user to...
2018/0227272 SYSTEM AND METHOD FOR SATELLITE COMMUNICATIONS LINK
In one embodiment, a secure communications processor is provided. The secure communications data processor comprises a satellite datalink gateway; wherein the...
2018/0227271 METHOD FOR TRANSMITTING INFORMATION BETWEEN TWO DOMAINS WITH DISTINCT SECURITY LEVELS
First and second applications are executed in a red domain, and a third application is executed in a black domain, with a lower security level, and via which a...
2018/0227270 ROUTER ADDRESS TYPE IDENTIFICATION METHOD AND APPARATUS
A router media access control (MAC) address for a router, and network interaction data are received. The network interaction data indicates a connection...
2018/0227269 Correlating nameserver IPv6 and IPv4 addresses
Nameserver addresses are correlated in a multi-tier name server hierarchy comprising a first level authority for a domain, and one or more second level...
2018/0227268 Wireless Extension of Broadband Access
Methods, systems, and apparatuses are described for extending a network through the use of access nodes. The access nodes may receive packets from user devices...
2018/0227267 IP INDEX FOR IP ADDRESS ALLOCATION BASED ON POLICY CONTROL FUNCTION
Systems and methods discussed herein are directed to allocating an IP address to a requesting UE based on an IP index as a part of a policy rule, such as a...
2018/0227266 METHOD AND APPARATUS TO ENABLE DISCOVERY OF IDENTICAL OR SIMILAR DEVICES ASSEMBLED IN A SERIAL CHAIN AND ASSIGN...
Methods and apparatus for enabling discovery of and assigning unique addresses for identical or similar devices assembled in a serial chain of devices in a...
2018/0227265 USE OF A NETWORK ADDRESS BY A NETWORK ACCESSORY
In some examples, a network accessory includes a computing device interface to communicate with a computing device that is separate from the network accessory,...
2018/0227264 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR A DISTRIBUTED VIRTUAL ADDRESS SPACE
A virtual memory management method, system, and computer program product at a first machine, receiving a request to access memory associated with a virtual...
2018/0227263 SYSTEM AND METHOD FOR PROVIDING SERVICES
Systems and methods for providing services are disclosed. One aspect comprises detecting a compromised state of a user device, determining a device identifier...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.