Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0234428 AUTOMATICALLY PROVISIONING NEW ACCOUNTS ON MANAGED TARGETS BY PATTERN RECOGNITION OF EXISTING ACCOUNT ATTRIBUTES
A set of existing account information belonging to respective user accounts of a first set of users is retrieved. Pattern matching is performed by an attribute...
2018/0234427 Identification of People In Common
A method for identifying people in common (PIC) between two users on a social networking service includes: receiving a request for a set of people in common...
2018/0234426 AUTHORIZATION SERVER, AUTHORIZATION METHOD AND NON-TRANSITORY COMPUTER READABLE MEDIUM THEREOF
An authorization server, an authorization method and a non-transitory computer readable medium thereof are provided. The authorization server calculates an...
2018/0234425 MEDIA LIST FOR TRAVEL
In an approach for sending a media list to a transportation vehicle for a user, a processor determines a media list for travel for a user, wherein the media...
2018/0234424 MEDIA LIST FOR TRAVEL
In an approach for sending a media list to a transportation vehicle for a user, a processor determines a media list for travel for a user, wherein the media...
2018/0234423 Method for Controlling Contents and Electronic Device Thereof
The present disclosure relates to a sensor network, Machine Type Communication (MTC), Machine-to-Machine (M2M) communication, and technology for Internet of...
2018/0234422 SYSTEM, METHOD, AND DEVICE FOR DELIVERING COMMUNICATIONS AND STORING AND DELIVERING DATA
A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is...
2018/0234421 DATACENTROID
A modular, expandable, and flexible computer system device is provided. The computer system device comprising a multiple number of individual modules...
2018/0234420 Systems, Devices, and Methods for Identifying User Data
The various embodiments described herein include methods, devices, and systems for identifying users. In one aspect, a method includes (1) receiving from a...
2018/0234419 CONNECTION MANAGEMENT OF SMART DEVICES WITH AUTOMOBILE HEAD UNIT
Embodiments are directed towards establishing a network connection between a mobile device and an automobile head unit. A user of the mobile device interacts...
2018/0234418 METHOD AND APPARATUS FOR FACILITATING ACCESS TO PUBLISH OR POST UTILIZING FRICTIONLESS TWO-FACTOR AUTHENTICATION
A method, apparatus and computer program products are provided for facilitating access to an internet of things (iot) device, platform or account associated...
2018/0234417 LOCAL VERIFICATION OF CODE AUTHENTICATION
Embodiments are directed to a computing device having execution hardware including at least one processor core, and non-volatile memory that stores...
2018/0234416 POLYMORPHIC CONFIGURATION MANAGEMENT FOR SHARED AUTHORIZATION OR AUTHENTICATION PROTOCOLS
Provided is a process including: receiving, from a first service-provider computer system, via a network, with an identity-provider computer system, a request...
2018/0234415 MOUNT, AUTHENTICATION DEVICE, AUTHENTICATION METHOD, AND PROGRAM
A wearable article includes: an annular casing that surrounds a space into which a body of a user is to be inserted; a light-emitting element that is provided...
2018/0234414 Multifactor Authentication Device
An authentication device has internal circuitry operable to execute specific digital processing, a digital token, an image-capturing mechanism and circuitry,...
2018/0234413 Authenticated Network
An authenticated network in which a physical network including physical nodes with actual physical substances and a logical network including logical nodes...
2018/0234412 Online authentication method based on smart card, smart card and authentication server
Disclosed are an online authentication method based on a smart card, smart card and authentication server, the method comprising: running a first application...
2018/0234410 APPARATUS AND METHOD FOR IMPLEMENTING COMPOSITE AUTHENTICATORS
A system, apparatus, method, and machine readable medium are described for implementing a composite authenticator. For example, an apparatus in accordance with...
2018/0234409 PRIVACY ENSURED BROKERED IDENTITY FEDERATION
A system, method, apparatus, and computer program product for a privacy ensured brokered identity federation system. The privacy ensured brokered identity...
2018/0234408 Identity Authentication Using Credentials
A method and system may allow for authenticating a computing device. A computing device may send an authentication request over a network to an authentication...
2018/0234407 METHOD FOR SECURELY EXCHANGING LINK DISCOVERY INFORMATION
A network system is provided to coordinate nodes in a network topology to exchange neighbor information. The network system includes a plurality of processing...
2018/0234406 BROWSER PLUG-IN FOR SECURE CREDENTIAL SUBMISSION
Described is a technology by which a plug-in (e.g., an ActiveX.RTM. control) instantiated by a web browser calls functions of a credential service to use a set...
2018/0234405 APPARATUS AND METHOD FOR MANAGING SECURITY DOMAINS FOR A UNIVERSAL INTEGRATED CIRCUIT CARD
A device that incorporates the subject disclosure may perform, for example, generating a security domain root structure for a universal integrated circuit card...
2018/0234404 EFFICIENT USE OF KEYSTREAMS
Performing cryptographic operations such as encryption and decryption may be computationally expensive. In some contexts, initialization vectors and keystreams...
2018/0234403 DATA OWNER RESTRICTED SECURE KEY DISTRIBUTION
A content distribution system is described herein which enables a data owner of content to set one or more restrictions on a data consumer where the one or...
2018/0234402 Role-Based Notification Service
A notification system automatically sends notifications to users based on the defined roles of the notifications. The notification system allows an application...
2018/0234401 ABSTRACTED CRYPTOGRAPHIC MATERIAL MANAGEMENT ACROSS MULTIPLE SERVICE PROVIDERS
A method for cryptographic material management is provided. The method includes receiving into a computing device, through an API of the computing device, a...
2018/0234400 MANAGEMENT OF AUTHENTICATOR INFORMATION IN A COMPUTER SYSTEM
The disclosure relates to apparatuses and methods for managing authenticator information in a computerized system. An access request to a host comprising an...
2018/0234399 APPARATUS AND METHOD OF ENCRYPTED COMMUNICATION
A method of encrypted communication by a terminal device is described. An encryption request for a message is obtained by processing circuity of the terminal...
2018/0234398 SECURE STREAM BUFFER ON NETWORK ATTACHED STORAGE
A network attached storage device coupled to a local network and including a network interface configured to receive digital content from a remote content...
2018/0234397 METHODS OF DISTRIBUTING DIGITAL PUBLICATIONS INCORPORATING USER GENERATED AND ENCRYPTED CONTENT WITH UNIQUE...
Electronic publications are increasingly replacing physical media but to date standards have evolved to mimic these physical media. Accordingly it is...
2018/0234396 System and method for creating private encrypted browser zones based on one or more parameters
System and method for establishing zones of restricted data interaction based on specific user-defined parameters. In an embodiment, a first zone may be...
2018/0234395 Methods and Apparatuses for Providing Security in a Roaming Environment
The embodiments herein relate to an IoT device, a method performed in the IoT device, a network device and a method performed in the network device for...
2018/0234394 SYSTEM AND METHOD FOR ENCRYPTING DATA INTERACTIONS DELINEATED BY ZONES
A system and method for establishing zones of control for communications among computing devices. Zones of control refer to the concept of unique ...
2018/0234393 Secure time communication system
Methods and apparatus for a Secure Time Communication System (10) are disclosed. One embodiment of the invention provides secure and non-interactive...
2018/0234392 METHOD AND APPARATUS FOR MANAGING DEVICE CONTEXT USING AN IP ADDRESS IN A COMMUNICATION SYSTEM
The present invention relates to a system configuration and an apparatus for preventing the infringement of user privacy, and for collecting and analyzing...
2018/0234391 Trust Status of a Communication Session
Techniques for trust status of a communication session are described. According to various embodiments, different networks cooperate to facilitate routing of...
2018/0234390 SYSTEM AND METHOD FOR THE SEPARATION OF SYSTEMS THAT WORK TOGETHER
A system and method is introduced for separating computing devices that work together. The computing devices appear to the user as a single device such as...
2018/0234389 Data Computation in a Multi-Domain Cloud Environment
A gateway device for implementing data security is described herein. The gateway device is coupled between a client device and a server device, and is...
2018/0234388 GRANULAR OFFLOADING OF A PROXIED SECURE SESSION
A device may receive encrypted traffic associated with a secure session. The device may determine, based on the encrypted traffic, information associated with...
2018/0234387 System and method for establishing simultaneous encrypted virtual private networks from a single computing device
System and method for establishing simultaneous zones of control for various communications to and from a computing devices based on specific criteria...
2018/0234386 SECURE NETWORK ENROLLMENT
A UE communicates with a network gateway to access a provisioning device via a provisioning network. The provisioning device uses identification data of the UE...
2018/0234385 Network Application Security Policy Generation
Embodiments of the present invention generate network communication policies by applying machine learning to existing network communications, and without using...
2018/0234384 SERVER PORT VIRTUALIZATION FOR GUEST LOGICAL UNIT NUMBER (LUN) MASKING IN A HOST DIRECT ATTACH CONFIGURATION
Embodiments for server port virtualization for guest logical unit number (LUN) masking in a host direct attach configuration using a storage adapter in a...
2018/0234383 SYSTEM AND METHOD FOR ADDRESS-MAPPED CONTROL OF FIELD PROGRAMMABLE GATE ARRAY (FPGA) VIA ETHERNET
A method includes receiving, at a field programmable gate array (FPGA), one or more Ethernet packets of a message including control or status information...
2018/0234382 AUTOMATIC RESPONSE SYSTEM BASED ON BODY LANGUAGE
Content of an electronic message can be presented to a recipient of the electronic messaging. At least one visible user gesture made by the recipient while...
2018/0234381 NETWORK-BASED CALENDARING
Systems and methods are provided for network-based implementation of a calendaring application. A social calendaring application may be implemented amongst...
2018/0234380 TECHNIQUES FOR AUGMENTING ENTITY REFERENCES IN A MESSAGING SYSTEM
Techniques for augmenting entity references in messaging groups are described. In one embodiment, an apparatus may comprise a messaging component operative to...
2018/0234379 INTELLIGENT MESSAGE QUEUE MANAGEMENT
Aspects include managing distribution of messages from a message queue to a plurality of consumers for processing by maintaining a processing history for the...
2018/0234378 ENHANCED MANAGEMENT OF MIGRATION AND ARCHIVING OPERATIONS
A network-based solution that provides enhances management of migration and archiving operations may involve, as embodied in various systems, methods, and...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.