Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,769,154 Passcode operating system, passcode apparatus, and super-passcode generating method
The present invention relates to a passcode operating system, to a passcode apparatus, and to a super-passcode generating method, which are capable of...
US-9,769,153 Validation for requests
A customer can demonstrate control over an element, such as a domain, by receiving a certificate from a certificate authority. A customer can submit a request...
US-9,769,152 Attribute-based access control
Attribute-based access control is performed across a first and a second security domain in a federated distributed processing environment. A security token...
US-9,769,151 Multi-algorithm key generation and certificate install
Techniques are disclosed for generating multiple key pairs using different algorithms and similarly installing certificates signed using the different...
US-9,769,150 Directory driven mailbox migrations
An example method for migrating communication data from a source server to a target server includes obtaining, using a computing device, a set of credentials to...
US-9,769,149 Proxy-less secure sockets layer (SSL) data inspection
Some embodiments of proxy-less Secure Sockets Layer (SSL) data inspection have been presented. In one embodiment, a secured connection according to a secured...
US-9,769,148 Secure application access system
A proxy server receives a synchronization request from an application program resident on a user device. The proxy server determines that the user device...
US-9,769,147 Session activity tracking for session adoption across multiple data centers
Techniques are disclosed for managing session activity of SSO access across multiple data centers. Session activity of SSO access is managed across multiple...
US-9,769,146 Information processing system, information processing method, and non-transitory computer-readable medium
An information processing system comprises: a management unit that performs management by associating an electronic certificate for a first group with...
US-9,769,145 Method and apparatus for connecting to online service
A method of connecting to an online service where a terminal transmits information regarding a selected online service and first authentication information to...
US-9,769,144 Method for logging of a remote control session
A method for logging of a remote control session, for use in a remote control system comprising a session initiator operable to initiate a remote control...
US-9,769,143 Content-based association of device to user
Example methods and systems for content-based association of a device to a user are presented. In an example method, data corresponding to each of a plurality...
US-9,769,142 Systems and methods for authenticating network messages
Networks and methods for use in authenticating messages, based on the clients and the computing devices, are provided. One exemplary method generally includes...
US-9,769,141 Securely authorizing access to remote resources
Methods and an apparatus are provided for securely authorizing access to remote resources. For example, a method is provided that includes receiving a request...
US-9,769,140 Authentication support for autonomous requests
Methods and apparatus for supporting authentication for session border controller generated autonomous requests are described. In some embodiments, the session...
US-9,769,139 On-premises agent for mobile cloud service
Systems, devices, and methods are disclosed for an agent device within a company's network firewall to initiate an HTTP connection with a cloud-based gateway...
US-9,769,138 Method for updating a table of correspondence between a logical address and an identification number
A method and system for updating a table of correspondence between a logical address associated to a user unit in a communication network and a unique...
US-9,769,137 Extensible mechanism for securing objects using claims
An extensible mechanism for providing access control for logical objects in a network environment. A security broker is able to dynamically register one or more...
US-9,769,136 System and method for providing proactive VPN establishment
A system and method which includes monitoring an existing first connection to a secured network domain. A first network configuration is employed to access the...
US-9,769,135 Information processing device, information processing client, access authentication method, and program
There is provided an information processing device including a public key setter that sets a public key corresponding to a public-key authentication scheme in...
US-9,769,134 Mobile account authentication service
A payment authentication service authenticates the identity of a payer during online transactions. The authentication service allows a card issuer to verify a...
US-9,769,133 Protecting user identity and personal information by sharing a secret between personal IoT devices
A wearable device provides protection for personal identity information by fragmenting a key needed to release the personal identity information among members...
US-9,769,132 Control system for securely protecting a control program when editing, executing and transmitting the control...
A control system which protects a control program securely and improves a convenience for a particular user in reading and writing an execution-use control...
US-9,769,131 Fast reconfiguring environment for mobile computing devices
An example method includes receiving an indication of a selection of a first application environment that includes a first virtual environment associated with a...
US-9,769,130 Systems and methods of transmitting data
Systems and methods of transmitting data from one location to another location that can be used in a number of applications including, but not limited to,...
US-9,769,129 Mutually assured data sharing between distrusting parties in a network environment
An apparatus for sharing information between entities includes a processor and a trusted execution module executing on the processor. The trusted execution...
US-9,769,128 Method and apparatus for encryption of communications over a network
Aspects of the subject disclosure may include, for example, determining whether communications are encrypted, determining a communication type for the...
US-9,769,127 Smart card accessible over a personal area network
Systems and methods for a smart card accessible over a personal area network (PAN). An example method may include: communicatively coupling a device to the PAN,...
US-9,769,126 Secure personal server system and method
A provider computer announces content to the provider computer and establishes a secure connection to a VPN server. Requests for the content are received in one...
US-9,769,125 Information administration system
An information administration system configured of: a component information management apparatus (4) including a component information storing unit (41) storing...
US-9,769,124 Method and apparatus for providing access control to shared data based on trust level
An approach is provided for providing access control to shared data based on a trust level. A method comprising, encrypting, at a first device, data with public...
US-9,769,123 Mitigating unauthorized access to data traffic
One particular example implementation of an apparatus for mitigating unauthorized access to data traffic, comprises: an operating system stack to allocate...
US-9,769,122 Anonymous single sign-on to third-party systems
An online system receives from a third-party application on a client device, an anonymous login request to anonymously log a user of the online system into a...
US-9,769,121 Scalable, selective traffic proxying
Proxy networks enable a source to send traffic to one or more targets through a set of nodes operating as proxies. However, proxy networks are typically...
US-9,769,120 Method and system for VPN isolation using network namespaces
One embodiment of the present invention provides a system for providing exclusive access to a virtual private network (VPN) connection to an authorized...
US-9,769,119 Examining and controlling IPv6 extension headers
Methods and systems for selectively blocking, allowing and/or reformatting IPv6 headers by traversing devices are provided. According to one embodiment,...
US-9,769,118 Device for providing security barrier for network
An apparatus, a system, and a method for providing a security barrier between local network and an internet connection.
US-9,769,117 Domain name variant generation
Domain name variants may be generated and/or displayed by accessing historical domain name information and identifying, based on the accessed historical domain...
US-9,769,116 Encapsulating traffic while preserving packet characteristics
A method for encapsulating a packet of data from a data flow is described. The packet comprises a flow network header for identifying a source network address...
US-9,769,115 DHCP agent assisted routing and access control
Systems and methods for increasing layer 2 visibility of layer 3 network devices so as to facilitate implementation of device-oriented policy actions by layer 3...
US-9,769,114 Method and system for providing optimized ethernet communication for vehicle
Disclosed are methods for allocating an address to an Electronic Control Unit (ECU) on an in-vehicle Ethernet network and devices therefor. A method may include...
US-9,769,113 Socket-based internet protocol for wireless networks
Systems and methods for assigning unique network identifiers in a packet-switched wireless network are provided. A request for a unique network identifier for a...
US-9,769,112 Optimising data transmission in a hypercube network
A method of operating a hypercube network of processing devices includes determining that a plurality of the processing devices are storing data to be processed...
US-9,769,111 System, method, and computer program for many-to-one communications in a network
A system, method, and computer program product are provided for many-to-one communications in a network. In use, a first single device subscribes to receive...
US-9,769,110 Message delivery in messaging networks
In response to receipt of a request message from a requester, a reply message is created. The reply message includes a message identifier of the request message...
US-9,769,109 Monitoring of subscriber message processing in a publish/subscribe messaging environment
A message associated with a subscription topic hosted by a publish/subscribe message tracking device is sent by the publish/subscribe message tracking device to...
US-9,769,108 System and method for securing information provided via a social network application
A system and method allows users of a social network system to view different types of information based on rights and privileges associated with the...
US-9,769,107 Lifestyle-based social groups
Techniques for lifestyle-based social groups are described. A user device can learn movement patterns of the user device. Based on the movement pattern, and a...
US-9,769,106 Displaying notifications on a mobile computing device
Technologies for displaying notifications on a mobile computing device includes determining a notification category for each notification, determining a...
US-9,769,105 Runway chat
In an implementation, a selection of a program is received by a computing device. The program is associated with a duration of time. In response to the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.