Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,781,104 Working method of dynamic token
Disclosed is a working method of a dynamic token. The present invention relates to the field of communications. The method comprises: when a token is awakened,...
US-9,781,103 Trusted communication session and content delivery
Methods and systems for configuring a network are disclosed. An example method can comprise receiving a first token and an encryption key from a first device. A...
US-9,781,102 Managing support access in software-as-a-service systems
An improved technique involves setting an administrator password in a server to a temporary password upon receipt of a request for administrator access to the...
US-9,781,101 Method and apparatus for controlling connection between devices
A method and apparatus for controlling connection between devices includes detecting a first device, determining whether the first device is included in a...
US-9,781,100 Certificate validation and channel binding
A constrained network entity may determine, via an authentication procedure with a core network entity, the trustworthiness of an endpoint attempting to...
US-9,781,099 Online communication risks
Systems, methods, and apparatus to analyze potential risks of communicating online are described. In an embodiment, the communication may include communicating...
US-9,781,098 Generic server framework for device authentication and management and a generic framework for endpoint command...
Methods, devices, and systems are described for enrolling a user's bring-your-own-device for secure connection to a company's enterprise computer network. From...
US-9,781,097 Device fingerprint updating for single sign on authentication
A device fingerprinting system provides an additional factor of authentication. A user device may be redirected, along with user ID parameters, to...
US-9,781,096 System and method for out-of-band application authentication
Application-to-Application authentication features using a second communication channel for out-of-band authentication separate from a communication channel of...
US-9,781,095 Suppression of authorization risk feedback to mitigate risk factor manipulation in an authorization system
Dynamic risk communication associated with a computer device may include automatically detecting one or more security risk factors for the computer device based...
US-9,781,094 Systems and methods for performing remote authentication of a virtual subscriber identity module (SIM)
Various embodiments for performing remote authentication of a virtual subscriber identity module (SIM) on a mobile communication device include receiving, on a...
US-9,781,093 Authentication of a secure electronic device from a non-secure electronic device
The application relates in particular to a method for authentication of a secure electronic device (BNK_SRV) from a non-secured electronic device (PC, SP)...
US-9,781,092 Authenticating users to media-player devices on online social networks
In one embodiment, a method includes receiving an authentication key from an online social network in response to a request from a media-player device. The...
US-9,781,091 Provisioning for smart navigation services
Techniques for provisioning a smart navigation service are presented. The provisioning can be performed by a name owner, by the smart navigation service itself,...
US-9,781,090 Enterprise computing environment with continuous user authentication
Continuous user authentication includes receiving authentication event information including (1) transaction information describing authentication transactions,...
US-9,781,089 Authenticating a user account with a content management system
Systems, methods, and computer-readable storage media for authenticating a user account with a content management system are disclosed. A synchronized content...
US-9,781,088 Information processing apparatus, method of controlling the same, and storage medium
By a Web browser, an authentication screen is displayed based on HTML data received from a Web server, and authentication information inputted via the...
US-9,781,087 Private and secure communication architecture without utilizing a public cloud based routing server
A method for use with a public cloud network is disclosed. The method includes setting up a private cloud routing server and a smart device client in a client...
US-9,781,086 System and method for confirming identity and authority by a patient medical device
A system and method for confirming identity and authority by a patient medical device is provided. Master credentials are issued to a requesting device and a...
US-9,781,085 Device to device security using NAF key
A method, apparatus and computer program product are disclosed for establishing secure off-network communications between first and second Secure Cellular...
US-9,781,084 Reducing start-up delay in streaming media sessions
A method is provided for delivering a streaming media asset to a client device. For the method, a request is received over a communication network from a client...
US-9,781,083 System and method of efficiently generating and transmitting encrypted documents
The present specification discloses an improved method of encrypting a file and distributing the encrypted file over a network from a user computer to a remote...
US-9,781,081 Leveraging transport-layer cryptographic material
A client application cryptographically protects application data using an application-layer cryptographic key. The application-layer cryptographic key is...
US-9,781,080 Method and apparatus for diverse security handling in an enhanced local area network
A method for diverse security handling may comprise: maintaining a first connection between a user equipment and a first network node, and a second connection...
US-9,781,079 Security key generator
A communication system has a first and a second communicating device operable to send and receive data units through a communication channel. Some of the data...
US-9,781,078 Managing unlinkable identifiers for controlled privacy-friendly data exchange
A method for managing unlinkable database user identifiers includes distributing to a first database a first encrypted user identifier, a first database...
US-9,781,077 Media distribution system with manifest-based entitlement enforcement
A method for enforcing entitlements includes configuring a wide variety of entitlements at a server; determining applicable combination of entitlements for a...
US-9,781,076 Secure communication system
A communications system (40) comprises a first entity (42), a first encryption device (48) and a network (46). The first encryption device (48) is adapted to...
US-9,781,075 Increased port address space
Managing network ports is disclosed. Network session identification information is received. The network session identification information is associated with a...
US-9,781,074 Method and device for sending cloud server address
A method for sending a cloud server address to a desktop cloud terminal, where a terminal management server receives a request message from a desktop cloud...
US-9,781,073 Redirecting invalid URL to comparable object with sufficient permissions
Systems, methods, and computer program products to perform an operation comprising receiving, by a web server, a client request specifying to access a first...
US-9,781,072 Unifying web and phone presence
The subject matter of this specification can be embodied in, among other things, a computer-implemented method that includes obtaining, at a computer system, a...
US-9,781,071 Method, apparatus and computer program product for providing automatic delivery of information to a terminal
An apparatus for providing automatic delivery of information to a terminal includes a communication element, a registry element and a proxy element. The...
US-9,781,070 Resolver-based data storage and retrieval system and method
System and method for associating general data with an end-user based on the domain name system (DNS) resolver that the end-user uses to map the canonical...
US-9,781,069 VLAN advertisement and automated configuration
A gratuitous address resolution protocol frame is sent from an information handling system upon detection of VLAN status change the information handling system....
US-9,781,068 Messaging media to go viral
Systems and techniques are disclosed for transmitting a message via one or more platforms, the messages being associated with media content and/or related media...
US-9,781,067 Social conversation management
A method for managing conversations in social media and networks may include selecting, by a processor, a message posted to a social medium for management and...
US-9,781,066 Terminal device, server, and method of providing messaging service
A terminal device is provided. The terminal device includes an input unit configured to receive an input of a user command inviting a non-subscriber of a...
US-9,781,065 Lightweight application integration for mobile cloud computing
Disclosed herein are technologies to provide lightweight software applications deployable on mobile devices that allow users and intermediary solution providers...
US-9,781,064 Method and system for creating and distributing electronic postcards
Method and system for creating and distributing professional quality electronic postcards are provided. An accessible library of numerous photographs/videos...
US-9,781,063 System and method for alerting a list of multiple recipients of a user's request for assistance
A request for assistance from a user employing a first user device is received. The request is converted into a plurality of formatted requests. Each formatted...
US-9,781,062 Using annotations to extract parameters from messages
The disclosed embodiments relate techniques for using annotations to extract parameters from messages. During operation, a computing device receives a message...
US-9,781,061 Method and system for providing an information centric network with a software defined network
A method and system provide an information centric network with a software defined network based on an information centric networking protocol on top of a...
US-9,781,060 Crossbar switch and recursive scheduling
A crossbar switch has N input ports, M output ports, and a switching matrix with N.times.M crosspoints. In an embodiment, each crosspoint contains an internal...
US-9,781,059 Optoelectronic switch
An optoelectronic switch comprising: a first plurality of detector remodulators (DRMs) (C3, D1), each DRM having an integer number M of optical inputs and an...
US-9,781,058 Dynamically adjusting liveliness detection intervals for periodic network communications
In general, techniques are described to dynamically adjust a session detection time defined by a timer in accordance with a bidirectional forwarding detection...
US-9,781,057 Deadlock avoidance techniques
Described are techniques for avoiding deadlock. Each consumer is assigned a priority level denoting a number of resource allocation requests that have been...
US-9,781,056 Content source selection in a P2P network
Telemetry data from a plurality of peer computers of a peer-to-peer network is aggregated via a computer network. Each of the plurality of peer computers sends...
US-9,781,055 Dynamic cascaded clustering for dynamic VNF
In an example, a server architecture is described for a dynamic cascaded node chain providing a resource cluster. The cascaded node chain may include one or...
US-9,781,054 Quota-based resource scheduling
The present disclosure relates to dynamically scheduling resource requests in a distributed system based on usage quotas. One example method includes...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.