Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,819,708 Method and system for self-registration and self-assembly of electrical devices
A method for self-registration and/or self-assembly of a plurality of electrical devices, the method including: performing the self-registration of the...
US-9,819,707 Dynamic virtual private network
Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote...
US-9,819,706 Maintaining session initiation protocol application session affinity in SIP container cluster environments
A system for maintaining SIP application session affinity, the system including a destination inspector configured to inspect a SIP request to determine whether...
US-9,819,705 Method of exchanging data packages between first and second portable communication devices using a favoured...
The present disclosure relates in a first aspect to a method of exchanging data packages between a first portable communication device and a second portable...
US-9,819,704 Transmission system, transmission management apparatus, and recording medium
Disclosed is a transmission system to manage sessions established between a plurality of terminals for performing voice communications. The transmission system...
US-9,819,702 Processing signaling changes
The disclosure relates to tracking commands and data received from many sources. A device may receive a command from a user and forward the command to a network...
US-9,819,701 Low latency IMS-based media handoff between a cellular network and a WLAN
Methods for transporting a media call between an IMS server and a User Equipment (UE) and of handing over the media call between a cellular network and a WLAN...
US-9,819,700 System and method for passive communication services
Passive presence information for a first user of a service, such as a conversation service, is obtained by analyzing user activity logs. This is performed upon...
US-9,819,699 Systems and methods for network security memory reduction via distributed rulesets
The present disclosure describes systems and methods for reducing rule set sizes via statistical redistribution throughout a plurality of network security...
US-9,819,698 Method and apparatus for MoCA network with protected set-up
Systems and methods are disclosed for securing a network, for admitting new nodes into an existing network, and/or for securely forming a new network. As a...
US-9,819,697 Diffusing denial-of-service attacks by using virtual machines
A system for diffusing denial-of-service attacks by using virtual machines is disclosed. In particular, the system may receive, from a measurement probe, a...
US-9,819,696 Systems and methods for detecting domain generation algorithm (DGA) malware
Domain generation algorithm (DGA) malware is detected by intercepting an external time request sent by a potential DGA malware host, and replacing the received...
US-9,819,695 Scanning method and device, and client apparatus
Disclosed are a scanning method and device, and a client apparatus. The method comprises: when a specified scanning is started, enumerating at least one disk...
US-9,819,694 Arrangement configured to migrate a virtual machine in the event of an attack
An arrangement for use in managing resources of a plurality of computing devices in response to an attack, the arrangement comprising: an interface configured...
US-9,819,693 Identification of infected devices in broadband environments
Novel solutions for detecting and/or treating malware on a subscriber's premise network. Such solutions can include, but are not limited to, tools and...
US-9,819,692 System and method for detecting network activity of interest
A network activity detection system is trained to detect network activities of interest such as threats by malicious computer data. The training involves...
US-9,819,691 Network monitoring system and method
A disclosed network monitoring method includes: obtaining, by a first apparatus, packets from a node outside a network to a first terminal in the network, and...
US-9,819,690 Malicious virtual machine alert generator
Technologies are generally described for methods and systems effective to generate an alert in a data center. In some examples, a device may detect an execution...
US-9,819,689 Large scale malicious process detection
Identify a set or session of processes as having certain characteristics. A method obtains a known set or session of processes, wherein the known set or session...
US-9,819,688 Peer enrollment method, route updating method, communication system, and relevant devices
A peer enrollment method, a route updating method, a communication system, and relevant devices to improve security of a peer-to-peer (P2P) network. The peer...
US-9,819,687 Reducing web browsing overheads with external code certification
Methods, servers, and systems for using signatures/certifications embedded in pre-processed code to enable use or reuse of pre-processed code to obviate the...
US-9,819,686 Method and apparatus for providing an adaptable security level in an electronic communication
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and...
US-9,819,685 Method and system for identifying security risks using graph analysis
Methods, systems, apparatus, and non-transitory computer readable media are described for identifying users who are likely to have unauthorized access to secure...
US-9,819,684 Systems and methods for scalable-factor authentication
Authentication systems and methods can selectively authenticate a request to access a resource data store storing access rights associated with a user device....
US-9,819,683 Automated control of technology resources
The present invention provides for a fully automated process for controlling technology resources. Specifically, embodiments of the invention streamline the...
US-9,819,682 Certificate based profile confirmation
Disclosed are various embodiments for controlling access to resources in a network environment. Methods may include installing a profile on the device and...
US-9,819,681 Datacentroid
A modular, expandable, and flexible computer system device is provided. The computer system device comprising a multiple number of individual modules...
US-9,819,680 Determining user authentication requirements based on the current location of the user in comparison to the...
Systems, apparatus, methods, and computer program products are provided for determining a user's authentication requirements/credentials for a specific network...
US-9,819,679 Hardware assisted provenance proof of named data networking associated to device data, addresses, services, and...
A system of delivering data content with hardware assisted provenance proof in named data networking (NDN). The system comprises a data content server with a...
US-9,819,678 Linking a forwarded contact on a resource to a user interaction on a requesting source item
Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, including a method for providing content. An initial...
US-9,819,677 Supplementing biometric identification with device identification
A computer may identify an individual according to one or more biometrics based on various physiological aspects of the individual, such as metrics of various...
US-9,819,676 Biometric capture for unauthorized user identification
A computing device may determine to capture biometric information in response to the occurrence of one or more trigger conditions. The trigger condition may be...
US-9,819,675 Secure communications smartphone system
Methods, systems, and non-transitory data storage media are provided for secured communications where biometrics are used to secure communications sent over a...
US-9,819,674 System, apparatus and method for secure operation of image forming device
Systems, apparatuses and methodologies, for secure operation of an image forming (or output) device, by automated handshaking between the image forming (or...
US-9,819,673 Authentication and authorization of a privilege-constrained application
Methods and systems are provided for managing access to a client account related (CAR) resource. When a privilege-constrained (PC) application requests access...
US-9,819,672 Sharing access tokens with trusted users
Disclosed are techniques of sharing an access token. The techniques comprise generating a list that includes indications of users trusted to access a protected...
US-9,819,671 Prompting login account
A login request initiated by a user at a current page is received. Whether there exists an account record matched with a login account name and login password...
US-9,819,670 Distributing security codes through a restricted communications channel
Disclosed are various examples for facilitating distribution of security codes for a two-factor authentication scheme or one-time passwords. Security codes can...
US-9,819,669 Identity migration between organizations
Disclosed are various embodiments for identity data migration from one organization to another. Identity data corresponding to user accounts of a first...
US-9,819,668 Single sign on for native and wrapped web resources on mobile devices
A method includes performing operations as follows on a processor: associating a single sign on module with a native application residing on a mobile device,...
US-9,819,667 System and method for determining use of non-human users in a distributed computer network environment
Embodiments of systems and methods as disclosed herein may determine that an initiator of a communication on a distributed computer network is an automated...
US-9,819,666 Pass-thru for client authentication
This disclosure pertains generally to client authentication. One aspect of the disclosure relates to a first server for presenting evidence to a Domain...
US-9,819,665 Synchronization of access tokens for session continuity across multiple devices
An access token is synchronized across multiple trusted devices when one of the trusted devices obtains an authorization grant from a resource owner, and uses...
US-9,819,664 Method and device for implementing a process under a superuser privilege, and mobile terminal
In an example for implementing a process under a superuser privilege within a computing device, a monitor function library for monitoring an executable function...
US-9,819,663 Data protection file system
Protecting content is disclosed. A request for a file system operation is intercepted. A user-defined callback that corresponds to the file system operation is...
US-9,819,662 Authentication using a transaction history
Systems and methods are provided for authenticating a user. In one implementation, a computer-implemented method is provided. According to the method,...
US-9,819,661 Method of authorizing an operation to be performed on a targeted computing device
A method of authorizing an operation to be performed on a targeted computing device is provided. The method includes generating a request to perform an...
US-9,819,660 Systems and methods for document authentication
Disclosed are systems and methods that provide authentication for printed and/or electronic versions of a document through the use of a document authentication...
US-9,819,659 Iterative data secret-sharing transformation
Provided are a method, system, and article of manufacture for iterative data secret-sharing transformation and reconversion. In one aspect, data secret-sharing...
US-9,819,658 Virtual gateways for isolating virtual machines
Virtual machines in a network may be isolated by encrypting transmissions between the virtual machines with keys possessed only by an intended recipient. Within...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.