Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,854,011 Analyzing reading metrics to generate action information
Data reports are received from a plurality of clients including action reports and timing reports. Action reports describe actions performed by users of the...
US-9,854,010 Smart notifications using a calendar
Notifications are delivered to a user based in part on a user's current context. The notifications may be based on personal information (e.g. calendar events,...
US-9,854,009 Method and apparatus for enabling multimedia synchronization
Methods and apparatus are described for synchronizing a media presentation on a plurality of wireless transmit/receive units (WTRUs). A media session may be...
US-9,854,008 Real time communication method, terminal device, real time communication server and real time communication system
The present invention provides a real time communication method, a terminal device, an RTC server and an RTC system. The method includes: receiving, by a first...
US-9,854,007 Method of controlling packet switched data transmission and related communication device
A method of controlling packet switched data transmission functionality for a mobile device in a wireless communication system is disclosed. The method...
US-9,854,006 System and methods for improving interaction routing performance
An interaction router includes a computerized server executing a routing engine stored on a machine-readable medium, an interface at the server receiving...
US-9,854,005 Methods and apparatus for providing network based services to non-registering endpoints
Methods and apparatus to provide data network services to a non-registering endpoint are disclosed herein. A disclosed method includes, transmitting, by...
US-9,854,004 Systems and methods for managing different types of registrations for IMS services on SIMs of a wireless...
Methods and devices are disclosed for managing Internet Protocol Multimedia Subsystem (IMS) service registration on a wireless communication device having at...
US-9,854,003 System and method for initiating telecommunications sessions through an electronic mail address
A system and method of establishing and controlling a telecommunications or multimedia communications sessions over a conventional call signaling protocol is...
US-9,854,002 Application centric compliance management system and method for a multi-level computing environment
An application centric compliance management system includes a computing system that executes a tool to identify a subset of a the resources of a multi-tier...
US-9,854,001 Transparent policies
A system enforces policies in connection with requests to access resources. Users are provided the ability to obtain information about the policies the system...
US-9,853,999 Context-aware knowledge system and methods for deploying deception mechanisms
Methods, systems, and computer-readable mediums are described herein to provide context-aware knowledge systems and methods for deploying deception mechanisms....
US-9,853,998 Mitigation of computer network attacks
Various techniques for mitigating computer network attacks are disclosed herein. In one embodiment, a method includes receiving indications of denial of service...
US-9,853,997 Multi-channel change-point malware detection
A malware detection system and method detects changes in host behavior indicative of malware execution. The system uses linear discriminant analysis (LDA) for...
US-9,853,996 System and method for identifying and preventing malicious API attacks
A system and method for identifying and preventing malicious application programming interface attacks is configured to, during a learning stage: monitor all...
US-9,853,995 System and method for restricting pathways to harmful hosts in computer networks
System and method for detecting malicious activity in a computer network that includes hosts and connectors between the hosts. Network pathways to a plurality...
US-9,853,994 Attack analysis system, cooperation apparatus, attack analysis cooperation method, and program
In a log analysis cooperation system including a logger that collects a log of a communication device and stores the log in a storage device, a SIEM apparatus...
US-9,853,993 Systems and methods for generation and selection of access rules
In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access...
US-9,853,992 Cloud service usage risk analysis based on user location
A system and method for filtering detected anomalies in cloud service usage activities associated with an enterprise uses a trusted location analysis to filter...
US-9,853,991 Finding command and control center computers by communication link tracking
Methods, systems, and apparatus, including computer programs encoded on computer storage media for identifying malware attacks collects data traffic...
US-9,853,990 Verification of computer system prior to and subsequent to computer program installation
Embodiments of the present invention provide a method, system, and computer program product for debugging a computer environment. In an embodiment of the...
US-9,853,989 Smart power background to validate user
Technologies are generally described to implement intrusion detection based on smart power background. In some examples, upon detection of an attempt to access...
US-9,853,988 Method and system for detecting threats using metadata vectors
An approach for detecting network attacks using metadata vectors may initially involve receiving network communications or packets, extracting metadata items...
US-9,853,987 Method, apparatus and system for realizing security detection in heterogeneous network
Provided are a method, apparatus and system for realizing security detection in a heterogeneous network. UE establishes cross-Evolved NodeB (eNB)...
US-9,853,986 Clustering event data by multiple time dimensions
Systems and methods for processing log data are provided. A set of data chunks is determined. Each data chunk is associated with a set of events, which are...
US-9,853,985 Device time accumulation
A method, system and computer-usable medium are disclosed for performing a device time accumulation operation. With a device time accumulation operation systems...
US-9,853,984 Methods, systems, and products for identity verification
Methods, systems, and products verify an identity claimed by a person. A signature, representing the presence of a device, is acquired. The signature is...
US-9,853,983 Preventing phishing attacks based on reputation of user locations
User sessions are authenticated based on locations associated with a user account used for sending a request for creating a session. Examples of locations of a...
US-9,853,982 Image-based group profiles
An image of users of an application may be received from a computing device on a home network. The image may comprise representations of a group of users....
US-9,853,981 Handling potential service load interruptions by presenting action items for service requester to complete to...
A method, system and computer program product for handling potential service load interruptions. The utilization of resources, such as servers in a service...
US-9,853,980 Technique for configuring secured access to a host network for an invited terminal
A method is provided for configuring access to a network, to authorize an access to the network for at least one invited terminal associated with an invited...
US-9,853,979 Immediate policy effectiveness in eventually consistent systems
Policy changes are propagated to access control devices of a distributed system. The policy changes are given immediate effect without having to wait for the...
US-9,853,978 Domain join and managed directory support for virtual computing environments
A virtual computing environment service may receive a request from a customer to provision a virtual computing environment and join the virtual computing...
US-9,853,977 System, method, and program product for processing secure transactions within a cloud computing system
Particular systems, methods, and program products for web-based security systems for user authentication and processing in a distributed computing environment...
US-9,853,976 Data encryption/decryption using neurological fingerprints
In accordance with one embodiment, a method for securing data is disclosed. The method includes sensing multi-dimensional motion of a body part of a user to...
US-9,853,975 Restricting access to content based on measurements of user terminal operational performance
A processor of a user terminal performs operations that include obtaining a user identifier for a user operating the user terminal, measuring an initial...
US-9,853,974 Implementing access control by system-on-chip
Systems and methods for implementing access control by systems-on-chip (SoCs). An example SoC may comprise an access control unit employed to: receive a message...
US-9,853,973 Information distribution system, and server, on-board terminal and communication terminal used therefor
Inherent terminal identification information and a terminal unique key are stored in an on-board terminal, and server-side terminal identification information...
US-9,853,972 Pharmacy authentication methods and systems
An electronic image that includes information identifying a user of a client device is received, as is another electronic image that captures the face of the...
US-9,853,971 Proximity based authentication using bluetooth
Techniques for securing communications between fixed devices and mobile devices. A mobile device management server mediates communications between the fixed...
US-9,853,970 Method, system and apparatus for secured wireless docking connection
Examples are disclosed for techniques for wireless docking. According to some embodiments, a mobile device may scan for an available docking device, for example...
US-9,853,969 Bluetooth low energy hostless private address resolution
Conventional Bluetooth low energy (or like personal wireless network) controllers cannot resolve private addresses without some calculation from a host...
US-9,853,968 Systems and methods for authenticating users accessing a secure network with one-session-only, on-demand login...
Systems and methods are disclosed for providing an unregistered user with access to a network in a secure and efficient manner. A random, on-demand password is...
US-9,853,967 Private simultaneous authentication of equals
A passphrase is assigned to an end user device for use in authenticating the end user device for a network using SAE. An identification of the end user device...
US-9,853,966 Securely connecting control device to target device
In an approach, a target computing device receives a pairing request from a controller computing device, the pairing request including controller credentials...
US-9,853,965 Authentication service for third party applications
An authentication device receives, from an application executing at a mobile device, a request for an authentication token, the request including an application...
US-9,853,964 System and method for authenticating the legitimacy of a request for a resource by a user
A method of authenticating the legitimacy of a request for a resource from a resource provider by a user, including providing an authentication process in which...
US-9,853,963 Authorization server, authentication cooperation system, and storage medium storing program
An authorization token verification request including the authorization token is received from an application server having received a processing request along...
US-9,853,962 Flexible authentication framework
A flexible and extensible architecture allows for secure searching across an enterprise. Such an architecture can provide a simple Internet-like search...
US-9,853,961 System and method for pool-based identity authentication for service access without use of stored credentials
A computer-implemented system and method for pool-based identity authentication for service access without use of stored credentials is disclosed. The method in...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.