Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,888,005 Delivery of items for consumption by a user device
An item-providing system supplies items to a user device for consumption at the user device via communication infrastructure. The device may correspond to a...
US-9,888,004 Processing apparatus, authority setting method, and storage medium storing program
A processing apparatus performs: in response to reception of first information by one of the network interface and the user interface, identifying, as a first...
US-9,888,003 Pre-delivery of content to devices
Systems and methods for pre-delivering content to user devices are described. In some embodiments, the systems and methods may assign a user device to a group...
US-9,888,002 M2M data management
Described embodiments provide managing data collected from machine 2 machine (M2M) devices. A plurality of M2M devices may be grouped based on a common interest...
US-9,888,001 Methods, systems, and computer readable media for negotiating diameter capabilities
According to one method, the method occurs at a Diameter relay agent including at least one processor and a memory. The method includes receiving first Diameter...
US-9,888,000 Inter-application delegated authentication
Disclosed is a system for delegating authentication of an untrusted application executing on a client device. For delegated authentication, an untrusted...
US-9,887,999 Login method and apparatus
A login method and a login apparatus are provided. A third party server receives a login request of a first client and returns an identification code, the first...
US-9,887,998 Security model for data transfer using a shippable storage device
Data may be securely stored onto a shippable data storage device in order for the client data to be protected during shipment to the remote storage service...
US-9,887,997 Web authentication using client platform root of trust
Systems and methods for performing web authentication using a client platform root of trust are disclosed herein. Website and user validity and integrity may be...
US-9,887,996 Bidirectional authentication
Systems, methods, and other embodiments associated with bidirectional authentication are described herein. According to one embodiment, a method includes a user...
US-9,887,995 Locking applications and devices using secure out-of-band channels
Systems and methods are provided for locking/unlocking a user account for accessing a client application. The systems and methods pair a user account for...
US-9,887,994 Data processing based on two-dimensional code
The present disclosure provides example methods and apparatuses of data processing based on a two-dimensional code. The two-dimensional code is generated upon...
US-9,887,993 Methods and systems for securing proofs of knowledge for privacy
Embodiments described herein relate to securing the privacy of knowledge used to authenticate a user (i.e., Proof of Knowledge (PoK) test(s)). In some...
US-9,887,992 Sight codes for website authentication
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for site codes for website authentication are disclosed. In...
US-9,887,991 Facilitation of service login
As provided herein, a first device may be registered as authorized to authenticate a user login into a service from a second device (e.g., a smart phone may be...
US-9,887,990 Protection of application passwords using a secure proxy
A computer-implemented method, computer program product, and system for tagging and replacing tagged credentials with target credentials unknown to a client....
US-9,887,988 Login information transmission method, code scanning method and apparatus, and server
Described are a login information transmission method, a code scanning method and apparatus, and a server. The login information transmission method includes:...
US-9,887,987 Smartphone and computer application for personal meetings documentation that enables access to the...
An application that enables documentation of meetings using a Smartphone or internet-based communication programs installed on a computer whereby the...
US-9,887,986 Relay device, relay method, and program
Provided are a relay device capable of appropriate access management, a relay method, and a program. The relay device (10): receives a user ID and password for...
US-9,887,985 Management of certificate authority (CA) certificates
Systems and methods for automatically installing CA certificates received from a network security appliance by a client security manager to make the CA...
US-9,887,984 Autonomous system for secure electric system access
Secure electronic access may be provided by receiving at least one electronic certificate from an electronic device seeking to access a secure resource at a...
US-9,887,983 Apparatus and method for implementing composite authenticators
A system, apparatus, method, and machine readable medium are described for implementing a composite authenticator. For example, an apparatus in accordance with...
US-9,887,982 Accelerating OCSP responses via content delivery network collaboration
Techniques are disclosed for accelerating online certificate status protocol (OCSP) response distribution to relying parties using a content delivery network...
US-9,887,981 Single sign-on between multiple data centers
Systems and methods are disclosed for a single sign-on (SSO) enterprise system with multiple data centers that use a lightweight cookie on a user's client...
US-9,887,980 Global time based authentication of client devices
A system for authenticating client devices for communication with one or more wireless communications networks, includes a client device configured to receive a...
US-9,887,979 Systems and methods for enabling users to launch applications without entering authentication credentials
The disclosed computer-implemented method for enabling users to launch applications without entering authentication credentials may include (1) receiving, at a...
US-9,887,978 System and method for centralized configuration and authentication
A system and method for efficiently obtaining user configuration information for a given device. Multiple devices are deployed in an environment and may be...
US-9,887,977 Displaying the accessibility of hyperlinked files
The accessibility of a hyperlinked files is displayed. A hyperlink that references a resource is extracted from a target file. An attempt to acquire the...
US-9,887,976 Multi-factor authentication using quantum communication
Multi-factor authentication using quantum communication ("QC") includes stages for enrollment and identification. For example, a user enrolls for multi-factor...
US-9,887,975 Systems and methods for delegated cryptography
In some embodiments, an authentication method comprises receiving a request for a digital signature of data from a delegate computer over a secure channel using...
US-9,887,974 Method for network communication past encryption devices
This disclosure is directed to techniques for providing communication between devices in different networks wherein the communication must first pass through an...
US-9,887,973 Private peer-to-peer data transfers
A computer system implements a peer-to-peer network that permits peer-to-peer data transfers with privacy with respect to the identities of requestor peers,...
US-9,887,972 Cryptanalysis method and system
A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption...
US-9,887,971 Method and apparatus for secure energy delivery
A solar power conversion device embedded security module creates trusted metering data in relation to power generated and outputs it as metering data. The...
US-9,887,970 Methods of accessing and providing access to a remote resource from a data processing device
A method of accessing a remote resource (4) from a data processing device (2) includes obtaining a first URL corresponding to the remote resource (4), obtaining...
US-9,887,969 Methods for obfuscating javascript and devices thereof
A method, non-transitory computer readable medium and device that assists obfuscating JavaScript includes obtaining a webpage requested by a client computing...
US-9,887,968 Enhanced security when sending asynchronous messages
According to one exemplary embodiment, a method for increasing security when sending a plurality of messages over a network connection is provided. The method...
US-9,887,967 Portable security device, method for securing a data exchange and computer program product
There is disclosed a portable security device for securing a data exchange between a host device and a remote device, said portable security device comprising a...
US-9,887,966 Method and apparatus for mediating communications
A method of mediating communications between a first computing device and a second computing device, by an intermediary computing device, comprising...
US-9,887,965 Method and system for browser identity
A browser application programming interface is exposed to a web application to verify an identify of a user using user-specific identity information stored by...
US-9,887,964 Method and system for dynamic de-identification of data sets
A method for combining disparate data sets using dynamic de-identifiers includes: receiving a first data set from a first external entity, the data set...
US-9,887,963 Network security processing
A method, and associated system, for security processing of a request for a resource in a network security system. The request for the resource is received from...
US-9,887,962 Translating network attributes of packets in a multi-tenant environment
A method of translating network attributes of packets in a multi-tenant environment, and an appliance and a program product implementing the method. The method...
US-9,887,961 Multi-tenant aware dynamic host configuration protocol (DHCP) mechanism for cloud networking
An approach includes providing support multi-tenancy support on a DHCP protocol. The approach includes receiving a dynamic host configuration protocol (DHCP)...
US-9,887,960 Providing services for logical networks
Some embodiments provide a method for a network controller that manages several logical networks. The method receives a specification of a logical network that...
US-9,887,959 Methods and system for allocating an IP address for an instance in a network function virtualization (NFV) system
A method for allocating an IP address for an instance in a NFV system includes obtaining a first requirement of IP address allocation from VNFD by a first node...
US-9,887,958 Configuring DNS clients
Techniques are provided for increasing the efficiency and efficacy of DNS clients. In one technique, DNS clients log information about performance of one or...
US-9,887,957 Systems and methods for localization based on internet terminal location
Methods and systems for providing sourcing Internet access requests from ISP subscribers serviced by a gateway not physically located near the subscribers. As...
US-9,887,956 Remote purge of DNS cache
Various techniques for purging resource records stored in a cache of domain name system servers are disclosed herein. In one embodiment, a method includes...
US-9,887,955 Message queues for rapid re-hosting of client devices
Connected gateway servers relay an electronic message from a first client device to a second client device by storing the message in respective user message...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.