Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,002,7657 Authentication/authorization without a password
A method for authenticating a user on the electronic computing device includes receiving a request to authenticate the user. First data is received from the...
US-1,002,7656 Systems and methods for user account recovery
Systems, methods, and non-transitory computer-readable media can determine a request to recover access to an account of a first user, the request being received...
US-1,002,7655 Method and system for CU logging in docking platform
The invention discloses a CU login method and system. The method is applied to a multi-platform interconnection and intercommunication VSS based on a structure...
US-1,002,7654 Method for authenticating a client device to a server using a secret element
The invention relates to an authentication method for authenticating a client device having an authentication token generated by means of a pseudo-homomorphic...
US-1,002,7653 Method for providing user authority certification service
Embodiments of a method for providing user authority information management service are provided. In some embodiments, the method includes a client server...
US-1,002,7652 Secured agent communications
A server communicates with a network appliance. The server includes an agent. The network appliance sends a request to the agent. The request includes an...
US-1,002,7651 Shaping I/O traffic by managing queue depth in fractional increments
A method for managing input/output (I/O) traffic in an information handling system. The method may include receiving electronic I/O requests from a...
US-1,002,7650 Systems and methods for implementing security
Systems and method are provided in accordance with one or more processes that run within an operating system, in which a first process of the one or more...
US-1,002,7649 Credential-free user login to remotely executed applications
Provided is a process including: receiving, with an intermediary server, a request to access web content at a web server; submitting, from the intermediary...
US-1,002,7648 Geolocation dependent variable authentication
In an approach to variable authentication, one or more computer processors receive a request to access secure data from a computing device. The one or more...
US-1,002,7647 Mobile voting and voting verification system and method
A voter verification system and method are provided. The voter verification system may include a mobile messaging aggregator configured to receive voter...
US-1,002,7646 Associating an agent device associated with a first application providing apparatus with a second application...
An agent device is registered in a first device registry maintained by a first registry apparatus for authenticating agent devices for communicating with...
US-1,002,7645 Systems and methods for verifying attributes of users of online systems
For sharing of information in a virtual or online environment, methods and systems are provided which enable verifying attributes of an individual. An...
US-1,002,7644 Analysis with embedded electronic spreadsheets
A computer system includes a processor and a data store coupled to the processor. A user interface module is configured to provide a user interface of a first...
US-1,002,7643 Authenticating home device using device token issued based on identifier of terminal
To solve the problems that may occur due to the leakage of user account information, the present disclosure may manage the security using the device token that...
US-1,002,7642 Method of access by a telecommunications terminal to a database hosted by a service platform that is accessible...
A method enabling a telecommunications terminal to access a database hosted by a service platform that can be accessed via a telecommunications network. The...
US-1,002,7641 Method and apparatus of account login
The present disclosure discloses a method and an apparatus of account login to solve the problem of low efficiency of account login in existing technologies. A...
US-1,002,7640 Secure data re-encryption
A method includes: decrypting, in a device, a first subset of encrypted data using a cryptographic device key associated with the device to produce first plain...
US-1,002,7639 IC chip performing access control based on encrypted ID
There is provided an information processing apparatus including an encrypted-ID generation section which encrypts a unique ID to generate an encrypted ID, the...
US-1,002,7638 System for user-friendly access control setup using a protected setup
A method and apparatus includes a determining unit configured to determine whether a device entering a network should be allowed access and an executing unit...
US-1,002,7637 Secure and control data migrating between enterprise and cloud services
A method for operating a cloud gateway is provided. The method includes generating a plurality of rules relating users and groups to data access at a plurality...
US-1,002,7636 Data transmission method, apparatus, and system
The present invention relates to a data transmission method, apparatus, and system. The method includes: obtaining, by a benefited device, a cooperative-layer...
US-1,002,7635 Systems and methods for decryption as a service via a message queuing protocol
Systems and methods for decryption of payloads are disclosed herein. In various embodiments, systems and methods herein are configured for decrypting thousands...
US-1,002,7634 Mobile device security
A system is described for communicating with a mobile device. The mobile device exchanges an electronic message with a messaging server, where the message is...
US-1,002,7633 Method for performing similar-information search while keeping content confidential by encryption
A similar-information search method includes obtaining an instruction indicating which of an encrypted search and an unencrypted search a data computation...
US-1,002,7632 Data view based on context
In an implementation, a view of a set of data may be based on a context. The context may include an attribute associated with an attribute list. A set of...
US-1,002,7631 Securing passwords against dictionary attacks
Described herein are various technologies pertaining to constructions of a password-based authentication protocol that are configured to allow a user to...
US-1,002,7630 Secure zone for digital communications
The systems, methods and apparatuses described herein provide a computing environment that includes a secure zone for executing tasks. An apparatus according to...
US-1,002,7629 Short message service reading method and device
A Short Message Service (SMS) reading method and device are disclosed for providing security when authorizing SMS reading. After a reading request for reading...
US-1,002,7628 Client/server security by an intermediary rendering modified in-memory objects
In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define one or more objects and one or more...
US-1,002,7627 Context sharing between endpoint device and network security device using in-band communications
A network security device (NSD) is connected between a network and an endpoint device configured to host a client application. The client application...
US-1,002,7626 Method for providing authoritative application-based routing and an improved application firewall
A method for providing authoritative application-based routing and an improved application firewall, as well as a method for application classification, is...
US-1,002,7625 Secure analysis application for accessing web resources
Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or...
US-1,002,7624 Region-based redirection and bridging of calls
Apparatus and methods are disclosed for bridging communications between a private network and a public network. A mapping that associates a first set of IP...
US-1,002,7623 Internet protocol address resolution
A first edge node in a first site network receives an Internet Protocol (IP) address resolving request packet from a device in the first site network. The first...
US-1,002,7622 Recovering lost device information in cable networks
In one embodiment, methods are described for recovering lost customer premises equipment (CPE) information on a cable modem termination system (CMTS) in the...
US-1,002,7621 System for classifying an internet protocol address
A system for classifying an Internet protocol (IP) address, including: a data store for storing client profile data associated with a client, the client profile...
US-1,002,7620 Call processing telecommunication system and methods thereof in a WiFi network
Global identifiers can be dialed from anywhere in the world. The present application relates to a call processing telecommunication system and methods thereof...
US-1,002,7619 Messaging centre for forwarding e-mail
A method for forwarding an e-mail message from an e-mail server to a mobile terminal is provided. An e-mail address of the mobile terminal is associated with an...
US-1,002,7618 Social media feedback for routing user communications
A call handling platform receives a call placed by a caller to a calling number. The platform examines parameters of the call, determines identifying...
US-1,002,7617 Systems and methods for communication of user comments over a computer network
Systems and methods for communication of user comments over a computer network are provided. Users may place and review comments on webpages or other resources...
US-1,002,7616 Proximity discovery system and method
A proximity discovery system enabling a person to quickly and efficiently discover colleagues within their proximity without visual contact. The system...
US-1,002,7615 Personal communication data management in multilingual mobile device
A method for managing personal communication data, wherein the personal communication data including a plurality of chat histories from a plurality of chat...
US-1,002,7614 Duplicate notification management
For managing multiple duplicative notifications, a method receives and parses, at a processor, a first notification. The method also receives and parses, at the...
US-1,002,7613 Method and system of automating data capture from electronic correspondence
In some embodiments, electronic data may be automatically captured to provide a user with a universal Internet identity and e-mail address, comprehensive e-mail...
US-1,002,7612 Method and apparatus for managing content distribution according to social networks
Aspects of the subject disclosure may include, for example, determining a common interests associated with a group of users according to activity information...
US-1,002,7611 Method and apparatus for classifying electronic messages
Systems and methods for processing a message are provided. A message may be processed to generate a message summary by removing or replacing certain words,...
US-1,002,7610 Management of dynamic email content
Systems and methods to manage dynamic content in email via an image server. The image server being configured to communicate and receive requests from an email...
US-1,002,7609 Experience redirection with interactive feature changes
A system and method are described for allowing users to forward a media content experience, such as an Internet site, to another computing device. The system...
US-1,002,7608 Message processing using deactivation condition and after scheduled end time
Message processing includes activating an out-of-office function for a messaging account, wherein the out-of-office function has a scheduled end time. A...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.