Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,004,4704 Systems and methods for authenticating or identifying personnel and personnel related material
A method is provided. The method includes providing an authentication code onto a reference article associated with a person, determining a signature associated...
US-1,004,4703 User device performing password based authentication and password registration and authentication methods thereof
A password registration method of a user device which uses a password-based authentication manner is provided. The password registration method includes...
US-1,004,4702 Cross instance user authentication architecture
In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing a cross instance user authentication...
US-1,004,4701 Technologies for token-based authentication and authorization of distributed computing resources
Technologies for token-based access authorization to an application program interface (API) include an access management server to receive a service request...
US-1,004,4700 Identity attestation of a minor via a parent
A technique allows a parentally attested security token to serve as authentication for a minor using identifying attributes of the minor child. The security...
US-1,004,4699 Method and apparatus of providing messaging service and callback feature to mobile stations
Disclosed are an apparatus and method of performing automated administrative operations on a mobile device. One example method may include determining via a...
US-1,004,4698 Dynamic identity checking for a software service in a virtual machine
A selector apparatus to select one or more shared authentication facilities for a software service executing in a virtualized shared computing environment, the...
US-1,004,4697 Multi-level authentication for onboard systems
Described herein is a platform and method for providing multi-level authentication by an onboard system in relation to a transaction. In response to receiving...
US-1,004,4696 Simplified sensor integrity
An apparatus is provided that includes at least one processor device, an energy storage module to power the apparatus, memory to store a secret such that...
US-1,004,4695 Application instances authenticated by secure measurements
A computer-implemented system and method for receiving a request to associate one or more application instance definitions with an application identity of an...
US-1,004,4694 Server, method and system for authenticating application
An application authentication program causes a data server and an application server to execute the processes of: accepting an access request containing...
US-1,004,4693 Security for confidential data
In an example embodiment, a submission of confidential data is received from a user. Then, the confidential data is encrypted using a first public key generated...
US-1,004,4692 Information processing apparatus for controlling data transmission between devices in a network
There is provided an information processing apparatus, the information processing apparatus including: a control unit configured to cause a second information...
US-1,004,4691 Decrypting network traffic on a middlebox device using a trusted execution environment
Decrypting network traffic on a middlebox device using a trusted execution environment (TEE). In one embodiment, a method may include loading a kernel...
US-1,004,4690 Secure media capture, transfer, and storage
A secure media capture device may comprise a secure memory, a first sensor, a second sensor, a processor, and a communication module. The first sensor may be...
US-1,004,4689 System and method for authenticating users
A security application for a computing device, e.g., a mobile phone, allows generation of a secret according to a unique user input (e.g., user credentials)....
US-1,004,4688 Decentralized authoritative messaging
A secure chat client is described that allows users to exchange encrypted communications via secure chat rooms, as well as one-to-one communications. In...
US-1,004,4687 Internet of things datapoint engine
Techniques allow owners of Internet of Things (IoT) devices to provide specific access to data from their IoT devices to requesters of data. A request for data...
US-1,004,4686 Systems and methods for decryption as a service via a hardware security module
Systems and methods for decryption of payloads are disclosed herein. In various embodiments, systems and methods herein are configured for decrypting thousands...
US-1,004,4685 Securing enterprise data on mobile devices
Embodiments include method, systems and computer program products for securing enterprise data in a mobile computing environment. Aspects include receiving, by...
US-1,004,4684 Server for authenticating smart chip and method thereof
The present invention provides a server for authenticating a smart chip, which is connected to a terminal transmitting and receiving data to and from the smart...
US-1,004,4683 Content transmission and reception device compatible to switch to a new encryption scheme
The disclosure is directed to reduce a load of time and cost at the time of transition to a safer system in which an encryption scheme is newly set. By allowing...
US-1,004,4682 Technique for distributing a piece of content in a content distribution network
A method for distributing a piece of content in a content distribution network, provided by a source entity of which the integrity is ensured by means of a...
US-1,004,4681 Interfaces to manage direct network peerings
Methods and apparatus for interfaces to manage direct network peerings. A system may include a data center, endpoint routers and a connectivity coordinator. The...
US-1,004,4680 Method for hiding receiver's address for link layer in group communication
The present invention relates to a receiver information hiding method of hiding receiver information of a message in a system including a transmitting terminal...
US-1,004,4679 System and method for proxy-based privacy protection
User privacy while browsing the Internet can be preserved by reversing the man-in-the-middle attack using a distributed network of proxy servers. The proxy...
US-1,004,4678 Methods and apparatus to configure virtual private mobile networks with virtual private networks
Methods and apparatus to configure virtual private mobile networks with virtual private networks are disclosed. A disclosed example method includes logically...
US-1,004,4677 System and method to configure a firewall for access to a captive network
An approach is proposed that contemplates system and method to configure firewall rules of a VPN gateway of a protected network so that users of devices in the...
US-1,004,4676 Using headerspace analysis to identify unneeded distributed firewall rules
Some embodiments provide a method for identifying unnecessary firewall rules for a distributed firewall of a logical network. The method identifies a firewall...
US-1,004,4675 Integrating a honey network with a target network to counter IP and peer-checking evasion techniques
Techniques for integrating a honey network with a target network environment (e.g., an enterprise network) to counter IP and peer-checking evasion techniques...
US-1,004,4674 System and method for automatic wireless network authentication in an internet of things (IOT) system
A system, apparatus, and method are described for a secure IoT wireless network configuration. For example, one embodiment of an Internet of Things (IoT) hub...
US-1,004,4673 Protecting communication link between content delivery network and content origin server
A privatized link between an origin server and a content delivery network is provided. A privatized link can be direct connection that does not route over the...
US-1,004,4672 IPv6 address assignment method and apparatus
IPv6 address assignment method and apparatus are provided. The method includes: receiving first Prefix Delegations (PDs) sent by at least two network access...
US-1,004,4671 Control apparatus, communication system, communication method, and program
A control apparatus includes: a first control information setting unit configured to set first control information for forwarding packets between predetermined...
US-1,004,4670 Connecting transparent network devices to optimize unidirectional network traffic
Transparent network devices intercept unidirectional network traffic and use bidirectional network protocol messages to discover each other and configure an...
US-1,004,4669 Suggesting a message to user to post on a social network based on prior posts directed to same topic in a...
A method, system and computer program product for improving the quality of the posts in a social network. A topic of a post to a social network environment is...
US-1,004,4668 Expanding a social network
This disclosure relates to systems and methods for expanding a social network. A method includes retrieving contact lists from a plurality of devices,...
US-1,004,4667 Method and device for controlling peripheral devices via a social networking platform
A method and device for providing access and control of a peripheral device through a support service provider thereof over a social networking platform...
US-1,004,4666 System for communicating between devices
A computer implemented method of communicating between devices is disclosed. This method includes: selecting a plurality of options associated with a...
US-1,004,4665 Managing data on computer and telecommunications networks
Protecting personal information by generating entity-specific aliases for use in communication with third parties is disclosed.
US-1,004,4664 Prevention of sending messages by mistake
Machine logic implemented techniques for preventing sending messages by mistake (with such "mistakes" including sending a message to an unintended recipient)....
US-1,004,4663 System for electronic mail server configuration management
The present invention provides for a rules-based system for managing the configuration of electronic mail (email) and/or messaging servers within an enterprise....
US-1,004,4662 Email conversation linking
A system adapted to link email conversations is disclosed. An email client identifies email conversations from email header information and presents the...
US-1,004,4661 Social media message delivery based on user location
An approach for delaying social media messages is provided herein. A first computing device receives user preferences. The first computing device detects a...
US-1,004,4660 Computer implemented methods and apparatus for providing communication between network domains in a service cloud
Disclosed are systems, apparatus, and methods for integrating a service console application by providing communication between a first and second network...
US-1,004,4659 Dynamic e-mail chain participant manager
An approach for new recipient inclusion to e-mail chains. E-mail chain manager receives include participants associated with an e-mail chain, current...
US-1,004,4658 Group messaging method, and device
A group messaging method and a device, which relate to the field of communications is described. The group messaging method is applied to a group-send...
US-1,004,4657 Preventing messages from being sent using inappropriate communication accounts
A method, system and computer program product for preventing messages from being sent using inappropriate communication accounts. A message created by a user of...
US-1,004,4656 Statistical message classifier
A system and method are disclosed for improving a statistical message classifier. A message may be tested with a machine classifier, wherein the machine...
US-1,004,4655 Managing distribution of media content
This disclosure relates to systems and methods that include receiving media content from a content submitter, classifying the media content by initiating one of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.