Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,005,0962 Determining user authentication requirements along a continuum based on a current state of the user and/or the...
Systems, apparatus, methods, and computer program products are provided for determining a user's authentication requirements/credentials for function requiring...
US-1,005,0961 Network device authentication based on hashing content of sequential messages
A method, performed by an authentication processor of a first network device, includes receiving a first message through a network interface circuit from a...
US-1,005,0960 Methods and systems of adding a user account to a device
A method of adding a user account to an unassociated device may include detecting, by an associated device that is associated with a user account, an audio...
US-1,005,0959 Synthetic genomic variant-based secure transaction devices, systems and methods
Various devices, systems, structures and methods are disclosed related to securely authorizing a transaction by synchronizing digital genomic data with...
US-1,005,0958 Validating biometrics without special purpose readers
To validate a user's identity a network validation server receives a smartphone image of a preexisting user credential, including both a user biometric and a...
US-1,005,0957 Smart card redirection
A processing device of a server executing an application establishes a network connection to a client device having a smart card, detects a program call...
US-1,005,0956 System architecture and method for guaranteeing network information security
Disclosed is a system architecture and method for guaranteeing network information security, the system architecture including the Internet, a program...
US-1,005,0955 Efficient start-up for secured connections and related services
One embodiment of the present invention includes an approach for efficient start-up for secured connections and related services. A client machine receives, via...
US-1,005,0954 Secure automated device configuration and management
A method may include performing secure device configuration, via a configuration service manager device, for a SIP user device. The method includes monitoring,...
US-1,005,0953 Extending a federated graph with third-party data and metadata
Technologies are described herein for extending a federated graph with third-party data or metadata. A federated facet provider service registers with a...
US-1,005,0952 Smart phone login using QR code
Systems and methods are disclosed for a user to use a mobile device such as a smart phone to scan a QR (Quick Response) code displayed on a login webpage of a...
US-1,005,0951 Secure access to virtual machines in heterogeneous cloud environments
Systems, methods, and computer-readable media provide for secure access to virtual machines in heterogeneous cloud environments. In an example embodiment,...
US-1,005,0950 Session manager for secured remote computing
A method for managing a session between a local computing device and a remote computing device, in which a session is established between a local computing...
US-1,005,0949 Accessing a secure network using a streaming device
Web pages, such as a captive portal web page, may be rendered on an electronic display such as a display of a television that is removably coupled to a content...
US-1,005,0948 Presence-based credential updating
Methods, systems, and devices for updating access permissions of users in an access control system are described. The access permissions are capable of being...
US-1,005,0947 Key distribution in a distributed network environment
A system including a controller and a pool of computing resources to run virtual machines are configured to automatically provision each virtual machine with...
US-1,005,0946 Secured data transmission using identity-based cryptography
A system is provided for secure data transmission. The system stores a public master key, private decryption key and secure messaging module for securely...
US-1,005,0945 Apparatus and methods for content transfer protection
Methods and apparatus for ensuring protection of transferred content. In one embodiment, content is transferred while enabling a network operator (e.g., MSO) to...
US-1,005,0944 Process to access a data storage device of a cloud computer system with the help of a modified Domain Name...
A process for accessing a data storage device of a CCS through a GCS includes setting up a protected connection over the Internet between a first piece of...
US-1,005,0943 Widely distributed parameterization
This technology mitigates the vulnerabilities of parameter storage by calculating parameters dynamically rather than storing and using static parameters. This...
US-1,005,0942 System and method of mobile authentication
A method for two factor authentication is described. The method comprises a server receiving an activation code for verification from a mobile device. The...
US-1,005,0941 DNS-based captive portal with integrated transparent proxy to protect against user device caching incorrect IP...
A captive portal system includes a login database, a web server, and a name server. The name server receives a DNS request from a user device, queries the login...
US-1,005,0940 Connection control system, management server, connection support method, and non-transitory computer-readable...
A connection control system includes a management server outside firewall, supporting connection of communications between a control target device inside...
US-1,005,0939 Techniques for communication in hybrid cloud system
Techniques for communication in a hybrid cloud computing system. The techniques include utilizing cross-origin resource sharing to allow a web-based application...
US-1,005,0938 Highly secure firewall system
A firewall system with closed ports configured to reject the data packets and create a readable log of rejected data packets. A port listening processor...
US-1,005,0937 Reducing impact of network attacks in access networks
In general, techniques are described for reducing impact of network attacks in access networks. A network device including an interface in a forwarding plane of...
US-1,005,0936 Security device implementing network flow prediction
A security device for processing network flows is described, including: one or more packet processors configured to receive incoming data packets associated...
US-1,005,0935 Using individualized APIs to block automated attacks on native apps and/or purposely exposed APIs with forced...
An API call filtering system filters responses to API call requests received, via a network, from UEs. The API call filtering system is configured to require...
US-1,005,0934 Redirector for secure web browsing
Methods, systems, and computer-readable media for redirecting a web browser application for secure web browsing are described herein. In various embodiments, a...
US-1,005,0933 Structural data ferry system
A system allowing computers to be un-connected to the internet or networks generally while still allowing computers to share data on networks. By creating a...
US-1,005,0932 Method, user node and remote access server for releasing address
A method for releasing an address, a user node and a remote access server are disclosed. The method includes: when releasing an Internet protocol version 6...
US-1,005,0931 Method and system for handling a dynamic host configuration protocol internet protocol version 4 address release
Methods and apparatus are provided for releasing an Internet Protocol (IP) address by a Packet Data Network (PDN) GateWay (PGW) in a mobile communication...
US-1,005,0930 Multi-radio single internet protocol address wireless local area network apparatus and method
An apparatus includes a first media access control (MAC) device with a first radio transceiver and having a first MAC address, and a second MAC device with a...
US-1,005,0929 Connection setting information managing system
In a connection setting information managing system which is configured to set connection setting information using a setting tool, wherein the connection...
US-1,005,0928 Methods and systems for determining an optimal subnet
Methods and systems for recommending an optimal subnet for assignment are disclosed. In some embodiments, the methods include the following: receiving a request...
US-1,005,0927 Systems and methods for centralized domain name system administration
A Domain Name Service (DNS) administration computer system for centralized DNS administration includes at least one processor. The processor is configured to...
US-1,005,0926 Ideograms based on sentiment analysis
Particular embodiments of a method comprise analyzing a message to perform sentiment analysis with respect to at least a portion of the message. One or more...
US-1,005,0925 Method and system for notifying users of misdirected response messages associated with messages sent on the...
Messages sent on behalf of a user through an intermediary service message are assigned a unique sender address including unique message identification data...
US-1,005,0924 Messaging
A mechanism enabling a user whose user device has received a notification on messages waiting delivery, messages being deferred or waiting for another reason,...
US-1,005,0923 Mail bot and mailing list detection
An embodiment of the invention may include a method, computer program product, and system for detecting email messages sent from an automated mailing system....
US-1,005,0922 Server and method for processing email messages
A mail processing server includes a storage unit and a computation unit. The storage unit stores operation log data recording operations that a plurality of...
US-1,005,0921 Analyzing email threads
An emotion function chain may be generated from an email thread and displayed to a user in one or more windows on a computer display of a computer system. An...
US-1,005,0920 Modifying environmental chat distance based on chat density in an area of a virtual world
A mechanism for determining a chat distance associated with an environmental chat based on the chat amount within an area of a virtual universe associated with...
US-1,005,0919 Highly parallel scalable distributed email threading algorithm
Systems, apparatuses, methods, and computer readable mediums for implementing a scalable distributed email threading algorithm. A database is created for...
US-1,005,0918 Dynamic thread management for online conversations
A method for creating at least one new thread associated with an online conversation is provided. The method may include monitoring the online conversation to...
US-1,005,0917 Multi-dimensional reputation scoring
Methods and systems for assigning reputation to communications entities include collecting communications data from distributed agents, aggregating the...
US-1,005,0916 Contextual interstitials
An interstitial message server system selects a like interstitial message that corresponds to a like user event generated by a user, a skip interstitial message...
US-1,005,0915 Adding images to a text based electronic message
A plurality of word groups that satisfy at least one criterion, each word group comprising at least one word, can be identified in an electronic message. For...
US-1,005,0914 Method and device for parsing MMS information
Disclosed are a method and device for parsing MMS information. The method includes: determining the storage location information corresponding to a first...
US-1,005,0913 Method for sending and receiving electronic mail of international multilingual mail box
Disclosed are a method for sending and receiving emails using international multilingual mailbox. The method includes: 1) setting a field 1 in a header of an...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.