Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0366538 VALIDATION FOR REQUESTS
A customer can demonstrate control over an element, such as a domain, by receiving a certificate from a certificate authority. The customer can utilize a...
2017/0366537 SECURE EFFICIENT REGISTRATION OF INDUSTRIAL INTELLIGENT ELECTRONIC DEVICES
A method for registering an intelligent electronic device with a certification authority. The method includes enrolling a configuration tool at the...
2017/0366536 Credential Translation
Systems and methods for credential translation are described. In some embodiments, an Information Handling System (IHS) may include: a host processor; an...
2017/0366535 METHOD AND APPARATUS FOR CONNECTING TO ONLINE SERVICE
Disclosed is a method of connecting to an online service, in which first authentication information is received from a terminal, at least one service available...
2017/0366534 APPLICATION DELIVERY METHOD, COMPUTER-READABLE RECORDING MEDIUM, AND SERVER
An application delivery method includes detecting, by a server, a first terminal present in a specific area and transmitting, by the server, to the detected...
2017/0366533 ENHANCED MANAGEMENT OF PASSWORDS FOR PRINTING APPLICATIONS AND SERVICES
Techniques described herein provide enhanced management of passwords for applications and services. Generally described, the techniques disclosed herein...
2017/0366532 SECURING COMPUTING RESOURCES
Various examples are directed to systems and methods for providing access to computing resources. A resource system may receive an access request from a first...
2017/0366531 Authenticating Users to Media-Player Devices on Online Social Networks
In one embodiment, a method includes an online social networking system generating an authentication key in response to a request from a media-player device....
2017/0366530 Mobile Account Authentication Service
A payment authentication service authenticates the identity of a payer during online transactions. The authentication service allows a card issuer to verify a...
2017/0366529 METHOD AND APPARATUS OF IMPLEMENTING A VPN TUNNEL
The present invention is directed to allowing a more secure initial, and continuous authentication of virtual private network (VPN) tunneling. The device of...
2017/0366528 SECONDARY SECURE COMMUNICATION CHANNLES
Embodiments are provided for establishing secondary secure channels in any network, including networks that enforce a single channel per neighbor policy. In...
2017/0366527 Method and System for an Efficient Shared-Derived Secret Provisioning Mechanism
Embodiments of systems and methods disclosed herein include an embedded secret provisioning system that is based on a shared-derivative mechanism. Embodiments...
2017/0366526 SYSTEM FOR KEY EXCHANGE IN A CONTENT CENTRIC NETWORK
One embodiment provides a system that facilitates secure communication between computing entities. During operation, the system generates, by a ...
2017/0366525 APPARATUS AND METHOD FOR CONTROLLING PROFILE DATA DELIVERY
In a profile data delivery control apparatus, a storage unit stores therein a public key and a private key. A control unit obtains profile data including the...
2017/0366524 SYNCHRONIZING SECURE SESSION KEYS
A first client encryption initiation is intercepted from a client. The first client encryption initiation is intended for a server. Based on the first client...
2017/0366523 MANAGEMENT OF ENCRYPTION WITHIN PROCESSING ELEMENTS
A streaming environment includes at least a first processing element of a first compute node and a second processing element of a second compute node. A tuple...
2017/0366522 MANAGEMENT OF ENCRYPTION WITHIN PROCESSING ELEMENTS
A streaming environment includes at least a first processing element of a first compute node and a second processing element of a second compute node. A tuple...
2017/0366521 REMOTE FIREWALL UPDATE FOR ON-BOARD WEB SERVER TELEMATICS SYSTEM
A mobile device includes a processor, a transceiver, and a storage maintaining vehicle associations including phone numbers of telematics control units of...
2017/0366520 SECURED DATA TRANSMISSION USING IDENTITY-BASED CRYPTOGRAPHY
A system is provided for secure data transmission. The system stores a public master key, private decryption key and secure messaging module for securely...
2017/0366519 COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR PROTECTING SENSITIVE DATA VIA DATA RE-ENCRYPTION
A computer-implemented method for protecting sensitive data via data re-encryption is provided. Encrypted data is maintained. A data query is received from a...
2017/0366518 SYSTEM AND METHOD FOR ACCELERATING CRYPTOGRAPHY OPERATIONS ON A PORTABLE COMPUTING DEVICE
Systems, methods, and computer programs are disclosed for accelerating cryptography operations on a portable computing device. One such method comprises...
2017/0366517 Providing Load Balanced Secure Media Content and Data Delivery in a Distributed Computing Environment
A system and method for providing load balanced secure media content and data delivery in a distributed computing environment is disclosed. Media content is...
2017/0366516 MANAGING VERIFIABLE, CRYPTOGRAPHICALLY STRONG TRANSACTIONS
A central service provider manages verifiable and cryptographically strong transactions in a block chain network. For each transaction, the central service...
2017/0366515 PERMUTATION-BASED CONTENT ENCRYPTION WITH MANIFESTS IN A CONTENT CENTRIC NETWORK
One embodiment provides a system that facilitates encryption of manifest content based on permutation. During operation, the system partitions, by a computer...
2017/0366514 CODE OBFUSCATION AND ASSOCIATED OBJECTS
Obfuscation transforms original code into an obfuscated code that is less intelligible, but behaves like the original. In one embodiment, a data sequence...
2017/0366513 Data Anonymization for Distributed Hierarchical Networks
Various implementations disclosed herein provide a method for anonymizing data in a distributed hierarchical network. In various implementations, the method...
2017/0366512 System and Method for Machine-to-Machine Privacy and Security Brokered Transactions
A machine-to-machine secure messaging system permits a first machine to send a message to a second machine, despite not knowing the addressing information...
2017/0366511 METHOD AND SYSTEM FOR THE SUPPLY OF DATA, TRANSACTIONS AND ELECTRONIC VOTING
A method and system for supply of data, including generating a first digital certificate referred (empowerment certificate) signed with a first signing...
2017/0366510 COGNITIVE CONFIDENTIALITY GUARDIAN
Protecting secure information in computer communications may include detecting by a computer process running on a server an initiation of an action if executed...
2017/0366509 NETWORK CHANNELS PRIMITIVES
Networks primitives are provided for establishing and maintaining channels and secure channels. In one embodiment, requests to open a new channel are handled...
2017/0366508 TECHNIQUES TO USE OPERATING SYSTEM REDIRECTION FOR NETWORK STREAM TRANSFORMATION OPERATIONS
Techniques to use operating system redirection for network stream transformation operations are described. In one embodiment, an apparatus may comprise a...
2017/0366507 DATA LEAK PROTECTION IN UPPER LAYER PROTOCOLS
Methods and systems for Data Leak Prevention (DLP) in a private network are provided. According to one embodiment, a packet is received by a network security...
2017/0366506 SYMMETRIC BI-DIRECTIONAL POLICY BASED REDIRECT OF TRAFFIC FLOWS
Disclosed are systems, methods, and computer-readable storage media for guaranteeing symmetric bi-directional policy based redirect of traffic flows. A first...
2017/0366505 FILTERING OUTBOUND NETWORK TRAFFIC
Obtaining, in association with origination of outbound network traffic to be sent by a system, user account information of a user account on behalf of which...
2017/0366504 CONTEXT-AWARE DISTRIBUTED FIREWALL
A context-aware distributed firewall scheme is provided. A firewall engine tasked to provide firewall protection for a set of network addresses applies a...
2017/0366503 IDENTIFYING THE SOURCE AND DESTINATION SITES FOR A VOIP CALL WITH DYNAMIC-IP ADDRESS END POINTS
In a voice-over-IP communications network, call data records include dynamically assigned IP signaling addresses such as IPv6 signaling addresses used in...
2017/0366502 IP Route Caching with Two Search Stages on Prefix Length
A data packet is received in a network element. The network element has a cache memory in which cache entries represent a portion of addresses stored in a main...
2017/0366501 DOMAIN NAME SERVICE INFORMATION PROPAGATION
A computing resource service receives a request from a customer to assign a domain name to a computing resource. The computing resource service may submit a...
2017/0366500 INFERRING ADDITIONAL EMAIL ADDRESSES TO MATCH EMAIL ADDRESSES IN A DIGEST LIST
An online system receives third party hashes for a plurality of targeted users and generates local hashes for one or more local users of the online system. The...
2017/0366499 RELATING TO MESSAGING GATEWAYS
The present disclosure provides a method of routing a short message to a user. According to the method, an SMSC sends a routing request to a HLR or HSS of the...
2017/0366498 METHODS AND SYSTEM FOR DISTRIBUTING INFORMATION VIA MULTIPLE FORMS OF DELIVERY SERVICES
A content distribution facilitation system is described comprising configured servers and a network interface configured to interface with a plurality of...
2017/0366497 Selection of Service Providers for Message Transmission on Online Social Networks
In one embodiment, a method includes identifying a mobile service provider network (SPN) and a geographic location of an online social network user and...
2017/0366496 SYSTEM AND METHOD FOR AUTOMATED EVALUATION SYSTEM ROUTING
Systems and methods for automated evaluation system routing are described herein. The system can include a memory, which can include a model database and a...
2017/0366495 MESSAGE UPDATING METHOD, APPARATUS, AND TERMINAL
A message update method includes: displaying a group message reminding identifier on a session entry of a specified group on a session list interface when it...
2017/0366494 Message Delivery System and Method
In one embodiment, a method of delivering messages to a user of a user terminal executing a communication client and connected to a packet-based communication...
2017/0366493 SMART CHUNKING LOGIC FOR CHAT PERSISTENCE
Aspects of the present disclosure relate to systems and methods for providing distinct conversations within a file activity feed for display on a user...
2017/0366492 System and Method for Messaging Between Operating System Containers
A method for messaging between operating system containers includes receiving, by a first proxy in a first user space container, a first message from a first...
2017/0366490 SYSTEMS AND METHODS FOR ALTERATION OF CONTENT
In one aspect, a device includes a processor and storage accessible to the processor. The storage bears instructions executable by the processor to identify...
2017/0366489 System and Method for Alerting a List of Multiple Recipients of a User's Request for Assistance
A request for assistance from a user employing a first user device is received. The request is converted into a plurality of formatted requests. Each formatted...
2017/0366488 EXPERIENCE SHARING SYSTEM AND METHOD
A method, computer program product, and computing system for the sharing of experiences is provided. The method may include receiving content associated with a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.