Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0063106 USER AUTHENTICATION USING AUDIOVISUAL SYNCHRONY DETECTION
Methods, computing systems and computer program products implement embodiments of the present invention that include receiving, at a first time, first video...
2018/0063105 MANAGEMENT OF ENCIPHERED DATA SHARING
An exemplary system comprises a computing device processor configured for: determining, at a sending computing device, a public key, the public key associated...
2018/0063104 DIFFERENTIAL CLIENT-SIDE ENCRYPTION OF INFORMATION ORIGINATING FROM A CLIENT
A method may include allocating a number of public keys, where each respective public key is allocated to a respective entity of a number of entities; storing...
2018/0063103 SECURE KEY MANAGEMENT PROTOCOL FOR DISTRIBUTED NETWORK ENCRYPTION
For an encryption management module of a host that executes one or more data compute nodes (DCNs), some embodiments of the invention provide a method of...
2018/0063102 ENCRYPTION KEY SHREDDING TO PROTECT NON-PERSISTENT DATA
Systems and methods for encryption key shredding to protect non-persistent data are described. In one embodiment, the storage system device may include a...
2018/0063101 KEYS FOR ENCRYPTED DISK PARTITIONS
Examples described herein include receiving a key request from a requestor, determining a validity of the key request, and sending the key to the requestor...
2018/0063100 Thread Ownership of Keys for Hardware-Accelerated Cryptography
An embedded processor with a cryptographic co-processor operating in a multithreading environment, with inter-thread security for cryptography operations. A...
2018/0063099 PUBLICLY READABLE BLOCKCHAIN REGISTRY OF PERSONALLY IDENTIFIABLE INFORMATION BREACHES
A registry is utilized to identify personally identifiable information (PII) that has been breached. The registry is a distributed database shared by multiple...
2018/0063098 Vehicle Network Interface Tool
A vehicle network interface tool electrically connects a computing device to an electronic control unit of a motor vehicle. The vehicle network interface tool...
2018/0063097 MANAGE ENCRYPTED NETWORK TRAFFIC USING DNS RESPONSES
This present disclosure generally relates to managing encrypted network traffic using Domain Name System (DNS) responses. One example method includes...
2018/0063096 ENCRYPTED COMMUNICATIONS
A system including a sending computer system, a re-encryption server, and a receiving computer system is described. The sending computer system can encrypt a...
2018/0063095 DATA ENCIPHERMENT PRIOR TO RECIPIENT SELECTION
The present disclosure relates, according to some embodiments, to a system for enciphering data. The system comprises a computing device processor configured...
2018/0063094 END-TO-END ENCRYPTION FOR PERSONAL COMMUNICATION NODES
Systems, methods, software and apparatus enable end-to-end encryption of group communications by implementing a pairwise encryption process between a pair of...
2018/0063093 Method and system for secure document exchange
An application is instrumented with a document protection service provider interface (SPI). The interface is used to call an external function, e.g., an...
2018/0063092 SYSTEM AND METHOD FOR DELEGATION OF CLOUD COMPUTING PROCESSES
The disclosed systems and methods allow cloud services to delegate processing of sensitive data to trusted user devices. In an exemplary method, a cloud...
2018/0063091 MESSAGE PROTECTION
There is disclosed in an example a computing apparatus, comprising: a network interface; a messaging application to communicate via the network interface; and...
2018/0063090 USING DISPERSAL TECHNIQUES TO SECURELY STORE CRYPTOGRAPHIC RESOURCES AND RESPOND TO ATTACKS
A dispersed storage network (DSN) includes a DSN memory, which in turn employs multiple distributed storage (DS) units to store encrypted secret material that...
2018/0063089 CROSS-TENANT DATA LEAKAGE ISOLATION
A method and proxy device for cross-tenant data leakage isolation in a multi-tenant database are provided. The method includes monitoring, by a proxy device,...
2018/0063088 HYPERVISOR NETWORK PROFILES TO FACILITATE VPN TUNNEL
A system can include a host device that execute a virtual machine execution environment. A hypervisor network profile can be associated with the hypervisor of...
2018/0063087 MANAGED FORWARDING ELEMENT EXECUTING IN SEPARATE NAMESPACE OF PUBLIC CLOUD DATA COMPUTE NODE THAN WORKLOAD...
Some embodiments provide a method for a network controller that manages a logical network implemented in a datacenter having forwarding elements to which the...
2018/0063086 MANAGED FORWARDING ELEMENT EXECUTING IN PUBLIC CLOUD DATA COMPUTE NODE WITHOUT OVERLAY NETWORK
Some embodiments provide a method for a network controller that manages a logical network implemented in a datacenter having forwarding elements to which the...
2018/0063085 AUTOMATIC FIREWALL CONFIGURATION BASED ON AGGREGATED CLOUD MANAGED INFORMATION
Disclosed are systems, methods, and computer-readable storage media for automatic firewall configuration based on aggregated cloud managed information. A cloud...
2018/0063084 FILTERING OF PACKETS FOR PACKET TYPES AT NETWORK DEVICES
Examples include a network device to filter a packet for a packet type. The network device includes a filter to receive the packet and to determine whether the...
2018/0063083 GUEST NETFILTER PROTECTION BY VIRTUAL MACHINE FUNCTION
A system and method for guest netfilter protection using a virtual machine function includes a memory, one or more processors, in communication with the...
2018/0063082 SYSTEMS AND METHODS FOR GEOPROCESSING-BASED COMPUTING NETWORK SECURITY
The present disclosure describes systems and methods for geoprocessing-based packet processing and network security. Filter parameters, such as Internet...
2018/0063081 SECURING STORAGE UNITS IN A DISPERSED STORAGE NETWORK
A method for execution by a security module operating in a device of a dispersed storage network (DSN). The method begins by identifying storage unit(s) having...
2018/0063080 SECURITY AND PRIVACY CONTROLS FOR REMOTE-ACCESS SUPPORT SERVICES
Security and privacy controls for remote-access support services are provided. A system management policy that is associated with a customer system is...
2018/0063079 Secure Tunnels for the Internet of Things
A system for the maintenance and creation of security tunnels between IoT devices and IoT cloud servers, comprising the steps of receiving one or more packets...
2018/0063078 SYSTEMS, DEVICES, AND METHODS FOR LOCALITY-BASED DOMAIN NAME REGISTRY OPERATION VERIFICATION
Embodiments relate to systems, devices, and computing-implemented methods for performing and requesting registry operations using reseller profiles. A domain...
2018/0063077 SOURCE NETWORK ADDRESS TRANSLATION DETECTION AND DYNAMIC TUNNEL CREATION
An approach is disclosed for detecting source network address translation in internet protocol (IP) tunneling flows and using learned source IP addresses and...
2018/0063076 NETWORK IDENTIFICATION AS A SERVICE
Certain examples described herein make use of an intermediate network device (110) in a service provider network (104) to enable the modification of network...
2018/0063075 TOPOLOGY-AWARE ADDRESSING FOR RECONFIGURABLE NETWORKS
In one embodiment, an addressing agent determines a logical static IP addressing scheme for a computer network, the addressing scheme shared with an...
2018/0063074 LOW DOWNTIME SOFTWARE-DEFINED WIDE AREA NETWORK SERVICE UPGRADE
Techniques for upgrading virtual appliances in a hybrid cloud computing system are provided. In one embodiment, virtual appliances are upgraded by deploying...
2018/0063073 ENDPOINT DEVICE IDENTIFICATION BASED ON DETERMINED NETWORK BEHAVIOR
In one embodiment, a method comprises detecting, by a network device, an endpoint device attempting to access a data network via a data link; and generating,...
2018/0063072 DETERMINE ANOMALOUS BEHAVIOR BASED ON DYNAMIC DEVICE CONFIGURATION ADDRESS RANGE
Example embodiments disclosed herein relate to determining whether a device exhibits anomalous behavior based on a set of rules, address usage information, and...
2018/0063071 CROSS-MESSAGING IDENTITY MAPPING
A user identifier to a user is received over a messaging platform. The user identifier is mapped to a user identity that includes an identity mapping to a...
2018/0063070 MESSAGING INTEGRATION
An dialogue for a chat session spans multiple messaging platforms. Bats participate in each messaging platform for maintaining an aggregated and integrated...
2018/0063069 PLUG-IN FOR EXTENDING FUNCTIONALITY OF MESSENGER APPLICATION ACROSS SUPPLEMENTED AND UNSUPPLEMENTED APPLICATION...
A first instance of a messenger application having a plug-in communicates with a second instance of the messenger application lacking the plug-in. The plug-in...
2018/0063068 INTELLIGENTLY SPLITTING TEXT IN MESSAGES POSTED ON SOCIAL MEDIA WEBSITE TO BE MORE READABLE AND UNDERSTANDABLE...
A method, system and computer program product for improving readability and understandability in messages posted on a social media website. The messages posted...
2018/0063067 QUINQUELATERAL RELATIONSHIP-BASED KINSHIP NETWORK SYSTEM
The present invention discloses a quinquelateral relationship-based kinship network system, comprising an Internet platform, a registration and login module,...
2018/0063066 EFFICIENT CREATION OF DRAFTS ASSOCIATED WITH SPONSORED CONTENT
An online system enables content providers to efficiently create and publish sponsored content in multiple phases. Each phase of the content creation is...
2018/0063065 SOCIAL MEDIA ENGAGEMENT ENGINE
Described herein is a social media engagement engine. In accordance with another aspect of the framework, a social media message from a person (e.g., customer,...
2018/0063064 MODIFYING A MOOD THROUGH SELECTIVE FEEDING OF CONTENT
Embodiments include method, systems and computer program products for modifying a mood through selective feeding of content. Aspects include obtaining a...
2018/0063063 TASK ASSISTANT
A task assistant identifies a correspondence received by a source associated with a user and determines that the correspondence includes a request. The task...
2018/0063062 PROMPT RANKING
In one embodiment, a method includes accessing a number of candidate notifications stored on the social-networking system. Each of the candidate notifications...
2018/0063061 GROUP MANAGEMENT METHOD, TERMINAL, AND STORAGE MEDIUM
Disclosed is a chat group management method, including: detecting a message receiving mode corresponding to a chat group; obtaining a degree of interest of a...
2018/0063060 COMMUNICATION AND NOTIFICATION SYSTEM AND METHOD THEREOF
The invention generally relates to a communication and notification system and method thereof, and more particularly to a method and system for providing,...
2018/0063059 2'-FLUORO-6'-METHYLENE CARBOCYCLIC NUCLEOSIDES AND METHODS OF TREATING VIRAL INFECTIONS
The present invention relates to 2'-Fluoro-6'-methylene carbocyclic nucleosides, pharmaceutical compositions containing these nucleosides and their use in the...
2018/0063058 SOCIAL NETWORK USERS' INTERACTIONS BY SPLITTING POSTS IN A THREAD INTO A NEW THREAD
A method, system and computer program product for improving social network users' interactions. The content of posts in a thread is analyzed so as to group the...
2018/0063057 Conversation enrichment through component re-order
Technologies are described for chronological re-ordering of transmitted conversation components. A message transmitting a message chain in the conversation...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.