Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0075148 PERSONALIZED CONTENT STREAMS USING ALIGNED ENCODED CONTENT SEGMENTS
Systems and methods are described to enable a personalized content stream whose content can be dynamically altered by a user, such that multiple underlying...
2019/0075147 Routing Data Over Wireless Communication Links
Certain examples accommodate data routing optimizations. An example method comprises receiving, by a first playback device, data to be directed to at least a...
2019/0075146 COMPUTER-IMPLEMENTED METHOD OF PERFORMING A REAL-TIME COLLABORATION SESSION, COLLABORATIVE PLATFORM FOR...
A telecommunication device, apparatus, and a computer-implemented method of performing a real-time collaboration session with a plurality of participants can...
2019/0075145 METHOD AND APPARATUS FOR SHARING CONTENT
A method and an apparatus for sharing content are provided. Information about at least one content is transmitted to an external device. Information about...
2019/0075144 ROUTING OF CONFERENCE PARTICIPANT BASED ON CALLER RECOGNITION
Aspects of the present disclosure involve systems, methods, computer program products, and the like, for routing one or more requests to join or initiate a...
2019/0075143 METHODS AND SYSTEMS FOR DRAG AND DROP CONTENT SHARING IN A MULTI-DEVICE ENVIRONMENT
Methods and systems for interacting with graphical user interface elements to invoke commands and initiate requests in a multi-device environment are described.
2019/0075142 CONFERENCE SYSTEM AND METHOD FOR INTERWORKING BETWEEN AUDIO CONFERENCE AND WEB CONFERENCE
A conference system and a method for interworking between an audio conference and a web conference in the system are provided. The method for interworking...
2019/0075141 PERSISTENT CHAT CHANNEL CONSOLIDATION
An channel consolidation system and method may include analyzing a channel of a persistent chat platform to determine a plurality of metrics associated with...
2019/0075140 ESTABLISHING COMMUNICATION LINKS USING ROUTING PROTOCOLS
Systems and methods for facilitating shared access-right evaluation using linked communication channels are provided. A first communication can be received...
2019/0075139 METHOD AND SERVER FOR SELECTING AN ENTRY SERVER OF AN IMS COMMUNICATION NETWORK
A method and a proxy server for selecting an input server of an IMS communication network in order to register a terminal in the IMS communication network....
2019/0075138 ANONYMIZATION OVERLAY NETWORK FOR DE-IDENTIFICATION OF EVENT PROXIMITY DATA
A system comprising: mobile computing devices; an anonymization network; a server computing device coupled to each mobile computing device, and wherein each...
2019/0075137 FILTERING AND REDACTING BLOCKCHAIN TRANSACTIONS
A blockchain may store transactions which should were not intended to be recorded due to inappropriate content or unwanted subject matter submitted by...
2019/0075136 DEVICE AUTHENTICATION BASED UPON TUNNEL CLIENT NETWORK REQUESTS
Disclosed are various approaches for providing authentication of a user and a client device. A user's credentials can be authenticated by an identity provider....
2019/0075135 CONVERGED LOGICAL AND PHYSICAL SECURITY
A security management system that includes a hierarchical security platform, converged IT and physical security management, unified credentialing, credential...
2019/0075134 RESTRICTIONS ON USE OF A KEY
Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain...
2019/0075133 METHODS AND SYSTEMS FOR ESTABLISHMENT OF VPN SECURITY POLICY BY SDN APPLICAITON
The present application is directed a computer-implemented methods and systems implementing Virtual Private Network (VPN) policies created or modified by...
2019/0075132 DOMAIN NAME HIJACK PROTECTION
A domain name registering entity (such as a domain registry, registrar, or reseller) or an independent proxy registration service may offer a domain name...
2019/0075131 DYNAMIC DETECTION OF GEO-LOCATION OBFUSCATION IN OF INTERNET DEVICES
Methods and systems are disclosed for dynamic detection of geo-location spoofing by a networked device, such as fraudulent client connections to a server, in...
2019/0075130 SECURE APPLICATION FOR ACCESSING WEB RESOURCES
Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or...
2019/0075129 COMPUTER SECURITY VULNERABILITY ASSESSMENT
Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification...
2019/0075128 APPARATUS AND METHODS FOR DATA COLLECTION, ANALYSIS AND SERVICE MODIFICATION BASED ON ONLINE ACTIVITY
Methods and apparatus for evaluating collected data relating to online activity, and modification of services within a service provider network. In one...
2019/0075127 COMMAND INTERCEPTION
A system and method for intercepting commands issued to a host server. An agent is installed on the host server and configured to intercept commands issued to...
2019/0075126 Data Retrieval in Security Anomaly Detection Platform with Shared Model State between Real-Time and Batch Paths
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The...
2019/0075125 METHOD AND SYSTEM FOR DETECTING AND REMEDIATING POLYMORPHIC ATTACKS ACROSS AN ENTERPRISE
Disclosed are methods and systems for detecting malware and potential malware based on using generalized attack trees (generalized attack tree graphs). The...
2019/0075124 SYSTEM AND METHOD FOR CONDUCTING A DETAILED COMPUTERIZED SURVEILLANCE IN A COMPUTERIZED ENVIRONMENT
A system and method for conducting a computerized surveillance in a computerized environment, including: initiating an installation of an agent on an endpoint...
2019/0075123 SYSTEMS AND METHODS FOR CYBER INTRUSION DETECTION AND PREVENTION
Systems and methods for detecting cyber attacks on a computer network are provided. The system trains attack and detection models. The attack model is used to...
2019/0075122 CLIENT REPUTATION DRIVEN ROLE-BASED ACCESS CONTROL
The present disclosure discloses a system and method for dynamically modifying role based access control for a client based on the activity. Generally, a...
2019/0075121 SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR INGRESS EMAIL SECURITY
An ingress server is operable to perform, through a multi-list evaluator, two different validations: one utilizes a sender network address of a sender's server...
2019/0075120 GEOLOCATION-BASED AUTHENTICATION CREDENTIALS
Provided is process including receiving a request to authenticate a user; sending instructions to present an authentication user interface including a...
2019/0075119 METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR PROVIDING SECURITY AND RESPONSIVENESS IN CLOUD BASED DATA...
A storage controller that is coupled to a plurality of storage clouds is maintained. The storage controller determines security requirements for performing a...
2019/0075118 PAGE LOCK FOR NOTEBOOK APPLICATION
Notebook applications may be employed to create, edit, and/or share collaborative documents. In a classroom setting, a notebook application may enable...
2019/0075117 METHOD FOR SERVING LOCATION INFORMATION ACCESS REQUESTS
The present invention relates to processing location information access requests. An identifier of a sender of a received location information access request...
2019/0075115 SYSTEMS AND METHODS FOR ACCESSING CLOUD RESOURCES FROM A LOCAL DEVELOPMENT ENVIRONMENT
A method for accessing cloud resources via a local application development environment on a computing device. The method includes invoking an access management...
2019/0075114 System and Method for Implementing Community Wireless Communications Service
Novel tools and techniques provide for implementing community wireless communications service. In some embodiments, a network gateway device might receive,...
2019/0075113 INSTALLMENT CONFIGURATIONS WITHIN A VEHICLE AND INTEROPERABILITY OF DEVICES CONFIGURED TO IMPLEMENT SECURE...
In some embodiments, the present invention provides for a hardware component that includes at least the following: a logic cell; where the logic cell is...
2019/0075112 NETWORKED ACCESS CONTROL SYSTEM
Methods and systems for controlling a network access control system that includes a server encrypting a first identifier that can be related to a registered...
2019/0075111 DEFAULT TO SIGNED-IN STATE
Non-limiting examples of the present disclosure describe generation of a default signed-in state for subsequent authenticated access to a service. Identity...
2019/0075110 AUTHENTICATING AN AIRCRAFT DATA EXCHANGE USING DETECTED DIFFERENCES OF ONBOARD ELECTRONICS
Systems and methods are provided for authenticating aircraft communications using detected difference of on board electronics. One embodiment is a method that...
2019/0075109 COMPUTERIZED APPARATUS AND METHODS FOR LOCATION-BASED SERVICE PROVISION
Computerized apparatus useful within vehicles for causing provision of location-based services to users via a portable wireless computerized device. In one...
2019/0075108 DIGITAL IDENTITY NETWORK INTERFACE SYSTEM
There is a provided a digital identity network interface system that may include a communications module and a processor. The processor may be configured to:...
2019/0075107 METHOD AND SYSTEM FOR DYNAMIC DATA FLOW ENFORCEMENT
A method, a device, and a non-transitory storage medium are described in which destination device identifiers associated with network devices are subject to a...
2019/0075106 SECURE USER CREDENTIAL ACCESS SYSTEM
A proxy server mitigates security risks of user credentials sent across a network in clear text. The proxy server encrypts user credentials within a client...
2019/0075105 AUTOMATED SCALABLE IDENTITY-PROOFING AND AUTHENTICATION PROCESS
An automated process is disclosed for improving the functionality of computer systems and electronic commerce in user identity-proofing. Steps include...
2019/0075104 Methods and Apparatus for Account Linking
Apparatus and methods are provided for enabling a plurality of applications running on a user device or in communication therewith to share data. In one...
2019/0075103 AUTHORIZATION AUTHENTICATION METHOD, DEVICE AND SYSTEM
The present disclosure provides an authorization authentication method, apparatus and system. The method includes: after a biological limb enters a preset...
2019/0075102 TERMINAL APPARATUS, SERVER APPARATUS, BLOCKCHAIN AND METHOD FOR FIDO UNIVERSAL AUTHENTICATION USING THE SAME
Disclosed herein are a terminal apparatus, a server apparatus, and a method for FIDO universal authentication using a blockchain. The method includes sending,...
2019/0075101 Multi-functional Identification Recognition System Capable of Recognizing the Identity of Users
A multi-functional identification recognition system includes a server storing a database, the database containing a plurality of user identities. For each...
2019/0075100 COMPUTING DEVICE WITH INTEGRATED AUTHENTICATION TOKEN
Disclosed are various embodiments for a computing device with an integrated authentication token. The computing device includes first circuitry having a...
2019/0075099 SECURING A DATA CONNECTION FOR COMMUNICATING BETWEEN TWO END-POINTS
Methods and systems for securing a data connection for communicating between two end-points are described herein. One of the end-points may be a server and the...
2019/0075098 COMPUTER READABLE STORAGE MEDIA FOR LEGACY INTEGRATION AND METHODS AND SYSTEMS FOR UTILIZING SAME
Systems and methods for integrative legacy context management are disclosed herein. An example computer hardware system may include at least one processing...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.