Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,954,852 Service-to-service digital path tracing
A service receives from a sender service a digital message and a corresponding trace, which includes an ordered set of digital signatures of one or more...
US-9,954,851 Method for controlling vehicle security access based on certificate
A method for controlling access security at a vehicle gateway of a vehicle including at least one control unit in communication with the vehicle gateway...
US-9,954,850 Service locking method, apparatuses and systems thereof
Disclosed are a service locking method, apparatuses and systems thereof. The method includes: receiving a locking request including identification information...
US-9,954,849 Systems and methods for managing secure sharing of online advertising data
Systems and methods are disclosed for managing online advertising data secure sharing. One method includes receiving, at a server, a request for proprietary...
US-9,954,848 Central cryptographic management for computer systems
A system implemented on a server computer for managing digital certificates includes a certificate management agent module, a digital certificate processing...
US-9,954,847 Computer readable storage media for legacy integration and methods and systems for utilizing same
Systems and methods for integrative legacy context management are disclosed herein. An example computer hardware system may include at least one processing unit...
US-9,954,846 Collaborative sign-on
An authentication approval request can be received by a first system from a second system. The first system can determine whether the user is required to be...
US-9,954,845 Multi-user multi-router network management method and system
A network management method and system for managing multiple routers under a single user log-in. The network management system implements the method, which...
US-9,954,844 Offline authentication
A method including determining, by a processing device, whether a computer system is able to access an authentication server, in response to determining that...
US-9,954,843 Web ticket based upon a symmetric key usable for user authentication
Described herein are various aspects pertaining to a web ticket that is used in connection with authenticating a user. The web ticket is generated through use...
US-9,954,842 Method, client, server and system of login verification
The present disclosure introduces a method, a client, a server and a system of login verification. When a user logins, the client obtains a login request from...
US-9,954,841 Distinguish valid users from bots, OCRs and third party solvers when presenting CAPTCHA
A method and system of administering a CAPTCHA challenge comprising: providing a CAPTCHA challenge to the client computer, the CAPTCHA challenge comprising an...
US-9,954,840 Generating a negative answer to a domain name system query that indicates resource records as existing for the...
A DNS server receives, from a client device, a DNS query for a resource record type at a domain name. The DNS server determines that the resource record type...
US-9,954,839 Systems and methods for providing distributed authentication of service requests by identity management components
There is described a system for authenticating a client device in a network having a plurality of IDM components. One or more of the IDM components subscribes...
US-9,954,838 Browser plug-in for secure credential submission
Described is a technology by which a plug-in (e.g., an ActiveX.RTM. control) instantiated by a web browser calls functions of a credential service to use a set...
US-9,954,837 Method of multi-factor authenication during encrypted communications
Embodiments herein provide, for example, method, comprising: requesting, by a first user on a first device, to open a channel of communication to a second user...
US-9,954,836 Wireless network information flow conditioning
Apparatus and methods for conditioning wireless information flow in a wireless network. The system may include a processor that stores a digital key in a mobile...
US-9,954,835 Methods and systems for management of key exchanges
Methods and systems for facilitating exchanges of keys between individuals across multiple locations are provided. Each key set is assigned a unique key...
US-9,954,834 Method of operating a computing device, computing device and computer program
A computing device has a first application and a second application. The first application generates a data access application key for use by the second...
US-9,954,833 Management of access sessions
Disclosed are examples of managing access sessions for a computing device. In some examples, a computing device obtains a key and timeout data from secured...
US-9,954,832 System and method for enhanced data protection
In one embodiment, a method of secure network transmission is performed by a computer system. The method includes encrypting a payload via a first symmetric key...
US-9,954,831 Systems and methods for managed data transfer
Systems and methods are provided for managed file transfer. A managed file transfer server may receive a request from a sender to send a file (bulk data) to a...
US-9,954,830 Systems and methods for decryption as a service
Systems and methods for decryption of payloads are disclosed herein. In various embodiments, systems and methods herein are configured for decrypting thousands...
US-9,954,829 Method and apparatus for detecting and dealing with a lost electronics device
Techniques for detecting and dealing with a lost electronics device are disclosed. In one design, the device may autonomously determine whether it is lost. The...
US-9,954,828 Protection of data stored in the cloud
A system for protecting data stored in the cloud includes a computing device that generates a plaintext encryption key and encrypts the plaintext encryption key...
US-9,954,827 Invisible two-factor authentication
In an example embodiment, invisible two factor authentication is performed by receiving, at a first machine, a registration request from a second machine, with...
US-9,954,826 Scalable and secure key management for cryptographic data processing
A method and system for secure and scalable key management for cryptographic processing of data is described herein. A method of secure key handling and...
US-9,954,825 Secure virtual machine
Various embodiments pertain to computing devices and virtual machines. In particular, various embodiments relate to the start-up, operation, and communication...
US-9,954,824 Exposing an interface to devices outside a network for requesting a subset of services provided by devices...
A method includes extending an interface, to a device outside a firewall, for requesting a service performed by a device inside the firewall. The interface is...
US-9,954,823 Engineering method and establishing system
An engineering method for establishing an engineering system includes establishing the engineering system in a virtual system by performing a communication and...
US-9,954,822 Distributed traffic management system and techniques
Approaches, techniques, and mechanisms are disclosed for implementing a distributed firewall. In an embodiment, many different computer assets police incoming...
US-9,954,821 Internet protocol security (IPSEC) packet processing for multiple clients sharing a single network address
Embodiments of the present invention address deficiencies of the art in respect to secure communications for multiple hosts in an address translation...
US-9,954,820 Detecting and preventing session hijacking
A security device may receive a response associated with a request. The response may include original session information. The request may be associated with a...
US-9,954,819 System and method for compliance based automation
This invention generally relates to a process and computer code for enabling users to create adapters that enable application automation processes that allow...
US-9,954,818 Domain name hi-jack prevention
A domain name hi-jack prevention service may be selected by a domain name registrant and enabled by a Registrar. In a first embodiment, the Registrar may send a...
US-9,954,817 Software receive side scaling for packet re-dispatching
A method of re-dispatching packets at a packet forwarding element that includes a hardware dispatch unit and a multi-core processor. The method, at a first core...
US-9,954,816 Delegation of content delivery to a local service
Provided is a method for delegation of local content delivery service. The method includes receiving a Domain Name System (DNS) query from a client to resolve a...
US-9,954,815 Domain name collaboration service using domain name dependency server
A domain name dependency server (DDS) stores known relationships between domain names. In response to a domain relationship query from a local DNS server for a...
US-9,954,814 Systems and methods for verification and mapping of social connections
Systems and methods including computer-executable software for receiving user information, receiving a user request to connect with another user, computing a...
US-9,954,813 Method and system for facilitating publication of a media file at a scheduled time
Methods, systems, and techniques for facilitating publication of a media file at a scheduled time. A media aggregation client sends media and a scheduling...
US-9,954,812 Message-browsing system, server, terminal device, control method, and recording medium
A message-browsing system includes an image storage unit storing user images corresponding to respective multiple users, a motion storage unit storing pieces of...
US-9,954,811 Email notification on mobile devices
Methods and systems for providing notifications to mobile device utilize a cloud extension agent operating on a corporate network for sending notification...
US-9,954,810 Message categorization
One or more techniques and/or systems are provided for defining a message behavior profile for a sender, which may be used to categorize messages from the...
US-9,954,809 Embedding and executing commands in messages
A communication server, computer-readable storage medium and computer-implemented method for executing commands embedded in messages are provided. The method...
US-9,954,808 Collecting messages from a group chat window that mention a specific user
Collecting online group chat messages. The method may include receiving a message associated with an online group chat session between chat participants. The...
US-9,954,807 Endorsement indications in communication environments
Communication services enable two or more users to communicate electronically using multiple modes of communication. Conversations between groups of users are...
US-9,954,806 Inline message composing with visible list view
A compose form for drafting a message is presented inline within a window along with a message list. For example, instead of overlaying the message ...
US-9,954,805 Graymail filtering-based on user preferences
A graymail detection and filtering system predicts whether a user will consider an email to be graymail using a classifier model based on features extracted...
US-9,954,804 Method and system for preemptive harvesting of spam messages
A processor attracts and harvests spam messages. The processor simulates a message relay server. The processor receives one or more messages for the message...
US-9,954,803 Method of augmenting a voice call with supplemental audio
The present disclosure relates to a method of augmenting a voice call with supplemental audio. In one example, the method comprises: receiving predetermined...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.