Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,979,760 Systems and methods for secure, controlled virtual visitation with confinement institution inmates
Secure, controlled, interactive virtual visitation for confinement institution inmates is provided using computing devices connected through a network by...
US-9,979,759 System and method for managing multi-media conferences using group segmentation
A conference management system that is capable of managing one or more panels within a teleconference. The conference manager is capable of receiving commands...
US-9,979,758 Creation, sharing and embedding of interactive charts
Systems and methods for generating and sharing interactive charts are described. The interactive charts are generated in an online portal that allows users to...
US-9,979,757 Method and apparatus for providing a media content from a collaborative meeting to a remote user
According to an example computer-implemented method, a first client on a proxy server joins a collaborative meeting on behalf of a user. The collaborative...
US-9,979,756 Recovery from a potential proxy call session control function (P-CSCF) failure during call origination
A user device registers with a proxy-call session control function device (P-CSCF) associated with an Internet protocol (IP) multimedia subsystem (IMS). The...
US-9,979,755 System and method for routing customer support softphone call
A method of routing a voice communication from a web page to one of a plurality of queues includes determining a plurality of variables for routing the voice...
US-9,979,754 Emergency call back for session initiation protocol sessions
An Address Resolution Protocol (ARP) process receives a first Internet Protocol (IP) address that is associated with a Media Access Control (MAC) address of a...
US-9,979,753 Cyber-security system and methods thereof
A system and method for adaptively securing a protected entity against cyber-threats. The method includes: activating a security application configured to...
US-9,979,752 Selective regulation of information transmission from mobile applications to third-party privacy compliant...
Selective regulation of information transmission from mobile applications to a third-party privacy compliant target system. A privacy policy is configured for...
US-9,979,751 Application gateway architecture with multi-level security policy and rule promulgations
Embodiments of an application gateway architecture may include an application gateway server computer communicatively connected to backend systems and client...
US-9,979,750 Tunneling for network deceptions
Provided are systems, methods, and computer-program products for providing network deceptions using a network tunnel. In various implementations, a network...
US-9,979,749 Network security elements using endpoint resources
A method and apparatus for network security elements using endpoint resources. An embodiment of a method includes receiving a request for access to a network at...
US-9,979,748 Domain classification and routing using lexical and semantic processing
Domain classification based on lexical and semantic processing of target domains is provided. A target domain name or URL may undergo a lexical analysis to...
US-9,979,747 Systems and methods for detecting and preventing spoofing
Techniques for detecting device type spoofing. The techniques include: receiving a communication from a client device different from the at least one computer;...
US-9,979,746 Method and apparatus for detecting hidden content of web page
According to an example, a web page is loaded and description information of the web page and layout information of the web page are generated, the description...
US-9,979,745 Method and apparatus for transmitting information
A method for transmitting information from a first security module to a second security module involves a system comprising the first and the second security...
US-9,979,744 Dynamic risk engine
Various embodiments of the present invention generally relate to identity authentication and/or recognition. Some embodiments provide a method for determining...
US-9,979,743 Computer asset vulnerabilities
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining a network path between computer assets. One of...
US-9,979,742 Identifying anomalous messages
A method for computer system forensics includes receiving an identification of an anomalous message transmitted by a host computer in a computer network...
US-9,979,741 Malware beaconing detection methods
A method for detecting malware beaconing in a network, the method includes capturing network traffic over a network connection at a network connected device,...
US-9,979,740 Data surveillance system
Data surveillance techniques are presented for the detection of security issues, especially of the kind where privileged data may be stolen by steganographic,...
US-9,979,739 Automated forensics of computer systems using behavioral intelligence
A method for computer system forensics includes receiving an identification of at least one host computer (26) that has exhibited an anomalous behavior, in a...
US-9,979,738 System and method to detect attacks on mobile wireless networks based on motif analysis
Described is a system for detecting attacks on networks. A hierarchical representation of activity of a communication network is used to detect and predict...
US-9,979,737 Scoring persons and files for trust in digital communication
A method, using trust software executing from a machine-readable medium on a computerized appliance operating as a trust authority, to assign to a person, a...
US-9,979,736 Cloud-based surveillance with intelligent tamper protection
In one embodiment, a security system includes a central communication unit and a first surveillance device. The central communication unit is communicatively...
US-9,979,735 Devices, methods and systems for secure data transfers
Methods, systems and devices for securely transferring digital data from a first repository to a second repository are disclosed. Per at least one embodiment, a...
US-9,979,734 Management of transactions in a distributed transaction system
Briefly, embodiments disclosed herein relate to managing transactions in a distributed content transaction system.
US-9,979,733 Automatically provisioning new accounts on managed targets by pattern recognition of existing account attributes
An identity management system is augmented to provide for automated provisioning of user accounts in an IAM system. A user account is autoprovisioned based on...
US-9,979,732 Contextually aware sharing recommendations
A profile is configured with permissions that may be shared with other profiles. Contextual data defining user activity, preferences, and/or other contextual...
US-9,979,731 Single use identifier values for network accessible devices
Apparatus and method for providing unique device identification values for a network accessible device. In accordance with some embodiments, a unique device...
US-9,979,730 System and method for secure provisioning of out-of-network user equipment
The disclosure relates to technology for provisioning out-of-network user equipment with a network relay in a communications network. The network relay device...
US-9,979,729 Controlling access for a home control device including an online mode and an offline mode
A method for controlling access to a system for supporting home control activities includes hierarchical authorization of the user. Access in an online mode, in...
US-9,979,727 Internetwork authentication
A technique for network authentication interoperability involves initiating an authentication procedure on a first network, authenticating on a second network,...
US-9,979,726 System and method for web application security
A system for detection and mitigation of client-side initiated security attack(s) to a web application is disclosed. A server component (SC) of the system is...
US-9,979,725 Two-way authentication using two-dimensional codes
A system for two-way authentication using two-dimensional codes is provided. The system includes a memory and a processor coupled to the memory. The processor...
US-9,979,724 Distributed method and system to improve collaborative services across multiple devices
A distributed system and method to improve collaborative service across multiple sensors on various devices. According to one embodiment, multiple devices may...
US-9,979,723 User credentials
Obtaining and/or validating user credentials at client devices is described. A phrase may be generated based on one or more index values determined according to...
US-9,979,722 Method and apparatus for processing a RTCWEB authentication
Systems and methods of processing a real-time communication in web-browsers (RTCWEB) authentication by a first server are disclosed. These include receiving a...
US-9,979,721 Method, server, client and system for verifying verification codes
Disclosed are a method, server, client and system for verifying a verification code. The method includes: sending a verification picture to a client according...
US-9,979,720 Passwordless strong authentication using trusted devices
A code for accessing a resource having a customer account associated therewith is presented via a secondary device, and authentication data indicative of the...
US-9,979,719 System and method for converting one-time passcodes to app-based authentication
A method comprising includes detecting, in response to a user access attempt on an electronic access device, a one-time passcode authentication event;...
US-9,979,718 System for managing security and access to resource sub-components
A means for managing security and access to resources associated with blocks/sub-components of a distributed validating network, such as a blockchain network....
US-9,979,717 Algorithm hardening in background context and external from the browser to prevent malicious intervention with...
A technique for hardening the entry of user credentials in web sites is described. A headless web browser authenticates the user to a target web site with...
US-9,979,716 Certificate authority
A protocol for issuing and controlling digital certificates is described in which an identity management system is used to identify a user requesting a digital...
US-9,979,715 Aggregator technology without usernames and passwords
Techniques are described in which to access a user's web applications, the user registers and signs on to an aggregator system using any supported login...
US-9,979,714 Authenticating a persona in a social networking system
A social networking system provides access to personas comprising information, for example, web pages describing users or entities. The information may be...
US-9,979,713 Scored factor-based authentication
Concepts and technologies are disclosed herein for scored factor-based authentication. A verification service can receive an authentication request from a...
US-9,979,712 Synchronizing authentication sessions between applications
Disclosed are various embodiments for synchronizing authentication sessions between applications. In one embodiment, a first authentication token is received...
US-9,979,711 Authentication for VLAN tunnel endpoint (VTEP)
A first network device configured as a first Virtual Local Area Network (VLAN) Tunnel Endpoint (VTEP) may receive a packet from a second network device. The...
US-9,979,710 Single SSID and dual-SSID enhancements
A wireless local area network system establishes a PASSPOINT.TM. connection between a mobile station and a hotspot using an enhanced single SSID method or an...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.