Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,011,6649 P2P connecting and establishing method and communication system using the same
A establishing method for a P2P connection includes: receiving a connection request with a remote device from a client device, detecting a validation token in a...
US-1,011,6648 User authentication
There are disclosed herein techniques for use in authentication. In one embodiment, the techniques include a method comprising several steps. The method...
US-1,011,6647 Unified provisioning of applications on devices in an enterprise system
The present disclosure relates generally to managing access to an enterprise system using remote devices. Techniques are disclosed for provisioning applications...
US-1,011,6646 Software-defined network threat control
A Software-Defined Network (SDN) data-plane machine stores flow data and a hardware-trust key. The SDN data-plane machine receives and processes a ...
US-1,011,6645 Controlling use of encryption keys
A computing device includes a processor and a persistent memory for storing information about a first public key associated with a first asymmetric key pair for...
US-1,011,6644 Network access session detection to provide single-sign on (SSO) functionality for a network access control device
This disclosure describes techniques for verifying the identity of a user with a network access control (NAC) device in response to receiving a security...
US-1,011,6643 Virtualized data storage and management of policy and credential data sources
Web-based single sign-on can enable a user to log in to a single interface (such as through a web browser or thin client) and then provide SSO services to the...
US-1,011,6642 Identity management over multiple identity providers
Systems and processes of advanced identity management over multiple identity providers deployable through mobile applications are provided. The process, e.g.,...
US-1,011,6641 Cloud queue playback policies on a graphical user interface
An example implementation involves a device of a media playback system transmitting, to a computing system, a request to access a first cloud queue. After...
US-1,011,6640 Image processing system, image processing device, and authentication method
An image processing system includes: a first image processing device including: an input unit that receives an input of first authentication information for...
US-1,011,6639 Security controller SC restoration method and apparatus
Embodiments of the present disclosure disclose a security controller SC restoration method. The method provided by the embodiments of the present disclosure...
US-1,011,6638 Method and device for uploading data to social platform
A method and device for uploading data to a social platform. The method includes a plugin set into an application program. The plugin integrates at least one...
US-1,011,6637 Secure telecommunications
The present disclosure describes techniques for configuring and participating in encrypted audio calls, audio conferences, video calls, and video conferences....
US-1,011,6636 Apparatus and method for secure transmission avoiding duplicate data
A first communication device determines whether an encryption key is stored in a first memory in association with an identifier of data requested to transmit,...
US-1,011,6635 Mobile-based equipment service system using encrypted code offloading
A mobile-based equipment service system includes a remote server, a mobile device, and at least one equipment controller. The mobile device includes a user...
US-1,011,6634 Intercepting secure session upon receipt of untrusted certificate
A method for intercepting, by a security gateway, a secure data session comprises the steps of establishing a first secure data session between a client device...
US-1,011,6633 Systems and devices for hardened remote storage of private cryptography keys used for authentication
The invention provides for systems and devices for hardened remote storage of private cryptography keys used for authentication. The storage device is...
US-1,011,6632 System, method and computer-accessible medium for secure and compressed transmission of genomic data
An exemplary system, method and computer-accessible medium can be provided for generating an encrypted reference-based secure-compression of randomly located...
US-1,011,6631 Systems and methods for managed data transfer
Systems and methods are provided for managed file transfer. A managed file transfer server may receive a request from a sender to send a file (bulk data) to a...
US-1,011,6630 Systems and methods for decrypting network traffic in a virtualized environment
Described systems and methods enable a decryption of encrypted communication between a client system and a remote party, for applications such as detection and...
US-1,011,6629 Systems and methods for obfuscation of data via an aggregation of cloud storage services
The present disclosure describes systems and methods for aggregation and management of cloud storage among a plurality of providers via file fragmenting to...
US-1,011,6628 Server-paid internet access service
An embodiment of a system for providing Internet access free of charge to a user utilizes an Internet service provider for connecting a user to the Internet, a...
US-1,011,6627 Methods and systems for identifying targeted content item for user
The disclosed embodiments illustrate methods and systems for identifying a targeted content item for a user. The method includes receiving one or more encrypted...
US-1,011,6626 Cloud based logging service
Methods and systems are provided for facilitating access to a cloud-based logging service. According to one embodiment, access to a cloud-based logging service...
US-1,011,6625 Systems and methods for secure containerization
A method for provisioning a secure container for running an application includes routing traffic between the application and a secure container service over a...
US-1,011,6624 Intelligent sorting for N-way secure split tunnel
A method of intelligently sorting packets/datagrams for sending through appropriate branches of a N-way split VPN tunnel according to embodiments of the present...
US-1,011,6623 Methods and systems for providing a token-based application firewall correlation
Token-based firewall functionality. A request is received for access to a resource from a remote user device, the request received by an application firewall. A...
US-1,011,6622 Secure communication channel using a blade server
Systems and methods to manage a network include a security blade server configured to perform a security operation on network traffic, and a controller...
US-1,011,6621 Method and system for messaging security
An e-mail firewall applies policies to e-mail messages transmitted between a first site and a plurality of second sites. The e-mail firewall includes a...
US-1,011,6620 Method for access network virtualization and proxy node
An embodiment of the present invention discloses a method for access network virtualization and a proxy node, relates to a technical field of communication, and...
US-1,011,6619 Systems and methods for provisioning, configuring, diagnosing, and maintaining out-of band management of...
Systems and methods of the present disclosure facilitate provisioning an out-of-band system. In some embodiments, the system includes a server of a first...
US-1,011,6618 In-band LDAP over FICON
Methods, systems, and computer program product embodiments for exchanging data information packets, by a processor device, include receiving an Internet...
US-1,011,6617 System architecture for DMZ external IP addresses
A system of a first network, which is intermediate a second network and a third network, connects a host of the second network to a host of the third network....
US-1,011,6616 Smart routing synchronization system and methods for socializing a synthetic rebroadcast and group stream
Smart routing synchronization systems socialize a synthetic rebroadcast or group stream for enabling members of a user group to (re)broadcast select content to...
US-1,011,6615 Method and system of managing ephemeral post in a social networking system
A method of posting ephemeral posts is disclosed. The method starts with receiving, from a user of a social network, a request to post an ephemeral post, the...
US-1,011,6614 Detection of abusive user accounts in social networks
Abusive user accounts in a social network are identified from social network data. The social network data are processed to compare postings of the user...
US-1,011,6613 Systems and methods for managing social media posts
Methods, systems, and computer program products for interacting with a social media networking system. Information related to occurrence of an event impacting...
US-1,011,6612 Electronically referring a contact without divulging contact data
A referrer device configured to perform operations such as detecting an electronic request to provide information from an information source to a contact...
US-1,011,6611 Prioritizing messages within a message network
A system and a method are disclosed for recommending electronic messages in a message sharing system. Users can post messages to the message sharing system....
US-1,011,6610 Automotive wheel overlay attachment system
A vehicle wheel overlay attachment system disclosed herein provides for wheel overlays, or wheel skins, that are readily installable over existing wheels by...
US-1,011,6609 Third party email signature generation and authentication
Technologies are described related to third party email signature generation and authentication. A DKIM signature may be stamped in a way such that the "From"...
US-1,011,6608 Email deal alerter through data scraping
Systems and methods for alerting a user of deal emails are provided. Emails that contain deals are analyzed to determine which emails will be expiring soon and...
US-1,011,6607 Splitting posts in a thread into a new thread
A method, system and computer program product for improving social network users' interactions. The content of posts in a thread is analyzed so as to group the...
US-1,011,6606 Determining a number of users allowed to access message based on message objective
Controlling access to categorized messages includes categorizing a message into a number of categories according to a message objective. The message objective...
US-1,011,6605 Transport stack name scheme and identity management
An identity management and initialization scheme, along with a naming scheme for a transport stack and its components, facilitates directly addressing each...
US-1,011,6604 Animated delivery of electronic messages
An electronic message is transformed into moving images uttering the content of the electronic message. Methods of the present invention may be implemented on...
US-1,011,6603 Methods, systems, and media for identifying and presenting video objects linked to a source video
Methods, systems, and media for identifying video objects linked to a source video are provided. In some embodiments, the method comprises: identifying...
US-1,011,6602 System and methods for device to device control
The present disclosure relates to systems, methods, electronic devices and applications for device to device control by way of an application layer protocol. In...
US-1,011,6601 Methods and devices for display device notifications
The present disclosure relates to methods and devices for presentation of display device notifications. The notifications are visually appealing, employing a...
US-1,011,6600 Expressing statements in messages with personalized expression style
Many computing scenarios enable a user to send a message to a user expressing a statement, such as a "happy birthday" message or a "let's meet for lunch"...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.