Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,025,0601 Updating database drivers for client applications through a database server push
A method for updating drivers. The method may include transmitting a connection request from a first computer to a second computer. The method may include...
US-1,025,0600 Updating database drivers for client applications through a database server push
A method for updating drivers. The method may include transmitting a connection request from a first computer to a second computer. The method may include...
US-1,025,0599 Queue management based on biometric authentication
A method performed by a user device may include obtaining biometric information relating to a user of the user device using a biometric sensor of the user...
US-1,025,0598 Liveness detection method and device, and identity authentication method and device
Liveness detection and an identity authentication is included in the disclosure. A user's biological characteristic information is collected and displayed at an...
US-1,025,0597 Systems and methods for performing user recognition based on biometric information captured with wearable...
Systems and methods are disclosed herein for performing biometrics based user recognition and monitoring based on biometric information captured using wearable...
US-1,025,0596 Monitoring encrypted communication sessions
A method for monitoring encrypted communication sessions between computing devices includes intercepting messages of a handshaking procedure between a client...
US-1,025,0595 Embedded trusted network security perimeter in computing systems based on ARM processors
The invention relates to a method for computer systems based on the ARM processor, for example mobile devices, wherein the ARM processor provides fully hardware...
US-1,025,0594 Declarative techniques for transaction-specific authentication
Techniques are disclosed for providing and/or implementing utilizing declarative techniques for transaction-specific authentication. Certain techniques are...
US-1,025,0593 Image based key deprivation function
Embodiments of the invention relate to methods of generating and using an image-based derived key. In various embodiments, the image-based derived key may be...
US-1,025,0592 Approach for accessing third-party content collaboration services on interactive whiteboard appliances using...
An approach for managing collaboration on IWBs allows users of different third-party collaboration services to participate in collaboration meetings on IWBs....
US-1,025,0591 Password-based authentication
A system has .lamda..gtoreq.2 servers. At least each of a set of authentication servers stores a key-share sk.sub.i of secret key sk, shared between q of the...
US-1,025,0590 Multi-factor device registration for establishing secure communication
A method of secure device registration is presented. The method comprises: receiving a registration request from a device; validating the device on the basis of...
US-1,025,0589 System and method for protecting access to authentication systems
A system and method for protecting access to authentication systems. A mediator may accept original authentication credentials from a client, may process the...
US-1,025,0588 Systems and methods for determining reputations of digital certificate signers
The disclosed computer-implemented method for determining reputations of digital certificate signers may include (i) identifying a group of endpoint devices...
US-1,025,0587 Detecting malicious usage of certificates
The misuse of public key, private key, and public/private key certificates poses significant security challenges to computer networks that are addressed by...
US-1,025,0586 Security certification and application categorization for mobile device management
Implementations for managing mobile devices associated with enterprise operations include actions of receiving a request to access information regarding a...
US-1,025,0585 Identity migration between organizations
Disclosed are various embodiments for identity data migration from one organization to another. An authentication service operated by a first organization...
US-1,025,0584 System and method for single sign-on technical support access to tenant accounts and data in a multi-tenant...
Shown is single sign-on support access to tenant accounts in a multi-tenant service platform involving a proxy user account in an identity provider for a tenant...
US-1,025,0583 Systems and methods to authenticate users and/or control access made by users on a computer network using a...
A controller for user authentication and access control, configured to: store data representing a graph having: nodes representing data elements associated with...
US-1,025,0582 Secure private location based services
Representative embodiments disclose unique mechanisms to use beacons to provide access to cloud services. In order to access the cloud services a user presents...
US-1,025,0581 Client, server, radius capability negotiation method and system between client and server
Disclosed are a client, a server, an RADIUS capability negotiation method and system, and the method includes: a client transmits to a server a first message...
US-1,025,0580 Out-of band remote authentication
In an embodiment a single user authentication event, performed between a trusted path hardware module and a service provider via an out of band communication,...
US-1,025,0579 Secure file transfers within network-based storage
A capability is provided for securely transferring a file within network-based storage. A capability is provided for securely transferring a user file of a user...
US-1,025,0578 Internet key exchange (IKE) for secure association between devices
Aspects may relate to performing an Internet Key Exchange (IKE) to create an IPsec security association (SA) between a first device and a second device based...
US-1,025,0577 System and method for authenticating and enabling an electronic device in an electronic system
A system and method for authenticating and enabling an electronic device in an electronic system are disclosed. A particular embodiment includes: an electronic...
US-1,025,0576 Communication of messages over networks
A method is provided for communicating messages between sender and receiver computers, connectable via a network to a system of servers, based on authentication...
US-1,025,0575 Utility meter for metering a utility consumption and optimizing upstream communications and method for managing...
A utility meter and method for metering consumption of at least one utility including: a metering unit, a communication unit for sending/receiving messages...
US-1,025,0574 Systems and methods for encoded communications
Systems and methods for encoded communications are disclosed. In some embodiments, a server system may be configured to receive a communication from a user...
US-1,025,0573 Leveraging transport-layer cryptographic material
A client application cryptographically protects application data using an application-layer cryptographic key. The application-layer cryptographic key is...
US-1,025,0572 Logic repository service using encrypted configuration data
The following description is directed to a logic repository service. In one example, a method of a logic repository service can include receiving a first...
US-1,025,0571 Systems and methods for offloading IPSEC processing to an embedded networking device
A new approach is proposed that contemplates systems and methods to support a mechanism to offload IPSec/IKE processing of virtual machines (VMs) running on a...
US-1,025,0570 Separated intelligent control system and method thereof
The present invention provides a separated intelligent control system comprising a WiFi intelligent controller. The WiFi intelligent controller comprises: a...
US-1,025,0568 Methods and systems for concealing information
A retrieving system for retrieving information concealed within a sequence of symbols. The system includes a decoder configurable using rule information and...
US-1,025,0567 Communication system, wireless communication apparatus, and communication method
A wireless communication circuit includes a receiver to receive at least one of a beacon frame and a probe response frame from a first wireless communication...
US-1,025,0566 Communication system, wireless communication apparatus, and communication method
A wireless communication circuit includes a receiver to receive at least one of a beacon frame and a probe response frame from a first wireless communication...
US-1,025,0565 Service layer device location management and privacy control
A machine to machine (M2M) service layer can facilitate acquiring and providing location information for use by M2M devices. The service layer can also ensure...
US-1,025,0564 Dynamically allowing traffic flow through a firewall to allow an application server device to perform...
A network device may receive, a flow control request for a first device that is registered for an internet protocol (IP) pinhole service. The flow control...
US-1,025,0563 Secure device and proxy for secure operation of a host data processing system
Secure device and proxy operation include generating, using a processor, a first proxy and a first proxy companion paired with the first proxy and providing the...
US-1,025,0562 Route signaling driven service management
A system and method for handling critical events in service gateways. Configuration information is received in a service gateway, the configuration information...
US-1,025,0561 Communication apparatus and communication control apparatus
A transmission apparatus transmits a plurality of second packets obtained from a plurality of first packets, wherein each of the plurality of first packets...
US-1,025,0560 Network security method and device using IP address
The present invention provides a network security method, which comprises the steps of: maintaining information on blocked countries, to be blocked from data...
US-1,025,0559 Reversible mapping of network addresses in multiple network environments
A method for translating network addresses includes receiving a first network packet, the first network packet comprising an internal source address. The method...
US-1,025,0558 Method and apparatus for triggering devices and delivering small data
Method and apparatus are described for delivering triggers and small data. In an embodiment, a receiver may be configured to receive a trigger or small data...
US-1,025,0557 Enabling multi-realm service access for a single IP stack UE
Apparatuses and methods are provided by which a second address of user equipment, which is served on a first address in a first network in a first address...
US-1,025,0556 Systems and methods for allocating communication resources via information technology infrastructure
The present disclosure is directed to allocating communication resources via information technology infrastructure. A system can provide a communication tag and...
US-1,025,0555 Methods and systems for implementing very large DNS zones
Systems, methods and devices are provided for registering DNS hostnames of Internet host devices for very large domain zones (VLZ) stored on a DNS server on a...
US-1,025,0554 Methods, systems, and products for monitoring domain name servers
Methods, systems, and products infer performance of a domain name system. Queries to, and responses from, the domain name system are logged and categorized....
US-1,025,0553 ARP offloading for managed hardware forwarding elements
Some embodiments provide an ARP-offload service node for several managed hardware forwarding elements (MHFEs) in a datacenter in order to offload ARP query...
US-1,025,0551 Method and apparatus for expiring messages in electronic communications
The present disclosure includes systems and methods for off-the-record communication including expiring messages. An example method comprises receiving an...
US-1,025,0550 Social message monitoring method and apparatus
A social message monitoring method is implemented by receiving, from a social network server, a social message, and obtaining a theme probability vector of the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.