Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


31st week of 2016 patent applcation highlights part 71
Patent application numberTitlePublished
20160226798TECHNIQUES FOR SCALABLE AND FOOLPROOF VIRTUAL MACHINE MOVE HANDLING WITH VIRTUAL PORT CHANNELS2016-08-04
20160226799METHOD AND SYSTEM FOR ON-DEMAND COMMUNITIES2016-08-04
20160226800Safety Intact2016-08-04
20160226801SYSTEM FOR RESTRICTING THE DISTRIBUTION OF ATTACHMENTS TO ELECTRONIC MESSAGES2016-08-04
20160226802CORRELATION OF SENT AND RECEIVED ELECTRONIC MESSAGE2016-08-04
20160226803SOCIAL CONNECTION VIA REAL-TIME IMAGE COMPARISON2016-08-04
20160226804METHODS, SYSTEMS, AND MEDIA FOR SUGGESTING A LINK TO MEDIA CONTENT2016-08-04
20160226805Method and System for Image Sharing and Feedback2016-08-04
20160226806DIGITAL MEDIA MESSAGES AND FILES2016-08-04
20160226807INTER VEHICLE COMMUNICATION SYSTEM2016-08-04
20160226808Secure E-mail Attachment Routing and Delivery2016-08-04
20160226809INTEROPERABLE CLINICAL DOCUMENT-EXCHANGE SYSTEM2016-08-04
20160226810SYSTEM AND METHOD OF MAKING MESSAGES REMAIN ON TOP OF A MOBILE BULLETIN BOARD2016-08-04
20160226811SYSTEM AND METHOD FOR PRIORITY EMAIL MANAGEMENT2016-08-04
20160226812COMMUNICATION SYSTEM AND SERVER FACILITATING MESSAGE EXCHANGE AND RELATED METHODS2016-08-04
20160226813SMARTPHONE INDICATOR FOR CONVERSATION NONPRODUCTIVITY2016-08-04
20160226814INTER-MODAL MESSAGING COMMUNICATION2016-08-04
20160226815SYSTEM AND METHOD FOR COMMUNICATING IN AN SSL VPN2016-08-04
20160226816CONTROLS FOR RESOLVING PRODUCT AND ACTION DOMAIN NAMES2016-08-04
20160226817APPARATUS AND METHOD FOR CREATING BLOCK-TYPE STRUCTURE USING SKETCH-BASED USER INTERACTION2016-08-04
20160226818OVERLAY TUNNEL INFORMATION EXCHANGE PROTOCOL2016-08-04
20160226819Domain Name and Internet Protocol Address Approved and Disapproved Membership Inference2016-08-04
20160226820DETERMINISTIC MAPPING2016-08-04
20160226821DATAPATH WITH SERVICE STAGES2016-08-04
20160226822DATAPATH FOR MULTIPLE TENANTS2016-08-04
20160226823VOICE CONTROL OF ENDPOINT DEVICES THROUGH A MULTI-SERVICES GATEWAY DEVICE AT THE USER PREMISES2016-08-04
20160226824Restricting Communication Over an Encrypted Network Connection to Internet Domains that Share Common IP Addresses and Shared SSL Certificates2016-08-04
20160226825DYNAMIC DETECTION AND APPLICATION-BASED POLICY ENFORCEMENT OF PROXY CONNECTIONS2016-08-04
2016022682610Gbps LINE RATE STREAM TO DISK WITH FAST RETRIEVAL (METADATA) AND NETWORK STATISTICS2016-08-04
20160226827TRANSPORT LAYER SECURITY LATENCY MITIGATION2016-08-04
20160226828COMMUNICATING WITH A MACHINE TO MACHINE DEVICE2016-08-04
20160226829SYSTEMS AND METHODS FOR SECURE DATA EXCHANGE2016-08-04
20160226830SYSTEMS AND METHODS FOR PROVIDING DATA SECURITY SERVICES2016-08-04
20160226831APPARATUS AND METHOD FOR PROTECTING USER DATA IN CLOUD COMPUTING ENVIRONMENT2016-08-04
20160226832SERVER USING UNPREDICTABLE SCRAMBLED COOKIE NAMES2016-08-04
20160226833PORTABLE ENCRYPTION AND AUTHENTICATION SERVICE MODULE2016-08-04
20160226834SAFECHANNEL ENCRYPTED MESSAGING SYSTEM2016-08-04
20160226835Authenticating Connections and Program Identity in a Messaging System2016-08-04
20160226836SYSTEMS AND METHODS FOR SECURED COMMUNICATIONS2016-08-04
20160226837SERVER FOR AUTHENTICATING SMART CHIP AND METHOD THEREOF2016-08-04
20160226838SYSTEMS AND METHODS OF TRANSMITTING DATA2016-08-04
20160226839SECURE DATA TRANSMISSION2016-08-04
20160226840TRANSACTION-BASED SECURE INFORMATION DELIVERY AND ASSESSMENT2016-08-04
20160226841TRUST RELATIONSHIPS IN A COMPUTERIZED SYSTEM2016-08-04
20160226842GUEST WIFI AUTHENTICATION BASED ON PHYSICAL PROXIMITY2016-08-04
20160226843INFORMATION PROCESSING TERMINAL, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING SYSTEM2016-08-04
20160226844MULTIPLE RECIPIENT MESSAGE ENCRYPTION2016-08-04
20160226845Key Exchange Through a Trusted Proxy2016-08-04
20160226846METHOD, APPARATUS, AND SYSTEM FOR QUANTUM KEY DISTRIBUTION2016-08-04
20160226847METHODS AND SYSTEMS FOR COMMUNICATING WITH AN M2M DEVICE2016-08-04
20160226848AUTHENTICATION SURVIVABILITY FOR ASSIGNING ROLE AND VLAN BASED ON CACHED RADIUS ATTRIBUTES2016-08-04
20160226849Portal authentication method, broadband network gateway, portal server and system2016-08-04
20160226850COMMUNICATION APPARATUS2016-08-04
20160226851SYSTEM AND METHOD FOR POOL-BASED IDENTITY AUTHENTICATION FOR SERVICE ACCESS WITHOUT USE OF STORED CREDENTIALS2016-08-04
20160226852SYSTEMS AND METHODS FOR DEPLOYING RICH INTERNET APPLICATIONS IN A SECURE COMPUTING ENVIRONMENT2016-08-04
20160226853Secret Supplemental Username2016-08-04
20160226854SYSTEMS AND METHODS FOR THE SECURE SHARING OF DATA2016-08-04
20160226855IMAGE FORMING SYSTEM HAVING USER AUTHENTICATION FUNCTION, IMAGE FORMING APPARATUS, METHOD OF CONTROLLING IMAGE FORMING SYSTEM, AND STORAGE MEDIUM2016-08-04
20160226856INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM2016-08-04
20160226857Methods and Apparatus of Key Pairing for D2D Devices under Different D2D Areas2016-08-04
20160226858SYSTEM AND METHOD FOR SECURE ACCESS OF A REMOTE SYSTEM2016-08-04
20160226859USING REPRESENTATIONAL STATE TRANSFER (REST) FOR CONSENT MANAGEMENT2016-08-04
20160226860VIRTUAL SUBSCRIBER IDENTITY MODULE2016-08-04
20160226861TERMINAL DEVICE AND INFORMATION PROCESSING DEVICE2016-08-04
20160226862WIRELESS AUTHENTICATION SYSTEM AND WIRELESS AUTHENTICATION METHOD FOR ONE TIME PASSWORD OF MOBILE COMMUNICATION TERMINAL HAVING NEAR FIELD COMMUNICATION FUNCTION2016-08-04
20160226863AUTHORITY TRUSTED SECURE SYSTEM COMPONENT2016-08-04
20160226864METHOD AND SYSTEM FOR IMPROVED SECURITY2016-08-04
20160226865MOTION BASED AUTHENTICATION SYSTEMS AND METHODS2016-08-04
20160226866AUTHENTICATION USING INDIVIDUAL'S INHERENT EXPRESSION AS SECONDARY SIGNATURE2016-08-04
20160226867CLOUD-BASED BIOMETRIC ENROLLMENT, IDENTIFICATION AND VERIFICATION THROUGH IDENTITY PROVIDERS2016-08-04
20160226868OUT-OF-BAND BIOMETRIC ENROLLMENT AND VERIFICATION USING INTERACTIVE MESSAGING2016-08-04
20160226869SYSTEM AND METHOD OF CONTROLLING NETWORK ACCESS2016-08-04
20160226870INTERNET OF THINGS SYSTEM AND CONTROL METHOD THEREOF2016-08-04
20160226871HIGHLY SCALABLE, FAULT TOLERANT REMOTE ACCESS ARCHITECTURE AND METHOD OF CONNECTING THERETO2016-08-04
20160226872SYSTEM AND METHOD FOR VERIFYING STATUS OF AN AUTHENTICATION DEVICE2016-08-04
20160226873NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM FOR STORING APPLICATION PROGRAM FOR NETWORK CERTIFICATION2016-08-04
20160226874Secure Shell (SSH) Proxy for a Platform-as-a-Service System2016-08-04
20160226875DEVICE AUTHENTICATION WITHIN DEPLOYABLE COMPUTING ENVIRONMENT2016-08-04
20160226876PASSWORD ENTRY THROUGH TEMPORALLY-UNIQUE TAP SEQUENCE2016-08-04
20160226877METHODS AND APPARATUS FOR LARGE SCALE DISTRIBUTION OF ELECTRONIC ACCESS CLIENTS2016-08-04
20160226878METHOD AND APPARATUS FOR USE WITH DIFFERENT MEMORY MAPS2016-08-04
20160226879AUTHORIZATION TOKEN CACHE SYSTEM AND METHOD2016-08-04
20160226880Reconciliation of Access Rights in a Computing System2016-08-04
20160226881CONFIRMING AN IDENTITY OF A USER OF A SOCIAL NETWORK2016-08-04
20160226882OVER THE AIR MANAGEMENT OF PAYMENT APPLICATION INSTALLED IN MOBILE DEVICE2016-08-04
20160226883USING A WIRELESS TRANSMITTER AND RECEIVER TO PREVENT UNAUTHORIZED ACCESS TO RESTRICTED COMPUTER SYSTEMS2016-08-04
20160226884USING CONNECTIONS BETWEEN USERS IN A SOCIAL NETWORKING SYSTEM TO REGULATE OPERATION OF A MACHINE ASSOCIATED WITH A SOCIAL NETWORKING SYSTEM USER2016-08-04
20160226885SYSTEM AND METHOD TO AGGREGATE CONTROL OF MULTIPLE DEVICES VIA MULTICAST MESSAGES AND AUTOMATIC SET UP OF CONNECTIONS2016-08-04
20160226886SECURE WIRELESS LOCATION INTERFACE PROTOCOL2016-08-04
20160226887COMMUNICATION SYSTEM AND METHOD2016-08-04
20160226888WEB MALWARE BLOCKING THROUGH PARALLEL RESOURCE RENDERING2016-08-04
20160226889System and Method for Detecting and Protecting Against Malicious Content2016-08-04
20160226890METHOD AND APPARATUS FOR PERFORMING INTRUSION DETECTION WITH REDUCED COMPUTING RESOURCES2016-08-04
20160226891GEOGRAPHICAL INTRUSION RESPONSE PRIORITIZATION MAPPING THROUGH AUTHENTICATION AND FLIGHT DATA CORRELATION2016-08-04
20160226892Intrusion Detection and Radio Fingerprint Tracking2016-08-04
20160226893METHODS FOR OPTIMIZING AN AUTOMATED DETERMINATION IN REAL-TIME OF A RISK RATING OF CYBER-ATTACK AND DEVICES THEREOF2016-08-04
20160226894SYSTEM AND METHOD FOR DETECTING INTRUSION INTELLIGENTLY BASED ON AUTOMATIC DETECTION OF NEW ATTACK TYPE AND UPDATE OF ATTACK TYPE MODEL2016-08-04
20160226895SPACE AND TIME EFFICIENT THREAT DETECTION2016-08-04
20160226896ACTIVE VALIDATION FOR DDOS AND SSL DDOS ATTACKS2016-08-04
20160226897Risk Ranking Referential Links in Electronic Messages2016-08-04
Website © 2025 Advameg, Inc.