29th week of 2016 patent applcation highlights part 63 |
Patent application number | Title | Published |
20160212076 | System, Method, and Apparatus for Providing Prayers over a Network | 2016-07-21 |
20160212077 | METHODS AND SYSTEMS FOR PROCESSING INFORMATION IN A NETWORK | 2016-07-21 |
20160212078 | Method And System For Managing Mass Delivery Of Audio Messages | 2016-07-21 |
20160212079 | MESSAGE CHALLENGE RESPONSE | 2016-07-21 |
20160212080 | SYSTEM, METHOD AND COMPUTER READABLE MEDIUM FOR PROCESSING UNSOLICITED ELECTRONIC MAIL | 2016-07-21 |
20160212081 | PROCESSING CONNECTION REQUEST IN ONLINE SERVICE | 2016-07-21 |
20160212082 | SYSTEM AND METHOD FOR SECURING ELECTRONIC MESSAGES | 2016-07-21 |
20160212083 | CONNECTION SHARING ACROSS ENTITIES IN A DISTRIBUTED MESSAGING SYSTEM | 2016-07-21 |
20160212084 | System and methods for using message thread-recurrent data to implement internal organizational processes | 2016-07-21 |
20160212085 | SOCIAL MEDIA MESSAGE DELIVERY BASED ON USER LOCATION | 2016-07-21 |
20160212086 | MESSAGE PROCESSING, FORWARDING AND FILTERING BASED ON ATTRIBUTE VALUES | 2016-07-21 |
20160212087 | MESSAGE SYSTEM | 2016-07-21 |
20160212088 | PROMPTING USER ACTION IN CONJUNCTION WITH TAGGED CONTENT ON A SOCIAL NETWORKING SYSTEM | 2016-07-21 |
20160212089 | METHODS AND SYSTEMS FOR MANAGING A MULTI PARTICIPANT EVENT | 2016-07-21 |
20160212090 | SYSTEM AND METHOD FOR TRACKING CONVERSATIONS | 2016-07-21 |
20160212091 | MANAGING MESSAGING SESSIONS AMONG MULTIPLE PARTICIPANTS | 2016-07-21 |
20160212092 | RESPONSE DEVICE, INFORMATION PROCESSING DEVICE, RESPONSE METHOD, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM | 2016-07-21 |
20160212093 | SYSTEM AND METHOD FOR SMTP AND ALTERNATIVE EMAIL PROTOCOL INTEROPERABILITY | 2016-07-21 |
20160212094 | DYNAMIC LINK AGGREGATION | 2016-07-21 |
20160212095 | METHOD AND SYSTEM FOR ACCESSING RESOURCE AND SYSTEM APPLYING THE SAME | 2016-07-21 |
20160212096 | FTP APPLICATION LAYER PACKET FILTERING METHOD, DEVICE AND COMPUTER STORAGE MEDIUM | 2016-07-21 |
20160212097 | Secure In-Band Signaling Method for Mobility Management Crossing Firewalls | 2016-07-21 |
20160212098 | LOAD BALANCING INTERNET PROTOCOL SECURITY TUNNELS | 2016-07-21 |
20160212099 | PRIVATE CLOUD CONTROL | 2016-07-21 |
20160212100 | TRANSPARENT PROXY SYSTEM WITH AUTOMATED SUPPLEMENTAL AUTHENTICATION FOR PROTECTED ACCESS RESOURCES | 2016-07-21 |
20160212101 | PROTECTING CONTENT INTEGRITY | 2016-07-21 |
20160212102 | METHOD AND DEVICE FOR DISTRIBUTING TRAFFIC BY USING PLURALITY OF NETWORK INTERFACES IN WIRELESS COMMUNICATION SYSTEM | 2016-07-21 |
20160212103 | CONFIGURING, CONTROLLING AND MONITORING COMPUTERS USING MOBILE DEVICES | 2016-07-21 |
20160212104 | Preventing Misuse of Code Signing Certificates | 2016-07-21 |
20160212105 | COLLISION AVOIDANCE IN A DISTRIBUTED TOKENIZATION ENVIRONMENT | 2016-07-21 |
20160212106 | SECURE VIRTUALIZED MOBILE CELLULAR DEVICE | 2016-07-21 |
20160212107 | TAPE DRIVE ENCRYPTION IN THE DATA PATH | 2016-07-21 |
20160212108 | SYSTEMS, METHODS AND DEVICES FOR DIRECT COMMUNICATION | 2016-07-21 |
20160212109 | MANAGING DISTRIBUTION AND RETRIEVAL OF SECURITY KEY FRAGMENTS AMONG PROXY STORAGE DEVICES | 2016-07-21 |
20160212110 | USER AUTHENTICATION RELYING ON RECURRING PUBLIC EVENTS FOR SHARED SECRETS | 2016-07-21 |
20160212111 | ENDPOINT SECURITY SCREENING | 2016-07-21 |
20160212112 | MESSAGE COMMUNICATION SYSTEM AND OPERATION METHOD THEREOF | 2016-07-21 |
20160212113 | TECHNIQUES FOR FACILITATING SECURE, CREDENTIAL-FREE USER ACCESS TO RESOURCES | 2016-07-21 |
20160212114 | IMAGE FORMING APPARATUS, INFORMATION PROCESSING SYSTEM, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM | 2016-07-21 |
20160212115 | System and Method for Providing Confidence Scores in a Persistent Framework | 2016-07-21 |
20160212116 | Open Access Network Secure Authentication Systems and Methods | 2016-07-21 |
20160212117 | Systems, Methods, and Computer Program Products for Securely Managing Data on A Secure Element | 2016-07-21 |
20160212118 | System and Method for Visualizing Data Sharing Arrangements for an Organization | 2016-07-21 |
20160212119 | AUTHENTICATION INFORMATION ENCRYPTION SERVER APPARATUSES, COMPUTER READABLE MEDIUMS AND METHODS | 2016-07-21 |
20160212120 | TRANSACTION QUERY ENGINE | 2016-07-21 |
20160212121 | METHODS AND SYSTEMS FOR A SUBSCRIPTION DATA SHARING SERVICE | 2016-07-21 |
20160212122 | SYSTEMS AND METHODS FOR INTEGRATING WITH A NATIVE COMPONENT USING A NETWORK INTERFACE | 2016-07-21 |
20160212123 | SYSTEM AND METHOD FOR PROVIDING A CERTIFICATE BY WAY OF A BROWSER EXTENSION | 2016-07-21 |
20160212124 | TERMINAL DETERMINATION DEVICE AND METHOD | 2016-07-21 |
20160212125 | Authenticating Customers and Managing Authenticated Sessions | 2016-07-21 |
20160212126 | SECURE IDENTITY AUTHENTICATION IN AN ELECTRONIC TRANSACTION | 2016-07-21 |
20160212127 | VERIFYING AN APPLICATION IDENTIFIER ON A MOBILE DEVICE THROUGH A TELECOMMUNICATION NETWORK | 2016-07-21 |
20160212128 | Rolling Security Platform | 2016-07-21 |
20160212129 | System for Accessing Data from Multiple Devices | 2016-07-21 |
20160212130 | INFORMATION PROCESSING APPARATUS, POLICY MANAGEMENT APPARATUS, SECURITY POLICY MANAGEMENT METHOD, AND STORAGE MEDIUM | 2016-07-21 |
20160212131 | INFORMATION PROCESSING SYSTEM, USER TERMINAL, AND DATA PROCESSING DEVICE | 2016-07-21 |
20160212132 | CONTEXT-BASED POSSESSION-LESS ACCESS OF SECURE INFORMATION | 2016-07-21 |
20160212133 | SYSTEM AND METHODS FOR POLICY-BASED ACTIVE DATA LOSS PREVENTION | 2016-07-21 |
20160212134 | ONE STEP SECURITY SYSTEM IN A NETWORK STORAGE SYSTEM | 2016-07-21 |
20160212135 | CLINICAL-PATH MANAGEMENT SERVER AND CLINICAL-PATH MANAGEMENT SYSTEM | 2016-07-21 |
20160212136 | REMOTE ACCESS TO RESOURCES OVER A NETWORK | 2016-07-21 |
20160212137 | METHODS AND RESOURCES FOR CREATING PERMISSIONS | 2016-07-21 |
20160212138 | CONTEXTUALLY AWARE SHARING RECOMMENDATIONS | 2016-07-21 |
20160212139 | Session Security Splitting and Application Profiler | 2016-07-21 |
20160212140 | ZEROCONF PROFILE TRANSFERRING TO ENABLE FAST ROAMING | 2016-07-21 |
20160212141 | INVISIBLE PASSWORD RESET PROTOCOL | 2016-07-21 |
20160212142 | PURPOSE-SPECIFIC PACKAGES | 2016-07-21 |
20160212143 | METHOD AND SYSTEM FOR COMPILING MAP DATA | 2016-07-21 |
20160212144 | Authenticating Customers and Managing Authenticated Sessions | 2016-07-21 |
20160212145 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR MANAGING ACCESS TO SYSTEMS, PRODUCTS, AND DATA BASED ON INFORMATION ASSOCIATED WITH A PHYSICAL LOCATION OF A USER | 2016-07-21 |
20160212146 | PEDDaL Blockchaining for Document Integrity Verification Preparation | 2016-07-21 |
20160212147 | METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR A SERVER CONTROLLED DEVICE WAKEUP | 2016-07-21 |
20160212148 | NETWORK-LAYER APPLICATION-SPECIFIC TRUST MODEL | 2016-07-21 |
20160212149 | PROCEDURE FOR THE PREPARATION AND PERFORMING OF A POST ISSUANCE PROCESS ON A SECURE ELEMENT | 2016-07-21 |
20160212150 | METHOD AND APPARATUS FOR VERIFYING SOURCE ADDRESSES IN A COMMUNICATION NETWORK | 2016-07-21 |
20160212151 | SERVICE PROVISION METHOD | 2016-07-21 |
20160212152 | Method and Apparatus of Identifying User Risk | 2016-07-21 |
20160212153 | Code Labeling Based on Tokenized Code Samples | 2016-07-21 |
20160212154 | METHOD AND SYSTEM FOR HANDLING MALWARE | 2016-07-21 |
20160212155 | SYSTEM AND METHOD FOR BLOCKING ELEMENTS OF APPLICATION INTERFACE | 2016-07-21 |
20160212156 | SYSTEM AND METHOD FOR DETECTING MALICIOUS CODE BASED ON APPLICATION PROGRAMMING INTERFACE | 2016-07-21 |
20160212157 | SYSTEM AND METHOD FOR ANALYZING LARGE-SCALE MALICIOUS CODE | 2016-07-21 |
20160212158 | DISTRIBUTED PATTERN DISCOVERY | 2016-07-21 |
20160212159 | AUTOMATED RUNTIME DETECTION OF MALWARE | 2016-07-21 |
20160212160 | METHOD, DEVICE AND SYSTEM FOR ALERTING AGAINST UNKNOWN MALICIOUS CODES | 2016-07-21 |
20160212161 | STATISTICAL ANALYTIC METHOD FOR THE DETERMINATION OF THE RISK POSED BY FILE BASED CONTENT | 2016-07-21 |
20160212162 | INTRUSION DETECTION MECHANISM | 2016-07-21 |
20160212163 | Method and Apparatus to Identify the Source of Information or Misinformation in Large-Scale Social Media Networks | 2016-07-21 |
20160212164 | VERIFICATION OF COMPUTER SYSTEM PRIOR TO AND SUBSEQUENT TO COMPUTER PROGRAM INSTALLATION | 2016-07-21 |
20160212165 | HIERARCHICAL THREAT INTELLIGENCE | 2016-07-21 |
20160212166 | MANAGEMENT OF SECURITY POLICIES ACROSS MULTIPLE SECURITY PRODUCTS | 2016-07-21 |
20160212167 | CLASSIFICATION OF SECURITY POLICIES ACROSS MULTIPLE SECURITY PRODUCTS | 2016-07-21 |
20160212168 | CREATION OF SECURITY POLICY TEMPLATES AND SECURITY POLICIES BASED ON THE TEMPLATES | 2016-07-21 |
20160212169 | SECURITY POLICY UNIFICATION ACROSS DIFFERENT SECURITY PRODUCTS | 2016-07-21 |
20160212170 | GENERALIZED SECURITY POLICY USER INTERFACE | 2016-07-21 |
20160212171 | VISUALLY INTUITIVE INTERACTIVE NETWORK CYBER DEFENSE | 2016-07-21 |
20160212172 | VISUALLY INTUITIVE INTERACTIVE NETWORK MANAGEMENT | 2016-07-21 |
20160212173 | PREVALENCE-BASED REPUTATIONS | 2016-07-21 |
20160212174 | SECURITY TECHNIQUES FOR DEVICE ASSISTED SERVICES | 2016-07-21 |
20160212175 | Administration of a context-based cloud security assurance system | 2016-07-21 |