FACEBOOK, INC. (Menlo Park, CA)

In one particular embodiment the method involves receiving, from a device using wireless signals, a request to access the router’s WLAN and an identification number for the device. The provisioning agent can be within wireless ranges of the device and of the router. An authentication server can be required by the provisioning agent to create an account password for their device. The password may be uniquely created by the authentication server for the device. The password could be sent to the provisioning agent by the authentication server. The provisioning agent could transmit to the router, the password along with the device identifier. The router can give the agent a indication that it has verified the password with its authentication server. The router could save the device’s identification number along with the password. The password may be sent to the device by the provisioning agent. The password will be used to authenticate the device with the router.

A social-networking platform, which could include a social-networking site, may enable its users (such as persons or organizations) to interact with it and with each other via it. A user can input information to create and save profiles on the social network. The user profile may include demographic information, communication-channel information, and information on personal interests of the user. The social-networkingsystem may also, with input from a user, create and store a record of relationships of the user with other users of the social-networking system, as well as provide services (e.g., wall posts, photo-sharing, event organization, messaging, games, oradvertisements) to facilitate social interaction between or among users.

A social-networking system can transmit messages or contents from any of the networks to a mobile device or any other device that uses a computer. Users may also install software to view the profile of a user and other information on the social-networking platform. A customized collection of content objects could be created by the social networking system for users to look at, for example, newsfeeds that contain aggregated stories from other users connected to the user.

Social-graph analysis analyzes social relations as network theories comprised of edges and nodes. Edges define the relationships between the actors. Nodes represent individual actors within the network. The resultinggraph-based structures are often very complex. There are many kinds of nodes, as well as many kinds of edges for connecting nodes. In its simplest form, a social graph is a graph of all of the pertinent edges that connect all of the nodes in the study.

In particular instances, a provisioning agent (e.g. an agent or client system) may authenticate one or more devices, each device having wireless network connectivity, to a wireless router associated with a wireless local area network (WLAN).The provisioning agent may detect a request that is broadcast (e.g. in the form of a BLUETOOTH signal) by an device that has been activated and is close to the agent that is provisioning it (e.g., within distance of the wireless agent). The request received by the provisioning agent might include a device identification number of the device (e.g., a media access control (MAC) address). An authentication server may be requested by the provisioning agent to generate a device-specific password. The provisioning agent can generate the device-specific password. The provisioning agent can transmit the password, which was created uniquely for the device, to the router with the device identifier. The authentication server may be used to verify the password as well as the device identifier. The provisioning agent could be informed by the router that the password has been verified. The provisioning agent might then verify that the password has been confirmed for the device. This will allow devices to connect to WLAN through the router. Each device can have an individual password that can be generated in any manner. A unique password is assigned to each device to ensure that hackers are blocked from connecting to private WLANs using compromised or stolen passwords. For instance, and without limitation the possibility exists that a malicious user could take over the transmission of the password from the provisioning agent the device and then attempt to access the WLAN using the router with the password. Since the router may require a valid password as well as the correct identification of the device as well, it could deny the access of the user who is malicious to the WLAN. The attacker could have another device to connect to theWLAN however, the other device would have a different device identifier. Thus, the router would not allow access to the malicious user.

These embodiments are only examples. The scope of the disclosure is not limited by them. Specific embodiments could include the entirety, a portion or none of the elements, components such as functions, features or steps of the embodiments disclosed above. The attached claims disclose examples of embodiments that conform to the invention. They address a method and a storage medium. Computer program products may also be included. The features mentioned in one claim for example method, could be claimed in a different claim, e.g. system. The claims are not based on reference or dependencies. They are chosen because of formal reasons. However any subject matter resulting from a deliberate reference back to previous claims (in particular, multiple dependencies) is possible to claim in addition, meaning the claims in any combination as well as the characteristics thereof are described and is able to be claimed regardless of dependencies chosen in the attached claims. The subject matter could be a combination of not only the features mentioned in the attached claims but any combination of features in the claims. Each feature in the claims may be combined with a different feature or combination of other features. Each of the features and embodiments described herein can be claimed in a separate claim, or in combination with any other feature or embodiment described herein.

Click here to view the patent on USPTO website.

Get Patents with PatentPC

What is a patent?

A patent is granted by the government to protect an invention patents give the inventor with the exclusive right to create, use, sell and promote the invention? Society gains when a new technology is brought into the marketplace. The benefits can be in directly, in that it can allow people to do previously impossible things. Or indirectly, due to the opportunities for economic growth (business expansion and job creation) which the invention provides.

Patent protection is sought by a variety of pharmaceutical companies and university researchers for research and development. A patent can cover a physical or abstract product or process or a technique or composition of material unique to the area. To be granted patent protection the invention must be novel, useful and not be obvious to other people in the same subject.

Patents are awarded to inventors who have commercially successful inventions. They serve as a motivator for inventors to create. Patents permit inventors and small companies to know that there’s a good chance they will be paid back for their time, effort and money spent on the development of technology. They can make a living by their work.

Businesses with the ability to:

Secure innovative products and services;

Improve the visibility and the value of your products ‘ presence on the market

Make your company and products stand out from the rest;

Access to business and technical knowledge and other information;

Beware of accidentally downloading third-party content or loosing valuable information, original outputs or any other creative output.

Patents transform inventor’s knowledge into a marketable asset, which creates new opportunities for job creation through licensing and joint ventures.

Investors who are involved in the development and commercialization of technology will find small companies with patent protection more appealing.

Patenting can lead to new ideas and inventions. These information may be patent-worthy.

Patents can be used to prevent untrustworthy third parties from profiting from the invention’s efforts.

Patent-protected technology that is commercially profitable may be used to finance technological research and development (R&D) which can increase the chance of better technology in future.

You can leverage intellectual property ownership to convince investors and lenders that your product has real commercial value. Sometimes, one powerful patent could open the door to numerous financing possibilities. Patents can be used along with other IP assets as collateral or security financing. You may also present investors with the patents you own to increase the value of your business. Forbes and other sources have pointed out that each patent can increase the value of your company by as much as $500,000 to $1 million.

Startups require a well-designed business plan that leverages the IP to demonstrate that your product/service is unique and superior or ingenuous. Investors will be impressed if your IP rights are secure or in the process to becoming secure, and if they support your business plan.

It is vital to protect an invention prior to filing for patent protection. Making an invention public before it is filed is often detrimental to its originality and render it unpatentable. Thus, disclosures that are filed prior to filing (e.g., for test-marketing investors, test-marketing, or for other business partners) must only be done following the signing of a confidentiality agreement.

There are several types of patents, and understanding the different types is crucial to protect your invention. Patents for utility cover techniques and machines. Design patents cover ornamental designs. Utility patents are the most beneficial since they protect the owner from copycats and other competitors. In most cases they are granted to improve or modify existing inventions. Utility patents also cover enhancements and modifications to existing inventions. A process patent would be a way to describe the actions or methods to perform a specific action. A chemical composition would include an amalgamation of ingredients.

How long does a patent last? While utility patents last for 20 years from the date of the initial filing, they may be extended by delay in the Patent Office.

Are you considering patenting your ideas? As patents are only granted to applicants who file first and you must file quickly – call PatentPC to speak with a patent attorney PatentPC to patent your idea now!

When drafting your patent application when you are writing a patent application, it is advised to conduct an internet search for patents, since the search can provide some insights into other people’s concepts. You’ll be able limit the nature of your invention. In addition, you can learn about state of the technology in your field of invention. You’ll be able to get a better idea of what your idea should be, and you’ll be better prepared to write the patent application.

How to Search for Patents

A patent search is the first step in obtaining your patent. You can do a google patent search or do a USPTO search. Once the patent application is filed, the product that is covered by the patent application could be described as patent-pending. you can find the patent application on a public pair. Once the patent office approves the application, you can conduct a patent number search to find the patent issued, and your product has been granted patent. You can also utilize the USPTO search engine. Read on for more details. A patent lawyer or attorney can help you through the procedure. Patents in the United States are granted by the US trademark and patent office as well as the United States patent office. This office also reviews trademark applications.

Interested in finding more similar patents? These are the steps to follow:

1. Brainstorm terms that describe your invention based on its purpose, composition, and usage.

Write down a succinct, precise description of your idea. Don’t use generic terms such as “device”, “process” or “system”. Look for synonyms to the terms you picked initially. Then, note significant technical terms as well as keywords.

Utilize the following questions to help you identify the keywords or concepts.

  • What is the goal of the invention? Is it a utilitarian device or an ornamental design?
  • Is the invention a method of creating something or a function? Are you referring to an item?
  • What is the nature and purpose of the invention? What is the physical makeup of the invention?
  • What is the goal of the invention
  • What are technical terms and keywords that describe the essence of an invention? A technical dictionary can assist you to find the appropriate words.

2. Use these terms to find relevant Cooperative Patent Classifications on the Classification Text Search Tool. To determine the most suitable classification to your invention, look through the class scheme of the classification (class schedules). If you don’t see any results from the Classification Text Search, you may want to consider replacing the words that describe your invention using synonyms.

3. Go through 3. Check the CPC Classification Definition to confirm the validity of the CPC classification you have found. The hyperlink to a CPC classification definition is provided when the classification you have selected has a blue box that includes “D” to its left. CPC classification definitions can assist you in determining the classification’s scope of application so that you can pick the one that is the most appropriate. These definitions may also include some search tips or other recommendations which could prove useful in further research.

4. The Patents Full-Text Database and the Image Database allow you to find patent documents that are accompanied by the CPC classification. You can search and select the most relevant patent publications first focusing on abstract and drawings representative of.

5. This collection of patent publications is the best to look at for any similarities with your invention. Pay attention to the specification and claims. It is possible to find additional patents by referring to the patent examiner as well as the applicant.

6. You can retrieve published patent applications that match the CPC classification you selected in Step 3. It is also possible to use the same strategy of searching you utilized in Step 4 to narrow down your search results to the most relevant patents by reading the abstracts and representative drawings on each page. Then, you must carefully review the published patent applications with particular attention paid to the claims as well as additional drawings.

7. Locate additional US patent publications using keywords searching in PatFT and AppFT databases, classification searching of non-U.S. patents as described below, and searching for non-patent literature disclosures of inventions using web search engines. For instance:

  • Add keywords to your search. Keyword searches may turn up documents that are not well-categorized or have missed classifications during Step 2. For example, US patent examiners often supplement their classification searches with keyword searches. Think about the use of technical engineering terminology rather than everyday words.
  • Search for foreign patents using the CPC classification. Then, re-run the search using international patent office search engines such as Espacenet, the European Patent Office’s worldwide patent publication database of over 130 million patent publications. Other national databases include:
  • Search non-patent literature. Inventions can be made public in many non-patent publications. It is recommended that you search journals, books, websites, technical catalogs, conference proceedings, and other print and electronic publications.

To review your search, you can hire a registered patent attorney to assist. A preliminary search will help one better prepare to talk about their invention and other related inventions with a professional patent attorney. In addition, the attorney will not spend too much time or money on patenting basics.