Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0119340 MEDIA SERVICES WITH ACCESS CONTROL
Systems and methods are describe wherein a service provider provides media services that can include, but are not limited to, telephone, radio, interactive and...
2016/0119339 DATA SECURITY SYSTEM WITH ENCRYPTION
A data security system, and method of operation thereof, is provided that includes: an electronic authentication subsystem for verifying a user identification...
2016/0119338 DEVICE ACCESS USING VOICE AUTHENTICATION
A device can be configured to receive speech input from a user. The speech input can include a command for accessing a restricted feature of the device. The...
2016/0119337 SYSTEMS AND METHODS FOR AUTHENTICATING A USER BASED ON A BIOMETRIC MODEL ASSOCIATED WITH THE USER
Systems and methods as provided herein may create a biometric model associated with a user. The created biometric model may be used to generate challenges that...
2016/0119336 SYSTEM AND METHOD FOR HARDWARE-BASED TRUST CONTROL MANAGEMENT
A trust control management method for security, operable on a computer system generates a unique Trust ID value by combining user-defined values with...
2016/0119335 METHODS AND SYSTEMS FOR DISTRIBUTING CRYPTOGRAPHIC DATA TO AUTHENTICATED RECIPIENTS
A method includes receiving, by an access control management system, from a first client device, information associated with an encrypted data object. The...
2016/0119334 ESTABLISHMENT OF COMMUNICATION CONNECTION BETWEEN MOBILE DEVICE AND SECURE ELEMENT
The invention relates to communication technology, and in particular, to a method of establishing communication connection between a mobile device and a secure...
2016/0119333 SYSTEM AND METHOD FOR CROSS-CHANNEL AUTHENTICATION
A system includes a memory and processor. The memory stores a user account identifier associated with a user account. The processor receives at least one user...
2016/0119332 DIRECT USER TO TICKETING SERVICE PROVIDER SECURE TRANSACTION CHANNEL
Ensuring security of electronic transactions between a user and a ticketing service provider involves establishing trust between a user and a transaction...
2016/0119331 Counter Sets For Copies Of One Time Password Tokens
One time password (OTP) technology enables a plurality of OTP software token instances (or copies) to be used simultaneously on a plurality of computing...
2016/0119330 SMART ROUTER WITH ENHANCED SECURITY
A router receives, from a LAN-side client computing device, a request for a web resource served by a WAN side destination server, sent via an unsecure...
2016/0119329 DEVICE AUTHENTICATION FOR SECURE KEY RETRIEVAL FOR STREAMING MEDIA PLAYERS
Systems and methods are disclosed that authenticate devices or users, and enable playback of secured streaming content through a media player. In one...
2016/0119328 SYSTEM AND METHOD FOR USER AUTHENTICATION
A system and method for providing authentication of a user is disclosed. The use of a non-confidential and unique user identification number and a temporary...
2016/0119327 Confidence-based authentication discovery for an outbound proxy
A confidence-based authentication discovery scheme is implemented at a proxy. The scheme assumes that some level of unauthenticated browsing is allowed prior...
2016/0119326 System and Method for Single Sign-On Session Management Without Central Server
A method and system for single sign-on session management. Functions of session management and client log-in, normally handled by separate system servers, are...
2016/0119325 SINGLE SIGN ON PROXY FOR REGULATING ACCESS TO A CLOUD SERVICE
Embodiments disclosed herein provide systems, methods, and computer readable media for using a single sign-on proxy to regulate access to a cloud service. In a...
2016/0119324 Single Sign On Across Multiple Devices Using A Unique Machine Identification
Single sign on technology enables shared access to a protected service, such as an application, from a plurality of dynamically associated computing devices....
2016/0119323 SINGLE SIGN ON FOR NATIVE AND WRAPPED WEB RESOURCES ON MOBILE DEVICES
A method includes performing operations as follows on a processor: associating a single sign on module with a native application residing on a mobile device,...
2016/0119322 AUTO-USER REGISTRATION AND UNLOCKING OF A COMPUTING DEVICE
A first computing device provides an indication that the first computing device accepts dynamic user registration of user accounts over a wireless connection....
2016/0119321 FLEXIBLE AUTHENTICATION FRAMEWORK
A flexible and extensible architecture allows for secure searching across an enterprise. Such an architecture can provide a simple Internet-like search...
2016/0119320 METHOD AND SYSTEM FOR SECURE DEPLOYMENT AND USE OF BLUETOOTH LOW ENERGY BEACONS AND OTHER NETWORK DEVICES
A network security system is provided to secure one or more digital commerce or advertising processes for one more users, based on the presence of the one or...
2016/0119319 METHOD AND APPARATUS FOR FACILITATING THE LOGIN OF AN ACCOUNT
Systems and methods are provided for facilitating account login, wherein the method is implemented by a first server that is associated with a first account....
2016/0119318 EFFICIENT START-UP FOR SECURED CONNECTIONS AND RELATED SERVICES
One embodiment of the present invention includes an approach for efficient start-up for secured connections and related services. A client machine receives,...
2016/0119317 SECURED DATA CHANNEL AUTHENTICATION IMPLYING A SHARED SECRET
The invention solves the way of authentication of secured data channel between two sides (A, B) when there is at first established a non-authenticated...
2016/0119316 WIRELESS NETWORK AUTHENTICATION METHOD AND WIRELESS NETWORK AUTHENTICATION APPARATUS
Embodiments of the present application provide a wireless network authentication method and wireless network authentication apparatuses, and relate to the...
2016/0119315 CONFERENCING INTELLIGENCE ENGINE IN A COLLABORATION CONFERENCING SYSTEM
Aspects of the present disclosure involve systems, methods, computer program products, and the like, for collaboration conferencing with multiple participants...
2016/0119314 IDENTIFICATION TOKEN IN A COLLABORATION CONFERENCING SYSTEM
Aspects of the present disclosure involve systems, methods, computer program products, and the like, for collaboration conferencing with multiple participants...
2016/0119313 User Login Methods, Devices, and Systems
A user login method for use in a terminal is provided. The method includes: receiving an automatic login request; acquiring a terminal identifier of the...
2016/0119312 ENCRYPTION METHODS AND APPARATUS
The embodiments discussed herein relate to updating and encrypting passwords for one or more computing devices. The computing devices can be associated with a...
2016/0119311 CARRIER NETWORK SECURITY INTERFACE FOR FIELDED DEVICES
Carrier-side security services for fielded devices is disclosed. In contrast to conventional authentication systems for fielded devices, wherein an end-to-end...
2016/0119310 AUTHENTICATION AND PAIRING OF A MOBILE DEVICE TO AN EXTERNAL POWER SOURCE
A mobile device communicates with an authenticator affiliated with a recharging facility, to identify itself. To confirm that the mobile device is connected to...
2016/0119309 METHOD AND APPARATUS FOR PROTECTING REGIONS OF AN ELECTRONIC DOCUMENT
A method and apparatus for protecting regions of an electronic document are provided. According to the method, the entire electronic document is protected. The...
2016/0119308 INFORMATION MANAGING SERVER AND METHOD
An information managing server includes: a memory; and a processor configured to execute a procedure, the procedure comprising: registering, in the memory,...
2016/0119307 FAILURE RECOVERY MECHANISM TO RE-ESTABLISH SECURED COMMUNICATIONS
Embodiments of the present invention include techniques for reestablishing a secure communication channel between a client machine and a server machine. A...
2016/0119306 SYSTEMS AND METHODS FOR CREDENTIALING OF NON-LOCAL REQUESTORS IN DECOUPLED SYSTEMS UTILIZING A DOMAIN LOCAL...
Embodiments as disclosed provide systems and methods that use a local authenticator within a domain to provide a credential to access a resource of the domain...
2016/0119305 ELECTRONIC PROTECTED HEALTH INFORMATION SECURITY FOR DIGITAL MEDICAL TREATMENT ROOM
A medical imaging system includes a data store having stored medical imaging data and a computer. The system may be in a medical treatment room and is adapted...
2016/0119304 TECHNIQUES FOR OPTIMIZING AUTHENTICATION CHALLENGES FOR DETECTION OF MALICIOUS ATTACKS
A method and system for optimizing segregation between human-operated clients and machine-operated clients accessing computing resources are provided. The...
2016/0119303 INFORMATION SECURITY ATTACHMENT DEVICE FOR VOICE COMMUNICATION AND INFORMATION SECURITY METHOD FOR VOICE...
An information security attachment device for voice communication and an information security method for voice communication using the same are provided. The...
2016/0119302 Authentication Engine and Stream Cipher Engine Sharing in Digital Content Protection Architectures
A system for receiving and decrypting media content encrypted according to the HDCP protocol is described herein. A receiving device coupled to a plurality of...
2016/0119301 POLICY SETTINGS CONFIGURATION WITH SIGNALS
Techniques and systems are disclosed for enabling device configuration using signals that encode device policy settings. A method of configuring policy...
2016/0119300 METHOD FOR THE ADMINISTRATION OF MEDIA FOR WIRELESS COMMUNICATION
A method is provided for carrying out a reading and/or writing process, using a first actively operated medium, from or on a passively operated second medium...
2016/0119299 END-TO-END ENCRYPTION IN A SOFTWARE DEFINED NETWORK
A first information comprising an identification of an encryption algorithm supported by a first component from the first component of a software defined...
2016/0119298 SYSTEM AND METHOD FOR ENCRYPTION KEY MANAGEMENT IN A MIXED INFRASTRUCTURE STREAM PROCESSING FRAMEWORK
A system and method for protecting streams in a mixed infrastructure includes determining processing elements that are to access a data stream in a stream...
2016/0119297 METHOD FOR SECURE NETWORK BASED ROUTE OPTIMIZATION IN MOBILE NETWORKS
The present invention provides a method of route optimization involving a first mobile device associated with a first home gateway. One embodiment of the...
2016/0119296 Token Enrollment System and Method
Embodiments of the invention are directed to methods, apparatuses, computer readable media and systems for providing a token service environment that allows a...
2016/0119295 SYSTEM AND METHOD FOR PROVIDING PERSONALIZED AND CONFIDENTIAL DATA MANAGEMENT AND SHARING SERVICES
A method and system for providing personalized and confidential data management and sharing services to the subscriber are disclosed. The method includes...
2016/0119294 METHODS AND SYSTEMS FOR DATA TRAFFIC CONTROL AND ENCRYPTION
Methods, systems and programming for data traffic control and encryption. In one example, data traffic is received from a first node to be sent to a second...
2016/0119293 System and Method for Authenticating and Encrypting Data Transmitted To and From the Devices and Cloud Servers
A method is provided of authenticating and encrypting data transmitted between a user and a remote cloud server, where the method includes providing a computer...
2016/0119292 RE-ENCRYPTION SYSTEM, RE-ENCRYPTION APPARATUS, AND PROGRAM
A re-encryption system according to this embodiment includes a file sharing apparatus and a re-encryption apparatus. Upon receiving a file request from the...
2016/0119291 SECURE COMMUNICATION CHANNEL WITH TOKEN RENEWAL MECHANISM
One embodiment of the present invention includes a server machine configured to establish a secure communication channel with a client machine via renewable...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.