Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0127359 COMPLIANT AUTHENTICATION BASED ON DYNAMICALLY-UPDATED CRTEDENTIALS
A system, method and a computer-readable medium for authenticating a user in a live manner in non-face-to-face transactions, including a user downloading an...
2016/0127358 PROVIDING A SECURITY MECHANISM ON A MOBILE DEVICE
Disclosed are methods, apparatus, systems, and computer program products for providing a security mechanism on a mobile device before performing an action on a...
2016/0127357 Method for safeguarding a network
A method for safeguarding a network made up of at least one first device and one second device. The first device derives a first challenge from physical...
2016/0127356 INFORMATION PROCESSING SYSTEM AND AUTHENTICATION METHOD
An information processing system includes a service utilizing device and at least one information processing device to provide a service for the service...
2016/0127355 EMBEDDED EXTRINSIC SOURCE FOR DIGITAL CERTIFICATE VALIDATION
A computer uses the information included within a digital certificate to obtain a current date and time value from a trusted extrinsic trusted source and the...
2016/0127354 MANAGEMENT METHOD AND ARRANGEMENT FOR OUTPATIENT ELECTROCARDIOGRAPHY ON A PATIENT
A management method for outpatient electrocardiography on a patient using an ECG recorder, an administration network, a first mobile device and at least one...
2016/0127353 METHOD AND APPARATUS FOR ENABLING SECURED CERTIFICATE ENROLLMENT IN A HYBRID CLOUD PUBLIC KEY INFRASTRUCTURE
In a method a public key infrastructure (PKI) device receives a certificate signing request (CSR) and an identity assertion cryptographically bound to an end...
2016/0127352 STEP-UP AUTHENTICATION FOR SINGLE SIGN-ON
A method for authenticating a user seeking access to first and second resources that have different authentication levels. The method includes receiving a...
2016/0127351 CONTINUOUS MULTI-FACTOR AUTHENTICATION
Technologies for continuously authenticating a user via multiple authentication factors include a computing device for generating a continuous authentication...
2016/0127350 MULTIPLE INPUT BASED PASSWORDS
A computer-implemented method, carried out by one or more processors, for utilizing one or more input methods for passwords. In an embodiment, the method...
2016/0127349 DATA PROCESSING SYSTEM, DATA PROCESSING APPARATUS AND LOG IN METHOD
A data processing system including a data processing apparatus, includes a user data storing unit that stores user data of a user who uses a first service, the...
2016/0127348 LINKED REGISTRATION
Secure registration of a new application with a server system is provided. An old application has been registered with the system. A first link between the new...
2016/0127347 AGGREGATE SERVICE WITH USER INTERFACE
One embodiment provides a method, including: receiving authentication input, at a device, that is sent to an aggregate service device; requesting file system...
2016/0127346 MULTI-FACTOR AUTHENTICATION
The disclosed invention is a system and method that allows for authentication of a user to a network using a token. The user can use movements or gesture that...
2016/0127345 System And Method For Providing A Content Delivery Network Via A Motor Vehicle
A cache server disposed in a motor vehicle receives and caches content from a content distribution network when a load of a cellular link to the content...
2016/0127344 PASSWORD-LESS AUTHENTICATION SYSTEM AND METHOD
A processor-implemented method for authenticating a login without a password. The method includes: receiving a request to authenticate a login, the request...
2016/0127343 AUTHENTICATING DATA TRANSFER
In an embodiment, a method for authenticating data transfer is provided. A user-agent is redirected between an enterprise, an intermediary platform, and an...
2016/0127342 System and Method for Providing Security Monitoring
The present disclosure describes systems and methods for processing security sensor data that enhances the ability of a user to quickly and efficiently review...
2016/0127341 A Method and Apparatus for Anonymous and Trustworthy Authentication in Pervasive Social Networking
A method for anonymous authentication may comprise: issuing token information to a first node registered with a network entity, wherein the token information...
2016/0127340 METHOD AND APPARATUS FOR CONNECTING A COMMUNICATION DEVICE TO A DEPLOYABLE NETWORK WITHOUT COMPROMISING...
A method and apparatus is provided for connecting a communication device to a deployable system. The deployable system obtains at least one deployable key...
2016/0127339 AGGREGATE SERVICE WITH ENHANCED CLOUD DEVICE MANAGEMENT
One embodiment provides a method, comprising: receiving, from a client device, a request by a user to access an aggregate service device; authenticating, at an...
2016/0127338 AGGREGATE SERVICE WITH ENHANCED REMOTE DEVICE MANAGEMENT
One embodiment provides a method, including: receiving, from a client device, a request by a user to access an aggregate service device; authenticating, at the...
2016/0127337 SYSTEMS AND METHODS FOR CLOUD DATA SECURITY
Techniques for providing data security services with respect to cloud-based services are described. Examples include a security service provider ("SSP")...
2016/0127336 PREVENTING PERSISTENT STORAGE OF CRYPTOGRAPHIC INFORMATION USING SIGNALING
Organizations maintain and generate large amounts of sensitive information using computer hardware resources and services of a service provider. Furthermore,...
2016/0127335 DIRECTORY SERVICE DEVICE, CLIENT DEVICE, KEY CLOUD SYSTEM, METHOD THEREOF, AND PROGRAM
Name information which is generated by using a value corresponding to a decryption key and address information of a key cloud device which provides a cloud-key...
2016/0127334 RESUMPTION OF PLAY FOR A CONTENT-DELIVERY SESSION
Multimedia content may be delivered to content consumer devices via a content-delivery network. Encrypted content and cryptography keys for decrypting the...
2016/0127333 Technologies for Secure Inter-Virtual Network Function Communication
Technologies for secure inter-virtual network function communication include a computing device to determine a cryptographic key for secure communication over...
2016/0127332 OFF-HOST AUTHENTICATION SYSTEM
An off-host authentication system includes an authentication information handling system (IHS) that is coupled to a network. The off-host authentication system...
2016/0127331 METHOD AND SYSTEM FOR ENCRYPTED COMMUNICATIONS
Method and device of encrypting communication between a server and a peripheral device are disclosed. The method includes: a server receiving a session request...
2016/0127330 RESOURCE LOCATORS WITH KEYS
Requests are pre-generated to include a cryptographic key to be used in fulfilling the requests. The requests may be encoded in uniform resource locators and...
2016/0127329 SYSTEMS AND METHODS FOR PROVIDING CONDITIONAL ACCESS TO TRANSMITTED INFORMATION
Controlling access to position information at a receiver, or at another device external to the receiver. Various considerations, including a requested service...
2016/0127328 INVISIBLE TWO FACTOR AUTHENTICATION AND INCREMENTAL DYNAMIC DATA
In an example embodiment, invisible two factor authentication is performed by receiving, at a first machine, a registration request from a second machine, with...
2016/0127327 ROAMING CONTENT WIPE ACTIONS ACROSS DEVICES
Content on a device is encrypted and protected based on a data protection key. The protected content can then be copied to cloud storage, and from the cloud...
2016/0127326 TELECOMMUNICATION METHOD FOR SECURELY EXCHANGING DATA
The invention provides for a telecommunication method of securely exchanging unencrypted data between a telecommunications device and a first server computer...
2016/0127325 SCRAMBLING BUSINESS DATA
Methods and system are disclosed that scramble business data before transferring to a test environment. In one aspect, a business data scrambling logic may...
2016/0127324 PRIVACY PROTECTED INTERNET NETWORKS, SUBNETWORKS AND SUB-SUBNETWORKS
A computerized methods and systems to create, control and manage restricted scope and closed internet interactive networks, subnetworks and sub-subnetworks....
2016/0127323 TRUSTED DEVICE CONTROL MESSAGES
Two endpoint devices communicate with one another in a secure session using a secure protocol. Trusted control messages are passed upstream from one of the...
2016/0127322 MASKING DATA WITHIN JSON-TYPE DOCUMENTS
A method comprising using at least one hardware processor for: receiving input from a user with respect to masking of a data element in one or more documents...
2016/0127321 METHOD AND SYSTEM FOR VPN ISOLATION USING NETWORK NAMESPACES
One embodiment of the present invention provides a system for providing exclusive access to a virtual private network (VPN) connection to an authorized...
2016/0127320 Proxy Forwarding of Local Traffic by Edge Devices in a Multi-Homed Overlay Virtual Private Network
A first provider edge network device that is configured in a multi-homed virtual private network for a data center in which there are one or more peer edge...
2016/0127319 METHOD AND SYSTEM FOR AUTONOMOUS RULE GENERATION FOR SCREENING INTERNET TRANSACTIONS
A computer system for evaluating transactions in a network includes a storage medium, one or more processors coupled to said storage medium, and computer code...
2016/0127318 SECURITY SERVICES FOR END USERS THAT UTILIZE SERVICE CHAINING
Embodiments described herein provide security for end users of User Equipment (UE) that utilize service chaining for Service Data Flows (SDFs). One embodiment...
2016/0127317 METHOD AND APPARATUS FOR DISPLAYING HTTPS BLOCK PAGE WITHOUT SSL INSPECTION
The present disclosure discloses a method and system for displaying an HTTPS block page without SSL inspection. Specifically, a network device snoops a first...
2016/0127316 HIGHLY SECURE FIREWALL SYSTEM
A firewall system with closed ports configured to reject the data packets and create a readable log of rejected data packets. A port listening processor...
2016/0127315 FIREWALL BASED PREVENTION OF THE MALICIOUS INFORMATION FLOWS IN SMART HOME
A system for preventing malicious attacks on a device in a Smart Home network comprises logical circuitry suitable to compare information flows in said network...
2016/0127314 Front End Processor for Short Message Service Centers
A communication gateway which includes a short-message-system network element is disclosed. The communication gateway includes a short-message-system network...
2016/0127313 Identifying Port Misconnections On A Network Device
Identifying port misconnections on a network device is disclosed. In an embodiment, host-to-port configuration data for a second network device is received at...
2016/0127312 Optimization of Resource URLS in Machine-to-Machine Networks
A mechanism for forming and using shortened Uniform Resource Locators or URLs for resources available within a Machine-to-Machine, M2M, network enables the use...
2016/0127311 RECLAIMING LEASED IP ADDRESSES IN WIRELESS NETWORKS
Methods, systems and computer readable media for reclaiming DHCP leased IP address from disassociated clients in a WLAN are described.
2016/0127310 DISTRIBUTED INDUSTRIAL CONTROL MONITORING AND MANAGEMENT
An industrial control system provides for a bottom-up configuration and incremental growth in size and complexity without requiring system-specific programming...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.