Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0149912 Trusted Computing Base Evidence Binding for a Migratable Virtual Machine
In an embodiment, at least one computer readable medium has instructions stored thereon for causing a system to cryptographically sign, at a secure platform...
2016/0149911 FACILITATION OF SEAMLESS SECURITY DATA TRANSFER FOR WIRELESS NETWORK DEVICES
Configuration and credential data associated with a wireless network can be stored by the wireless network or a by a gateway device associated with the...
2016/0149910 MANAGING SOFTWARE KEYS FOR NETWORK ELEMENTS
Methods and systems for managing software keys include distributing software keys from a vendor to a customer key manager at a secure customer network that...
2016/0149909 IMPLEMENTING BLOCK DEVICE EXTENT GRANULARITY AUTHORIZATION MODEL PROCESSING IN CAPI ADAPTERS
A method, system and computer program product are provided for implementing block extent granularity authorization model processing in Coherent Accelerator...
2016/0149908 AUTHENTICATION METHOD AND AUTHENTICATION SYSTEM
A system performs mutual authentication between a controller and a first device, creates a group key, shares the group key, and sets the first device as a...
2016/0149907 BIOMETRIC-BASED WIRELESS DEVICE ASSOCIATION
According to one aspect of the present disclosure, a method and technique for automatically associating a wireless device to a data processing system using...
2016/0149906 BIOMETRIC AUTHENTICATION METHOD, COMPUTER-READABLE RECORDING MEDIUM, AND BIOMETRIC AUTHENTICATION APPARATUS
A biometric authentication method is disclosed. Biometric information is acquired from a pair of portions at right and left of a body. Collation feature data...
2016/0149905 Apparatus for Authenticating Pairing of Electronic Devices and Associated Methods
An apparatus comprising: a processor; and a memory including computer program code, the memory and the computer program code configured, with the processor, to...
2016/0149904 SYSTEMS AND METHODS TO GENERATE AUTHORIZATION DATA BASED ON BIOMETRIC DATA AND NON-BIOMETRIC DATA
A method of selectively authorizing access includes obtaining, at an authentication device, first information corresponding to first synthetic biometric data....
2016/0149903 METHOD FOR SUPPORTING SUBSCRIBER'S SERVICE PROVIDER CHANGE RESTRICTION POLICY IN MOBILE COMMUNICATIONS AND...
The present invention relates to a method and an apparatus for employing an embedded subscriber identity module (hereinafter referred to as eSIM) to apply a...
2016/0149902 TEMPORAL MODIFICATION OF AUTHENTICATION CHALLENGES
A method for authenticating a user of a computing device. The method includes a computer processor receiving an indication that a user of a computing device is...
2016/0149901 METHOD AND APPARATUS FOR ENABLING SERVICE-CONFIGURABLE WIRELESS CONNECTIONS
The disclosed embodiments provide a system that enables service-configurable wireless connections. During operation, a local service endpoint of a service runs...
2016/0149900 AUTONOMOUS SYSTEM FOR SECURE ELECTRIC SYSTEM ACCESS
Secure electronic access may be provided by receiving at least one electronic certificate from an electronic device seeking to access a secure resource at a...
2016/0149899 SYSTEM AND METHOD FOR NON-REPLAYABLE COMMUNICATION SESSIONS
Systems, methods, and non-transitory computer-readable storage media for a non-replayable communication system are disclosed. A first device associated with a...
2016/0149898 REDIRECT TO INSPECTION PROXY USING SINGLE-SIGN-ON BOOTSTRAPPING
An authentication request is generated when a user of a client device attempts to initiate a user session with an application managed by a service provider. An...
2016/0149897 INTERACTIVE BASE AND TOKEN CAPABLE OF COMMUNICATING WITH COMPUTING DEVICE
A smart charm bracelet that includes an elongated band or other base, at least one smart charm or other token that may be coupled to or otherwise associated...
2016/0149896 FILE FORMAT AND PLATFORM FOR STORAGE AND VERIFICATION OF CREDENTIALS
In various embodiments, a computer-implemented method for generating and verifying officially verifiable electronic representations may be disclosed. The...
2016/0149895 Authentication Apparatus That Assists Input of User ID and Password Authentication Method, and Recording Medium
An authentication apparatus includes an authentication determination circuit, a partial determination circuit, and a combination determination circuit. The...
2016/0149894 SYSTEM AND METHOD FOR PROVIDING MULTI FACTOR AUTHENTICATION
An authentication technique is disclosed that permits or denies access to content based on several factors. Such factors include a user ID, a user password, a...
2016/0149893 STRONG AUTHENTICATION METHOD
The present invention relates to a method of authenticating, with an authentication server, a user having at his disposal a calculator storing at least one...
2016/0149892 ELECTRONIC PASSWORD LOCK APPARATUS AND PASSWORD PROTECTION SYSTEM USING THE SAME
An electronic password lock apparatus includes a storage unit, an input unit, and a communication unit. The storage unit stores a unique identification number...
2016/0149891 Sharing Access to a Media Service
Examples provided herein are directed to a computing device and media playback system sharing access to a media service corresponding to a media application...
2016/0149890 AUTHENTICATION METHOD
An authentication method for at least one of a plurality of devices connected to a HAN includes checking, with a first device among the plurality of devices,...
2016/0149889 SECURE CONNECTION BETWEEN A DATA REPOSITORY AND AN INTELLIGENCE APPLICATION
Embodiments of the invention are directed to systems, methods and computer program products for establishing a secure connection between a data repository and...
2016/0149888 Systems and Methods for Facilitating Access to Private Files Using a Cloud Storage System
A method for providing access to objects associated with a particular client in a cloud storage system is disclosed. The method includes the steps of...
2016/0149887 SYSTEMS AND METHODS FOR MALICIOUS CODE DETECTION ACCURACY ASSURANCE
There is provided a method for authenticating an attempt at establishment of a network connection by allowed code, comprising: providing a dataset having...
2016/0149886 METHOD, DEVICE AND SYSTEM FOR ACCOUNT RECOVERY WITH A DURABLE CODE
A method for resetting credentials of an account of a user by a server and a database associated with the server is provided, the database including records of...
2016/0149885 INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, AND INFORMATION PROCESSING METHOD
An information processing device includes: an authentication unit configured to compare, when receiving first user information used for authentication...
2016/0149884 ELECTRONIC KEY SYSTEM AND INFORMATION REGISTRATION SYSTEM
An electronic key system includes a mobile device and a control device. Main identification information identifying the control device is registered in the...
2016/0149883 TEMPORAL MODIFICATION OF AUTHENTICATION CHALLENGES
A method for authenticating a user of a computing device. The method includes a computer processor receiving an indication that a user of a computing device is...
2016/0149882 MULTI-TENANCY SUPPORT IN A CLOUD BASED DATA GRID
A system with a tenant aware in-memory data grid includes a data grid configured to store data in memory. A request manager is configured to receive a data...
2016/0149881 PROVIDING ACCESS TO A RESTRICTED RESOURCE VIA A PERSISTENT AUTHENTICATED DEVICE NETWORK
Providing access to a restricted resource via a persistent authenticated device network, including: authenticating a user; joining a persistent authenticated...
2016/0149880 SECURE COMMUNICATION PATHS IN DATA NETWORKS WITH TETHERED DEVICES
A communication network processes intermediate security data from intermediate access nodes on a communication path between a network access node and an...
2016/0149879 METHOD FOR GENERATING CRYPTOGRAPHIC "ONE-TIME PADS" AND KEYS FOR SECURE NETWORK COMMUNICATIONS
A method of generating random and pseudo-random material which is incorporated in devices located at each end of a communications network for secure...
2016/0149878 PROTECTING USER IDENTITY AND PERSONAL INFORMATION BY SHARING A SECRET BETWEEN PERSONAL IOT DEVICES
A wearable device provides protection for personal identity information by fragmenting a key needed to release the personal identity information among members...
2016/0149877 SYSTEMS AND METHODS FOR CLOUD-BASED WEB SERVICE SECURITY MANAGEMENT BASEDON HARDWARE SECURITY MODULE
A new approach is proposed that contemplates systems and methods to support security management for a plurality of web services hosted in a cloud at a data...
2016/0149876 SECURITY FOR PROSE GROUP COMMUNICATION
A method of performing authentication and authorization in Proximity based Service (ProSe) communication by a requesting device (31) which sends a request of a...
2016/0149875 PROTECTED INFORMATION SHARING
A request for sharing information of a first user to a second user is received. Responsive to the request, information of the first user is obtained. The...
2016/0149874 PRIMITIVE FUNCTIONS FOR USE IN REMOTE COMPUTER MANAGEMENT
The invention facilitates remote management of a computer via a network. Remote computer management capability can be expanded beyond that previously available...
2016/0149873 ELECTRONIC COMMERCE WITH CRYPTOGRAPHIC AUTHENTICATION
A method for facilitating an authentication related to an electronic transaction between a first and a second user is provided. Authentication data is received...
2016/0149872 SECURE CONNECTION BETWEEN A DATA REPOSITORY AND AN INTELLIGENCE APPLICATION
Embodiments of the invention are directed to systems, methods and computer program products for establishing a secure connection between a data repository and...
2016/0149871 METHOD AND APPARATUS FOR SECURE COMMUNICATION VIA MULTIPLE COMMUNICATION PATHS
A method for sending and receiving a data through multiple communication paths and an apparatus for receiving a data through multiple communication paths. A...
2016/0149870 Network Authentication Method using a Card Device
A network authentication method includes: by a user terminal, through execution of an application, connecting to a network server and sending a server...
2016/0149869 KEY ESTABLISHMENT FOR CONSTRAINED RESOURCE DEVICES
It is disclosed a method and a constrained resource device (502, 70, 90) for establishing a secret first key between a client device (506) and the constrained...
2016/0149868 CONTENT TRANSMISSION DEVICE AND CONTENT TRANSMISSION METHOD, CONTENT RECEPTION DEVICE AND CONTENT RECEPTION...
To reduce a load of time and cost at the time of transition to a safer system in which an encryption scheme is newly set. By allowing a device of a transition...
2016/0149867 ADAPTIVE TRAFFIC ENCRYPTION FOR OPTICAL NETWORKS
A technique is provided for a transmitting optical network element with an encrypting entity. The transmitting optical network element has an interface for...
2016/0149866 ACCUMULATING AUTOMATA AND CASCADED EQUATIONS AUTOMATA FOR NON-INTERACTIVE AND PERENNIAL SECURE MULTI-PARTY...
A method of securely executing practically unbounded input stream of symbols, by non-interactive, multi-party computation, according to which the input stream...
2016/0149865 CRYPTOGRAPHIC SECURITY PROFILES
Two endpoint devices communicate with one another in a secure session by negotiating encrypted communications at initial establishment of the session. Each...
2016/0149864 METHOD AND SYSTEM FOR E-READING COLLECTIVE PROGRESS INDICATOR INTERFACE
A method and system for implementing an e-reading collective progress indicator interface is provided. One embodiment, utilizes a share progress selection to...
2016/0149863 METHOD AND SYSTEM FOR MANAGING A HOST-BASED FIREWALL
Disclosed herein are a system and method for managing a firewall of one or more host computing device associated with a customer, wherein each host computing...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.