At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
SYSTEMS AND METHODS FOR THREAT ANALYSIS OF COMPUTER DATA
Various embodiments of the present disclosure can include systems, methods, and non-transitory computer readable media configured to aggregate a plurality of...
Identity and Trustworthiness Verification Using Online and Offline
Methods and systems for verifying the identity and trustworthiness of a user of an online system are disclosed. In one embodiment, the method comprises...
CRYPTOGRAPHIC VERIFICATION OF PROVENANCE IN A SUPPLY CHAIN
Some embodiments includes a provenance management system. The provenance management system can authenticate an entity account to register a public identity key...
SECURE VIRTUAL TRANSFER OF SUBSCRIBER CREDENTIALS
To virtually transfer subscriber identity module ("SIM") credentials from an active device to an inactive device in order to share carrier network access,...
Verification Code Generating System And Method
A verification code generating system and method are provided, where a difference of a displayed verification code and an inputted verification code are...
REMOTE VEHICLE APPLICATION PERMISSION CONTROL AND MONITORING
A vehicle may identify an application identifier of a mobile application executed by a mobile device paired with the vehicle; query a local policy table for...
Systems And Methods Of Transaction Authorization Using Server-Triggered
Switching To An Integrity-Attested...
Described systems and methods allow a client system to carry out secure transactions with a remote service-providing server, in applications such as online...
METHOD FOR ACCESSING A PLURALITY OF SERVICES BY A MOBILE TERMINAL USER,
AND RELATED SECURE DEVICE
The invention relates to a method for enabling the user of at least one mobile terminal to access a plurality of services, said method consisting of: creating...
INFORMATION PROCESSING APPARATUS, CONTROL METHOD FOR INFORMATION
PROCESSING APPARATUS, INFORMATION PROCESSING...
An information processing apparatus that communicates with a client that accesses a storage server and a server different from the storage server includes...
INTEGRATING A ROUTER BASED WEB METER AND A SOFTWARE BASED WEB METER
A method for associating a web event with a member of a group of users is implemented at a first computing device. The method includes: receiving a data access...
REMOTE PROFILE SECURITY SYSTEM
A method comprises storing, at the server computer system, user profile information for the remote user. The user profile information for the remote user (or a...
SECURE SYSTEM AND METHOD OF MAKING SECURE COMMUNICATION
A secure system 1 includes a requesting device (L01) which requests a communication, and a receiving device (L03) which receives a communication request from...
MANAGEMENT OF DRONE OPERATIONS AND SECURITY IN A PERVASIVE COMPUTING
A method to provide negotiation control to data such that a person or entity can negotiate the use of data gathered beyond what is needed for a particular use...
ACCESS CONTROL FOR EVENT DATA STORED IN CLOUD-BASED DATA STORES
Embodiments are directed towards a system and method for a cloud-based front end that may abstract and enable access to the underlying cloud-hosted elements...
SECURE COMMUNICATION NETWORK
The present invention is directed to a secure communication network that enables multi-point to multi-point proxy communication over the network. The network...
FAIL-SAFE DISTRIBUTED ACCESS CONTROL SYSTEM
A distributed system includes two or more components, where at least one of the components is a Policy Decision Point (PDP). The PDP is capable of requesting...
USER AUTHENTICATION BASED ON FOB/INDICIA SCAN
Embodiments of the invention are directed to systems, methods and computer program products for receiving a request from a user for access to at least one...
Actively Federated Mobile Authentication
To make a trusted web service call, a client application sends a series of messages to obtain tokens that allow service requests to pass through a service...
REMOTELY AUTHENTICATING A DEVICE
Remotely authenticating a device includes generating authentication data and secret key data in a controlled environment, sending the authentication data to a...
NFC PACKAGE FOR STORING BIOMETRIC INFORMATION AND ELECTRONIC DEVICE
An electronic device includes a biometric sensor configured to generate biometric data by sensing a biometric characteristic and to encrypt the biometric a...
SYSTEM AND METHOD FOR APPLYING DIGITAL FINGERPRINTS IN MULTI-FACTOR
A method for multi-factor authentication with a first client includes receiving a request associated with the first client, initiating an authentication...
CONFIGURABLE ELECTRONIC-DEVICE SECURITY LOCKING
An interface of an electronic device may be locked in accordance with an authorization confidence level indicating a likelihood that the electronic device is...
CONVENIENT WIFI NETWORK ACCESS USING UNIQUE IDENTIFIER VALUE
A WiFi network manager stores a unique identifier value such as a network address associated with a communication device as being a valid credential for the...
PROXY SERVER-BASED NETWORK SITE ACCOUNT MANAGEMENT
Disclosed are various embodiments for network site account management using a proxy server. A request for a secured resource on a network site is generated...
METHOD, SYSTEM, AND PROGRAM PRODUCT FOR REMOTELY ATTESTING TO A STATE OF A
A method, system, and program product for remotely attesting to a state of computing system is provided. Specifically, the present invention allows a remote...
Methods for Fraud Detection
Method and systems for validating a client user in a secured network are provided. Upon authentication, a user is supplied a login cookie that includes...
Single Sign On Availability
Methods and computer program products relate to single sign on (SSO) availability including identifying a set of single sign on applications in a system in...
Method, device, and system of accessing online accounts
Device, system, and method of accessing electronic mail. For example, a computerized method includes: receiving an identifier of an email account, and a...
SHUTTING DOWN ACCESS TO ALL USER ACCOUNTS
Disclosed is a system and associated method or restricting access to a user's account via one or more account access channels. The system typically includes a...
USER AUTHENTICATION BASED ON HISTORICAL TRANSACTION DATA
Embodiments are directed to systems, methods and computer program products for providing user authentication based on transaction data. Embodiments receive...
DYNAMIC ACTIVATION OF SERVICE INDICATORS BASED UPON SERVICE PERSONNEL
Embodiments of the invention provide a method, system and computer program product for dynamic activation of service indicators based upon service personnel...
TWO FACTOR AUTHENTICATION WITH AUTHENTICATION OBJECTS
Representations of authentication objects are provided for selection via an interface. An authentication object may be generated to include information...
SECURE CONTENT MESSAGING
Systems and methods are disclosed for secure messaging and content sharing. In one implementation, a processor receives a content item in a first format, the...
METHOD FOR OPERATING A NETWORK AND A NETWORK
A method for operating a network in which a Software-Defined Networking (SDN) functionality between at least some of a plurality of elements of the network is...
SYSTEM AND METHOD FOR DEVICE AUTHENTICATION
Various aspects of a system and a method for device authentication are disclosed herein. The system comprises one or more processors in a first communication...
AUTHENTICATING MOBILE APPLICATIONS USING POLICY FILES
Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, at a first server, a key pair and a policy...
LOCATION-BASED USER DISAMBIGUATION
Embodiments are directed to validating the identity of a user. In one scenario, a computer system determines that a login account has been created for a user,...
Technologies For Synchronizing And Restoring Reference Templates
Generally, this disclosure describes technologies for restoring and/or synchronizing templates such as biometric templates to/among one or more client devices....
Detection of Stale Encryption Policy By Group Members
Various techniques that allow group members to detect the use of stale encryption policy by other group members are disclosed. One method involves receiving a...
PROCESS FOR THE USER-RELATED ANSWERING OF CUSTOMER INQUIRIES IN DATA
A process for the processing of user inquiries in a data network saves user data anonymized at first in an independent process with an independent third-party...
METHOD OF DIGITAL IMAGES MANAGEMENT AND A DIGITAL IMAGES MANAGEMENT SYSTEM
A method of digital image management is described for a mobile device having both a camera capable of taking digital images and an ability to communicate with...
IMPLEMENTING NETWORK COMMUNICATION
When a node device receives a packet transmitted from a device connecting with the node device, the node device searches a public network address of a next hop...
Remote Access System for Using Scientific Algorithms in Local Data
A remote access system for processing local data with a computing algorithm stores information on various computing algorithms available via the system. A...
DATA TRANSMISSION SECURITY IMPROVEMENTS
A method of securely transmitting communication information from a first terminal operating in a first coordinate measurement domain to a second ...
Secure Network Access
The present invention relates to a system and method for facilitating access to secure network sites, such as sites providing secure financial information. An...
MEDIA DISTRIBUTION SYSTEM WITH MANIFEST-BASED ENTITLEMENT ENFORCEMENT
A method for enforcing entitlements includes configuring a wide variety of entitlements at a server; determining applicable combination of entitlements for a...
NETWORK SECURITY PROCESSING
A method, and associated system, for security processing of a request for a resource in a network security system. The request for the resource is received...
SECURITY-FOCUSED MONITORING SYSTEM
In some implementations, data from security monitoring devices of a facility is collected and analyzed within the facility and the results of the analysis is...
VPN SERVER ACCESS METHOD AND VPN CLIENT
Disclosed in the embodiments of the present invention is a VPN server access method, comprising: acquiring an IP address assigned to a SIM card by a server at...
CUSTOMIZABLE WEB APPLICATION FIREWALL FOR SOFTWARE AS A SERVICE PLATFORM
Disclosed herein are technologies for implementing a web application firewall specific to tenants, and providing different security rules that are particular...