Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0164886 SYSTEMS AND METHODS FOR THREAT ANALYSIS OF COMPUTER DATA
Various embodiments of the present disclosure can include systems, methods, and non-transitory computer readable media configured to aggregate a plurality of...
2016/0164885 Identity and Trustworthiness Verification Using Online and Offline Components
Methods and systems for verifying the identity and trustworthiness of a user of an online system are disclosed. In one embodiment, the method comprises...
2016/0164884 CRYPTOGRAPHIC VERIFICATION OF PROVENANCE IN A SUPPLY CHAIN
Some embodiments includes a provenance management system. The provenance management system can authenticate an entity account to register a public identity key...
2016/0164883 SECURE VIRTUAL TRANSFER OF SUBSCRIBER CREDENTIALS
To virtually transfer subscriber identity module ("SIM") credentials from an active device to an inactive device in order to share carrier network access,...
2016/0164882 Verification Code Generating System And Method
A verification code generating system and method are provided, where a difference of a displayed verification code and an inputted verification code are...
2016/0164881 REMOTE VEHICLE APPLICATION PERMISSION CONTROL AND MONITORING
A vehicle may identify an application identifier of a mobile application executed by a mobile device paired with the vehicle; query a local policy table for...
2016/0164880 Systems And Methods Of Transaction Authorization Using Server-Triggered Switching To An Integrity-Attested...
Described systems and methods allow a client system to carry out secure transactions with a remote service-providing server, in applications such as online...
2016/0164879 METHOD FOR ACCESSING A PLURALITY OF SERVICES BY A MOBILE TERMINAL USER, AND RELATED SECURE DEVICE
The invention relates to a method for enabling the user of at least one mobile terminal to access a plurality of services, said method consisting of: creating...
2016/0164878 INFORMATION PROCESSING APPARATUS, CONTROL METHOD FOR INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING...
An information processing apparatus that communicates with a client that accesses a storage server and a server different from the storage server includes...
2016/0164877 INTEGRATING A ROUTER BASED WEB METER AND A SOFTWARE BASED WEB METER
A method for associating a web event with a member of a group of users is implemented at a first computing device. The method includes: receiving a data access...
2016/0164876 REMOTE PROFILE SECURITY SYSTEM
A method comprises storing, at the server computer system, user profile information for the remote user. The user profile information for the remote user (or a...
2016/0164875 SECURE SYSTEM AND METHOD OF MAKING SECURE COMMUNICATION
A secure system 1 includes a requesting device (L01) which requests a communication, and a receiving device (L03) which receives a communication request from...
2016/0164874 MANAGEMENT OF DRONE OPERATIONS AND SECURITY IN A PERVASIVE COMPUTING ENVIRONMENT
A method to provide negotiation control to data such that a person or entity can negotiate the use of data gathered beyond what is needed for a particular use...
2016/0164873 ACCESS CONTROL FOR EVENT DATA STORED IN CLOUD-BASED DATA STORES
Embodiments are directed towards a system and method for a cloud-based front end that may abstract and enable access to the underlying cloud-hosted elements...
2016/0164872 SECURE COMMUNICATION NETWORK
The present invention is directed to a secure communication network that enables multi-point to multi-point proxy communication over the network. The network...
2016/0164871 FAIL-SAFE DISTRIBUTED ACCESS CONTROL SYSTEM
A distributed system includes two or more components, where at least one of the components is a Policy Decision Point (PDP). The PDP is capable of requesting...
2016/0164870 USER AUTHENTICATION BASED ON FOB/INDICIA SCAN
Embodiments of the invention are directed to systems, methods and computer program products for receiving a request from a user for access to at least one...
2016/0164869 Actively Federated Mobile Authentication
To make a trusted web service call, a client application sends a series of messages to obtain tokens that allow service requests to pass through a service...
2016/0164868 REMOTELY AUTHENTICATING A DEVICE
Remotely authenticating a device includes generating authentication data and secret key data in a controlled environment, sending the authentication data to a...
2016/0164867 NFC PACKAGE FOR STORING BIOMETRIC INFORMATION AND ELECTRONIC DEVICE
An electronic device includes a biometric sensor configured to generate biometric data by sensing a biometric characteristic and to encrypt the biometric a...
2016/0164866 SYSTEM AND METHOD FOR APPLYING DIGITAL FINGERPRINTS IN MULTI-FACTOR AUTHENTICATION
A method for multi-factor authentication with a first client includes receiving a request associated with the first client, initiating an authentication...
2016/0164865 CONFIGURABLE ELECTRONIC-DEVICE SECURITY LOCKING
An interface of an electronic device may be locked in accordance with an authorization confidence level indicating a likelihood that the electronic device is...
2016/0164864 CONVENIENT WIFI NETWORK ACCESS USING UNIQUE IDENTIFIER VALUE
A WiFi network manager stores a unique identifier value such as a network address associated with a communication device as being a valid credential for the...
2016/0164863 PROXY SERVER-BASED NETWORK SITE ACCOUNT MANAGEMENT
Disclosed are various embodiments for network site account management using a proxy server. A request for a secured resource on a network site is generated...
2016/0164862 METHOD, SYSTEM, AND PROGRAM PRODUCT FOR REMOTELY ATTESTING TO A STATE OF A COMPUTER SYSTEM
A method, system, and program product for remotely attesting to a state of computing system is provided. Specifically, the present invention allows a remote...
2016/0164861 Methods for Fraud Detection
Method and systems for validating a client user in a secured network are provided. Upon authentication, a user is supplied a login cookie that includes...
2016/0164860 Single Sign On Availability
Methods and computer program products relate to single sign on (SSO) availability including identifying a set of single sign on applications in a system in...
2016/0164859 Method, device, and system of accessing online accounts
Device, system, and method of accessing electronic mail. For example, a computerized method includes: receiving an identifier of an email account, and a...
2016/0164858 SHUTTING DOWN ACCESS TO ALL USER ACCOUNTS
Disclosed is a system and associated method or restricting access to a user's account via one or more account access channels. The system typically includes a...
2016/0164857 USER AUTHENTICATION BASED ON HISTORICAL TRANSACTION DATA
Embodiments are directed to systems, methods and computer program products for providing user authentication based on transaction data. Embodiments receive...
2016/0164856 DYNAMIC ACTIVATION OF SERVICE INDICATORS BASED UPON SERVICE PERSONNEL PROXIMITY
Embodiments of the invention provide a method, system and computer program product for dynamic activation of service indicators based upon service personnel...
2016/0164855 TWO FACTOR AUTHENTICATION WITH AUTHENTICATION OBJECTS
Representations of authentication objects are provided for selection via an interface. An authentication object may be generated to include information...
2016/0164854 SECURE CONTENT MESSAGING
Systems and methods are disclosed for secure messaging and content sharing. In one implementation, a processor receives a content item in a first format, the...
2016/0164853 METHOD FOR OPERATING A NETWORK AND A NETWORK
A method for operating a network in which a Software-Defined Networking (SDN) functionality between at least some of a plurality of elements of the network is...
2016/0164852 SYSTEM AND METHOD FOR DEVICE AUTHENTICATION
Various aspects of a system and a method for device authentication are disclosed herein. The system comprises one or more processors in a first communication...
2016/0164851 AUTHENTICATING MOBILE APPLICATIONS USING POLICY FILES
Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, at a first server, a key pair and a policy...
2016/0164850 LOCATION-BASED USER DISAMBIGUATION
Embodiments are directed to validating the identity of a user. In one scenario, a computer system determines that a login account has been created for a user,...
2016/0164849 Technologies For Synchronizing And Restoring Reference Templates
Generally, this disclosure describes technologies for restoring and/or synchronizing templates such as biometric templates to/among one or more client devices....
2016/0164848 Detection of Stale Encryption Policy By Group Members
Various techniques that allow group members to detect the use of stale encryption policy by other group members are disclosed. One method involves receiving a...
2016/0164847 PROCESS FOR THE USER-RELATED ANSWERING OF CUSTOMER INQUIRIES IN DATA NETWORKS
A process for the processing of user inquiries in a data network saves user data anonymized at first in an independent process with an independent third-party...
2016/0164846 METHOD OF DIGITAL IMAGES MANAGEMENT AND A DIGITAL IMAGES MANAGEMENT SYSTEM
A method of digital image management is described for a mobile device having both a camera capable of taking digital images and an ability to communicate with...
2016/0164845 IMPLEMENTING NETWORK COMMUNICATION
When a node device receives a packet transmitted from a device connecting with the node device, the node device searches a public network address of a next hop...
2016/0164844 Remote Access System for Using Scientific Algorithms in Local Data Processing
A remote access system for processing local data with a computing algorithm stores information on various computing algorithms available via the system. A...
2016/0164843 DATA TRANSMISSION SECURITY IMPROVEMENTS
A method of securely transmitting communication information from a first terminal operating in a first coordinate measurement domain to a second ...
2016/0164842 Secure Network Access
The present invention relates to a system and method for facilitating access to secure network sites, such as sites providing secure financial information. An...
2016/0164841 MEDIA DISTRIBUTION SYSTEM WITH MANIFEST-BASED ENTITLEMENT ENFORCEMENT
A method for enforcing entitlements includes configuring a wide variety of entitlements at a server; determining applicable combination of entitlements for a...
2016/0164840 NETWORK SECURITY PROCESSING
A method, and associated system, for security processing of a request for a resource in a network security system. The request for the resource is received...
2016/0164839 SECURITY-FOCUSED MONITORING SYSTEM
In some implementations, data from security monitoring devices of a facility is collected and analyzed within the facility and the results of the analysis is...
2016/0164838 VPN SERVER ACCESS METHOD AND VPN CLIENT
Disclosed in the embodiments of the present invention is a VPN server access method, comprising: acquiring an IP address assigned to a SIM card by a server at...
2016/0164837 CUSTOMIZABLE WEB APPLICATION FIREWALL FOR SOFTWARE AS A SERVICE PLATFORM
Disclosed herein are technologies for implementing a web application firewall specific to tenants, and providing different security rules that are particular...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.