Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0173501 MANAGING ELECTRONIC ACCOUNT ACCESS CONTROL
In general, embodiments of the present invention provide systems, methods and computer readable media for controlling access to an electronic account. In some...
2016/0173500 MULTI-TENANT SECURITY IN THE CLOUD
A cloud asset manager can securely provide multi-tenant access to remote assets while preserving isolation across tenants. The remote asset manager defines...
2016/0173499 RECOMMENDATION SCHEMA FOR STORING DATA IN A SHARED DATA STORAGE NETWORK
A shared data storage network, such as a peer-to-peer network, is managed according to individual member trust level. Members of the storage network make their...
2016/0173498 IDENTITY AUTHENTICATION SYSTEM, APPARATUS, AND METHOD, AND IDENTITY AUTHENTICATION REQUEST APPARATUS
The present invention provides an identity authentication system, apparatus and method and an identity authentication request apparatus. The system includes:...
2016/0173497 USER AUTHENTICATION BASED ON SELF-SELECTED PREFERENCES
Embodiments of the invention are directed to a system, method, and a computer program product for a user authentication based on self-selected preferences. The...
2016/0173496 APPARATUS MANAGEMENT SYSTEM, INFORMATION TERMINAL, APPARATUS MANAGEMENT APPARATUS, AND APPARATUS MANAGEMENT METHOD
An apparatus management system managing an apparatus through an information terminal includes a transmission part configured to transmit terminal information...
2016/0173495 SYSTEM AND METHOD FOR PROVIDING AUTHENTICATION SERVICE FOR INTERNET OF THINGS SECURITY
A system and method for providing authentication service for IoT security are disclosed herein. The system for providing authentication service for IoT...
2016/0173494 Gesture-Based Signature Authentication
Embodiments of the invention are generally directed to systems, methods, devices, and machine-readable mediums for implementing gesture-based signature...
2016/0173493 APPARATUSES, METHODS AND SYSTEMS FOR CONFIGURING A TRUSTED JAVA CARD VIRTUAL MACHINE USING BIOMETRIC INFORMATION
Apparatuses, methods, and systems are provided for securely configuring a Java Card virtual machine operating on a cellular device's application processor. In...
2016/0173492 AUTHENTICATION METHOD USING BIOMETRIC INFORMATION AND ELECTRONIC DEVICE THEREFOR
An authentication method using biometric information and an electronic device. An authentication method using biometric information in an electronic device...
2016/0173491 METHOD AND SYSTEM FOR SHARING TWO-FACTOR AUTHENTICATORS TO ACCESS ELECTRONIC SYSTEMS
A storage server is provided and configured to: receive a time-based access code from a computing device of a customer having an account with a resource...
2016/0173490 TRUSTED SERVICE INTERACTION
In one embodiment a controller comprises logic configured to define, for display on a region of a display device coupled to the controller, a dialog box, lock...
2016/0173489 COMMUNICATION USING OVER-THE-TOP IDENTITIES WITHOUT CENTRALIZED AUTHORITY
Various communication systems may benefit from ways of communicating in the absence of a centralized authority. For example, certain wireless communication...
2016/0173488 MANAGEMENT OF CERTIFICATE AUTHORITY (CA) CERTIFICATES
Systems and methods for automatically installing CA certificates received from a network security appliance by a client security manager to make the CA...
2016/0173487 CONTROLLING A DISCOVERY COMPONENT, WITHIN A VIRTUAL ENVIRONMENT, THAT SENDS AUTHENTICATED DATA TO A DISCOVERY...
A discovery bundle component is applied in a virtual image deployed within a virtual environment, wherein the discovery bundle automatically discovers asset...
2016/0173486 METHOD AND SYSTEM FOR AUTOMATING SUBMISSION OF ISSUE REPORTS
A method for automating the submission of issue reports includes automatically capturing information and images related to a software user, receiving a request...
2016/0173485 SYSTEM AND METHOD FOR RECOGNIZING MALICIOUS CREDENTIAL GUESSING ATTACKS
A first identity claim and a first attempt to prove password possession are received. As a result of determining that the first attempt to prove password...
2016/0173484 USER AUTHENTICATION BASED ON OTHER APPLICATIONS
The present invention includes a system for authenticating a second action based on a first action, wherein the system is configured to: receive a first...
2016/0173483 AUTOMATED ACCESS DATA PROVISIONING
A method is disclosed. The method includes transmitting by a computing device, an account creation request to a remote server computer. The method further...
2016/0173482 CU LOGIN METHOD AND SYSTEM
The invention discloses a CU login method and system. The method is applied to a multi-platform interconnection and intercommunication VSS based on a structure...
2016/0173481 Convenient Login Method, Apparatus and System for Automatically Detecting and Filling in Login Field within Web...
A convenient login method, apparatus and system for automatically detecting and filling in a login field within a web environment or an application are...
2016/0173480 USER AUTHENTICATION USING UNIQUE HIDDEN IDENTIFIERS
Systems and methods are provided for user authentication using hidden unique identifiers in networks. In some example embodiments these systems and methods...
2016/0173479 Terminal Authentication Method, Apparatus, and System in Passive Optical Network
A terminal authentication method in a passive optical network (PON) which includes, receiving, by the optical line terminal (OLT), a registration request that...
2016/0173478 PROVIDING AUTHENTICATION USING PREVIOUSLY-VALIDATED AUTHENTICATION CREDENTIALS
Embodiments of the invention are directed to systems, methods and computer program products for providing authentication using previously-validated...
2016/0173477 PROVIDING AUTHENTICATION USING PREVIOUSLY-VALIDATED AUTHENTICATION CREDENTIALS
Embodiments of the invention are directed to systems, methods and computer program products for providing authentication using previously-validated...
2016/0173476 CREDENTIAL VALIDATION USING MULTIPLE COMPUTING DEVICES
A tool for credential validation using multiple computing devices. The tool select at least one challenge question. The tool selects two or more user owned...
2016/0173475 MULTI-TENANCY IDENTITY MANAGEMENT SYSTEM
A multi-tenant identity management (IDM) system enables IDM functions to be performed relative to various different customers' domains within a shared cloud...
2016/0173474 Method, Device And System For Network-Based Remote Control Over Contactless Secure Storages
A typical system environment comprises a terminal device, a secure storage subsystem, and an interconnectivity component. The terminal device has a network...
2016/0173473 METHOD FOR AUTHENTICATING A USER, CORRESPONDING SERVER, COMMUNICATIONS TERMINAL AND PROGRAMS
A method is provided for authenticating a user's communications terminal with an authentication server connected to a gateway terminal by using a ...
2016/0173472 METHOD FOR EXCHANGING NUMERICAL DATA FRAMES AND ASSOCIATED COMMUNICATION SYSTEM
The present invention relates to a method that may be used in a digital data communication system comprising a communication network constituted of a plurality...
2016/0173471 TRANSMISSION SYSTEM, MANAGEMENT SYSTEM, TERMINAL, METHOD OF TRANSMISSION AND PROGRAM
There is provided a transmission system, the terminal including: an additional information acquiring unit configured to acquire additional information...
2016/0173470 APPARATUS AND METHOD FOR PROVIDING POSITIONING DATA BASED ON AUTHENTICATION RESULT
Aspects of the disclosure include a technique for providing positioning data based on an authentication result. The technique includes receiving authentication...
2016/0173469 WIRELESS NETWORK SERVICE PROVISION METHOD AND SYSTEM
Provided in the present invention are a wireless network service provision method and system, which relate to the technical field of network security. The...
2016/0173468 INTEGRATION OF CENTRALIZED AND LOCAL AUTHORIZATIONS FOR MULTI-DIMENSIONAL DATA
The present disclosure describes methods, systems, and computer program products for integrating authorizations. One computer-implemented method includes:...
2016/0173467 DOCUMENT COLLABORATION THROUGH NETWORKING CREDENTIALS
A productivity application may enable users to create, edit, and share content in a collaborative environment. Document collaboration through networking...
2016/0173466 HTTP HEADER-BASED ADAPTABLE AUTHENTICATION MECHANISM
The disclosure is generally directed to systems and methods for HTTP header-based authentication. For example, the systems and methods include receiving, at a...
2016/0173465 TECHNOLOGIES FOR VERIFYING AUTHORIZED OPERATION OF SERVERS
Technologies for verifying authorized operation includes an administration server to query a dual-headed identification device of a server for identification...
2016/0173464 Media Session Resumption in Web Session Restoration
A call establishing method comprising registering with a server to obtain authorization credentials, obtaining a client encryption key using the authorization...
2016/0173463 LOCAL SECURITY KEY GENERATION
A calling device may obtain a first calling security parameter by registering with a network and obtain a second calling security parameter in response to...
2016/0173462 APPARATUS FOR SECURE HEARING DEVICE COMMUNICATION AND RELATED METHOD
The disclosure provides a client device for hearing device communication and related method. The client device comprises a processing unit, a memory unit, and...
2016/0173461 UTILIZATION OF A PROTECTED MODULE TO PREVENT OFFLINE DICTIONARY ATTACKS
Various technologies pertaining to authenticating a password in a manner that prevents offline dictionary attacks are described. A protected module, which can...
2016/0173460 POWER AND COST EFFICIENT PERIPHERAL INPUT
Systems and methods may provide for receiving, at a controller of a first device having a host processor, user input data and converting the user input data...
2016/0173459 METHOD FOR ENSURING MEDIA STREAM SECURITY IN IP MULTIMEDIA SUB-SYSTEM
A method for ensuring media stream security in an IP Multimedia Subsystem network is disclosed. The method includes: assigning an end-to-end media stream...
2016/0173458 Method of Encrypting and Transferring Data Between a Sender and a Receiver Using a Network
A method of encrypting and transferring data between a sender and a receiver in a secure manner is disclosed. The method includes steps of a server receiving...
2016/0173457 TECHNIQUES FOR SECURING SUPPLY CHAIN ELECTRONIC TRANSACTIONS
Techniques for authenticating the identity of shippers and receivers of goods at each point along a supply chain. A central hub repository issues shippers and...
2016/0173456 Dynamic Spectrum Audio Encryption and Decryption Device
A dynamic spectrum audio encryption and decryption device is connected to a cell phone. The dynamic spectrum audio encryption and decryption device generates a...
2016/0173455 METHOD AND SYSTEM FOR DIGITAL RIGHTS MANAGEMENT of ENCRYPTED DIGITAL CONTENT
Various aspects of a method and system for digital rights management of encrypted digital content are disclosed herein. The method includes determination of a...
2016/0173454 JURISDICTIONAL CLOUD DATA ACCESS
A request from a first user to access data stored in a first location is received. A profile of the first user is determined, wherein the profile includes one...
2016/0173453 PERSONAL AUTHENTICATION AND ACCESS
A user of a system defines a limited use access token for an external user for that external user to access defined resources of the system based on the user's...
2016/0173452 MULTI-CONNECTION SYSTEM AND METHOD FOR SERVICE USING INTERNET PROTOCOL
Disclosed are a multi-connection system (MCS) and method for a service using an Internet protocol. The MCS includes a plurality of proxies; an MCS client to...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.