Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0182494 DISTRIBUTED DEVICE MANAGEMENT AND DIRECTORY RESOLUTION
Systems and methods for file synchronization using P2P technology are provided. In some embodiments, a method of operating a device associated with a user for...
2016/0182493 Controlled Token Distribution to Protect Against Malicious Data and Resource Access
Techniques are described for controlling data and resource access. For example, methods and systems can facilitate controlled token distribution across systems...
2016/0182492 DETERMINING THE REPUTATION OF A DIGITAL CERTIFICATE
Particular embodiments described herein provide for an electronic device that can be configured to identifying a digital certificate associated with data and...
2016/0182491 METHODS, SYSTEMS AND APPARATUS TO MANAGE AN AUTHENTICATION SEQUENCE
Methods, apparatus, systems and articles of manufacture are disclosed to manage an authentication sequence. An example disclosed apparatus includes a...
2016/0182490 SENDING AUTHENTICATION CODES TO MULTIPLE RECIPIENTS
Systems and methods of the present invention provide for one or more server computers communicatively coupled to a network and configured to: receive a request...
2016/0182489 METHOD AND APPARATUS FOR ENABLING A SINGLE SIGN-ON ENABLED APPLICATION TO ENFORCE AN APPLICATION LOCK
A single sign-on server associated with a single sign-on client authenticates a user of a device. Subsequent to the authenticating, the single sign-on client...
2016/0182488 Pass-Thru for Client Authentication
This disclosure pertains generally to client authentication. One aspect of the disclosure relates to a first server for presenting evidence to a Domain...
2016/0182487 PERMISSION ARCHITECTURE FOR REMOTE MANAGEMENT AND CAPACITY INSTANCES
When a user inputs an action request, such as a requested command, to be performed on a target machine, a management system receives the request and verifies...
2016/0182486 SPACE-TIME SEPARATED AND JOINTLY EVOLVING RELATIONSHIP-BASED NETWORK ACCESS AND DATA PROTECTION SYSTEM
A network security system that employs space-time separated and jointly-evolving relationships to provide fast network access control, efficient real-time...
2016/0182485 METHOD AND DEVICE FOR CONTROLLING WEB PAGE TO INVOKE SYSTEM FUNCTION, AND STORAGE MEDIUM THEREOF
The disclosure discloses a method and device for controlling a web page to invoke a system function, and storage medium thereof. the method includes: parsing,...
2016/0182484 AUTHENTICATION-FREE CONFIGURATION FOR SERVICE CONTROLLERS
Embodiments generally relate to out-of-band management of a computing system. The present technology discloses enable a primary service controller to provide a...
2016/0182483 INFORMATION RECORDING APPARATUS
An information recording apparatus has a drive unit to record digital information including digital contents; and a host unit to control reading and writing of...
2016/0182482 APPARATUS AND METHOD FOR CONTROLLING DISPLAY IN ELECTRONIC DEVICE HAVING PROCESSORS
The present disclosure relates to a sensor network and Internet of Things (IoT) as applied to intelligent services based technologies such as smart home, smart...
2016/0182481 METHOD FOR AUTHENTICATING A DEVICE
Present system relates to a method for authenticating a first device, the method being executed by a second device, the second device comprising a database,...
2016/0182480 SYSTEMS AND METHODS OF GEO-LOCATION BASED COMMUNITY OF INTEREST
The embodiments described herein recite a geo-location based community of interest (CIO) system and method that add the capability to configure Network Connect...
2016/0182479 NO PASSWORD USER ACCOUNT ACCESS
Various embodiments of the present technology enable users to sign in to an account without a password. For example, when receiving a request to register a...
2016/0182478 COMMUNICATION DEVICE AND SYSTEM, DATA PROCESSING METHOD AND METHOD FOR SECURE DATA EXCHANGE
The present invention relates to a method for processing data in a communication device comprising a host and a security module associated with this host. This...
2016/0182477 DEVICES AND METHOD FOR MTC GROUP KEY MANAGEMENT
In order to improve security upon distributing a group key, there is provided a gateway (20) to a core network for a group of MTC devices (10_1-10_n)...
2016/0182476 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM
To be capable of guaranteeing security without dependency on a distance of wireless communication while maintaining convenience of a key apparatus, there is...
2016/0182475 LOW-COST AUTHENTICATED SIGNING DELEGATION IN CONTENT CENTRIC NETWORKING
One embodiment provides a system that delegates signature production in a CCN. During operation, a first content producing device monitors content objects...
2016/0182474 SECONDARY COMMUNICATIONS CHANNEL FACILITATING DOCUMENT SECURITY
Disclosed are various embodiments for facilitating the sharing of files or documents on behalf of a sending user to a recipient user. A secured file is...
2016/0182473 MULTI-FACETED COMPUTE INSTANCE IDENTITY
A compute instance of a virtual computing service (VCS) is assigned first and second cryptographically verifiable identities (CVIs) within respective...
2016/0182472 Binding White-Box Implementation To Reduced Secure Element
A non-transitory machine-readable storage medium encoded with instructions for a keyed cryptographic operation having a first and second portion for execution...
2016/0182471 NETWORK SECURITY BROKER
Certain methods and systems are described to provide security for sending and receiving data over unsecured networks. In an example a security broker (260) is...
2016/0182470 Data Security Operations With Expectations
A cryptography service allows for management of cryptographic keys and for the evaluation of security expectations when processing incoming requests. In some...
2016/0182469 Information Handling System Secure RF Wireless Communication Management with Out-of-Band Encryption Information...
A server information handling system baseboard management controller (BMC) includes an NFC transceiver that communicates NFC signals through an NFC antenna...
2016/0182468 SYSTEM AND METHOD FOR SECURE TRANSMISSION OF MEDIA CONTENT
A system that incorporates teachings of the present disclosure may include, for example, a gateway comprising a controller to receive from a communication...
2016/0182467 ADJUSTABLE PROXY RE-ENCRYPTION
Methods, systems, and computer-readable storage media for proxy re-encryption of encrypted data stored in a first database of a first server and a second...
2016/0182466 TransDRM for Streaming Media
A method for trans-muxing media content into various consumption formats in a content delivery network, the method comprising the steps of reading a server...
2016/0182465 Client-side encryption with DRM
A technique for extending security to a data object (e.g., a document, a file, a message, etc.) once it has been shared and during collaboration with others...
2016/0182464 TECHNIQUES FOR SECURING DELIVERY OF AN AUDIO MESSAGE
Techniques for securing the delivery of an audio message on a device are described. A method may include receiving a message encrypted with a public key from a...
2016/0182463 SECURE COMMUNICATION DEVICE AND METHOD
A security enhancement to IPSec processing is achieved by changing the algorithms used at each re-key after expiration or termination of a Security Association...
2016/0182462 DATA VIEW BASED ON CONTEXT
In an implementation, a view of a set of data may be based on a context. The context may include an attribute associated with an attribute list. A set of...
2016/0182461 TECHNIQUE FOR SECURELY COMMUNICATING AND STORING PROGRAMMING MATERIAL IN A TRUSTED DOMAIN
A "trusted domain" is established within which content received from a communications network, e.g., a cable TV network, is protected from unauthorized copying...
2016/0182460 RECOVERY FROM DECRYPTION ERRORS IN A SEQUENCE OF COMMUNICATION PACKETS
A method in a receiver includes receiving from a transmitter a sequence of communication packets, which carry data encrypted with an encryption scheme. The...
2016/0182459 SYSTEM AND METHOD FOR SECURELY CONNECTING NETWORK DEVICES
A platform, apparatus and method for Internet of Things Implementations. For example, one embodiment of a system comprises: an Internet of Things (IoT) hub...
2016/0182458 END-TO-END SECURITY FOR VIRTUAL PRIVATE SERVICE CHAINS
A first virtual machine is established in a virtual private service chain to provide a first network service to virtual private service chain traffic. A second...
2016/0182457 PROVIDING SECURE COMMUNICATION AND/OR SHARING OF PERSONAL DATA VIA A BROADBAND GATEWAY
A broadband gateway may manage confidential data associated with users in a home network managed and/or serviced by the broadband gateway. The broadband...
2016/0182456 System and Method to Associate a Private User Identity with a Public User Identity
The inventive system includes a host, a network including a security gateway, and a public application. Established are an access session between the network...
2016/0182455 METHOD AND APPARATUS FOR THREAT ISOLATION AND REMOTE RESOLUTION FOR COMPUTER SYSTEMS
A method and system providing remote access for threat removal to a computer system. A remote virtual private network (VPN) connection is established to an...
2016/0182454 Real-Time Reconfigurable Web Application Firewall For a Distributed Platform
Some embodiments provide reconfigurable web application firewall (WAF) functionality across a distributed platform. Specifically, the WAF function at each...
2016/0182453 Anti-Replay Method and Apparatus
An anti-replay method and apparatus are provided. The same maximum agreed value is set at a transmit end and a receive end. The receive end receives an...
2016/0182452 SYSTEMS AND METHODS OF GEO-LOCATION BASED COMMUNITY OF INTEREST
The embodiments described herein recite a geo-location based community of interest (COI) system and method which add the capability to configure Network...
2016/0182451 DYNAMIC RE-ORDERING OF SCANNING MODULES IN SECURITY DEVICES
A method and apparatus are provided for preserving bandwidth of a security gateway by dynamically placing a module with a highest ratio of block rate to...
2016/0182450 LOAD BALANCING IN A NETWORK WITH SESSION INFORMATION
Methods and systems for balancing load among firewall security devices (FSDs) are provided. According to one embodiment, session data, including session...
2016/0182449 SYSTEM AND METHOD FOR N PORT ID VIRTUALIZATION (NPIV) LOGIN LIMIT INTIMATION TO CONVERGED NETWORK ADAPTOR (CNA)...
Aspects of the present invention include an NPG system that can stop the CNA from requesting a login if the system has reached the ACL login limit. In...
2016/0182448 SCANNER ENABLED WITH A SECURE INPUT/OUTPUT (I/O) MODULE (SIOM)
A scanner is enabled for communication with a Secure Input/Output (I/O) Module (SIOM) using a secure communication protocol. The SIOM is provisioned with a...
2016/0182447 ASSIGNMENT OF TENANCY TO DEVICES
A method of assigning tenancy to a device during bootstrapping between a device and a server in a network includes transmitting a device identifier to a...
2016/0182446 Method and system for resolving Internet of Things heterogeneous identifiers
The present invention relates to a method and system for resolving Internet of Things heterogeneous identifiers. The method provides a special description...
2016/0182445 MOBILE CELLULAR NETWORK BACKHAUL
A mobile cellular network (MCN) communication system can provide an independent mobile cellular network to devices within a covered area. In addition, the MCN...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.