Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0191520 OFFLINE METHODS FOR AUTHENTICATION IN A CLIENT/SERVER AUTHENTICATION SYSTEM
A method for providing authentication of a user of a recipient unit when the recipient unit is off-line includes storing one or a plurality of one-time...
2016/0191519 COMPETENCY BASED DEVICE ACCESS
A system and method are provided to enable competency based device access. The ability for a user to use a particular device may require demonstration of a...
2016/0191518 Online Pseudonym Verification and Identity Validation
Methods, systems, and computer program products for authenticating an online user. Authentication involves sending a code from a server to a user device...
2016/0191517 METHOD AND APPARATUS FOR AUTHENTICATING USER BASED ON BIOSIGNAL
A method and apparatus for authenticating a user are provided. An authentication apparatus includes a data set generator configured to generate an...
2016/0191516 Method and System For Distinguishing Humans From Machines
A method and an apparatus for distinguishing humans from computers. During user registration, a computer prompts a human user to provide a spoken response to...
2016/0191515 USER AUTHENTICATION METHOD AND ELECTRONIC DEVICE PERFORMING USER AUTHENTICATION
Provided are a user authentication method and an electronic device performing the method. The method is performed under the control of a processor and includes...
2016/0191514 SECURE TRANSACTION AND ACCESS USING INSECURE DEVICE
The present invention enables secure transactions or access using insecure endpoint devices, such as computers, tablets and smart-phones. These insecure...
2016/0191513 BINDING A DATA TRANSACTION TO A PERSON'S IDENTITY USING BIOMETRICS
Methods and systems are described for binding a data transaction to a person's identity using biometrics. The method comprises the generation of data which...
2016/0191512 PREDICTIVE USER AUTHENTICATION
In an example, a system and method for predictive user authentication is disclosed. The system may include proximity sensors, computer vision systems, and...
2016/0191511 WEARABLE DEVICE AUTHENTICATION
A wearable device is used to authenticate a user into a user account at a user device of the user. In particular, the wearable device may include a sensor...
2016/0191510 SECURITY AND PRIVACY ENHANCEMENTS FOR SECURITY DEVICES
A tamper-resistant security device, such as a subscriber identity module or equivalent, has an AKA (Authentication and Key Agreement) module for performing an...
2016/0191509 Methods and Systems for Key Sharding of Objects Stored in Distributed Storage System
The present disclosure also provides systems and methods for sharding objects stored in a distributed storage system. In accordance with one embodiment...
2016/0191508 Methods and Systems for Block Sharding of Objects Stored in Distributed Storage System
The present disclosure provides systems and methods for sharding objects stored in a distributed storage system. In accordance with one embodiment disclosed...
2016/0191507 SYSTEMS AND METHODS FOR AUTHENTICATING A USER DEVICE FOR A WEB SERVICE
An instant access device may receive a request from a user device to access secure content corresponding to a particular web service. The instant access device...
2016/0191506 Mobile Secure Login System and Method
A mobile secure login method comprises steps of 1) displaying a machine readable graphic form encoded with a sign in URL and a unique token on a browser,...
2016/0191505 CAPTCHA IMAGE SCRAMBLE
In one embodiment, a client computing device receives information regarding a Completely Automated Public Turing Test to Tell Computers and Humans Apart...
2016/0191504 MOBILE TERMINAL FOR PROVIDING ONE TIME PASSWORD AND OPERATING METHOD THEREOF
Provided are a mobile terminal for providing a one-time password (OTP) and an operation method thereof. The mobile terminal includes a first one-time password...
2016/0191503 PEER TO PEER ENTERPRISE FILE SHARING
Disclosed are various embodiments for facilitating the distribution of files from a file repository. Files from a file repository can be distributed via peer...
2016/0191502 DUAL LAYER TRANSPORT SECURITY CONFIGURATION
A system includes a first computer processor that receives a data transmission from a second computer processor. The data transmission includes a client...
2016/0191501 METHOD, DEVICE AND SYSTEM FOR CONFIGURING MULTIPLE DEVICES
Embodiments of the present invention provide a method, device and system for configuring multiple devices, where multiple devices are configured simply and...
2016/0191500 CONSOLIDATED AUTHENTICATION
A method and system for authenticating a user at a first computer to first and second applications installed in a second computer. The second computer receives...
2016/0191499 Shared Secret Vault for Applications with Single Sign On
Some aspects of the disclosure generally relate to providing single sign on features in mobile applications in a secure environment using a shared vault. An...
2016/0191498 USER AUTHENTICATION BASED ON PERSONAL ACCESS HISTORY
Methods and systems are provided for authenticating a user using data related to the historical interactions of the user with computer based applications.
2016/0191497 METHOD AND SYSTEM FOR MANAGING DATA
The system has a user terminal. A client provides access for the user terminal to data entries stored in a database. A database holds information consisting of...
2016/0191496 ESTABLISHING ACCESS TO A SECURE NETWORK BASED ON USER-CREATED CREDENTIAL INDICIA
In various aspects, code-based indicia contain secured network access credentials. In some aspects, a computer processor receives user input that specifies...
2016/0191495 PRIVILEGED SHARED ACCOUNT PASSWORD SANITATION
Sanitizing passwords used in a shared, privileged account includes providing a password of a shared account to a user; identifying a first machine logged into...
2016/0191494 METHOD AND APPARATUS FOR SECURING A MOBILE APPLICATION
Methods, apparatus, and systems for personalizing a software token using a dynamic credential (such as a one-time password or electronic signature) generated...
2016/0191493 SYSTEM AND METHOD OF AUTHENTICATING A LIVE VIDEO STREAM
A method of authenticating a video streaming transmission comprising generating a secure token at an application server, providing the secure token to a user...
2016/0191492 METHOD AND DEVICE FOR TRANSFERRING RESOURCES
The present disclosure discloses a method and a device for transferring resources. The method for transferring resources includes: receiving a resource...
2016/0191491 SINGLE LOGIN PROCEDURE FOR ACCESSING SCOIAL NETWORK INFORMATION ACROSS MULTIPLE EXTERNAL SYSTEMS
A social networking system contains information describing users of the social network and various connections among the users. A user can access multiple...
2016/0191490 IDENTIFY A RADIO FREQUENCY EMITTING DEVICE BY MAC ADDRESS
A computer system reports "logical usage pattern data" and location information in a Device Report; in addition, another computer system reports MAC addresses...
2016/0191489 METHOD FOR ASSIGNING AN AGENT DEVICE FROM A FIRST DEVICE REGISTRY TO A SECOND DEVICE REGISTRY
An agent device is registered in a first device registry maintained by a first registry apparatus for authenticating agent devices for communicating with...
2016/0191488 NETWORK WATERMARK
A network communications method utilizing a network watermark for providing security in the communications includes creating a verifiable network...
2016/0191487 NETWORK WATERMARK
A network communications method utilizing a network watermark for providing security in the communications includes creating a verifiable network...
2016/0191486 TRANSPARENT CLIENT AUTHENTICATION
A system and method for authenticating an application (client) to a server or service. During a registration phase, an application that requests access to a...
2016/0191485 SYSTEMS AND METHODS FOR SITE DATA COLLECTION
A system and method for collecting, storing, maintaining and presenting data to optimize and make more efficient the installation of a communication system. A...
2016/0191484 Secure Inmate Digital Storage
A method for providing personal digital storage for residents of a secure facility includes receiving a resident's login information and verifying the login...
2016/0191483 Universal Connector
A Universal Connector ("UC") ecosystem includes encrypted twin (first and second) communications stacks configured to supervise persistent connectivity with...
2016/0191482 SYSTEM AND METHOD FOR PROVIDING AUTHENTICATED COMMUNICATIONS FROM A REMOTE DEVICE TO A LOCAL DEVICE
A method and system for enabling authenticated communications between a local device and a remote device over a network. An authentication service verifies...
2016/0191481 ENCRYPTION KEY RETRIEVAL
Particular embodiments described herein provide for an electronic device that can be configured to include an authentication module. The authentication module...
2016/0191480 RECORDING DATA AND USING THE RECORDED DATA
A method and system for recording data including content in a recording medium on a computer apparatus. First encrypted data, obtained by encrypting the data...
2016/0191479 SECURITY FRAMEWORK FOR MEDIA PLAYBACK
Disclosed are various embodiments relating to a security framework for media playback. In one embodiment, a client device has a decryption module, a streaming...
2016/0191478 METHOD AND COMPUTING DEVICE FOR INTEGRATING A KEY MANAGEMENT SYSTEM WITH PRE-SHARED KEY (PSK)-AUTHENTICATED...
A method and computing device for integrating a key management system with a Pre-Shared Key (PSK)-authenticated Internet Key Exchange (IKE). The method...
2016/0191477 AUTOMATIC SECURITY PARAMETER MANAGEMENT AND RENEWAL
A method of automatic security parameter renewal includes determining if a security parameter satisfies a renewal condition, and automatically updating the...
2016/0191476 KEY MANAGEMENT FOR COMPROMISED ENTERPRISE ENDPOINTS
Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple...
2016/0191475 DATA ACCESSING METHOD AND SYSTEM AND MEMORY STORAGE APPARATUS
A data accessing method and system for a memory storage apparatus are provided. The method includes: performing a near field communication between a memory...
2016/0191474 METHODS AND SYSTEMS FOR PROVIDING A CUSTOMIZED NETWORK
A computer implemented method and apparatus is disclosed that includes programming to generate, spawn, or invoke a mother script in a virtual computing...
2016/0191473 Method And Apparatus For Securing An Application Using A Measurement Of A Location Dependent Physical Property...
Methods, apparatus, and systems for authenticating a user taking into account measurement values of characteristics of the purported environment of the user...
2016/0191472 SYSTEM AND METHOD OF SENDING AND RECEIVING SECRET MESSAGE CONTENT OVER A NETWORK
The proliferation of personal computing devices in recent years, especially mobile personal computing devices, has led to increased concerns regarding the...
2016/0191471 SECURITY KEY GENERATION AND MANAGEMENT METHOD OF PDCP DISTRIBUTED STRUCTURE FOR SUPPORTING DUAL CONNECTIVITY
The present disclosure relates to a pre-5.sup.th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.