At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Authenticating Customers and Managing Authenticated Sessions
Methods, systems, and computer-readable media for authenticating customers of an organization and managing authenticated sessions of various customers are...
TERMINAL DETERMINATION DEVICE AND METHOD
A terminal determination device includes a processor that executes a procedure. The procedure includes acquiring operation information indicating history of...
SYSTEM AND METHOD FOR PROVIDING A CERTIFICATE BY WAY OF A BROWSER
Provided is a system and method for providing a certificate by way of a Browser Extension. More specifically, provided is a Server System having at least one...
SYSTEMS AND METHODS FOR INTEGRATING WITH A NATIVE COMPONENT USING A
Embodiments as disclosed herein may provide systems and methods for component integration and security presented herein. In particular, in one embodiment, a...
METHODS AND SYSTEMS FOR A SUBSCRIPTION DATA SHARING SERVICE
An illustrative method according to a set of instructions stored on the memory of a computing device includes receiving, by a processor of the computing...
TRANSACTION QUERY ENGINE
Example implementations described herein are directed to a transaction query engine involving a token that is generated by the server and sent to the...
AUTHENTICATION INFORMATION ENCRYPTION SERVER APPARATUSES, COMPUTER
READABLE MEDIUMS AND METHODS
There is provided an authentication server apparatus connected with a terminal device through a network including a storage device configured to store pattern...
System and Method for Visualizing Data Sharing Arrangements for an
In various embodiments, the present disclosure relates to a method of graphically displaying, by a central server of a peer-to-peer folder sharing system, on a...
Systems, Methods, and Computer Program Products for Securely Managing Data
on A Secure Element
Systems, methods, and computer program products are provided for managing applets. A first request to personalize the first applet is received over a...
Open Access Network Secure Authentication Systems and Methods
Authentication of devices to receive services provided by service providers over communications networks such as open access networks, wherein the provider of...
System and Method for Providing Confidence Scores in a Persistent
An information handling system includes a plurality of input devices and an authentication engine. Each input device receives credential information and...
IMAGE FORMING APPARATUS, INFORMATION PROCESSING SYSTEM, AND NON-TRANSITORY
An image forming apparatus includes: a communicating unit which communicates with a portable terminal device and an external device; a storage control unit...
TECHNIQUES FOR FACILITATING SECURE, CREDENTIAL-FREE USER ACCESS TO
Techniques are disclose herein for facilitating secure user access to resources without user-provided credentials. More specifically, the techniques described...
MESSAGE COMMUNICATION SYSTEM AND OPERATION METHOD THEREOF
An operation method of a message communication system includes the following steps. At least one linking server generates a first login request. A management...
ENDPOINT SECURITY SCREENING
In order to prevent unauthorized access to information, a system may analyze and may selectively store the information provided based on requests from users...
USER AUTHENTICATION RELYING ON RECURRING PUBLIC EVENTS FOR SHARED SECRETS
An access manager manages access to a resource. At a first time, the access manager designates a variable attribute associated with a recurring public event as...
MANAGING DISTRIBUTION AND RETRIEVAL OF SECURITY KEY FRAGMENTS AMONG PROXY
A method performed by a processor of a computer, includes obtaining a security key associated with data, dividing the security key into key fragments, and...
SYSTEMS, METHODS AND DEVICES FOR DIRECT COMMUNICATION
Device to device (D2D) communication can be performed with packet data convergence protocol (PDCP) based encapsulation without internet protocol (IP)...
TAPE DRIVE ENCRYPTION IN THE DATA PATH
Implementations described and claimed herein provide encryption in the data path. In one implementation, login parameters from a primary data center are...
SECURE VIRTUALIZED MOBILE CELLULAR DEVICE
Secure virtualizing of a mobile cellular device uses a cellular communication network having base transceiver station edge node servers. A virtualized-instance...
COLLISION AVOIDANCE IN A DISTRIBUTED TOKENIZATION ENVIRONMENT
A client receives sensitive data to be tokenized. The client queries a token table with a portion of the sensitive data to determine if the token table...
Preventing Misuse of Code Signing Certificates
A method of authenticating or controlling a software application on an end user device. The method includes, at the end user device, downloading software...
CONFIGURING, CONTROLLING AND MONITORING COMPUTERS USING MOBILE DEVICES
A portable computing device captures imagery from a screen of a second computer, decodes information steganographically-encoded in the screen display, and uses...
METHOD AND DEVICE FOR DISTRIBUTING TRAFFIC BY USING PLURALITY OF NETWORK
INTERFACES IN WIRELESS COMMUNICATION...
A method and a device for distributing traffic by a terminal in a wireless communication system are provided. The method includes generating a first secure...
PROTECTING CONTENT INTEGRITY
A request for a resource of web content is received. It is determined whether the request identifies the resource using a transformed identifier that has been...
TRANSPARENT PROXY SYSTEM WITH AUTOMATED SUPPLEMENTAL AUTHENTICATION FOR
PROTECTED ACCESS RESOURCES
Techniques are disclosed herein for facilitating dynamic risk assessment and automated triggering of supplemental authentication for protected access...
PRIVATE CLOUD CONTROL
Management of IoT devices through a private cloud. An IoT device is coupled to a gateway. A request from the IoT device to connect to a private cloud, wherein...
LOAD BALANCING INTERNET PROTOCOL SECURITY TUNNELS
A load balancer is provided that can direct Internet Protocol Security (IPsec) traffic received from a single IPsec tunnel initiator to one of a plurality of...
Secure In-Band Signaling Method for Mobility Management Crossing Firewalls
An in-band signaling method that enables secure updates of a care-of-IP address for a mobile host that roams between access networks. In the illustrative...
FTP APPLICATION LAYER PACKET FILTERING METHOD, DEVICE AND COMPUTER STORAGE
Disclosed is a method for Application Specific Packet Filter (ASPF) of a File Transfer Protocol (FTP), including the following steps: when a Transmission...
METHOD AND SYSTEM FOR ACCESSING RESOURCE AND SYSTEM APPLYING THE SAME
A method and system for accessing resource and system applying the same are disclosed. One aspect provides a method of allocating a universal resource...
DYNAMIC LINK AGGREGATION
At least two Ethernet sub-interfaces are established on a first Ethernet interface and a second Ethernet interface of a first device, and each Ethernet...
SYSTEM AND METHOD FOR SMTP AND ALTERNATIVE EMAIL PROTOCOL INTEROPERABILITY
A system and method for migrating from the legacy SMTP protocol to an alternative email protocol, such as Bitmessage protocol, for sending email messages...
RESPONSE DEVICE, INFORMATION PROCESSING DEVICE, RESPONSE METHOD,
INFORMATION PROCESSING METHOD, AND...
A response device includes a memory, a reception unit, and a response unit. The memory stores a logical address and a physical address in a communication...
MANAGING MESSAGING SESSIONS AMONG MULTIPLE PARTICIPANTS
A method of managing a multi participant messaging session among session participants. The method comprises detecting electronic mails and instant messaging...
SYSTEM AND METHOD FOR TRACKING CONVERSATIONS
A system and method for tracking conversations is disclosed. The method includes receiving an alert, the alert comprising operation information of a machine,...
METHODS AND SYSTEMS FOR MANAGING A MULTI PARTICIPANT EVENT
A method for managing communication among a plurality of social network members. The method comprises defining a multi participant task, setting at least one...
PROMPTING USER ACTION IN CONJUNCTION WITH TAGGED CONTENT ON A SOCIAL
A social networking system user is prompted to take an action or is provided with additional information associated with a location where the user has...
The present invention relates to a new message system, including various methods, systems, processes, applications, and products relating to same. In one...
MESSAGE PROCESSING, FORWARDING AND FILTERING BASED ON ATTRIBUTE VALUES
Message processing, forwarding and filtering are able to be implemented based on attribute-values extracted from a message. By utilizing attributes within the...
SOCIAL MEDIA MESSAGE DELIVERY BASED ON USER LOCATION
An approach for delaying social media messages is provided herein. A first computing device receives user preferences. The first computing device detects a...
System and methods for using message thread-recurrent data to implement
internal organizational processes
A method, system, computer program product, and related business methods are described in the context of a web-based business information system having an...
CONNECTION SHARING ACROSS ENTITIES IN A DISTRIBUTED MESSAGING SYSTEM
A method of creating a link of a connection to a messaging system includes receiving a protocol command message directed to a message entity of the messaging...
SYSTEM AND METHOD FOR SECURING ELECTRONIC MESSAGES
A secure communication system (100), a method to make same, and method to use that provides security and privacy of electronic communication. The secure...
PROCESSING CONNECTION REQUEST IN ONLINE SERVICE
Disclosed is a system and method for processing a connection request in an online service by a server corresponding to the online service. A connection request...
SYSTEM, METHOD AND COMPUTER READABLE MEDIUM FOR PROCESSING UNSOLICITED
An internet service provider (ISP) is configured to analyze a subscriber's sent e-mail packets to determine a subscriber identity associated with the e-mail...
MESSAGE CHALLENGE RESPONSE
A system and method are disclosed for registering a email sender for the purpose of sending an email message to an email receiver including receiving a...
Method And System For Managing Mass Delivery Of Audio Messages
In some embodiments, systems and methods disclosed herein facilitate mass delivery of audio messages to communication devices operated by recipients. Such a...
METHODS AND SYSTEMS FOR PROCESSING INFORMATION IN A NETWORK
Methods and systems for presenting information on a computing device in a network are disclosed. The method includes registering the computing device with the...
System, Method, and Apparatus for Providing Prayers over a Network
Provided is a computer-implemented method, system, and apparatus for displaying at least one prayer on at least one client device including at least one...